Sciweavers

SECRYPT
2007
110views Business» more  SECRYPT 2007»
14 years 8 days ago
Combined Data Mining Approach for Intrusion Detection
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
SECRYPT
2007
121views Business» more  SECRYPT 2007»
14 years 8 days ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
SECRYPT
2007
74views Business» more  SECRYPT 2007»
14 years 8 days ago
Towards a Multi-model Views Security Framework
Lei Xia, Hao Huang, Shuying Yu
SECRYPT
2007
126views Business» more  SECRYPT 2007»
14 years 8 days ago
Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs
In this paper, we study the opacity property of verifiably encrypted signatures (VES) of Boneh et al. (proposed in Eurocrypt 2003). Informally, opacity implies that although some...
Amitabh Saxena
SECRYPT
2007
82views Business» more  SECRYPT 2007»
14 years 8 days ago
Private Computing with Beehive Organized Agents
Bartek Gedrojc, Jan C. A. van der Lubbe, Martin va...
SECRYPT
2007
68views Business» more  SECRYPT 2007»
14 years 8 days ago
Subquadratic Binary Field Multiplier in Double Polynomial System
Pascal Giorgi, Christophe Nègre, Thomas Pla...
SECRYPT
2007
100views Business» more  SECRYPT 2007»
14 years 8 days ago
Mobile Secret Key Distribution with Network Coding
Paulo F. Oliveira, Rui A. Costa, João Barro...
SECRYPT
2007
78views Business» more  SECRYPT 2007»
14 years 8 days ago
Practical Secure Biometrics using Set Intersection as a Similarity Measure
Daniel Socek, Dubravko Culibrk, Vladimir Bozovic