Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
A Comparison of Market Approaches to Software Vulnerability Disclosure
Get full text
Conference Proceeding
Low Latency Anonymous Communication : How Long Are Users Willing to Wait?
Get full text
Conference Proceeding
An Open, PKI-Based Mobile Payment System
HASSINEN, Marko, HYPPÖNEN, Konstantin, HAATAJA, Keijo
Published in Lecture notes in computer science (2006)
Get full text
Published in Lecture notes in computer science (2006)
Conference Proceeding
Security Engineering Using Problem Frames
Hatebur, Denis, Heisel, Maritta, Schmidt, Holger
Published in Emerging Trends in Information and Communication Security (2006)
Published in Emerging Trends in Information and Communication Security (2006)
Get full text
Book Chapter
Revocable Anonymity
KÖPSELL, Stefan, WENDOLSKY, Rolf, FEDERRATH, Hannes
Published in Lecture notes in computer science (2006)
Get full text
Published in Lecture notes in computer science (2006)
Conference Proceeding
Privacy-Preserving Decision Tree Mining Based on Random Substitutions
Get full text
Conference Proceeding
Kleptographic Attacks on E-Voting Schemes
GOGOLEWSKI, Marcin, KLONOWSKI, Marek, KUBIAK, Przemyseaw, KUTYEOWSKI, Miroseaw, LAUKS, Anna, ZAGORSKI, Filip
Published in Lecture notes in computer science (2006)
Get full text
Published in Lecture notes in computer science (2006)
Conference Proceeding
Revocable Anonymity
Köpsell, Stefan, Wendolsky, Rolf, Federrath, Hannes
Published in Emerging Trends in Information and Communication Security (2006)
Published in Emerging Trends in Information and Communication Security (2006)
Get full text
Book Chapter