Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
35
search results - page 2 / 7
»
scn 2008
Sort
relevance
views
votes
recent
update
View
thumb
title
13
click to vote
SCN
2008
Springer
147
views
Communications
»
more
SCN 2008
»
New Anonymity Notions for Identity-Based Encryption
13 years 4 months ago
Download
www.di.ens.fr
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
claim paper
Read More »
9
click to vote
SCN
2008
Springer
107
views
Communications
»
more
SCN 2008
»
AuthoCast - a mobility-compliant protocol framework for multicast sender authentication
13 years 4 months ago
Download
home.fhtw-berlin.de
Thomas C. Schmidt, Matthias Wählisch, Olaf Ch...
claim paper
Read More »
8
click to vote
SCN
2008
Springer
78
views
Communications
»
more
SCN 2008
»
Early security key exchange for encryption in Mobile IPv6 handoff
13 years 4 months ago
Download
hcc.dormv6.niu.edu.tw
Tin Yu Wu, Chi-Hsiang Lo, Han-Chieh Chao
claim paper
Read More »
6
click to vote
SCN
2008
Springer
100
views
Communications
»
more
SCN 2008
»
Using selective, short-term memory to improve resilience against DDoS exhaustion attacks
13 years 4 months ago
Download
www.nd.edu
Qi Liao, David A. Cieslak, Aaron Striegel, Nitesh ...
claim paper
Read More »
20
click to vote
SCN
2008
Springer
141
views
Communications
»
more
SCN 2008
»
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
13 years 4 months ago
Download
eprint.iacr.org
In 2004, Molnar and Wagner introduced a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared
Julien Bringer, Hervé Chabanne, Thomas Icar...
claim paper
Read More »
« Prev
« First
page 2 / 7
Last »
Next »