Sciweavers

14824 search results - page 74 / 2965
» Security - Introduction
Sort
View
70
Voted
ACISP
2010
Springer
15 years 2 months ago
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
Marek Klonowski, Michal Koza, Miroslaw Kutylowski
69
Voted
ACISP
2010
Springer
15 years 2 months ago
A Multi-trapdoor Commitment Scheme from the RSA Assumption
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
90
Voted
ACISP
2010
Springer
15 years 2 months ago
Some Observations on Indifferentiability
Ewan Fleischmann, Michael Gorski, Stefan Lucks
66
Voted
ESORICS
2010
Springer
15 years 1 months ago
Low-Cost Client Puzzles Based on Modular Exponentiation
Ghassan Karame, Srdjan Capkun
ESORICS
2010
Springer
15 years 1 months ago
Evaluating Adversarial Partitions
Andreas Pashalidis, Stefan Schiffner