Search Results - PHAN, B~
-
1
Security of group key exchange protocols with different passwords
Published 2009Get full text
Default Conference proceeding -
2
Security of two recent constant-round password authenticated group key exchange schemes
Published 2009Get full text
Default Conference proceeding -
3
Security limitations of an authorized anonymous ID-based scheme for mobile communication
Published 2005Get full text
Default Article -
4
Cryptanalysis of a new ultralightweight RFID authentication protocol—SASI
Published 2009Get full text
Default Article -
5
Non-repudiable authentication and billing architecture for wireless mesh networks
Published 2011Get full text
Default Article -
6
Tampering with a watermarking-based image authentication scheme
Published 2008Get full text
Default Article -
7
Fixing the integrated Diffie-Hellman-DSA key exchange protocol
Published 2005Get full text
Default Article -
8
Traceable privacy of recent provably-secure RFID protocols
Published 2008Get full text
Default Conference proceeding -
9
Privacy of recent RFID authentication protocols
Published 2008Get full text
Default Conference proceeding -
10
-
11
Advanced differential-style cryptanalysis of the NSA's skipjack block cipher
Published 2009Get full text
Default Article -
12
Attacks on improved key distribution protocols with perfect reparability
Published 2008Get full text
Default Conference proceeding -
13
-
14
-
15
(In)security of efficient tree-based group key agreement using bilinear map
Published 2008Get full text
Default Conference proceeding -
16
Further attacks and comments on 'security of two remote user authentication schemes using smart cards'
Published 2004Get full text
Default Article -
17
-
18
Lessons from market-based approaches to improved hygiene for the rural poor in developing countries
Published 2004Get full text
Default Conference proceeding -
19
Index tables of finite fields and modular golomb rulers
Published 2012Get full text
Default Article -
20
Comparison of cube attacks over different vector spaces
Published 2015Get full text
Default Conference proceeding -
21
Smart, secure and seamless access control scheme for mobile devices
Published 2016Get full text
Default Conference proceeding -
22
Computing the linear complexity for sequences with characteristic polynomial f^v
Published 2013Get full text
Default Article -
23
-
24
Linear complexity for sequences with characteristic polynomial fv
Published 2011Get full text
Default Conference proceeding -
25
On the design of forgiving biometric security systems
Published 2009Get full text
Default Conference proceeding -
26
Analysis of two pairing-based three-party password authenticated key exchange protocols
Published 2009Get full text
Default Conference proceeding -
27
Higher order differentiation over finite fields with applications to generalising the cube attack
Published 2017Get full text
Default Article -
28
Augmented attack tree modeling of SQL injection attacks
Published 2010Get full text
Default Conference proceeding -
29
Privacy analysis of forward and backward untraceable RFID authentication schemes
Published 2011Get full text
Default Article -
30
Privacy-preserving clinical decision support system using gaussian kernel-based classification
Published 2013Get full text
Default Article -
31
Privacy-preserving multi-class support vector machine for outsourcing the data classification in cloud
Published 2013Get full text
Default Article -
32
Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption
Published 2018Get full text
Default Conference proceeding -
33
Analysis of a buyer-seller watermarking protocol for trustworthy purchasing of digital contents
Published 2011Get full text
Default Article -
34
Notions and relations for RKA-secure permutation and function families
Published 2011Get full text
Default Article -
35
Formal analysis of a TPM-based secrets distribution and storage scheme
Published 2008Get full text
Default Conference proceeding -
36
-
37
Accident causation and pre-accidental driving situations. Part 2. In-depth accident causation analysis
Published 2008Get full text
Default Report -
38
Accident causation and pre-accidental driving situations. Part 3. Summary report
Published 2008Get full text
Default Report -
39
Effective recognition of facial micro-expressions with video motion magnification
Published 2016Get full text
Default Article -
40
SaferWheels study on powered two-wheeler and bicycle accidents in the EU - Annex 6 case summaries
Published 2018Get full text
Default Report -
41
A preliminary analysis of in‐depth accident data for powered two‐wheelers and bicycles in Europe
Published 2018Get full text
Default Conference proceeding -
42
SaferWheels study on powered two-wheeler and bicycle accidents in the EU - Final report
Published 2018Get full text
Default Report -
43
Identification of vehicle related risk factors, deliverable 6.1 of the H2020 project SafetyCube
Published 2016Get full text
Default Report -
44
Description of data-sources used in SafetyCube. Deliverable 3.1 of the H2020 project SafetyCube
Published 2015Get full text
Default Report