Sciweavers

SECRYPT
2007
77views Business» more  SECRYPT 2007»
14 years 10 months ago
Mobile Agent Security with Efficient Oblivious Transfer
Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji
SECRYPT
2007
60views Business» more  SECRYPT 2007»
14 years 10 months ago
Reliable Process for Security Policy Deployment
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
SECRYPT
2007
92views Business» more  SECRYPT 2007»
14 years 10 months ago
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols
Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hri...
SECRYPT
2007
77views Business» more  SECRYPT 2007»
14 years 10 months ago
A Secure Jailing System for Confining Untrusted Applications
Guido van 't Noordende, Ádám Balogh,...
SECRYPT
2007
110views Business» more  SECRYPT 2007»
14 years 10 months ago
Combined Data Mining Approach for Intrusion Detection
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
SECRYPT
2007
121views Business» more  SECRYPT 2007»
14 years 10 months ago
Using Steganography to Improve Hash Functions' Collision Resistance
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou