Sciweavers

99
Voted
HICSS
1998
IEEE
90views Biometrics» more  HICSS 1998»
15 years 7 months ago
Information Technology in Developing Countries
William G. Chismar, Robert M. Davison, Noel Jones,...
112
Voted
FC
2000
Springer
80views Cryptology» more  FC 2000»
15 years 7 months ago
Statistics and Secret Leakage
Jean-Sébastien Coron, Paul C. Kocher, David...
141
Voted
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 7 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
102
Voted
FC
2000
Springer
102views Cryptology» more  FC 2000»
15 years 7 months ago
Asymmetric Currency Rounding
David M'Raïhi, David Naccache, Michael Tunsta...
114
Voted
FASE
2000
Springer
15 years 7 months ago
Analysing UML Active Classes and Associated State Machines - A Lightweight Formal Approach
Gianna Reggio, Egidio Astesiano, Christine Choppy,...