Sciweavers

1562 search results - page 9 / 313
» Mathematics, Cryptology, Security
Sort
View
FC
1998
Springer
98views Cryptology» more  FC 1998»
15 years 1 months ago
Using a High-Performance, Programmable Secure Coprocessor
Sean W. Smith, Elaine R. Palmer, Steve Weingart
ASIACRYPT
1992
Springer
15 years 1 months ago
Practical Proven Secure Authentication with Arbitration
Yvo Desmedt, Jennifer Seberry
CRYPTO
1989
Springer
90views Cryptology» more  CRYPTO 1989»
15 years 1 months ago
UNIX Password Security - Ten Years Later
David C. Feldmeier, Philip R. Karn
CANS
2007
Springer
142views Cryptology» more  CANS 2007»
15 years 1 months ago
Strongly Secure Certificateless Public Key Encryption Without Pairing
Yinxia Sun, Futai Zhang, Joonsang Baek
PKC
2010
Springer
175views Cryptology» more  PKC 2010»
15 years 1 months ago
Secure Network Coding over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal...