Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
32
click to vote
SECRYPT
2008
82
views
Business
»
more
SECRYPT 2008
»
A Fair e-Tendering Protocol
14 years 1 months ago
Download
www.vkrishnan.com
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
claim paper
Read More »
22
click to vote
SECRYPT
2008
74
views
Business
»
more
SECRYPT 2008
»
A Note on Biometrics-based Authentication with Portable Device
14 years 1 months ago
Download
www.c.csce.kyushu-u.ac.jp
Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano...
claim paper
Read More »
40
click to vote
SECRYPT
2008
222
views
Business
»
more
SECRYPT 2008
»
Improved Fuzzy Vault Scheme for Fingerprint Verification
14 years 1 months ago
Download
research.sabanciuniv.edu
Cengiz Örencik, Thomas Brochmann Pedersen, Er...
claim paper
Read More »
31
click to vote
SECRYPT
2008
89
views
Business
»
more
SECRYPT 2008
»
Rethinking Digital Signatures
14 years 1 months ago
Download
www.icete.org
Ueli M. Maurer
claim paper
Read More »
26
Voted
SECRYPT
2008
82
views
Business
»
more
SECRYPT 2008
»
Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks
14 years 1 months ago
Download
research.sabanciuniv.edu
Omer Zekvan Yilmaz, Albert Levi, Erkay Savas
claim paper
Read More »
32
click to vote
SECRYPT
2008
96
views
Business
»
more
SECRYPT 2008
»
Interactivity for Reactive Access Control
14 years 1 months ago
Download
www.orbac.org
Yehia Elrakaiby, Frédéric Cuppens, N...
claim paper
Read More »
37
click to vote
SECRYPT
2008
107
views
Business
»
more
SECRYPT 2008
»
Yet Another Secure Distance-Bounding Protocol
14 years 1 months ago
Download
eprint.iacr.org
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
claim paper
Read More »
25
click to vote
SECRYPT
2008
75
views
Business
»
more
SECRYPT 2008
»
Selecting Trustworthy Content using Tags
14 years 1 months ago
Download
www.cs.ucl.ac.uk
Daniele Quercia, Licia Capra, Valentina Zanardi
claim paper
Read More »
19
click to vote
SECRYPT
2008
58
views
Business
»
more
SECRYPT 2008
»
A Review of Trust Management, Security and Privacy Policy Languages
14 years 1 months ago
Download
www.l3s.de
Juri Luca De Coi, Daniel Olmedilla
claim paper
Read More »
19
click to vote
SECRYPT
2008
89
views
Business
»
more
SECRYPT 2008
»
Reputation Management in Grid-based Virtual Organisations
14 years 1 months ago
Download
epubs.cclrc.ac.uk
Álvaro Enrique Arenas, Benjamin Aziz, Gheor...
claim paper
Read More »
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »