default search action
ARES 2007: Vienna, Austria
- Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria. IEEE Computer Society 2007, ISBN 0-7695-2775-2
Session 1: Trust Model & Trust Management
- Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell:
Formalising Dynamic Trust Negotiations in Decentralised Collaborative e-Health Systems. 3-10 - Yudistira Asnar, Paolo Giorgini, Fabio Massacci, Nicola Zannone:
From Trust to Dependability through Risk Analysis. 19-26 - Jatinder Singh, Jean Bacon, Ken Moody:
Dynamic trust domains for secure, private, technology-assisted living. 27-34 - Ching Lin, Vijay Varadharajan:
A Hybrid Trust Model for Enhancing Security in Distributed Systems. 35-42 - Wilfried N. Gansterer, Andreas Janecek, Peter Lechner:
A Reliable Component-Based Architecture for E-Mail Filtering. 43-52
Session 2: Availability, Fault-Tolerant & Recovery
- Johannes Osrael, Lorenz Froihofer, Norbert Chlaupek, Karl M. Göschka:
Availability and Performance of the Adaptive Voting Replication. 53-60 - Marcin Gorawski, Pawel Marks:
Distributed Stream Processing Analysis in High Availability Context. 61-68 - Stefan Beyer, Francesc D. Muñoz-Escoí, Pablo Galdámez:
Implementing Network Partition-Aware Fault-Tolerant CORBA Systems. 69-76 - Bin Rong, Fred Douglis, Cathy H. Xia, Zhen Liu:
Failure Recovery in Cooperative Data Stream Analysis. 77-84 - José Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Bettina Kemme:
A Recovery Protocol for Middleware Replicated Databases Providing GSI. 85-92 - Rubén de Juan-Marín, Hendrik Decker, Francesc D. Muñoz-Escoí:
Revisiting Hot Passive Replication. 93-102
Session 3: Reputation Management & Trust
- Sini Ruohomaa, Lea Kutvonen, Eleni Koutrouli:
Reputation Management Survey. 103-111 - Audun Jøsang, Jochen Haller:
Dirichlet Reputation Systems. 112-119 - Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. 120-127 - Stefan Böttcher, Sebastian Obermeier:
Secure Anonymous Union Computation Among Malicious Partners. 128-138
Session 4: Privacy & Access Control
- Oliver Jorns, Oliver Jung, Gerald Quirchmayr:
A Privacy Enhancing Service Architecture for Ticket-based Mobile Applications. 139-146 - Pankaj Bhaskar, Sheikh Iqbal Ahamed:
Privacy in Pervasive Computing and Open Issues. 147-154 - Christin Groba, Stephan Groß, Thomas Springer:
Context-Dependent Access Control for Contextual Information. 155-161 - Dongxi Liu:
Bytecode Verification for Enhanced JVM Access Control. 162-172
Session 5: Failure Detection & Attack Prevention
- P. Hazy, Rudolph E. Seviora:
Automatic Failure Detection with Separation of Concerns. 173-181 - Mourad Elhadef, Azzedine Boukerche:
A Failure Detection Service for Large-Scale Dependable Wireless Ad-Hoc and Sensor Networks. 182-189 - Yanlan Ding, Guiping Su:
Intrusion detection system for signal based SIP attacks through timed HCPN. 190-197 - Muhammad Sher, Thomas Magedanz:
3G-WLAN Convergence: Vulnerability, Attacks Possibilities and Security Model. 198-205 - Meriam Ben Ghorbel, Mehdi Talbi, Mohamed Mejri:
Specification and Detection of TCP/IP Based Attacks Using the ADM-Logic. 206-212 - Frank Yeong-Sung Lin, Po-Hao Tsang, Yi-Luen Lin:
Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network. 213-222
Session 6: Authentication & Authorisation
- Anders Moen Hagalisletto:
Errors in Attacks on Authentication Protocols. 223-229 - Christian Schläger, Monika Ganslmayer:
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. 230-237 - Tieyan Li, Robert H. Deng:
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. 238-245 - Leila Ismail:
Authentication Mechanisms for Mobile Agents. 246-253 - Yuri Demchenko, Leon Gommans, Cees de Laat:
Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. 254-262 - Georg Treu, Florian Fuchs, Christiane Dargatz:
Implicit Authorization for Accessing Location Data in a Social Context. 263-272
Session 7: Security Algorithm & Framework
- Abinandhan Chandrasekaran, Bhavani Thuraisingham:
Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. 273-280 - Zeghid Medien, Belgacem Bouallegue, Adel Baganne, Mohsen Machhout, Rached Tourki:
A Reconfigurable Implementation of the New Secure Hash Algorithm. 281-285 - Jeffrey Todd McDonald, Alec Yasinsac:
Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. 286-293 - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
A Framework for the Development of Secure Data Warehouses based on MDA and QVT. 294-300
Session 8: Software Security
- David Byers, Nahid Shahmehri:
Design of a Process for Software Security. 301-309 - Christoph Krauß, Markus Schneider, Kpatcha M. Bayarou, Claudia Eckert:
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks. 310-317 - Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck:
A secure architecture for the pseudonymization of medical data. 318-324 - Thomas Nowey, Hannes Federrath:
Collection of Quantitative Data on Security Incidents. 325-334
Session 9: Security Models
- Suranjith Ariyapperuma, Chris J. Mitchell:
Security vulnerabilities in DNS and DNSSEC. 335-342 - David Arsenault, Arun Sood, Yih Huang:
Secure, Resilient Computing Clusters: Self-Cleansing Intrusion Tolerance with Hardware Enforced Security (SCIT/HES). 343-350 - Raihan Al-Ekram, Richard C. Holt, Chris Hobbs:
Applying a Tradeoff Model (TOM) to TACT. 351-355 - Denis Hatebur, Maritta Heisel, Holger Schmidt:
A Pattern System for Security Requirements Engineering. 356-365 - Stefan Durbeck, Rolf Schillinger, Jan Paul Kolter:
Security Requirements for a Semantic Service-oriented Architecture. 366-373 - Ludwig Fuchs, Günther Pernul:
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management. 374-384
Session 10: Miscellaneous Security Techniques
- Vidar Evenrud Seeberg, Slobodan Petrovic:
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. 385-390 - Valentina Casola, Nicola Mazzocca, Jesus Luna, Oscar Manso, Manel Medina:
Static evaluation of Certificate Policies for GRID PKIs interoperability. 391-399 - Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A Min Tjoa:
Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. 400-407 - TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang:
Universally Composable Three-Party Key Distribution. 408-416
Session 11: eAuction & eVoting Protocol
- Brian Curtis, Josef Pieprzyk, Jan Seruga:
An Efficient eAuction Protocol. 417-421 - Benedikt Ostermaier, Florian Dotzer, Markus Strassberger:
Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes. 422-431 - Orhan Cetinkaya, Ali Doganaksoy:
A Practical Verifiable e-Voting Protocol for Large Scale Elections over a Network. 432-442
Session 12: Dependability in Distributed & Ubiquitous Computing
- Lorenz Froihofer, Johannes Osrael, Karl M. Göschka:
Decoupling Constraint Validation from Business Activities to Improve Dependability in Distributed Object Systems. 443-450 - Lu Yan, Kaisa Sere:
Dependability Aspects of Ubiquitous Computing. 451-453 - Tomoya Enokido, Makoto Takizawa:
Concurrency Control using Subject- and Purpose-Oriented (SPO) View. 454-464
Session 13: Anomaly & Intrusion Detection
- Oleksiy Mazhelis, Seppo Puuronen:
Comparing Classifier Combining Techniques for Mobile-Masquerader Detection. 465-472 - Surekha Mariam Varghese, K. Poulose Jacob:
Process Profiling Using Frequencies of System Calls. 473-479 - Dil Muhammad Akbar Hussain:
Terrorist Networks Analysis through Argument Driven Hypotheses Model. 480-492
International Symposium on Frontiers in Availability, Reliability and Security (FARES)
Session 1: Fault-Tolerant & Availability
- S. Prabhu, R. Venkat:
High Availability for Network Management Applications. 493-498 - Yanlong Wang, Zhanhuai Li, Wei Lin:
RWAR: A Resilient Window-consistent Asynchronous Replication Protocol. 499-505 - Keiji Ozaki, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa:
Fault-Tolerant Semi-Passive Coordination Protocol for a Multi-Actuator/Multi-Sensor (MAMS) Model. 506-516
Session 2: Access Control
- Franz Kollmann:
Realizing fine-granular Read andWrite Rights on Tree Structured Documents. 517-523 - Vipin Singh Mewar, Subhendu Aich, Shamik Sural:
