Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2601
search results - page 59 / 521
»
Secure Rewarding Schemes
Sort
relevance
views
votes
recent
update
View
thumb
title
64
click to vote
CN
2004
85
views
more
CN 2004
»
Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme
14 years 11 months ago
Download
koasas.kaist.ac.kr
Abstract
Jinliang Fan, Jun Xu, Mostafa H. Ammar, Sue B. Moo...
claim paper
Read More »
70
click to vote
IPL
2000
53
views
more
IPL 2000
»
On the security of a convertible group signature scheme
14 years 11 months ago
Download
www.islab.iecs.fcu.edu.tw
Shahrokh Saeednia
claim paper
Read More »
58
click to vote
JCSC
2000
58
views
more
JCSC 2000
»
TDMA Secure Communication Scheme Based on Synchronization of Chua's Circuits
14 years 11 months ago
Download
www.eecs.berkeley.edu
Zhenya He, Ke Li, Luxi Yang, Yuhui Shi
claim paper
Read More »
60
click to vote
JISE
2002
39
views
more
JISE 2002
»
On the Security of a Variation of Cramer-Shoup's Public Key Scheme
14 years 11 months ago
Download
www.iis.sinica.edu.tw
Hung-Min Sun
claim paper
Read More »
66
click to vote
IEICET
2010
100
views
more
IEICET 2010
»
ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
14 years 10 months ago
Download
isyou.hosting.paran.com
Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshia...
claim paper
Read More »
« Prev
« First
page 59 / 521
Last »
Next »