Authenticating mobile phone users using keystroke analysis N. L. ClarkeS. M. Furnell Regular Contribution 01 August 2006 Pages: 1 - 14
Low-randomness constant-round private XOR computations Carlo BlundoClemente GaldiGiuseppe Persiano Regular Contribution 08 August 2006 Pages: 15 - 26
Handling distributed authorization with delegation through answer set programming Shujing WangYan Zhang Regular Contribution 29 November 2006 Pages: 27 - 46
Efficient generation of secure elliptic curves Elisavet KonstantinouYannis C. StamatiouChristos Zaroliagis Regular Contribution 29 November 2006 Pages: 47 - 63