Sciweavers

10 search results - page 1 / 2
» ijisec 2008
Sort
View
IJISEC
2008
58views more  IJISEC 2008»
13 years 4 months ago
Keeping secrets in incomplete databases
Joachim Biskup, Torben Weibert
IJISEC
2008
41views more  IJISEC 2008»
13 years 4 months ago
A multi-layer framework for puzzle-based denial-of-service defense
XiaoFeng Wang, Michael K. Reiter
IJISEC
2008
46views more  IJISEC 2008»
13 years 4 months ago
A symbolic framework for multi-faceted security protocol analysis
Andrea Bracciali, GianLuigi Ferrari, Emilio Tuosto
IJISEC
2008
64views more  IJISEC 2008»
13 years 4 months ago
Bayesian rational exchange
Juan M. Estévez-Tapiador, Almudena Alcaide,...
IJISEC
2008
108views more  IJISEC 2008»
13 years 4 months ago
A note on the Ate pairing
The Ate pairing has been suggested since it can be computed efficiently on ordinary elliptic curves with small values of the traces of Frobenius t. However, not all pairing-friendl...
Changan Zhao, Fangguo Zhang, Jiwu Huang