Sciweavers

17 search results - page 3 / 4
» secrypt 2007
Sort
View
SECRYPT
2007
92views Business» more  SECRYPT 2007»
13 years 7 months ago
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols
Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hri...
SECRYPT
2007
82views Business» more  SECRYPT 2007»
13 years 7 months ago
Private Computing with Beehive Organized Agents
Bartek Gedrojc, Jan C. A. van der Lubbe, Martin va...
SECRYPT
2007
110views Business» more  SECRYPT 2007»
13 years 7 months ago
Combined Data Mining Approach for Intrusion Detection
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
SECRYPT
2007
60views Business» more  SECRYPT 2007»
13 years 7 months ago
Reliable Process for Security Policy Deployment
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
SECRYPT
2007
77views Business» more  SECRYPT 2007»
13 years 7 months ago
A Secure Jailing System for Confining Untrusted Applications
Guido van 't Noordende, Ádám Balogh,...