Sciweavers

ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Risk Balance in Exchange Protocols
Muhammad Torabi Dashti, Yanjing Wang
ASIAN
2007
Springer
95views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Browser Based Agile E-Voting System
Sriperumbuduru Kandala Simhalu, Keiji Takeda
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
15 years 10 months ago
One-Time Receiver Address in IPv6 for Protecting Unlinkability
Atsushi Sakurai, Takashi Minohara, Ryota Sato, Kei...
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Large Scale Simulation of Tor:
Implementing global passive adversary attacks on currently deployed low latency anonymous networks is not feasible. This paper describes the implementation of a large scale, discre...
Gavin O'Gorman, Stephen Blott
ASIAN
2007
Springer
91views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Privacy Enhancing Credentials
Junji Nakazato, Lihua Wang, Akihiro Yamamura
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Compiling C Programs into a Strongly Typed Assembly Language
Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezaw...
ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Scalable DRM System for Media Portability
Hyoungshick Kim
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
15 years 10 months ago
How to do Things with Cryptographic Protocols
Joshua D. Guttman
80
Voted
ASIAN
2007
Springer
72views Algorithms» more  ASIAN 2007»
15 years 10 months ago
Information Flow Testing
Gurvan Le Guernic