Search alternatives:
iter » item, iyer

1
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers...

2
Published 2015
Springer International Publishing
Table of Contents: ... and User Privacy in the Third-party Identity Management Landscape -- An Iterative Algorithm for Reputation...