Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
83
search results - page 1 / 17
»
ijnsec 2008
Sort
relevance
views
votes
recent
update
View
thumb
title
27
click to vote
IJNSEC
2008
81
views
more
IJNSEC 2008
»
Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability
13 years 9 months ago
Download
ijns.femto.com.tw
Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasiza...
claim paper
Read More »
24
click to vote
IJNSEC
2008
101
views
more
IJNSEC 2008
»
A Hybrid Model for Network Security Systems: Integrating Intrusion Detection System with Survivability
13 years 9 months ago
Download
ijns.femto.com.tw
Tarun Bhaskar, B. Narasimha Kamath, Soumyo D. Moit...
claim paper
Read More »
18
click to vote
IJNSEC
2008
100
views
more
IJNSEC 2008
»
Towards a Framework for Federated Global Identity Management
13 years 9 months ago
Download
ijns.femto.com.tw
Mehrdad Naderi, Jawed I. A. Siddiqi, Babak Akhgar,...
claim paper
Read More »
29
click to vote
IJNSEC
2008
140
views
more
IJNSEC 2008
»
Distributed Paillier Plaintext Equivalence Test
13 years 9 months ago
Download
ijns.femto.com.tw
Consider the following scenario with N + 2 parties, A, B, X1, X2,
Pei-Yih Ting, Xiao-Wei Huang
claim paper
Read More »
28
click to vote
IJNSEC
2008
122
views
more
IJNSEC 2008
»
A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting
13 years 9 months ago
Download
ijns.femto.com.tw
Recently non-abelian groups have attracted the attention of cryptographers for constructing public-key cryptographic protocols. In this paper we use the conjugacy problem in non-a...
Tony Thomas, Arbind K. Lal
claim paper
Read More »
« Prev
« First
page 1 / 17
Last »
Next »