The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for MACs with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-1997 (17) 1998-2000 (16) 2001-2003 (21) 2004-2005 (44) 2006-2007 (32) 2008 (32) 2009 (22) 2010-2011 (18) 2012-2013 (23) 2014 (22) 2015-2016 (18) 2017-2018 (23) 2019 (17) 2020-2021 (22) 2022-2023 (25) 2024 (2)
Publication types (Num. hits)
article(127) incollection(1) inproceedings(225) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 194 occurrences of 134 keywords

Results
Found 355 publication records. Showing 354 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
86Pierre Gérard, Olivier Sigaud Designing Efficient Exploration with MACS: Modules and Function Approximation. Search on Bibsonomy GECCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
73Kelvin Sim, Vivekanand Gopalkrishnan, Hon Nian Chua, See-Kiong Ng MACs: Multi-Attribute Co-clusters with High Correlation Information. Search on Bibsonomy ECML/PKDD (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
73Kazuhiko Minematsu, Yukiyasu Tsunoo Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Differentially-uniform permutation, MAC, Block cipher, AES
73Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Threshold MACs. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
67Michel Abdalla, Chanathip Namprempre, Gregory Neven On the (Im)possibility of Blind Message Authentication Codes. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF blind MACs, provable security, blind signatures
67Katsuyuki Okeya, Tetsu Iwata Side Channel Attacks on Message Authentication Codes. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Selective Forgery, MACs, Side Channel Attacks, DPA, SPA
61Michael Semanko L-collision Attacks against Randomized MACs. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF L-collision, MACs, randomness, message authentication codes, birthday attacks
60Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu 0007 Towards Secure and Practical MACs for Body Sensor Networks. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
53Albrecht Schmidt 0001 Engineering interactive ubiquitous computing systems. Search on Bibsonomy EICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
53John Black, Martin Cochran MAC Reforgeability. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Message Authentication Codes, Birthday Attacks
53Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic seal, RFID, AES, message authentication code, pseudorandom function
51 Proceedings of the 2005 Workshop on Modeling and Analysis of Concerns in Software, MACS@ICSE 2005, St. Louis, Missouri, USA, May 16, 2005 Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Marius Marin, Leon Moonen, Arie van Deursen An approach to aspect refactoring based on crosscutting concern types. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Xiaoqing Wu, Barrett R. Bryant, Jeff Gray 0001, Marjan Mernik Pattern transformation for two-dimensional separation of concerns. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Wesley Coelho, Gail C. Murphy ActiveAspect: presenting crosscutting structure. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Vladimir Jakobac, Nenad Medvidovic, Alexander Egyed Separating architectural concerns to ease program understanding. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Martin P. Robillard, Gail C. Murphy Just-in-time concern modeling. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Juri Memmert Concern patterns and analysis. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Mazen Saleh, Hassan Gomaa Separation of concerns in software product line engineering. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51William H. Harrison, Harold Ossher, Stanley M. Sutton Jr., Peri L. Tarr Concern modeling in the concern manipulation environment. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Haitham S. Hamza Separation of concerns for evolving systems: a stability-driven approach. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Annie T. T. Ying, James L. Wright, Steven Abrams An exploration of how comments are used for marking related code fragments. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Jing Zhang 0003, Jeff Gray 0001, Yuehua Lin A model-driven approach to enforce crosscutting assertion checking. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Robert R. Painter, David Coppit A model for software plans. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Jing (Janet) Liu, Robyn R. Lutz, Jeffrey M. Thompson Mapping concern space to software architecture: a connector-based approach. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51David Shepherd, Lori L. Pollock, Tom Tourwé Using language clues to discover crosscutting concerns. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51José Juan Pazos-Arias, Jorge García Duque, Martín López Nores Locating crosscutting concerns in the formal specification of distributed reactive systems. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Naoyasu Ubayashi, Tetsuo Tamai Concern management for constructing model compilers. Search on Bibsonomy MACS@ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Fatiha Elghibari, Rachid Elouahbi, Fatima El Khoukhi, Layla Ezzahri, Labo Macs, Said Amali Intelligent model for measuring learners' satisfaction towards new contents. Search on Bibsonomy ITHET The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
46Shweta Agrawal, Dan Boneh Homomorphic MACs: MAC-Based Integrity for Network Coding. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 New Birthday Attacks on Some MACs Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack
46Kan Yasuda A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension
46Ueli M. Maurer, Johan Sjödin Single-Key AIL-MACs from Any FIL-MAC. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF arbitrary-input-length (AIL), variable-input-length (VIL), fixed-input-length (FIL), Message authentication code (MAC)
46Olivier Sigaud, Thierry Gourdin, Pierre-Henri Wuillemin Improving MACS Thanks to a Comparison with 2TBNs. Search on Bibsonomy GECCO (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Jee Hea An, Mihir Bellare Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
