A lightweight protocol for the generation and distribution of secure e-coupons
Proceedings of the 11th international conference on World Wide Web
SAWM: a tool for secure and authenticated web metering
SEKE '02 Proceedings of the 14th international conference on Software engineering and knowledge engineering
DISC '00 Proceedings of the 14th International Conference on Distributed Computing
Fair e-Lotteries and e-Casinos
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Online Advertising: Secure E-coupons
ICTCS '01 Proceedings of the 7th Italian Conference on Theoretical Computer Science
Dynamic Multi-threshold Metering Schemes
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Third Party Certification of HTTP Service Access Statistics (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Authentic Attributes with Fine-Grained Anonymity Protection
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
An Auditable Metering Scheme for Web Advertisement Applications
ISC '01 Proceedings of the 4th International Conference on Information Security
Defending Against Denial-of-Service Attacks with Puzzle Auctions
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Electronic Commerce Research
New client puzzle outsourcing techniques for DoS resistance
Proceedings of the 11th ACM conference on Computer and communications security
Proofs of communication and its application for fighting spam
SOFSEM'08 Proceedings of the 34th conference on Current trends in theory and practice of computer science
Combating spam and denial-of-service attacks with trusted puzzle solvers
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Peeking through the cloud: DNS-based estimation and its applications
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Peeking Through the Cloud: Client Density Estimation via DNS Cache Probing
ACM Transactions on Internet Technology (TOIT)
Hardware aging-based software metering
Proceedings of the Conference on Design, Automation and Test in Europe
A secure distance-based RFID identification protocol with an off-line back-end database
Personal and Ubiquitous Computing
Hi-index | 0.00 |