Cryptology ePrint Archive: Report 2015/486

Available versions in chronological order


How to detect unauthorised usage of a key
Jiangshan Yu and Mark Ryan and Cas Cremers

DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, and Cas Cremers

DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, and Cas Cremers

DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, and Cas Cremers
Original publication (with minor differences): IEEE Transactions on Information Forensics and Security

DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, and Cas Cremers
Original publication (with minor differences): IEEE Transactions on Information Forensics and Security

DECIM: Detecting Endpoint Compromise In Messaging
Jiangshan Yu, Mark Ryan, and Cas Cremers
Original publication (with minor differences): IEEE Transactions on Information Forensics and Security


[ Cryptology ePrint archive ]