Bichl VoIP Security Peer-to-Peer VoIP Communications Using Anonymisation Overlay Networks, p.130 ,
New Reflectors in the Internet, p.142 ,
URL : https://hal.archives-ouvertes.fr/hal-01056382
Hübner Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement Proposal, p.154 ,
Delétré Biometrics Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based Authentication, p.166 ,
Kollmitzer Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction, p.178 ,
191 Christian Rathgeb and Andreas Uhl Applied Cryptography Generalizations and Extensions of Redactable Signatures with Applications to Electronic ,
Rass Table of Contents XIII Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption, p.214 ,
and Edgar Weippl Secure Communication Using Identity Based Encryption, p.256 ,
Feng Cheng, and Christoph Meinel Anonymous Client Authentication for Transport Layer Security, p.268 ,