The SCEAS System
Navigation Menu

Conferences in DBLP

(wistp)
2009 (conf/wistp/2009)


  1. On the Unobservability of a Trust Relation in Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  2. A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. [Citation Graph (, )][DBLP]


  3. Privacy-Aware Location Database Service for Granular Queries. [Citation Graph (, )][DBLP]


  4. Algebraic Attacks on RFID Protocols. [Citation Graph (, )][DBLP]


  5. Anti-counterfeiting Using Memory Spots. [Citation Graph (, )][DBLP]


  6. On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. [Citation Graph (, )][DBLP]


  7. Measurement Analysis When Benchmarking Java Card Platforms. [Citation Graph (, )][DBLP]


  8. Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. [Citation Graph (, )][DBLP]


  9. Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  10. Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks. [Citation Graph (, )][DBLP]


  11. Ultra-Lightweight Key Predistribution in Wireless Sensor Networks for Monitoring Linear Infrastructure. [Citation Graph (, )][DBLP]


  12. PKIX Certificate Status in Hybrid MANETs. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002