Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
15
search results - page 1 / 3
»
acisp 2006
Sort
relevance
views
votes
recent
update
View
thumb
title
19
click to vote
ACISP
2006
Springer
111
views
Security Privacy
»
more
ACISP 2006
»
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles
14 years 1 months ago
Download
eprint.iacr.org
Eike Kiltz, David Galindo
claim paper
Read More »
20
click to vote
ACISP
2006
Springer
107
views
Security Privacy
»
more
ACISP 2006
»
Towards an Invisible Honeypot Monitoring System
13 years 11 months ago
Download
www.his.se
Anh-Quynh Nguyen, Yoshiyasu Takefuji
claim paper
Read More »
20
click to vote
ACISP
2006
Springer
139
views
Security Privacy
»
more
ACISP 2006
»
Cache Based Power Analysis Attacks on AES
14 years 1 months ago
Download
wistp2007.wistp.org
Jacques J. A. Fournier, Michael Tunstall
claim paper
Read More »
19
click to vote
ACISP
2006
Springer
99
views
Security Privacy
»
more
ACISP 2006
»
Graphical Representation of Authorization Policies for Weighted Credentials
14 years 1 months ago
Download
www.lcc.uma.es
Isaac Agudo, Javier Lopez, José A. Monteneg...
claim paper
Read More »
21
click to vote
ACISP
2006
Springer
95
views
Security Privacy
»
more
ACISP 2006
»
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant
14 years 1 months ago
Download
www.cosic.esat.kuleuven.be
Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie...
claim paper
Read More »
« Prev
« First
page 1 / 3
Last »
Next »