Sciweavers

SECRYPT
2007
77views Business» more  SECRYPT 2007»
14 years 9 days ago
Mobile Agent Security with Efficient Oblivious Transfer
Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji
SECRYPT
2007
60views Business» more  SECRYPT 2007»
14 years 9 days ago
Reliable Process for Security Policy Deployment
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
SECRYPT
2007
77views Business» more  SECRYPT 2007»
14 years 9 days ago
A Secure Jailing System for Confining Untrusted Applications
Guido van 't Noordende, Ádám Balogh,...
SECRYPT
2007
110views Business» more  SECRYPT 2007»
14 years 9 days ago
Combined Data Mining Approach for Intrusion Detection
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
SECRYPT
2007
121views Business» more  SECRYPT 2007»
14 years 9 days ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou