Sciweavers

SECRYPT
2008
125views Business» more  SECRYPT 2008»
14 years 29 days ago
CSteg: Talking in C Code - Steganography of C Source Code in Text
Jorge Blasco Alís, Julio César Hern&...
SECRYPT
2008
82views Business» more  SECRYPT 2008»
14 years 29 days ago
A Fair e-Tendering Protocol
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Hu...
SECRYPT
2008
74views Business» more  SECRYPT 2008»
14 years 29 days ago
A Note on Biometrics-based Authentication with Portable Device
Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano...
SECRYPT
2008
222views Business» more  SECRYPT 2008»
14 years 29 days ago
Improved Fuzzy Vault Scheme for Fingerprint Verification
Cengiz Örencik, Thomas Brochmann Pedersen, Er...
SECRYPT
2008
89views Business» more  SECRYPT 2008»
14 years 29 days ago
Rethinking Digital Signatures
Ueli M. Maurer
SECRYPT
2008
96views Business» more  SECRYPT 2008»
14 years 29 days ago
Interactivity for Reactive Access Control
Yehia Elrakaiby, Frédéric Cuppens, N...
SECRYPT
2008
107views Business» more  SECRYPT 2008»
14 years 29 days ago
Yet Another Secure Distance-Bounding Protocol
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
SECRYPT
2008
75views Business» more  SECRYPT 2008»
14 years 29 days ago
Selecting Trustworthy Content using Tags
Daniele Quercia, Licia Capra, Valentina Zanardi
SECRYPT
2008
58views Business» more  SECRYPT 2008»
14 years 29 days ago
A Review of Trust Management, Security and Privacy Policy Languages
Juri Luca De Coi, Daniel Olmedilla