Refreshing results…
Beating Random Test Case Prioritization
UploadSubversion in Practice: How to Efficiently Undermine Signatures
Download from doi.orgCooperative Secret Sharing Using QR Codes and Symmetric Keys
Download from doi.orgA generalized attack on RSA type cryptosystems
UploadOnline/Offline Provable Data Possession
UploadRFID Ownership Transfer with Positive Secrecy Capacity Channels
Download from doi.orgOn the security of text-based 3D CAPTCHAs
Download from ro.uow.edu.auAttribute-based optimistic fair exchange: How to restrict brokers with policies
Download from ro.uow.edu.auPerfect Ambiguous Optimistic Fair Exchange
Download from www.researchgate.netShort fail-stop signature scheme based on factorization and discrete logarithm assumptions
Download from doi.orgA Generic Construction of Identity-Based Online/Offline Signcryption
Download from ro.uow.edu.auIdentity-Based On-Line/Off-Line Signcryption
Download from ro.uow.edu.auMissing publications? Search for publications with a matching author name.