Sciweavers

123
Voted
SECRYPT
2007
110views Business» more  SECRYPT 2007»
15 years 6 months ago
Combined Data Mining Approach for Intrusion Detection
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
142
Voted
SECRYPT
2007
121views Business» more  SECRYPT 2007»
15 years 6 months ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
115
Voted
SECRYPT
2007
53views Business» more  SECRYPT 2007»
15 years 6 months ago
Utilizing Social Networking Platforms to Support Public Key Infrastructures
Volker Gruhn, Malte Hülder, Vincent Wolff-Mar...
SECRYPT
2007
74views Business» more  SECRYPT 2007»
15 years 6 months ago
Towards a Multi-model Views Security Framework
Lei Xia, Hao Huang, Shuying Yu
146
Voted
SECRYPT
2007
126views Business» more  SECRYPT 2007»
15 years 6 months ago
Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs
In this paper, we study the opacity property of verifiably encrypted signatures (VES) of Boneh et al. (proposed in Eurocrypt 2003). Informally, opacity implies that although some...
Amitabh Saxena
88
Voted
SECRYPT
2007
82views Business» more  SECRYPT 2007»
15 years 6 months ago
Private Computing with Beehive Organized Agents
Bartek Gedrojc, Jan C. A. van der Lubbe, Martin va...
113
Voted
SECRYPT
2007
68views Business» more  SECRYPT 2007»
15 years 6 months ago
Subquadratic Binary Field Multiplier in Double Polynomial System
Pascal Giorgi, Christophe Nègre, Thomas Pla...
114
Voted
SECRYPT
2007
100views Business» more  SECRYPT 2007»
15 years 6 months ago
Mobile Secret Key Distribution with Network Coding
Paulo F. Oliveira, Rui A. Costa, João Barro...
104
Voted
SECRYPT
2007
78views Business» more  SECRYPT 2007»
15 years 6 months ago
Practical Secure Biometrics using Set Intersection as a Similarity Measure
Daniel Socek, Dubravko Culibrk, Vladimir Bozovic
120
Voted
SECRYPT
2007
60views Business» more  SECRYPT 2007»
15 years 6 months ago
Securing OpenSSL against Micro-Architectural Attacks
Marc Joye, Michael Tunstall