Sciweavers

SECRYPT
2008
82views Business» more  SECRYPT 2008»
14 years 1 months ago
A Fair e-Tendering Protocol
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
SECRYPT
2008
74views Business» more  SECRYPT 2008»
14 years 1 months ago
A Note on Biometrics-based Authentication with Portable Device
Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano...
SECRYPT
2008
222views Business» more  SECRYPT 2008»
14 years 1 months ago
Improved Fuzzy Vault Scheme for Fingerprint Verification
Cengiz Örencik, Thomas Brochmann Pedersen, Er...
SECRYPT
2008
89views Business» more  SECRYPT 2008»
14 years 1 months ago
Rethinking Digital Signatures
Ueli M. Maurer
26
Voted
SECRYPT
2008
82views Business» more  SECRYPT 2008»
14 years 1 months ago
Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks
Omer Zekvan Yilmaz, Albert Levi, Erkay Savas
SECRYPT
2008
96views Business» more  SECRYPT 2008»
14 years 1 months ago
Interactivity for Reactive Access Control
Yehia Elrakaiby, Frédéric Cuppens, N...
SECRYPT
2008
107views Business» more  SECRYPT 2008»
14 years 1 months ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
SECRYPT
2008
75views Business» more  SECRYPT 2008»
14 years 1 months ago
Selecting Trustworthy Content using Tags
Daniele Quercia, Licia Capra, Valentina Zanardi
SECRYPT
2008
58views Business» more  SECRYPT 2008»
14 years 1 months ago
A Review of Trust Management, Security and Privacy Policy Languages
Juri Luca De Coi, Daniel Olmedilla
SECRYPT
2008
89views Business» more  SECRYPT 2008»
14 years 1 months ago
Reputation Management in Grid-based Virtual Organisations
Álvaro Enrique Arenas, Benjamin Aziz, Gheor...