Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
25
click to vote
SECRYPT
2007
77
views
Business
»
more
SECRYPT 2007
»
Mobile Agent Security with Efficient Oblivious Transfer
14 years 9 days ago
Download
www.sos.info.hiroshima-cu.ac.jp
Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji
claim paper
Read More »
33
click to vote
SECRYPT
2007
60
views
Business
»
more
SECRYPT 2007
»
Reliable Process for Security Policy Deployment
14 years 9 days ago
Download
www.cs.sunysb.edu
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
claim paper
Read More »
24
click to vote
SECRYPT
2007
77
views
Business
»
more
SECRYPT 2007
»
Remote Algorithmic Complexity Attacks against Randomized Hash Tables
14 years 9 days ago
Download
www.eng.tau.ac.il
Noa Bar-Yosef, Avishai Wool
claim paper
Read More »
28
click to vote
SECRYPT
2007
92
views
Business
»
more
SECRYPT 2007
»
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols
14 years 9 days ago
Download
www.cs.brown.edu
Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hri...
claim paper
Read More »
25
click to vote
SECRYPT
2007
70
views
Business
»
more
SECRYPT 2007
»
On the Effect of Score Equalization in SVM Multimodal Biometric Systems
14 years 9 days ago
Download
www.lsi.upc.edu
Pascual Ejarque, Javier Hernando
claim paper
Read More »
24
click to vote
SECRYPT
2007
54
views
Business
»
more
SECRYPT 2007
»
A High-Level Aspect-Oriented based Language for Software Security Hardening
14 years 9 days ago
Download
users.encs.concordia.ca
Azzam Mourad, Marc-André Laverdière,...
claim paper
Read More »
22
click to vote
SECRYPT
2007
77
views
Business
»
more
SECRYPT 2007
»
A Secure Jailing System for Confining Untrusted Applications
14 years 9 days ago
Download
www.cs.vu.nl
Guido van 't Noordende, Ádám Balogh,...
claim paper
Read More »
32
click to vote
SECRYPT
2007
110
views
Business
»
more
SECRYPT 2007
»
Combined Data Mining Approach for Intrusion Detection
14 years 9 days ago
Download
www.mondragon.edu
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
claim paper
Read More »
29
click to vote
SECRYPT
2007
121
views
Business
»
more
SECRYPT 2007
»
Using Steganography to Improve Hash Functions' Collision Resistance
14 years 9 days ago
Download
csrc.nist.gov
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
claim paper
Read More »
22
click to vote
SECRYPT
2007
53
views
Business
»
more
SECRYPT 2007
»
Utilizing Social Networking Platforms to Support Public Key Infrastructures
14 years 9 days ago
Download
ebus.informatik.uni-leipzig.de
Volker Gruhn, Malte Hülder, Vincent Wolff-Mar...
claim paper
Read More »
1
2
next ›
last »