Sciweavers

24 search results - page 2 / 5
» isw 2009
Sort
View
ISW
2009
Springer
13 years 11 months ago
Analysis and Optimization of Cryptographically Generated Addresses
Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
ISW
2009
Springer
13 years 11 months ago
Towards Unifying Vulnerability Information for Attack Graph Construction
Sebastian Roschke, Feng Cheng 0002, Robert Schuppe...
ISW
2009
Springer
13 years 11 months ago
On the Security of Identity Based Ring Signcryption Schemes
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
ISW
2009
Springer
13 years 11 months ago
A2M: Access-Assured Mobile Desktop Computing
Angelos Stavrou, Ricardo A. Barrato, Angelos D. Ke...
ISW
2009
Springer
13 years 11 months ago
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. De...