Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
14
search results - page 3 / 3
»
secrypt 2008
Sort
relevance
views
votes
recent
update
View
thumb
title
15
click to vote
SECRYPT
2008
111
views
Business
»
more
SECRYPT 2008
»
Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems
13 years 6 months ago
Download
eprints.ecs.soton.ac.uk
Kikelomo Maria Apampa, Tian Zhang, Gary B. Wills, ...
claim paper
Read More »
9
click to vote
SECRYPT
2008
74
views
Business
»
more
SECRYPT 2008
»
A Note on Biometrics-based Authentication with Portable Device
13 years 6 months ago
Download
www.c.csce.kyushu-u.ac.jp
Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano...
claim paper
Read More »
10
click to vote
SECRYPT
2008
125
views
Business
»
more
SECRYPT 2008
»
CSteg: Talking in C Code - Steganography of C Source Code in Text
13 years 6 months ago
Download
www-users.cs.york.ac.uk
Jorge Blasco Alís, Julio César Hern&...
claim paper
Read More »
16
click to vote
SECRYPT
2008
107
views
Business
»
more
SECRYPT 2008
»
Yet Another Secure Distance-Bounding Protocol
13 years 6 months ago
Download
eprint.iacr.org
Distance-bounding protocols have been proposed by Brands and Chaum in 1993 in order to detect relay attacks, also known as mafia fraud. Although the idea has been introduced fiftee...
Ventzislav Nikov, Marc Vauclair
claim paper
Read More »
« Prev
« First
page 3 / 3
Last »
Next »