46Bart Preneel, Paul C. van Oorschot MDx-MAC and Building Fast MACs from Hash Functions. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
40Shengtian Yang, Yan Chen, Peiliang Qiu Linear-Codes-Based Lossless Joint Source-Channel Coding for Multiple-Access Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Junichi Hoshino, Katsutoki Hamana, Shiratori Kazuto, Atsushi Nakano Distributed Episode Control System for Interactive Narrative Entertainment. Search on Bibsonomy ICEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF narrative entertainment, massive action, episode tree, lifelike
40Graciela Corral-Briones, Mario Rafael Hueda, Carmen E. Rodríguez Joint multiuser equalization and Group decoding for asynchronous trellis-coded multiple-access channels. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Anne Frenkel, Hamideh Afsarmanesh, Gert B. Eijkel, Louis O. Hertzberger Information Management for Material Science Applications in a Virtual Laboratory. Search on Bibsonomy DEXA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
40Shingo Sato, Shoichi Hirose, Junji Shikata Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
40Shingo Sato, Shoichi Hirose, Junji Shikata Generic Construction of Sequential Aggregate MACs from Any MACs. Search on Bibsonomy ProvSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
33Kan Yasuda A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension
33Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC, MAC, Distinguishing attack, Second preimage attack
33Peng Wang 0009, Dengguo Feng, Changlu Lin, Wenling Wu Security of Truncated MACs. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robust unforgeability, Message authentication code, Universal hash function, Unforgeability, Unpredictability
33Amitanand S. Aiyer, Lorenzo Alvisi, Rida A. Bazzi, Allen Clement Matrix Signatures: From MACs to Digital Signatures in Distributed Systems. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Yevgeniy Dodis, Krzysztof Pietrzak Improving the Security of MACs Via Randomized Message Preprocessing. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Martin P. Robillard Workshop on the Modeling and Analysis of Concerns in Software (MACS 2005). Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF separation of concerns, software modeling, software analysis
33Ueli M. Maurer, Johan Sjödin Domain Expansion of MACs: Alternative Uses of the FIL-MAC. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF arbitrary-input-length (AIL), variable-input-length (VIL), fixed-input-length (FIL), Message authentication code (MAC)
33Martin P. Robillard, Peri L. Tarr First international workshop on the modeling and analysis of concerns in software (MACS 2005). Search on Bibsonomy ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF separation of concerns, software modeling, software analysis
33Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway Improved Security Analyses for CBC MACs. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Antoine Joux, Guillaume Poupard, Jacques Stern New Attacks against Standardized MACs. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Karl Brincat, Chris J. Mitchell Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptographic API, cryptanalysis, Message Authentication Code
33Mihir Bellare, Roch Guérin, Phillip Rogaway XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
27Di Ma, Gene Tsudik A new approach to secure logging. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure logging, forward secure sequential aggregate (FssAgg) authentication, forward-secure stream integrity, MACs, signatures, truncation attack
27Di Ma, Gene Tsudik A New Approach to Secure Logging. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure logging, forward secure stream integrity, MACs, signatures, truncation attack
27Yevgeniy Dodis, Prashant Puniya Feistel Networks Made Public, and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Verifiable Random Functions/Permutations, PRFs, PRPs, MACs, Domain Extension, Feistel Network
27Yevgeniy Dodis, Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets Security Amplification for InteractiveCryptographic Primitives. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Rodrigo Martins da Silva, Nadia Nedjah, Luiza de Macedo Mourelle Reconfigurable MAC-Based Architecture for Parallel Hardware Implementation on FPGAs of Artificial Neural Networks Using Fractional Fixed Point Representation. Search on Bibsonomy ICANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Yi Hong 0001, Emanuele Viterbo Algebraic multiuser space-time block codes for 2 × 2 MIMO. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Abner Corrêa Barros, Victor Wanderley Costa de Medeiros, Viviane Lucy Santos de Souza, Paulo Sérgio Brandão do Nascimento, Ângelo Mazer, João Paulo Fernandes Barbosa, Bruno P. Neves, Ismael Santos 0001, Manoel Eusébio de Lima Implementation of a double-precision multiplier accumulator with exception treatment to a dense matrix multiplier module in FPGA. Search on Bibsonomy SBCCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA, scientific computing, floating-point, HPC
27Jonathan M. Dixon, Ryan Thomas Sharpe Doing more with mini. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intel mac, parallels, virtualization
27Ming Yang 0003, Zhou Kang, Lishan Kang A Parallel Multi-algorithm Solver for Dynamic Multi-Objective TSP (DMO-TSP). Search on Bibsonomy ICIC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dynamic multi-objective TSP, parallel multi-algorithm, Pareto optimal front
27Ananth Rao, Ion Stoica Adaptive Distributed Time-Slot Based Scheduling for Fairness in Multi-Hop Wireless Networks. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Byung Hee Kim, Tae Ho Cho Efficient selection method of message authentication codes for filtering scheme in sensor networks. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fabricated report, sensor network, message authentication code
