Sciweavers

1769 search results - page 14 / 354
» Cryptography
Sort
View
TCC
2007
Springer
94views Cryptology» more  TCC 2007»
15 years 8 months ago
Does Privacy Require True Randomness?
Carl Bosley, Yevgeniy Dodis
ACNS
2006
Springer
102views Cryptology» more  ACNS 2006»
15 years 8 months ago
Combinatorial Structures for Design of Wireless Sensor Networks
Dibyendu Chakrabarti, Jennifer Seberry
81
Voted
ACNS
2005
Springer
93views Cryptology» more  ACNS 2005»
15 years 8 months ago
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management
Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaj...
73
Voted
ACNS
2005
Springer
106views Cryptology» more  ACNS 2005»
15 years 8 months ago
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords
Jin Wook Byun, Dong Hoon Lee
95
Voted
ACNS
2005
Springer
79views Cryptology» more  ACNS 2005»
15 years 8 months ago
Intrusion-Resilient Secure Channels
Gene Itkis, Robert McNerney, Scott Russell