210 papers found
Refreshing results…
Traitor tracing schemes for protected software implementations
Security Verification
Speaker Biometrics
Shamir’s Trick
Sha
Strong Exclusion
Ssl
Secure Networks Design
Single Euro Payments Area
Simultaneous Transactions
Secure Computer System Model
Secret Key Cryptosystem
Smart/Algorithmic Denial of Service
Sieving in Function Fields
Memory-Constrained Implementations of Elliptic Curve Cryptography in Co-Z Coordinate Representation
Signed Window Exponentiation
Secure Wireless Multicast
Subgroup Cryptosystems
Secure Communication
Stack (Buffer) Overflow
Missing publications? Read more about our data sources.