Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
100
Voted
SECRYPT
2007
77
views
Business
»
more
SECRYPT 2007
»
Mobile Agent Security with Efficient Oblivious Transfer
15 years 4 months ago
Download
www.sos.info.hiroshima-cu.ac.jp
Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji
claim paper
Read More »
109
Voted
SECRYPT
2007
60
views
Business
»
more
SECRYPT 2007
»
Reliable Process for Security Policy Deployment
15 years 4 months ago
Download
www.cs.sunysb.edu
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
claim paper
Read More »
84
Voted
SECRYPT
2007
77
views
Business
»
more
SECRYPT 2007
»
Remote Algorithmic Complexity Attacks against Randomized Hash Tables
15 years 4 months ago
Download
www.eng.tau.ac.il
Noa Bar-Yosef, Avishai Wool
claim paper
Read More »
90
Voted
SECRYPT
2007
92
views
Business
»
more
SECRYPT 2007
»
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols
15 years 4 months ago
Download
www.cs.brown.edu
Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hri...
claim paper
Read More »
93
Voted
SECRYPT
2007
70
views
Business
»
more
SECRYPT 2007
»
On the Effect of Score Equalization in SVM Multimodal Biometric Systems
15 years 4 months ago
Download
www.lsi.upc.edu
Pascual Ejarque, Javier Hernando
claim paper
Read More »
94
Voted
SECRYPT
2007
54
views
Business
»
more
SECRYPT 2007
»
A High-Level Aspect-Oriented based Language for Software Security Hardening
15 years 4 months ago
Download
users.encs.concordia.ca
Azzam Mourad, Marc-André Laverdière,...
claim paper
Read More »
95
Voted
SECRYPT
2007
77
views
Business
»
more
SECRYPT 2007
»
A Secure Jailing System for Confining Untrusted Applications
15 years 4 months ago
Download
www.cs.vu.nl
Guido van 't Noordende, Ádám Balogh,...
claim paper
Read More »
102
Voted
SECRYPT
2007
110
views
Business
»
more
SECRYPT 2007
»
Combined Data Mining Approach for Intrusion Detection
15 years 4 months ago
Download
www.mondragon.edu
Urko Zurutuza, Roberto Uribeetxeberria, E. Azketa,...
claim paper
Read More »
120
Voted
SECRYPT
2007
121
views
Business
»
more
SECRYPT 2007
»
Using Steganography to Improve Hash Functions' Collision Resistance
15 years 4 months ago
Download
csrc.nist.gov
Lately, hash function security has received increased attention. Especially after the recent attacks that were presented for SHA-1 and MD5, the need for a new and more robust hash...
Emmanouel Kellinis, Konstantinos Papapanagiotou
claim paper
Read More »
95
Voted
SECRYPT
2007
53
views
Business
»
more
SECRYPT 2007
»
Utilizing Social Networking Platforms to Support Public Key Infrastructures
15 years 4 months ago
Download
ebus.informatik.uni-leipzig.de
Volker Gruhn, Malte Hülder, Vincent Wolff-Mar...
claim paper
Read More »
1
2
next ›
last »