|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 112 occurrences of 89 keywords
|
|
|
Results
Found 155 publication records. Showing 155 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
49 | Lanjun Dang, Weidong Kou, Yuxia Xiao |
An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 265-268, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Sarvar Patel |
Number Theoretic Attacks on Secure Password Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 236-247, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks |
41 | Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda |
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 781-794, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IUC, Light-weight Hash functions, Security, Authentication, RFID, Active-attacks |
36 | Elad Barkan, Eli Biham, Nathan Keller |
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(3), pp. 392-429, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular |
36 | Elad Barkan, Eli Biham, Nathan Keller |
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 600-616, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
Active hardware attacks and proactive countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 361-366, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Junji Shikata, Tsutomu Matsumoto |
Unconditionally Secure Steganography Against Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(6), pp. 2690-2705, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | LongHai Li, ShaoFeng Fu, XiangQuan Che |
Active Attacks on Reputable Mix Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, Chengdu, Sichuan, China, 10-12 August 2009, pp. 447-450, 2009, IEEE Computer Society, 978-0-7695-3747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy protection, mix network, anonymous communication, active attacks |
27 | Andrei Serjantov, Roger Dingledine, Paul F. Syverson |
From a Trickle to a Flood: Active Attacks on Several Mix Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 5th International Workshop, IH 2002, Noordwijkerhout, The Netherlands, October 7-9, 2002, Revised Papers, pp. 36-52, 2002, Springer, 3-540-00421-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Dijiang Huang, Deep Medhi |
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 3(3), pp. 16, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
node fabrication, selective node capture, Sensor, insider attack |
26 | Bo Zhu 0001, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao 0001, Robert H. Deng |
Providing efficient certification services against active attacks in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, IPCCC 2005, April 7-9, 2005, Phoenix, Arizona, USA, pp. 285-292, 2005, IEEE, 0-7803-8991-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Phong Q. Nguyen, Igor E. Shparlinski |
On the Insecurity of a Server-Aided RSA Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 21-35, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Server-aided protocol, Cryptanalysis, Lattices, RSA signature |
25 | Phong Q. Nguyen, Jacques Stern |
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 372-379, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | Matthias Krause 0001, Dirk Stegemann |
More on the Security of Linear RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 182-196, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography |
24 | Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres |
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 1-22, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks |
23 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet |
Silicon-level Solutions to Counteract Passive and Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fifth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2008, FDTC 2008, Washington, DC, USA, 10 August 2008, pp. 3-17, 2008, IEEE Computer Society, 978-0-7695-3314-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 210-226, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov |
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 112-124, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Justifying a Dolev-Yao Model Under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design III, FOSAD 2004/2005 Tutorial Lectures, pp. 1-41, 2004, Springer, 3-540-28955-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Philippe Béguin, Jean-Jacques Quisquater |
Fast Server-Aided RSA Signatures Secure Against Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 57-69, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
22 | Frédéric Amiel, Karine Villegas, Benoit Feix, Louis Marcel |
Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pp. 92-102, 2007, IEEE Computer Society, 0-7695-2982-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Birgit Pfitzmann, Michael Waidner |
Attacks on Protocols for Server-Aided RSA Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings, pp. 153-162, 1992, Springer, 3-540-56413-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
22 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 405-419, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |
22 | Prateek Mittal, Nikita Borisov |
Information leaks in structured peer-to-peer anonymous communication systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 267-278, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
information leaks, peer-to-peer, anonymity, attacks |
20 | Kun Wang, Meng Wu, Pengrui Xia, Subin Shen |
An Incentive-Based Secure Charging Scheme for Integrating Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design IV, 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers, pp. 432-442, 2007, Springer, 978-3-540-92718-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
MANET (Ad Hoc), security, cellular network, incentive, charging, Integrating networks |
18 | Kei Kawauchi, Mitsuru Tada |
On the Extract Security of Multi-signature Schemes Based on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 336-349, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang 0023, Muhammad Waqas Anwar |
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 223-228, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Graph head Sealing, execution integrity, security properties, Mobile Agent security, malicious hosts, active attacks |
18 | Xun Yi |
Identity-Based Fault-Tolerant Conference Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(3), pp. 170-178, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Computer network conference, conference key agreement, semitrusted, passive and active attacks, fault tolerance |
