Sciweavers

24 search results - page 2 / 5
» isw 2009
Sort
View
ISW
2009
Springer
14 years 4 months ago
Analysis and Optimization of Cryptographically Generated Addresses
Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
ISW
2009
Springer
14 years 4 months ago
Towards Unifying Vulnerability Information for Attack Graph Construction
Sebastian Roschke, Feng Cheng 0002, Robert Schuppe...
ISW
2009
Springer
14 years 4 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ISW
2009
Springer
14 years 4 months ago
A2M: Access-Assured Mobile Desktop Computing
Angelos Stavrou, Ricardo A. Barrato, Angelos D. Ke...
ISW
2009
Springer
14 years 4 months ago
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. De...