Sciweavers

14824 search results - page 113 / 2965
» Security - Introduction
Sort
View
PET
2005
Springer
15 years 8 months ago
Towards Privacy-Aware eLearning
Katrin Borcea, Hilko Donker, Elke Franz, Andreas P...
103
Voted
TRUSTBUS
2005
Springer
15 years 8 months ago
Conditional Digital Signatures
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, ...
ACISP
2004
Springer
15 years 8 months ago
Symmetric Key Authentication Services Revisited
Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenba...
ASIASIM
2004
Springer
15 years 8 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
CCS
2004
ACM
15 years 8 months ago
The dual receiver cryptosystem and its applications
Theodore Diament, Homin K. Lee, Angelos D. Keromyt...