18 | Chi-Sung Laih, Fu-Kuan Tu |
Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 167-173, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Server aided secret computation (SASC), passive attacks, RSA, Signature, active attacks |
16 | Min-Hui Lin 0001, Chin-Chen Chang 0001 |
A secure one-time password authentication scheme with low-computation for mobile communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(2), pp. 76-84, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password |
16 | Nathan Drenkow, Max Lennon, I-Jeng Wang, Philippe Burlina |
Do Adaptive Active Attacks Pose Greater Risk Than Static Attacks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WACV ![In: IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2023, Waikoloa, HI, USA, January 2-7, 2023, pp. 1380-1389, 2023, IEEE, 978-1-6654-9346-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Sven Laur, Sylvain Pasini |
SAS-Based Group Authentication and Key Agreement Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 197-213, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Groups, key agreement, message authentication, multi-party |
16 | Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin |
HB#: Increasing the Security and Efficiency of HB+. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 361-378, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
LPN, authentication, RFID tags, Toeplitz matrix |
16 | Li Lu 0001, Jinsong Han, Lei Hu, Yunhao Liu 0001, Lionel M. Ni |
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 19-23 March 2007, White Plains, New York, USA, pp. 13-22, 2007, IEEE Computer Society, 978-0-7695-2787-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Manish Mehta 0003, Dijiang Huang, Lein Harn |
RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 24th IEEE International Performance Computing and Communications Conference, IPCCC 2005, April 7-9, 2005, Phoenix, Arizona, USA, pp. 193-197, 2005, IEEE, 0-7803-8991-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Chae Hoon Lim, Pil Joong Lee |
Security and Performance of Server-Aided RSA Computation Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 70-83, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
13 | Panayiotis Kotzanikolaou, Emmanouil Magkos, Christos Douligeris, Vassilios Chrissikopoulos |
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2005 International Conference on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2005), 13-16 June 2005, Taormina, Italy, Proceedings, pp. 581-587, 2005, IEEE Computer Society, 0-7695-2342-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Luciano Rila, Chris J. Mitchell |
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 254-264, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, smartcards |
12 | Soon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim |
A New Scheme for the Location Information Protection in Mobile Communication Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 436-441, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Michael Backes 0001, Birgit Pfitzmann |
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 204-218, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Thomas Demuth |
A Passive Attack on the Privacy of Web Users Using Standard Log Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, pp. 179-193, 2002, Springer, 3-540-00565-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
user tracking and profiling, server logs, privacy, World Wide Web, anonymity |
12 | Tatsuaki Okamoto, Kazuo Ohta |
How to Utilize the Randomness of Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 456-475, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
11 | David Nordlund, Zheng Chen, Erik G. Larsson |
Detecting Active Attacks in Over-the-Air Computation using Dummy Samples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.08950, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | David Nordlund, Zheng Chen 0002, Erik G. Larsson |
Detecting Active Attacks in Over-the-Air Computation using Dummy Samples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSSC ![In: 57th Asilomar Conference on Signals, Systems, and Computers, ACSSC 2023, Pacific Grove, CA, USA, October 29 - Nov. 1, 2023, pp. 1691-1696, 2023, IEEE, 979-8-3503-2574-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ruiyun Zhang, Shuo Chang, Zhiqing Wei, Yifan Zhang 0003, Sai Huang, Zhiyong Feng 0001 |
Modulation Classification of Active Attacks in Internet of Things: Lightweight MCBLDN With Spatial Transformer Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(19), pp. 19132-19146, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Mahshad Shariatnasab, Farhad Shirani 0001, Elza Erkip |
Fundamental Privacy Limits in Bipartite Networks Under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 40(3), pp. 940-954, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Hasan Mujtaba Buttar, Waqas Aman, Muhammad Mahboob Ur Rahman, Qammer H. Abbasi |
Countering Active Attacks on RAFT-based IoT Blockchain Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2204.00838, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Yousra Magdy, Mohamed Azab, Amal O. Hamada, Mohamed R. M. Rizk, Nayera M. Sadek |
Moving-Target Defense in Depth: Pervasive Self- and Situation-Aware VM Mobilization across Federated Clouds in Presence of Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(23), pp. 9548, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
11 | Lubomyr Sikora, Natalya Lysa, Roman Martsyshyn, Yulia Miyushkovych |
Game and System Models of Conflict Resolution Methods and Infrastructure Cybersecurity Under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CITRisk ![In: Proceedings of the 3rd International Workshop on Computational & Information Technologies for Risk-Informed Systems (CITRisk 2022) co-located with XXII International scientific and technical conference on Information Technologies in Education and Management (ІТЕМ 2022), Online Event, Neubiberg, Germany, January 12, 2023., pp. 14-23, 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
11 | Sai Huang, Chunsheng Lin, Wenjun Xu 0001, Yue Gao 0001, Zhiyong Feng 0001, Fusheng Zhu |
Identification of Active Attacks in Internet of Things: Joint Model- and Data-Driven Automatic Modulation Classification Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 8(3), pp. 2051-2065, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Zhengjia Zhu, Hao Yin, Zijian Zhang 0001, Tielei Li, Jiamou Liu, Bakh Khoussainov, Chang Xu 0004 |
