Sciweavers

1562 search results - page 9 / 313
» Mathematics, Cryptology, Security
Sort
View
FC
1998
Springer
98views Cryptology» more  FC 1998»
14 years 5 days ago
Using a High-Performance, Programmable Secure Coprocessor
Sean W. Smith, Elaine R. Palmer, Steve Weingart
ASIACRYPT
1992
Springer
14 years 1 days ago
Practical Proven Secure Authentication with Arbitration
Yvo Desmedt, Jennifer Seberry
CRYPTO
1989
Springer
90views Cryptology» more  CRYPTO 1989»
14 years 7 hour ago
UNIX Password Security - Ten Years Later
David C. Feldmeier, Philip R. Karn
CANS
2007
Springer
142views Cryptology» more  CANS 2007»
13 years 12 months ago
Strongly Secure Certificateless Public Key Encryption Without Pairing
Yinxia Sun, Futai Zhang, Joonsang Baek
PKC
2010
Springer
175views Cryptology» more  PKC 2010»
13 years 12 months ago
Secure Network Coding over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal...