The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for KCI with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2007-2024 (15)
Publication types (Num. hits)
article(8) inproceedings(7)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6 occurrences of 6 keywords

Results
Found 15 publication records. Showing 15 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
111M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Exchange, Insider Attacks, Key Compromise Impersonation
83Meng-Hui Lim, Sanggon Lee, Youngho Park 0005, Hoonjae Lee 0001 An Enhanced ID-Based Deniable Authentication Protocol on Pairings. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
56Wei Wei, Roger E. Goldman, Nabil Simaan, Howard F. Fine, Stanley Chang Design and Theoretical Evaluation of Micro-Surgical Manipulators for Orbital Manipulation and Intraocular Dexterity. Search on Bibsonomy ICRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
34Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
34N. V. S. Lakshmipathi Raju, Vankamamidi Srinivasa Naresh Dynamic distributed KCi-slice data publishing model with multiple sensitive attributes. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
34Anuli Ndubuisi, Rubaina Khan, Elham Marzi, Oluwatobi Edun A KCI Approach to Promote Intercultural Competencies for International Virutal Engineering Student Teams (InVEST). Search on Bibsonomy FIE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
34Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes Prying Open Pandora's Box: KCI Attacks against TLS. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
34Young Man Ko, Ji Young Park An index for evaluating journals in a small domestic citation index database whose citation rate is generally very low: A test based on the Korea Citation Index (KCI) database. Search on Bibsonomy J. Informetrics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
34 Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
34Eun-Kyung Ryu, Hyunsung Kim 0001, Kee-Young Yoo KCI-resilient anonymous wireless link-layer authentication protocols. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Qiang Tang 0001, Liqun Chen 0002 Extended KCI attack against two-party key establishment protocols. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
34Young Man Ko, Soo-Ryun Cho, Yong Seok Park A study on the optimization of KCI-based index (Kor-Factor) in evaluating Korean journals. Search on Bibsonomy Scientometrics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
34Liang Hu 0001, Hongtu Li, Jianfen Chu, Hongwei Li, Wei Yan Registration and Private Key Distribution Protocol Based on IBE. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF private key distribution, private key replacing, KCI, authentication, Identity-Based Encryption
33Chengyu Fan, Shijie Zhou, Fagen Li An Identity-Based Restricted Deniable Authentication Protocol. Search on Bibsonomy ISPA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF restricted deniability, KCI attack, Bilinear pairings
Displaying result #1 - #15 of 15 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license