Articles dans des revues avec comité de lecture (69)

  1. 46. Qachri, N., Markowitch, O., & Dricot, J.-M. (2012). Vertical handover security in 4G heterogeneous networks: threat analysis and open challenges. Lecture notes in computer science, 7709, 7-14. doi:10.1007/978-3-642-35585-1_2
  2. 47. Dossogne, J., Markowitch, O., & Lafitte, F. (2012). Coercion-Freeness in E-voting via Multi-party Designated Verifier Schemes. GI-Edition. Lecture Notes in Informatics,(205), 127-141.
  3. 48. Cao, Z., & Markowitch, O. (2010). A note on some quantum secret sharing schemes. International Journal of Quantum Information, 8(3), 451-456.
  4. 49. Cao, Z., & Markowitch, O. (2009). Security Difference Between DSA and Schnorr's Signature. Proceedings (International Conference on Networks Security, Wireless Communications and Trusted Computing. Print), 201-204.
  5. 50. Cao, Z., Liu, L., & Markowitch, O. (2009). Generalized Greedy Algorithm for Shortest Superstring. Lecture notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 5, 1526-1531. doi:10.1007/978-3-642-02469-6_32
  6. 51. Cao, Z., & Markowitch, O. (2009). Different Authentication Properties and a Signcryption Scheme Revisited. Computer Society ..., 395-399.
  7. 52. Cao, Z., & Markowitch, O. (2009). A note on an arbitrated quantum signature scheme. International Journal of Quantum Information, 7(6), 1205-1209. doi:10.1142/S0219749909005742
  8. 53. Cao, Z., & Markowitch, O. (2008). Two Optimum Secret Sharing Schemes Revisited. Computer Society ..., 157-160.
  9. 54. Akimana, R., Markowitch, O., & Roggeman, Y. (2007). Secure outsourcing of DNA sequences comparisons in a Grid environment. W S E A S Transactions on Computers Research, 2(2), 262-269.
  10. 55. Gonzalez-Deleito Collel, N.-C., & Markowitch, O. (2007). Exclusions and related trust relationships in multi-party fair exchange protocols. Electronic commerce research and applications, 6(3), 343-357. doi:10.1016/j.elerap.2006.08.004
  11. 56. Akimana, R., & Markowitch, O. (2006). Integrity issues in a Grid environment. WSEAS Transactions on Communications, 5(11), 2115-2122.
  12. 57. Saeednia, S., Kremer, S., & Markowitch, O. (2004). An efficient strong designated verifier signature scheme. Lecture notes in computer science, 2971, 40-54.

  13. << Précédent 1 2 3 4 5 6 7 8 9 10 11 12 Suivant >>