Countermeasures for attacks on satellite TV cards using open receivers
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
A free, readily upgradeable, interactive tool for teaching encryption algorithms
Proceedings of the 43rd annual Southeast regional conference - Volume 1
Authentication & key agreement for off-portal mobile applications
Information Security Tech. Report
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Dealing with inconsistent secure messages by weighting majority
Knowledge-Based Systems
Design, installation and execution of a security agent for mobile stations
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Hi-index | 0.01 |
A fascinating introduction to cryptography, and how it actually works.