Access Control Model for Web Services with Attribute Disclosure Restriction. 524-531 - Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Aggregating and Deploying Network Access Control Policies. 532-542
Session 3: Authentication
- Arjan Durresi, Vamsi Paruchuri, Mimoza Durresi, Leonard Barolli:
Secure Spatial Authentication using Cell Phones. 543-549 - Bogdan Groza:
Broadcast Authentication Protocol with Time Synchronization and Quadratic Residues Chain. 550-557 - Yijun He, Nan Xu, Jie Li:
A Secure Key Exchange and Mutual Authentication Protocol for Wireless Mobile Communications. 558-563 - Gang Yao, Dengguo Feng, Xiaoxi Han:
Improved Client-to-Client Password-Authenticated Key Exchange Protocol. 564-574
Session 4: Real-Time System & Sensor Network
- Dong Seong Kim, Chung Su Yang, Jong Sou Park:
Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attack. 575-579 - Christian Buckl, Matthias Regensburger, Alois C. Knoll, Gerhard Schrott:
Models for automatic generation of safety-critical real-time systems. 580-587 - Bastian Preindl, Alexander Schatten:
A Near-Real-Time Behaviour Control Framework. 588-598
Session 5: RFID Techniques & Applications
- Qinghan Xiao, Cam Boulet, Thomas E. Gibbons:
RFID Security Issues in Military Supply Chains. 599-605 - Jens Mache, Chris Allick:
The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. 606-609 - Geethapriya Venkataramani, Srividya Gopalan:
Mobile phone based RFID architecture for secure electronic Payments using RFID credit cards. 610-620
Session 6: Secure Solution & Applications
- C. M. Jayalath, R. U. Fernando:
A Modular Architecture for Secure and Reliable Distributed Communication. 621-628 - Anthony Stell, Richard O. Sinnott, Oluwafemi O. Ajayi, Jipu Jiang:
Security Oriented e-Infrastructures Supporting Neurological Research and Clinical Trials. 629-636 - Georgios Kambourakis, Eleni Klaoudatou, Stefanos Gritzalis:
Securing Medical Sensor Environments: The CodeBlue Framework Case. 637-643 - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
A set of QVT relations to transform PIM to PSM in the Design of Secure Data Warehouses. 644-654
Session 7: Security Issue in Business Management
- Regine Endsuleit, Christoph Amma:
Agent Alliances: A Means for Practical Threshold Signature. 655-662 - Martin Boesgaard, Erik Zenner:
Protecting Online Transactions with Unique Embedded Key Generators. 663-669 - Thomas Neubauer, Gernot Goluch, Bernhard Riedl:
A research agenda for Autonomous Business Process Management. 670-680
Session 8: Web, XML, Content Management
- William Bradley Glisson, L. Milton Glisson, Ray Welland:
Secure Web Application Development and Global Regulation. 681-688 - Viet Hung Nguyen, Tran Khanh Dang, Nguyen Thanh Son, Josef Küng:
Query Assurance Verification for Dynamic Outsourced XML Databases. 689-696 - Lars-Helge Netland, Yngve Espelid, Khalid A. Mughal:
A Reflection-Based Framework for Content Validation. 697-706
Session 9: Security Policies & Techniques
- William Bradley Glisson, Ray Welland:
Web Engineering Security: Essential Elements. 707-714 - Paulina Januszkiewicz, Marek Pyka:
Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology. 715-722 - Sergio Pozo, Rafael Ceballos, Rafael M. Gasca:
CSP-Based Firewall Rule Set Diagnosis using Security Policies. 723-729 - Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stefan Jakoubi, Bernhard Riedl, Simon Tjoa:
CASSIS - Computer-based Academy for Security and Safety in Information Systems. 730-740
Session 10: Trust Management & Trust Model
- Vasiliki Liagkou, Effie Makri, Paul G. Spirakis, Yannis C. Stamatiou:
Trust in global computing systems as a limit property emerging from short range random interactions. 741-748 - Jimmy McGibney, Dmitri Botvich:
A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam. 749-756 - Simon Samwel Msanjila, Hamideh Afsarmanesh:
HICI: An Approach for Identifying Trust Elements The case of technological trust perspective in VBEs. 757-764 - Lin Zhang, Feng Xu, Yuan Wang, Jian Lv:
A Semantic and Time Related Recommendation-Feedback Trust Model. 765-774
Session 11: Miscellaneous Applications
- Mohammad Feroz Raihan, Mohammad Zulkernine:
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. 775-782 - Niraj Swami, Sheikh Iqbal Ahamed:
Error Modeling in RF-based Location Detection (EMLD) for Pervasive Computing Environments. 783-790 - Rafael Páez, Cristina Satizábal, Jordi Forné:
A performance model to Cooperative Itinerant Agents (CIA): a security scheme to IDS. 791-798 - Cesar Mauri, Toni Granollers, Agusti Solanas:
On the Assessment of the Interaction Quality of Users with Cerebral Palsy. 799-805 - Chaobo Yang, Ming Qi:
Research and Design of Mobile Impeachment System with Semi-cryptonym. 806-811 - Shu-Ching Wang, Shyi-Ching Liang, Kuo-Qin Yan, Guang-Yan Zheng:
Efficient Malicious Agreement in a Virtual Subnet Network. 812-820
Second International Workshop Dependability Aspects on Data Warehousing and Mining Applications (DAWAM 2007)
- Bhavani Thuraisingham, Srinivasan Iyer:
Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. 821-828 - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Application of QVT for the Development of Secure Data Warehouses: A case study. 829-836 - Marcin Gorawski, Jakub Bularz:
Protecting Private Information by Data Separation in Distributed Spatial Data Warehouse. 837-844 - Marcello Castellano, Giuseppe Mastronardi, Angela Aprile, Giuliano Bellone de Grecis, Flaviano Fiorino:
Applying a Flexible Mining Architecture to Intrusion Detection. 845-852 - Veselina G. Jecheva, Evgeniya P. Nikolova:
An Application of Learning Problem in Anomaly-based Intrusion Detection Systems. 853-860 - (Withdrawn) Detecting Critical Regions in Covert Networks: A Case Study of 9/11 Terrorists Network. 861-870
- Lillian Røstad, Øystein Nytrø:
Access Control and Integration of Health Care Systems: An Experience Report and Future Challenges. 871-878 - Dalia El-Mansy, Ahmed Sameh:
A Collaborative Inter Data Grids Strong Semantic Model with Hybrid Namespace. 878-885 - Calin Ciufudean, Bianca Satco, Constantin Filote:
Reliability Markov Chains for Security Data Transmitter Analysis. 886-894
2nd International Workshop Dependability and Security in e-Government (DeSeGov 2007)
- Melanie Volkamer, Margaret McGaley:
Requirements and Evaluation Procedures for eVoting. 895-902 - Orhan Cetinkaya, Deniz Cetinkaya:
Towards Secure E-Elections in Turkey: Requirements and Principles. 903-907 - Stefan G. Weber, Roberto Araújo, Johannes Buchmann:
On Coercion-Resistant Electronic Elections with Linear Work. 908-916 - Mariagrazia Fugini:
A Security Model and Architecture for Multichannel E-Government Systems. 917-924 - Judith E. Y. Rossebø, Scott Cadzow, Paul Sijben:
eTVRA, a Threat, Vulnerability and Risk Assessment Method and Tool for eEurope. 925-933 - Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair:
Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. 934-940 - Martijn Warnier, Frances M. T. Brazier, Martin Apistola, Anja Oskamp:
Secure Distributed Dossier Management in the Legal Domain. 941-947 - Elsa Estevez, Tomasz Janowski:
Building a Dependable Messaging Infrastructure for Electronic Government. 948-958
Workshop on Foundations of Fault-tolerant Distributed Computing (FOFDC 2007)
- Rachid Guerraoui, Michel Raynal:
A Universal Construction for Concurrent Objects. 959-966 - Bastian Braun:
FCPre: Extending the Arora-Kulkarni Method of Automatic Addition of Fault-Tolerance. 967-974 - Cristian Martín, Mikel Larrea, Ernesto Jiménez:
On the implementation of the Omega failure detector in the crash-recovery failure model. 975-982 - Mourad Elhadef, Azzedine Boukerche, Hisham Elkadiki:
Self-Diagnosing Wireless Mesh and Ad-Hoc Networks using an Adaptable Comparison-Based Approach. 983-990 - Olga Brukman, Shlomi Dolev, Yinnon A. Haviv, Reuven Yagel:
Self-Stabilization as a Foundation for Autonomic Computing. 991-998 - Christian Engelmann, Stephen L. Scott, Chokchai Leangsuksun, Xubin He:
On Programming Models for Service-Level High Availability. 999-1008
First International Workshop on Secure Software Engineering (SecSE 2007)
- Christos Kalloniatis, Evangelia Kavakli, Stefanos Gritzalis:
