Sciweavers

126
Voted
ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
15 years 11 months ago
Risk Balance in Exchange Protocols
Muhammad Torabi Dashti, Yanjing Wang
ASIAN
2007
Springer
95views Algorithms» more  ASIAN 2007»
15 years 11 months ago
Browser Based Agile E-Voting System
Sriperumbuduru Kandala Simhalu, Keiji Takeda
108
Voted
ASIAN
2007
Springer
102views Algorithms» more  ASIAN 2007»
15 years 11 months ago
One-Time Receiver Address in IPv6 for Protecting Unlinkability
Atsushi Sakurai, Takashi Minohara, Ryota Sato, Kei...
112
Voted
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
15 years 11 months ago
Large Scale Simulation of Tor:
Implementing global passive adversary attacks on currently deployed low latency anonymous networks is not feasible. This paper describes the implementation of a large scale, discre...
Gavin O'Gorman, Stephen Blott
109
Voted
ASIAN
2007
Springer
91views Algorithms» more  ASIAN 2007»
15 years 11 months ago
Privacy Enhancing Credentials
Junji Nakazato, Lihua Wang, Akihiro Yamamura
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
15 years 11 months ago
Compiling C Programs into a Strongly Typed Assembly Language
Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezaw...
ASIAN
2007
Springer
96views Algorithms» more  ASIAN 2007»
15 years 11 months ago
Scalable DRM System for Media Portability
Hyoungshick Kim
ASIAN
2007
Springer
76views Algorithms» more  ASIAN 2007»
15 years 11 months ago
How to do Things with Cryptographic Protocols
Joshua D. Guttman
ASIAN
2007
Springer
72views Algorithms» more  ASIAN 2007»
15 years 11 months ago
Information Flow Testing
Gurvan Le Guernic