Sciweavers

109
Voted
ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Risk Balance in Exchange Protocols
Muhammad Torabi Dashti, Yanjing Wang
97
Voted
ASIAN
2007
Springer
95views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Browser Based Agile E-Voting System
Sriperumbuduru Kandala Simhalu, Keiji Takeda
90
Voted
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
15 years 8 months ago
One-Time Receiver Address in IPv6 for Protecting Unlinkability
Atsushi Sakurai, Takashi Minohara, Ryota Sato, Kei...
89
Voted
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Large Scale Simulation of Tor:
Implementing global passive adversary attacks on currently deployed low latency anonymous networks is not feasible. This paper describes the implementation of a large scale, discre...
Gavin O'Gorman, Stephen Blott
94
Voted
ASIAN
2007
Springer
91views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Privacy Enhancing Credentials
Junji Nakazato, Lihua Wang, Akihiro Yamamura
94
Voted
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Compiling C Programs into a Strongly Typed Assembly Language
Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezaw...
110
Voted
ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Scalable DRM System for Media Portability
Hyoungshick Kim
78
Voted
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
15 years 8 months ago
How to do Things with Cryptographic Protocols
Joshua D. Guttman
67
Voted
ASIAN
2007
Springer
72views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Information Flow Testing
Gurvan Le Guernic