Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
99
Voted
HICSS
1998
IEEE
90
views
Biometrics
»
more
HICSS 1998
»
Information Technology in Developing Countries
15 years 7 months ago
Download
www.iimahd.ernet.in
William G. Chismar, Robert M. Davison, Noel Jones,...
claim paper
Read More »
112
Voted
FC
2000
Springer
80
views
Cryptology
»
more
FC 2000
»
Statistics and Secret Leakage
15 years 7 months ago
Download
saluc.engr.uconn.edu
Jean-Sébastien Coron, Paul C. Kocher, David...
claim paper
Read More »
141
Voted
FC
2000
Springer
83
views
Cryptology
»
more
FC 2000
»
Secret Key Authentication with Software-Only Verification
15 years 7 months ago
Download
www.cs.ru.nl
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
claim paper
Read More »
102
Voted
FC
2000
Springer
102
views
Cryptology
»
more
FC 2000
»
Asymmetric Currency Rounding
15 years 7 months ago
Download
www.gemplus.com
David M'Raïhi, David Naccache, Michael Tunsta...
claim paper
Read More »
114
Voted
FASE
2000
Springer
94
views
Software Engineering
»
more
FASE 2000
»
Analysing UML Active Classes and Associated State Machines - A Lightweight Formal Approach
15 years 7 months ago
Download
www.medien.ifi.lmu.de
Gianna Reggio, Egidio Astesiano, Christine Choppy,...
claim paper
Read More »
« first
‹ previous
…
29961
29962
29963
29964
29965
29966
29967
29968
29969
…
next ›
last »