Sciweavers

17 search results - page 3 / 4
» secrypt 2007
Sort
View
SECRYPT
2007
92views Business» more  SECRYPT 2007»
14 years 11 months ago
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols
Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hri...
SECRYPT
2007
82views Business» more  SECRYPT 2007»
14 years 11 months ago
Private Computing with Beehive Organized Agents
Bartek Gedrojc, Jan C. A. van der Lubbe, Martin va...
SECRYPT
2007
110views Business» more  SECRYPT 2007»
14 years 11 months ago
Combined Data Mining Approach for Intrusion Detection
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
SECRYPT
2007
60views Business» more  SECRYPT 2007»
14 years 11 months ago
Reliable Process for Security Policy Deployment
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
SECRYPT
2007
77views Business» more  SECRYPT 2007»
14 years 11 months ago
A Secure Jailing System for Confining Untrusted Applications
Guido van 't Noordende, Ádám Balogh,...