Exploring active attacks for three incorrect implementations of the ISO/IEC 9798 in satellite networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 172, pp. 93-101, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Mahshad Shariatnasab, Farhad Shirani 0001, Elza Erkip |
Fundamental Privacy Limits in Bipartite Networks under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2106.04766, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
11 | Miroslav Mitev, Arsenia Chorti, Elena Veronica Belmega, H. Vincent Poor |
Protecting Physical Layer Secret Key Generation from Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 23(8), pp. 960, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Masahito Hayashi, Ning Cai 0001 |
Asymptotically Secure Network Code for Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Commun. ![In: IEEE Trans. Commun. 69(5), pp. 3245-3259, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
11 | Ning Cai 0001, Masahito Hayashi |
Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 66(3), pp. 1428-1448, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Ning Cai 0001, Masahito Hayashi |
Corrections to "Secure Network Code for Adaptive and Active Attacks With No-Randomness in Intermediate Nodes". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 66(6), pp. 3954, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Masahito Hayashi, Ning Cai 0001 |
Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2003.12225, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
11 | Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai 0001 |
Reduction Theorem for Secrecy over Linear Network Code for Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2003.11722, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
11 | Gui Zhou, Cunhua Pan, Hong Ren, Kezhi Wang, Arumugam Nallanathan, Kai-Kit Wong |
User Cooperation for IRS-aided Secure SWIPT MIMO: Active Attacks and Passive Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2006.05347, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
11 | Masahito Hayashi, Masaki Owari, Go Kato, Ning Cai 0001 |
Reduction Theorem for Secrecy over Linear Network Code for Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 22(9), pp. 1053, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Cheng Gongye, Hongjia Li, Xiang Zhang, Majid Sabbagh, Geng Yuan, Xue Lin, Thomas Wahl, Yunsi Fei |
New Passive and Active Attacks on Deep Neural Networks in Medical Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: IEEE/ACM International Conference On Computer Aided Design, ICCAD 2020, San Diego, CA, USA, November 2-5, 2020, pp. 39:1-39:9, 2020, IEEE. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
11 | Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua |
Robust active attacks on social graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 33(5), pp. 1357-1392, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
11 | An Braeken, Madhusanka Liyanage, Pardeep Kumar 0001, John Murphy |
Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 64040-64052, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Ning Zhang 0007, Renyong Wu, Shenglan Yuan, Chao Yuan, Dajiang Chen |
RAV: Relay Aided Vectorized Secure Transmission in Physical Layer Security for Internet of Things Under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 6(5), pp. 8496-8506, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua |
Conditional adjacency anonymity in social graphs under active attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Knowl. Inf. Syst. ![In: Knowl. Inf. Syst. 61(1), pp. 485-511, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Audrey Lucas |
Support logiciel robuste aux attaques passives et actives pour l'arithmétique de la cryptographie asymétrique sur des (très) petits cœurs de calcul. (Robust software support against passive and active attacks for the arithmetic of asymmetric cryptography on (very) small computing cores). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2019 |
RDF |
|
11 | Sjouke Mauw, Yunior Ramírez-Cruz, Rolando Trujillo-Rasua |
Robust active attacks on social graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1811.10915, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
11 | Furrakh Shahzad, Maruf Pasha, Arslan Ahmad |
A Survey of Active Attacks on Wireless Sensor Networks and their Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1702.07136, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
11 | Ning Cai 0001, Masahito Hayashi |
Secure Network Code for Adaptive and Active Attacks with No-Randomness in Intermediate Nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1712.09035, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
11 | Ahmed El Shafie 0001, Hamadi Chihaoui, Ridha Hamila, Naofal Al-Dhahir, Adel Gastli, Lazhar Ben-Brahim |
On the Monetary Loss Due to Passive and Active Attacks on MIMO Smart Grid Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1711.02168, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
11 | Khai T. Phan, Ryan Ewing, David Starobinski, Liangxiao Xin |
Brief Announcement: Passive and Active Attacks on Audience Response Systems Using Software Defined Radios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Boston, MA, USA, November 5-8, 2017, Proceedings, pp. 405-409, 2017, Springer, 978-3-319-69083-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
11 | Arsenia Chorti |
Overcoming limitations of secret key generation in block fading channels under active attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPAWC ![In: 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2016, Edinburgh, United Kingdom, July 3-6, 2016, pp. 1-5, 2016, IEEE, 978-1-5090-1749-2. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Sjouke Mauw, Rolando Trujillo-Rasua, Bochuan Xuan |
Counteracting Active Attacks in Social Network Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security and Privacy XXX - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings, pp. 233-248, 2016, Springer, 978-3-319-41482-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Xiaoyun Hou, Chunlong Gao, Yan Zhu, Shuo Yang |
Detection of active attacks based on random orthogonal pilots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCSP ![In: 8th International Conference on Wireless Communications & Signal Processing, WCSP 2016, Yangzhou, China, October 13-15, 2016, pp. 1-4, 2016, IEEE, 978-1-5090-2860-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Dzevdan Kapetanovic, Gan Zheng, Fredrik Rusek |
