Filter your results
- 5
- 1
- 6
- 6
- 6
- 6
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.178-190, ⟨10.1007/978-3-642-13241-4_17⟩
Conference papers
hal-01056380v1
|
||
|
Anonymous Client Authentication for Transport Layer Security11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.268-280, ⟨10.1007/978-3-642-13241-4_24⟩
Conference papers
hal-01056373v1
|
||
|
Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.214-232, ⟨10.1007/978-3-642-13241-4_20⟩
Conference papers
hal-01056377v1
|
||
|
Security for XML Data Binding11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.53-63, ⟨10.1007/978-3-642-13241-4_6⟩
Conference papers
hal-01056368v1
|
||
Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposalCMC 2010 : 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, May 2010, Linz, Austria. pp.154 - 165
Conference papers
hal-00565730v1
|
|||
|
Throwing a MonkeyWrench into Web Attackers Plans11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security (CMS), May 2010, Linz, Austria. pp.28-39, ⟨10.1007/978-3-642-13241-4_4⟩
Conference papers
hal-01056370v1
|