The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Active-attacks (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2001 (17) 2002-2004 (27) 2005 (21) 2006-2007 (24) 2008 (16) 2009-2014 (15) 2015-2019 (15) 2020-2022 (17) 2023 (3)
Publication types (Num. hits)
article(45) inproceedings(109) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 112 occurrences of 89 keywords

Results
Found 155 publication records. Showing 155 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
49Lanjun Dang, Weidong Kou, Yuxia Xiao An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
41Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IUC, Light-weight Hash functions, Security, Authentication, RFID, Active-attacks
36Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular
36Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Artemios G. Voyiatzis, Dimitrios N. Serpanos Active hardware attacks and proactive countermeasures. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Junji Shikata, Tsutomu Matsumoto Unconditionally Secure Steganography Against Active Attacks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28LongHai Li, ShaoFeng Fu, XiangQuan Che Active Attacks on Reputable Mix Networks. Search on Bibsonomy ISPA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy protection, mix network, anonymous communication, active attacks
27Andrei Serjantov, Roger Dingledine, Paul F. Syverson From a Trickle to a Flood: Active Attacks on Several Mix Types. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Dijiang Huang, Deep Medhi Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF node fabrication, selective node capture, Sensor, insider attack
26Bo Zhu 0001, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao 0001, Robert H. Deng Providing efficient certification services against active attacks in ad hoc networks. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
25Phong Q. Nguyen, Jacques Stern The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Matthias Krause 0001, Dirk Stegemann More on the Security of Linear RFID Authentication Protocols. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography
24Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks
23Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet Silicon-level Solutions to Counteract Passive and Active Attacks. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Michael Backes 0001, Christian Cachin Public-Key Steganography with Active Attacks. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Justifying a Dolev-Yao Model Under Active Attacks. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Philippe Béguin, Jean-Jacques Quisquater Fast Server-Aided RSA Signatures Secure Against Active Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
22Frédéric Amiel, Karine Villegas, Benoit Feix, Louis Marcel Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Birgit Pfitzmann, Michael Waidner Attacks on Protocols for Server-Aided RSA Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
22Stefan Wolf 0001 Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement
22Prateek Mittal, Nikita Borisov Information leaks in structured peer-to-peer anonymous communication systems. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information leaks, peer-to-peer, anonymity, attacks
20Kun Wang, Meng Wu, Pengrui Xia, Subin Shen An Incentive-Based Secure Charging Scheme for Integrating Networks. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MANET (Ad Hoc), security, cellular network, incentive, charging, Integrating networks
18Kei Kawauchi, Mitsuru Tada On the Extract Security of Multi-signature Schemes Based on RSA. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang 0023, Muhammad Waqas Anwar On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Graph head Sealing, execution integrity, security properties, Mobile Agent security, malicious hosts, active attacks
18Xun Yi Identity-Based Fault-Tolerant Conference Key Agreement. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Computer network conference, conference key agreement, semitrusted, passive and active attacks, fault tolerance
18Chi-Sung Laih, Fu-Kuan Tu Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Server aided secret computation (SASC), passive attacks, RSA, Signature, active attacks
16Min-Hui Lin 0001, Chin-Chen Chang 0001 A secure one-time password authentication scheme with low-computation for mobile communications. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password
16Nathan Drenkow, Max Lennon, I-Jeng Wang, Philippe Burlina Do Adaptive Active Attacks Pose Greater Risk Than Static Attacks? Search on Bibsonomy WACV The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Sven Laur, Sylvain Pasini SAS-Based Group Authentication and Key Agreement Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Groups, key agreement, message authentication, multi-party
16Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin HB#: Increasing the Security and Efficiency of HB+. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LPN, authentication, RFID tags, Toeplitz matrix
16Li Lu 0001, Jinsong Han, Lei Hu, Yunhao Liu 0001, Lionel M. Ni Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. Search on Bibsonomy PerCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Manish Mehta 0003, Dijiang Huang, Lein Harn RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Chae Hoon Lim, Pil Joong Lee Security and Performance of Server-Aided RSA Computation Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
13Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Luciano Rila, Chris J. Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cardholder authentication, biometrics, smartcards
12Soon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim A New Scheme for the Location Information Protection in Mobile Communication Environments. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michael Backes 0001, Birgit Pfitzmann Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Thomas Demuth A Passive Attack on the Privacy of Web Users Using Standard Log Information. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2002 DBLP  DOI  BibTeX  RDF user tracking and profiling, server logs, privacy, World Wide Web, anonymity
12Tatsuaki Okamoto, Kazuo Ohta How to Utilize the Randomness of Zero-Knowledge Proofs. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
11David Nordlund, Zheng Chen, Erik G. Larsson Detecting Active Attacks in Over-the-Air Computation using Dummy Samples. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11David Nordlund, Zheng Chen 0002, Erik G. Larsson Detecting Active Attacks in Over-the-Air Computation using Dummy Samples. Search on Bibsonomy ACSSC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ruiyun Zhang, Shuo Chang, Zhiqing Wei, Yifan Zhang 0003, Sai Huang, Zhiyong Feng 0001 Modulation Classification of Active Attacks in Internet of Things: Lightweight MCBLDN With Spatial Transformer Network. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Mahshad Shariatnasab, Farhad Shirani 0001, Elza Erkip Fundamental Privacy Limits in Bipartite Networks Under Active Attacks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Hasan Mujtaba Buttar, Waqas Aman, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi Countering Active Attacks on RAFT-based IoT Blockchain Networks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Yousra Magdy, Mohamed Azab, Amal O. Hamada, Mohamed R. M. Rizk, Nayera M. Sadek Moving-Target Defense in Depth: Pervasive Self- and Situation-Aware VM Mobilization across Federated Clouds in Presence of Active Attacks. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
11Lubomyr Sikora, Natalya Lysa, Roman Martsyshyn, Yulia Miyushkovych Game and System Models of Conflict Resolution Methods and Infrastructure Cybersecurity Under Active Attacks. Search on Bibsonomy CITRisk The full citation details ... 2022 DBLP  BibTeX  RDF
11Sai Huang, Chunsheng Lin, Wenjun Xu 0001, Yue Gao 0001, Zhiyong Feng 0001, Fusheng Zhu Identification of Active Attacks in Internet of Things: Joint Model- and Data-Driven Automatic Modulation Classification Approach. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
11Zhengjia Zhu, Hao Yin, Zijian Zhang 0001, Tielei Li, Jiamou Liu, Bakh Khoussainov, Chang Xu 0004 Exploring active attacks for three incorrect implementations of the ISO/IEC 9798 in satellite networks. Search on Bibsonomy Comput. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
11Mahshad Shariatnasab, Farhad Shirani 0001, Elza Erkip Fundamental Privacy Limits in Bipartite Networks under Active Attacks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
11Miroslav Mitev, Arsenia Chorti, Elena Veronica Belmega, H. Vincent Poor Protecting Physical Layer Secret Key Generation from Active Attacks. Search on Bibsonomy Entropy The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
11Masahito Hayashi, Ning Cai 0001 Asymptotically Secure Network Code for Active Attacks. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
11Ning Cai 0001, Masahito Hayashi Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
11Ning Cai 0001, Masahito Hayashi Corrections to "Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes". Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
11Masahito Hayashi, Ning Cai 0001 Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
11Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai 0001 Reduction Theorem for Secrecy over Linear Network Code for Active Attacks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
11Gui Zhou, Cunhua Pan, Hong Ren, Kezhi Wang, Arumugam Nallanathan, Kai-Kit Wong User Cooperation for IRS-aided Secure SWIPT MIMO: Active Attacks and Passive Eavesdropping. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
11Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai 0001 Reduction Theorem for Secrecy over Linear Network Code for Active Attacks. Search on Bibsonomy Entropy The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
11Cheng Gongye, Hongjia Li, Xiang Zhang, Majid Sabbagh, Geng Yuan, Xue Lin, Thomas Wahl, Yunsi Fei New Passive and Active Attacks on Deep Neural Networks in Medical Applications. Search on Bibsonomy ICCAD The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
11Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua Robust active attacks on social graphs. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
11An Braeken, Madhusanka Liyanage, Pardeep Kumar 0001, John Murphy Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
11Ning Zhang 0007, Renyong Wu, Shenglan Yuan, Chao Yuan, Dajiang Chen RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
11Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua Conditional adjacency anonymity in social graphs under active attacks. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
11Audrey Lucas Support logiciel robuste aux attaques passives et actives pour l'arithmétique de la cryptographie asymétrique sur des (très) petits cœurs de calcul. (Robust software support against passive and active attacks for the arithmetic of asymmetric cryptography on (very) small computing cores). Search on Bibsonomy 2019   RDF
11Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua Robust active attacks on social graphs. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
11Furrakh Shahzad, Maruf Pasha, Arslan Ahmad A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
11Ning Cai 0001, Masahito Hayashi Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
11Ahmed El Shafie 0001, Hamadi Chihaoui, Ridha Hamila, Naofal Al-Dhahir, Adel Gastli, Lazhar Ben-Brahim On the Monetary Loss Due to Passive and Active Attacks on MIMO Smart Grid Communications. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
11Khai T. Phan, Ryan Ewing, David Starobinski, Liangxiao Xin Brief Announcement: Passive and Active Attacks on Audience Response Systems Using Software Defined Radios. Search on Bibsonomy SSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
11Arsenia Chorti Overcoming limitations of secret key generation in block fading channels under active attacks. Search on Bibsonomy SPAWC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
11Sjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan Counteracting Active Attacks in Social Network Graphs. Search on Bibsonomy DBSec The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
11Xiaoyun Hou, Chunlong Gao, Yan Zhu, Shuo Yang Detection of active attacks based on random orthogonal pilots. Search on Bibsonomy WCSP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
11Dzevdan Kapetanovic, Gan Zheng, Fredrik Rusek Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
11Dzevdan Kapetanovic, Gan Zheng, Fredrik Rusek Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
11Monika Darji, Bhushan H. Trivedi Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information. Search on Bibsonomy SSCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
11Oliver Kosut, Li-Wei Kao On generalized active attacks by causal adversaries in networks. Search on Bibsonomy ITW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
11Carsten Rudolf Janda, Christian Scheunert, Eduard A. Jorswieck Wiretap-channels with constrained active attacks. Search on Bibsonomy ACSSC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
11Mohammad Hajiabadi, Bruce M. Kapron Computational Soundness of Coinductive Symbolic Security under Active Attacks. Search on Bibsonomy TCC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
11Heng Zhou, Lauren M. Huie, Lifeng Lai Key generation through two-way relay channels under active attacks. Search on Bibsonomy ACSSC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
11Mohammad Hajiabadi, Bruce M. Kapron Computational Soundness of Coinductive Symbolic Security under Active Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
11Yingbin Liang, H. Vincent Poor, Lei Ying 0001 Secrecy Throughput of MANETs Under Passive and Active Attacks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
11Musard Balliu, Isabella Mastroeni A weakest precondition approach to active attacks analysis. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF robustness, non-interference, declassification, program semantics, active attackers
11Stefan Dziembowski, Alessandro Mei, Alessandro Panconesi On Active Attacks on Sensor Network Key Distribution Schemes. Search on Bibsonomy ALGOSENSORS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
11Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Vadim Lyubashevsky Lattice-Based Identification Schemes Secure Under Active Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Berk Sunar, William J. Martin, Douglas R. Stinson A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF True (and pseudo) random number generators, cryptography, resilient functions
11Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
11Soohyun Oh, Masahiro Mambo, Hiroki Shizuya, Dongho Won On the Security of Girault Key Agreement Protocols against Active Attacks. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2003 DBLP  BibTeX  RDF
11Michael Backes 0001, Christian Cachin Public-Key Steganography with Active Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2003 DBLP  BibTeX  RDF
11Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
11Shoichi Hirose, Susumu Yoshida An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
11Shin-Jia Hwang, Chin-Chen Chang 0001, Wei-Pang Yang Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
11Michael Waidner Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
9Michael Backes 0001, Birgit Pfitzmann Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dolev-Yao-style, Reactive simulatability/UC, Limitations, XOR, Computational soundness
9Julien Bringer, Hervé Chabanne Trusted-HB: A Low-Cost Version of HB + Secure Against Man-in-the-Middle Attacks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Matthieu R. Bloch, Rajesh Narasimha, Steven W. McLaughlin Network Security for Client-Server Architecture Using Wiretap Codes. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Hyun Seok Kim, Jin-Young Choi A Lightweight Protocol Analysis and Modification for Secure RFID System. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 155 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license