|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 33 occurrences of 23 keywords
|
|
|
Results
Found 34 publication records. Showing 34 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
42 | Raphael Chung-Wei Phan, Bok-Min Goi |
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 33-39, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
client-to-client, unknown key-share, cryptanalysis, replay attack, Password-authenticated key exchange |
39 | Wenting Jin, Jing Xu 0002 |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 299-314, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm |
31 | Yanjiang Yang, Feng Bao 0001, Robert H. Deng |
Efficient Client-to-Client Password Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 202-207, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 104-117, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm |
26 | Kazuki Yoneyama, Haruki Ota, Kazuo Ohta |
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings, pp. 257-266, 2007, Springer, 978-3-540-77223-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
different password, C2C-PAKE, cross-realm setting, undetectable on-line dictionary attacks, Authenticated key exchange |
24 | Gang Yao, Dengguo Feng, Xiaoxi Han |
Improved Client-to-Client Password-Authenticated Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 564-574, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Dengguo Feng, Jing Xu 0002 |
A New Client-to-Client Password-Authenticated Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings, pp. 63-76, 2009, Springer, 978-3-642-01813-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, cryptanalysis, provable security, cross-realm |
21 | Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang |
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRDC ![In: 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia, pp. 405-408, 2007, IEEE Computer Society, 0-7695-3054-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 |
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Frontiers of WWW Research and Development - APWeb 2006, 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings, pp. 830-836, 2006, Springer, 3-540-31142-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Human memorable password, different password authentication, mobile computing, dictionary attacks, authenticated key exchange |
16 | Leandro Lanzieri, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch |
Secure and Authorized Client-to-Client Communication for LwM2M. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.03450, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Leandro Lanzieri, Peter Kietzmann, Thomas C. Schmidt, Matthias Wählisch |
Secure and Authorized Client-to-Client Communication for LwM2M. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: 21st ACM/IEEE International Conference on Information Processing in Sensor Networks, IPSN 2022, Milano, Italy, May 4-6, 2022, pp. 158-170, 2022, IEEE, 978-1-6654-9624-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Hongfeng Zhu, Yu Xia, Yan Zhang 0065 |
A Novel Client-to-Client Password-Authenticated Key Exchange Protocol using Chaotic Maps in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Hiding Multim. Signal Process. ![In: J. Inf. Hiding Multim. Signal Process. 6(5), pp. 997-1008, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
16 | Károly Bósa |
An Ambient ASM Model of Client-to-Client Interaction via Cloud Computing and an Anonymously Accessible Docking Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOFT (Selected Papers) ![In: Software Technologies - 8th International Joint Conference, ICSOFT 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers, pp. 235-255, 2013, Springer, 978-3-662-44919-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
16 | Károly Bósa |
An Ambient ASM Model for Client-to-Client Interaction via Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOFT ![In: ICSOFT 2013 - Proceedings of the 8th International Joint Conference on Software Technologies, Reykjavík, Iceland, 29-31 July, 2013, pp. 459-470, 2013, SciTePress, 978-989-8565-68-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
16 | Chuangui Ma, Fushan Wei, Fengxiu Gao |
Efficient Client-to-Client Password Authenticated Key Exchange Based on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INCoS ![In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013, pp. 233-238, 2013, IEEE, 978-0-7695-4988-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
16 | Po-Jen Chuang, Yi-Ping Liao |
Efficient and Secure Cross-Realm Client-to-Client Password-Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: IEEE 26th International Conference on Advanced Information Networking and Applications, AINA, 2012 , Fukuoka, Japan, March 26-29, 2012, pp. 701-708, 2012, IEEE Computer Society, 978-1-4673-0714-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng |
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings, pp. 172-184, 2011, Springer, 978-3-642-25512-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
16 | M. Dakshayini, T. R. Gopala Krishnan Nair |
Client-to-Client Streaming Scheme for VOD Applications ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1005.5436, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
16 | Tianjie Cao, Tao Quan, Bo Zhang |
Cryptanalysis of Some Client-to-Client Password-Authenticated Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 4(4), pp. 263-270, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Shuhua Wu, Yuefei Zhu |
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Networks ![In: J. Networks 4(7), pp. 649-656, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Zhoujun Li, Hua Guo, Xiyong Zhang |
fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FICS ![In: Proceedings of the First International Conference on Foundations of Informatics, Computing and Software, FICS 2008, Shanghai, China, June 3-6, 2008, pp. 257-268, 2008, Elsevier. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Grandon Gill |
Resonance within the Client-to-Client System: Criticality, Cascades, and Tipping Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informing Sci. Int. J. an Emerg. Transdiscipl. ![In: Informing Sci. Int. J. an Emerg. Transdiscipl. 11, pp. 311-348, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hongfeng Zhu, Tianhua Liu, Jie Liu |
EV-C2C-PAKE: An improved client-to-client password-authenticated key exchange protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 23(3), 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
16 | Fengjiao Wang, Yuqing Zhang |
Cryptanalysis of a client-to-client password-authenticated key agreement protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 248, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
16 | Jin Wook Byun, Dong Hoon Lee 0001, Jong In Lim 0001 |
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 177(19), pp. 3995-4013, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Michael Dahlin, Clifford Mather, Randolph Y. Wang, Thomas E. Anderson, David A. Patterson 0001 |
A Quantitative Analysis of Cache Policies for Scalable Network File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 1994 ACM SIGMETRICS conference on Measurement and modeling of computer systems, Vanderbilt University, Nashville, Tennessee, USA, May 16-20, 1994, pp. 150-160, 1994, ACM, 0-89791-659-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
10 | Andrey Ermolinskiy, Renu Tewari |
C2Cfs: A Collective Caching Architecture for Distributed File Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: 11th IEEE International Conference on High Performance Computing and Communications, HPCC 2009, 25-27 June 2009, Seoul, Korea, pp. 642-647, 2009, IEEE, 978-0-7695-3738-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Sami J. Habib |
A Monte Carlo simulator for evaluating server placement within network topology designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VALUETOOLS ![In: Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, VALUETOOLS 2006, Pisa, Italy, October 11-13, 2006, pp. 29, 2006, ACM, 1-59593-504-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
simulation, optimization, computer-aided design, Monte Carlo, queuing theory, evolutionary approach, formulation |
10 | Peter Quax, Patrick Monsieurs, Wim Lamotte |
Performance evaluation of client-side video stream quality selection using autonomous avatars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the 2004 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology, 2004, Singapore, June 3-5, 2004, pp. 251-256, 2004, ACM, 1-58113-882-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park |
Password-Authenticated Key Exchange between Clients with Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 134-146, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
key exchange, Password authentication, dictionary attack, Kerberos, cross-realm |
5 | Yin Yin, Bao Li 0001 |
Secure Cross-Realm C2C-PAKE Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 395-406, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
5 | Eun-Jun Yoon, Kee-Young Yoo |
A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb Workshops ![In: Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings, pp. 659-663, 2006, Springer, 3-540-31158-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Kerberus, C2C-PAKE, Security, Cryptography, Key agreement |
5 | Jeeyeon Kim, Seungjoo Kim, Jin Kwak, Dongho Won |
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 895-902, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
5 | Björn Grönvall, Ian Marsh, Stephen Pink |
A multicast-based distributed file system for the internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS European Workshop ![In: Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996, Connemara, Ireland, September 9-11, 1996, pp. 95-102, 1996, ACM. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #34 of 34 (100 per page; Change: )
|
|