27Jonathan Katz, Andrew Y. Lindell Aggregate Message Authentication Codes. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Deholo Nali, Paul C. van Oorschot CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Nadia Nedjah, Rodrigo Martins da Silva, Luiza de Macedo Mourelle, Marcus Vinícius Carvalho da Silva Reconfigurable MAC-Based Architecture for Parallel Hardware Implementation on FPGAs of Artificial Neural Networks. Search on Bibsonomy ICANN (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ivana Maric, Roy D. Yates, Gerhard Kramer Capacity of Interference Channels With Partial Transmitter Cooperation. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Carol Currie Sobczak, James Kessler, David Eldridge The dual os classroom: if you build it, will they come? Search on Bibsonomy SIGUCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF boot camp, deep freeze, intel dual core, winbatch, parallels, imaging, deployment, support, classroom technology
27Gautam A. Gupta, Stavros Toumpis Power Allocation Over Parallel Gaussian Multiple Access and Broadcast Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Yu Liu, Charles G. Boncelet Jr. The CRC-NTMAC for Noisy Message Authentication. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Qing Li 0034, Wade Trappe Reducing delay and enhancing DoS resistance in multicast authentication through multigrade security. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Md. Abdul Hamid, Mustafizur Rahman 0001, Choong Seon Hong Energy Conserving Security Mechanism for Wireless Sensor Network. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jens-Peter Kaps, Kaan Yüksel, Berk Sunar Energy Scalable Universal Hashing. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF scalability, low-power, provable security, low-energy, message authentication codes, Universal hashing
27Fan Ye 0003, Haiyun Luo, Songwu Lu, Lixia Zhang 0001 Statistical en-route filtering of injected false data in sensor networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Gunnar Gaubatz, Jens-Peter Kaps, Berk Sunar Public Key Cryptography in Sensor Networks - Revisited. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Simon R. Blackburn, Kenneth G. Paterson Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, MAC, Message authentication, matrix groups, birthday paradox
27Marc Fischlin Progressive Verification: The Case of Message Authentication: (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27R. Luo, Demetrios Belis, R. M. Edwards 0001, Gordon A. Manson A simulation design for link connection-oriented wireless mesh networks. Search on Bibsonomy MWCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Karl Brincat, Chris J. Mitchell New CBC-MAC Forgery Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Rinku Rani Das, Rajalekshmi TR, Sruthi Pallathuvalappil, Alex Pappachen James FETs for Analog Neural MACs. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Yusuke Naito 0001 The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model. Search on Bibsonomy CT-RSA The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Yihan Zhang 0001 Zero-Error Communication Over Adversarial MACs. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Gangadhar Karevvanavar, Rajshekhar V. Bhat Importance-Aware Fresh Delivery of Versions over Energy Harvesting MACs. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Soshi Shimada, Franziska Mueller 0001, Jan Bednarík, Bardia Doosti, Bernd Bickel, Danhang Tang, Vladislav Golyanik, Jonathan Taylor 0001, Christian Theobalt, Thabo Beeler MACS: Mass Conditioned 3D Hand and Object Motion Synthesis. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Vitaly Kiryukhin About "k-bit security" of MACs based on hash function Streebog. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser Putting the Online Phase on a Diet: Covert Security from Short MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Hong-Wei Sun, Bin-Bin Cai, Su-Juan Qin, Qiao-Yan Wen, Fei Gao 0001 Quantum Attacks on Beyond-Birthday-Bound MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Carsten Baum, Nikolas Melissaris, Rahul Rachuri, Peter Scholl Cheater Identification on a Budget: MPC with Identifiable Abort from Pairwise MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Yaobin Shen, François-Xavier Standaert, Lei Wang 0031 Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Jiehui Nan, Honggang Hu, Ping Zhang 0020, Yiyuan Luo Quantum attacks against BBB secure PRFs or MACs built from public random permutations. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Yaobin Shen, François-Xavier Standaert, Lei Wang 0031 Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Peihong Yuan, Ken R. Duffy, Muriel Médard Time-Shift Coding for Uncoordinated MACs. Search on Bibsonomy LATINCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Sebastian Faust, Carmit Hazay, David Kretzler, Benjamin Schlosser Putting the Online Phase on a Diet: Covert Security from Short MACs. Search on Bibsonomy CT-RSA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Melissa Chase, F. Betül Durak, Serge Vaudenay Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs. Search on Bibsonomy CRYPTO (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Gholamreza Ramezan, Manvir Schneider, Mel McCann MACS: A Multi-Asset Coin Selection Algorithm for UTXO-based Blockchains. Search on Bibsonomy Blockchain The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Jörg Brauchle, Veronika Gstaiger, Seyed Majid Azimi, Manuel Muehlhaus, Florian Nikodem, Patrick Dern, Derek Griffith MACS-HAP: Design and Image Processing Features of the DLR HAP Camera System. Search on Bibsonomy IGARSS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Vasileios Asteriou, Anastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Georgios Papadimitriou 0001, Petros Nicopolitidis LoRaWAN-Based Adaptive MACs for Event Response Applications. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Mehrasa Ahmadipour, Michèle A. Wigger, Mari Kobayashi Coding for Sensing: An Improved Scheme for Integrated Sensing and Communication over MACs. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 354 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license