ACM SIGCAS Computers and Society
Hyper-Encryption and Everlasting Security
STACS '02 Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
Information-Theoretic Cryptography
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Information-theoretic analysis of steganalysis in real images
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Multimodal authentication based on random projections and source coding
Proceedings of the 10th ACM workshop on Multimedia and security
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
On the optimality of linear, differential, and sequential distinguishers
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Using multiple smart cards for signing messages at malicious terminals
ISC'06 Proceedings of the 9th international conference on Information Security
Unconditionally secure chaffing-and-winnowing: a relationship between encryption and authentication
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
How much assurance does a PIN provide?
HIP'05 Proceedings of the Second international conference on Human Interactive Proofs
Hi-index | 0.00 |