Sciweavers

5119 search results - page 141 / 1024
» Security Privacy
Sort
View
94
Voted
ACISP
2004
Springer
15 years 9 months ago
Pseudorandomness of SPN-Type Transformations
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon C...
111
Voted
WISA
2004
Springer
15 years 9 months ago
Vulnerability of a Mobile Payment System Proposed at WISA 2002
SangCheol Hwang, Dong Hoon Lee 0002, Daewan Han, J...
86
Voted
CCS
2003
ACM
15 years 9 months ago
Randomized instruction set emulation to disrupt binary code injection attacks
Elena Gabriela Barrantes, David H. Ackley, Trek S....
108
Voted
ACISP
2001
Springer
15 years 8 months ago
Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks
DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson
AGENTS
2001
Springer
15 years 8 months ago
Distributed sensor network for real time tracking
ÁÒ Ø × Ô Ô Ö Û × Ö ÓÙÖ ×ÓÐÙØ ÓÒ ØÓ Ö Ð¹Ø Ñ ×¹ ØÖ ÙØ Ö ×ÓÙÖ ÐÐÓ Ø ÓÒ ÔÔÐ Ø ÓÒ ÒÚÓÐÚ Ò ×ØÖ ÙØ × ØÙ Ø ÓÒ ×× ××...
Bryan Horling, Régis Vincent, Roger Mailler...