Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
1562
search results - page 17 / 313
»
Mathematics, Cryptology, Security
Sort
relevance
views
votes
recent
update
View
thumb
title
17
click to vote
FC
2004
Springer
119
views
Cryptology
»
more
FC 2004
»
Usability and Acceptability of Biometric Security Systems
14 years 1 months ago
Download
www.andrewpatrick.ca
Andrew S. Patrick
claim paper
Read More »
22
click to vote
CHES
2003
Springer
97
views
Cryptology
»
more
CHES 2003
»
On the Security of PKCS#11
14 years 1 months ago
Download
www.chesworkshop.org
Jolyon Clulow
claim paper
Read More »
19
click to vote
MYCRYPT
2005
Springer
123
views
Cryptology
»
more
MYCRYPT 2005
»
On Session Key Construction in Provably-Secure Key Establishment Protocols
14 years 1 months ago
Download
eprint.iacr.org
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
claim paper
Read More »
19
click to vote
ACNS
2010
Springer
125
views
Cryptology
»
more
ACNS 2010
»
On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption
14 years 24 days ago
Download
eprint.iacr.org
Aurélie Bauer, Jean-Sébastien Coron,...
claim paper
Read More »
21
click to vote
CTRSA
2001
Springer
139
views
Cryptology
»
more
CTRSA 2001
»
Security Weaknesses in Bluetooth
14 years 14 days ago
Download
www.cse.sc.edu
We point to three types of potential vulnerabilities in the
Markus Jakobsson, Susanne Wetzel
claim paper
Read More »
« Prev
« First
page 17 / 313
Last »
Next »