Home > Publications
Home University of Twente
Prospective Students
Intranet (internal)

EEMCS EPrints Service

Editor: Qing, S.
Home Policy Brochure Browse Search User Area Contact Help

Number of items: 4.


Tan, Zhiyuan and Jamdagni, Aruna and He, Xiangjian and Nanda, Priyadarsi and Liu, Ren Ping (2011) Multivariate correlation analysis technique based on euclidean distance map for network traffic characterization. In: Information and Communications Security. Lecture Notes in Computer Science 7043. Springer Verlag, Berlin, pp. 388-398. ISSN 0302-9743


Langer, L. and Jonker, H.L. and Pieters, W. (2010) Anonymity and Verifiability in Voting: Understanding (Un)Linkability. In: 12th International Conference Information and Communications Security, ICICS 2010, 15-17 Dec 2010, Barcelona, Spain. pp. 296-310. Lecture Notes in Computer Science 6476. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-17649-4


Cederquist, J.G. and Corin, R.J. and Torabi Dashti, M. (2005) On the quest for impartiality: Design and analysis of a Fair Non-repudiation protocol. In: 7th International Conference on Information and Communications Security, ICICS 2005, 10-13 Dec 2005, Beijing, China. pp. 27-39. Lecture Notes in Computer Science 3783. Springer-Verlag. ISBN 3-540-30934-9
Cheng, Jieyin and Chong, Chuen Ngen and Doumen, J.M. and Etalle, S. and Hartel, P.H. and Nikolaus, S. (2005) STREAMTO: Streaming Content using a Tamper-Resistant Token (Workshop paper). In: 20th IFIP TC11 Int. Conf. on Security and Privacy in the Age of Ubiquitous Computing (SEC), Makuhari-Messe, Chiba, Japan. pp. 601-612. Springer-Verlag. ISBN 0-387-25658-X

This list was generated on Fri May 26 05:37:58 CEST 2017.