Physical layer security for massive MIMO: An overview on passive eavesdropping and active attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 53(6), pp. 21-27, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
11 | Dzevdan Kapetanovic, Gan Zheng, Fredrik Rusek |
Physical Layer Security for Massive MIMO: An Overview on Passive Eavesdropping and Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1504.07154, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
11 | Monika Darji, Bhushan H. Trivedi |
Detection of Active Attacks on Wireless IMDs Using Proxy Device and Localization Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCC ![In: Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, pp. 353-362, 2014, Springer, 978-3-662-44965-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
11 | Oliver Kosut, Li-Wei Kao |
On generalized active attacks by causal adversaries in networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITW ![In: 2014 IEEE Information Theory Workshop, ITW 2014, Hobart, Tasmania, Australia, November 2-5, 2014, pp. 247-251, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
11 | Carsten Rudolf Janda, Christian Scheunert, Eduard A. Jorswieck |
Wiretap-channels with constrained active attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSSC ![In: 48th Asilomar Conference on Signals, Systems and Computers, ACSSC 2014, Pacific Grove, CA, USA, November 2-5, 2014, pp. 1984-1988, 2014, IEEE, 978-1-4799-8297-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
11 | Mohammad Hajiabadi, Bruce M. Kapron |
Computational Soundness of Coinductive Symbolic Security under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings, pp. 539-558, 2013, Springer, 978-3-642-36593-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Heng Zhou, Lauren M. Huie, Lifeng Lai |
Key generation through two-way relay channels under active attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSSC ![In: 2013 Asilomar Conference on Signals, Systems and Computers, Pacific Grove, CA, USA, November 3-6, 2013, pp. 56-60, 2013, IEEE, 978-1-4799-2390-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Mohammad Hajiabadi, Bruce M. Kapron |
Computational Soundness of Coinductive Symbolic Security under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 560, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
11 | Yingbin Liang, H. Vincent Poor, Lei Ying 0001 |
Secrecy Throughput of MANETs Under Passive and Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 57(10), pp. 6692-6702, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
11 | Musard Balliu, Isabella Mastroeni |
A weakest precondition approach to active attacks analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 59-71, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
robustness, non-interference, declassification, program semantics, active attackers |
11 | Stefan Dziembowski, Alessandro Mei, Alessandro Panconesi |
On Active Attacks on Sensor Network Key Distribution Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ALGOSENSORS ![In: Algorithmic Aspects of Wireless Sensor Networks, 5th International Workshop, ALGOSENSORS 2009, Rhodes, Greece, July 10-11, 2009. Revised Selected Papers, pp. 52-63, 2009, Springer, 978-3-642-05433-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov |
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 16(5), pp. 497-530, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Vadim Lyubashevsky |
Lattice-Based Identification Schemes Secure Under Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 162-179, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Berk Sunar, William J. Martin, Douglas R. Stinson |
A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 56(1), pp. 109-119, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
True (and pseudo) random number generators, cryptography, resilient functions |
11 | Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei |
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings, pp. 403-412, 2006, IEEE Computer Society, 0-7695-2607-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
11 | Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov |
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 421, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
11 | Soohyun Oh, Masahiro Mambo, Hiroki Shizuya, Dongho Won |
On the Security of Girault Key Agreement Protocols against Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5), pp. 1181-1189, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
11 | Michael Backes 0001, Christian Cachin |
Public-Key Steganography with Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2003, pp. 231, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
11 | Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada |
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 328-340, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Shoichi Hirose, Susumu Yoshida |
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 135-148, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
11 | Shin-Jia Hwang, Chin-Chen Chang 0001, Wei-Pang Yang |
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 215-227, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
11 | Michael Waidner |
Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 302-319, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
9 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(1), pp. 33-54, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Dolev-Yao-style, Reactive simulatability/UC, Limitations, XOR, Computational soundness |
9 | Julien Bringer, Hervé Chabanne |
Trusted-HB: A Low-Cost Version of HB + Secure Against Man-in-the-Middle Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(9), pp. 4339-4342, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Matthieu R. Bloch, Rajesh Narasimha, Steven W. McLaughlin |
Network Security for Client-Server Architecture Using Wiretap Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 3(3), pp. 404-413, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hyun Seok Kim, Jin-Young Choi |
A Lightweight Protocol Analysis and Modification for Secure RFID System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 17th International Conference on Computer Communications and Networks, IEEE ICCCN 2008, St. Thomas, U.S. Virgin Islands, August 3-7, 2008, pp. 958-962, 2008, IEEE, 978-1-4244-2390-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 155 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|