Sciweavers

ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Risk Balance in Exchange Protocols
Muhammad Torabi Dashti, Yanjing Wang
ASIAN
2007
Springer
95views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Browser Based Agile E-Voting System
Sriperumbuduru Kandala Simhalu, Keiji Takeda
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
14 years 4 months ago
One-Time Receiver Address in IPv6 for Protecting Unlinkability
Atsushi Sakurai, Takashi Minohara, Ryota Sato, Kei...
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Large Scale Simulation of Tor:
Implementing global passive adversary attacks on currently deployed low latency anonymous networks is not feasible. This paper describes the implementation of a large scale, discre...
Gavin O'Gorman, Stephen Blott
ASIAN
2007
Springer
91views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Privacy Enhancing Credentials
Junji Nakazato, Lihua Wang, Akihiro Yamamura
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Compiling C Programs into a Strongly Typed Assembly Language
Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezaw...
ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Scalable DRM System for Media Portability
Hyoungshick Kim
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
14 years 4 months ago
How to do Things with Cryptographic Protocols
Joshua D. Guttman
ASIAN
2007
Springer
72views Algorithms» more  ASIAN 2007»
14 years 4 months ago
Information Flow Testing
Gurvan Le Guernic