Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing
Computational Intelligence and Security
Browser based agile e-voting system
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A note on information-theoretic secret key exchange over wireless channels
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Journal of Network and Computer Applications
Secure billing for ubiquitous service delivery
ICQT'06 Proceedings of the 5th international conference on Internet Charging and QoS Technologies: performability has its Price
A new scheme for deniable/repudiable authentication
CASC'07 Proceedings of the 10th international conference on Computer Algebra in Scientific Computing
Hi-index | 0.00 |
First Page of the Article