Sciweavers

18 search results - page 2 / 4
» compsec 2006
Sort
View
84
Voted
COMPSEC
2006
172views more  COMPSEC 2006»
15 years 12 days ago
A qualitative analysis of software security patterns
Spyros T. Halkidis, Alexander Chatzigeorgiou, Geor...
COMPSEC
2006
78views more  COMPSEC 2006»
15 years 12 days ago
Efficient remote mutual authentication and key agreement
Wen-Gong Shieh, Jian-Min Wang
COMPSEC
2006
56views more  COMPSEC 2006»
15 years 12 days ago
A new protocol to counter online dictionary attacks
Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith A...
COMPSEC
2006
98views more  COMPSEC 2006»
15 years 12 days ago
A secure extension of the Kwak-Moon group signcryption scheme
Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert ...
52
Voted
COMPSEC
2006
105views more  COMPSEC 2006»
15 years 12 days ago
Steganography in games: A general methodology and its application to the game of Go
Julio César Hernández Castro, Ignaci...