Using Privacy Process Patterns for Incorporating Privacy Requirements into the System Design Process. 1009-1017 - Shanai Ardi, David Byers, Per Håkon Meland, Inger Anne Tøndel, Nahid Shahmehri:
How can the developer benefit from security modeling? 1017-1025 - Gabriel Hermosillo, Roberto Gomez, Lionel Seinturier, Laurence Duchien:
AProSec: an Aspect for Programming Secure Web Applications. 1026-1033 - Koen Buyens, Bart De Win, Wouter Joosen:
Empirical and statistical analysis of risk analysis-driven techniques for threat management. 1034-1041 - Takao Okubo, Hidehiko Tanaka:
Secure Software Development through Coding Conventions and Frameworks. 1042-1051 - Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean W. Smith:
Pastures: Towards Usable Security Policy Engineering. 1052-1059 - Kaarina Karppinen, Reijo Savola, Mikko Rapeli, Esa Tikkala:
Security Objectives within a Security Testing Case Study. 1060-1065 - Chengying Mao, Yansheng Lu:
CppTest: A Prototype Tool for Testing C/C++ Programs. 1066-1073 - Dragan Vidakovic, Dejan Simic:
A Novel Approach to Building Secure Systems. 1074-1084
Workshop on "Modeling, Designing, and Testing Correct, Secure, and Dependable Event-Based System" (EBITS 2007)
- Jan Ploski, Wilhelm Hasselbring:
Exception Handling in an Event-Driven System. 1085-1092 - Armin Beer, Matthias Heindl:
Issues in Testing Dependable Event-Based Systems at a Systems Integration Company. 1093-1100 - Jirí Kubalík, Richard Mordinyi:
Optimizing Events Traffic in Event-based Systems by means of Evolutionary Algorithms. 1101-1107 - Dindin Wahyudin, A Min Tjoa:
Event-Based Monitoring of Open Source Software Projects. 1108-1115 - Marcus Mor, Richard Mordinyi, Johannes Riemer:
Using Space-Based Computing for More Efficient Group Coordination and Monitoring in an Event-Based Work Management System. 1116-1123 - Roland Vecera, Szabolcs Rozsnyai, Heinz Roth:
Indexing and Search of Correlated Business Events. 1124-1134
First International Workshop on Advances in Information Security (WAIS 2007)
- Alexander Krizhanovsky, Alexander Marasanov:
An Approach for Adaptive Intrusion Prevention Based on The Danger. 1135-1142 - Rene Mayrhofer, Martyn Welch:
A Human-Verifiable Authentication Protocol Using Visible Laser Light. 1143-1148 - Chik How Tan:
Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. 1148-1154 - Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. 1155-1159 - Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai:
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. 1160-1166 - Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack. 1167-1174 - Yoshio Kakizaki, Hidekazu Tsuji:
A New Method for Reducing the Revocation Delay in the Attribute Authentication. 1175-1182 - Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota:
Efficient Multiparty Computation for Comparator Networks. 1183-1189 - Orhan Cetinkaya, Ali Doganaksoy:
Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols. 1190-1196 - Anders Moen Hagalisletto:
Attacks are Protocols Too. 1197-1206 - Luis Zarza, Josep Pegueroles, Miguel Soriano:
Evaluation Function for Synthesizing Security Protocols by means of Genetic Algorithms. 1207-1213 - Bogdan Groza, Toma-Leonida Dragomir:
On the use of one-way chain based authentication protocols in secure control systems. 1214-1221 - Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog:
Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. 1222-1226 - Dong Seong Kim, Taek-Hyun Shin, Jong Sou Park:
A Security Framework in RFID Multi-domain System. 1227-1234
Workshop on "Security in E-Learning" (SEL)
- Martin Ebner:
E-Learning 2.0 = e-Learning 1.0 + Web 2.0? 1235-1239 - Gerald Quirchmayr:
Blended Learning Technology in Information Security Management Courses. 1240-1244 - Emmanuel A. Adigun, Jan H. P. Eloff:
Defining a Trusted Service-Oriented Network Environment. 1245-1250 - Alan Ward, Jordi Castellà-Roca, Aleix Dorca-Josa:
Designing a Cryptographic Scheme for e-Surveys in Higher-Education Institutions. 1251-1255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.