Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Watermarking on compressed/uncompressed video using communications with side information mechanism
Distributed multimedia databases
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Informatics - 10 Years Back. 10 Years Ahead.
VLSI Implementation of Modulo Multiplication Using Carry Free Addition
VLSID '97 Proceedings of the Tenth International Conference on VLSI Design: VLSI in Multimedia Applications
Encyclopedia of Computer Science
Application of FI sequences for authentication in a network
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Relationships among the computational powers of breaking discrete log cryptosystems
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Dependability metrics
A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Hi-index | 0.00 |