The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Re-encryption (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
96Pooya Farshim, Bogdan Warinschi Certified Encryption Revisited. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption
75Satoshi Hada, Kouichi Sakurai A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
72Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Conditional Proxy Broadcast Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption
69Yang Cui 0001, Kirill Morozov, Kazukuni Kobara, Hideki Imai Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic encryption, code-based encryption, database security, hybrid encryption, searchable encryption
68Walid Bagga, Refik Molva, Stefano Crosta Policy-based encryption schemes from bilinear pairings. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
68Shiguo Lian Quasi-commutative watermarking and encryption for secure media content distribution. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Commutative watermarking and encryption (CWE), Watermarking, Digital rights management (DRM), Video encryption
67Phillip Rogaway, Don Coppersmith A Software-Optimized Encryption Algorithm. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Cryptography, Cryptography, Stream cipher, Stream cipher, Encryption, Encryption, Key words
65Phillip Rogaway Nonce-Based Symmetric Encryption. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Initialization vector, provable security, modes of operation, symmetric encryption, nonces
63Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan 0001 An Implementation and Evaluation of Online Disk Encryption for Windows Systems. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security
60Xu An Wang 0001, Xiaoyuan Yang 0002 Proxy Re-encryption Scheme Based on SK Identity Based Encryption. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
60Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-Based encryption, broadcast encryption, forward security
59Jonathan Katz, Arkady Yerukhimovich On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems
58Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. Search on Bibsonomy CASES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, sensor networks, embedded systems, encryption
58Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
56Jonathan Katz, Moti Yung Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
55Chik How Tan Public-Key Encryption from ID-Based Encryption Without One-Time Signature. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear maps
55Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption
55Toshihiko Matsuo Proxy Re-encryption Systems for Identity-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy re-encryption system, public key encryption, identity-based encryption
54Ribao Wei, Dingfeng Ye Delegate predicate encryption and its application to anonymous authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF predicate encryption, anonymous authentication
54Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
53Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cost/performance, Security, Simulation, Optimization, Algorithms, Dynamic programming, Wireless communication, Emerging technologies, Wireless systems, Data encryption, Data Encryption, Security and Privacy Protection, integrity and protection
53Giovanni Di Crescenzo, Vishal Saraswat Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption
53Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Timed-Release and Key-Insulated Public Key Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF timed-release, key-insulated encryption, authenticated encryption
53Dan Boneh, Jonathan Katz Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public-key encryption, Identity-based encryption, Chosen-ciphertext security
53Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
53Mihir Bellare, Alexandra Boldyreva, Jessica Staddon Randomness Re-use in Multi-recipient Encryption Schemeas. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Encryption, provable security, randomness, broadcast encryption
53Yasumasa Nakai, Takahiro Matsuda 0002, Wataru Kitada, Kanta Matsuura A Generic Construction of Timed-Release Encryption with Pre-open Capability. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pre-open capability, public key encryption, identity-based encryption, timed-release encryption, generic construction
53Ivan Damgård, Lars R. Knudsen Two-Key Triple Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF The Data Encryption Standard, The Data Encryption Standard, Block ciphers, Block ciphers, Pseudorandom generators, Pseudorandom generators, Key words, Multiple encryption, Multiple encryption
52Seiko Arita, Koji Tsurudome Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption
51Yuliang Zheng 0001 Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption
49Osamu Watanabe 0002, Akiko Nakazaki, Hitoshi Kiya A scalable encryption method allowing backward compatibility with JPEG2000 images. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen Authenticated Broadcast Encryption Scheme. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptography, broadcast encryption, bilinear map
49Dragos Trinca Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption
49Ryotaro Hayashi 0001, Keisuke Tanaka Universally Anonymizable Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy
49Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller 0001, Mihail L. Sichitiu Analyzing and modeling encryption overhead for sensor network nodes. Search on Bibsonomy Wireless Sensor Networks and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF encryption overhead, model, sensor networks, embedded systems, analysis
49Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto Multi-recipient Public-Key Encryption from Simulators in Security Proofs. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption
49Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Provably Secure Timed-Release Public Key Encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-insulated encryption, timed-release, authenticated encryption
49Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymity, Identity-based encryption, Random-oracle model, Foundations, Searchable encryption
49Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa Tag-KEM/DEM: A New Framework for Hybrid Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption
49Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
49Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identity-Based Encryption, Proxy re-encryption, Personal Health Record
49Shih-Ching Ou, Hung-Yuan Chung, Wen-Tsai Sung Improving the compression and encryption of images using FPGA-based cryptosystems. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Significance-linked connected component analysis (SLCCA), Image compression encryption scheme (ICES), Advance encryption standard (AES), Discrete wavelet transform (DWT)
49George Danezis Breaking Four Mix-Related Schemes Based on Universal Re-encryption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Universal re-encryption, re-encryption mix networks, traffic analysis, anonymous communications
49Dominik Engel, Andreas Uhl Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF lightweight encryption, parameterized biorthogonal wavelet lifting, transparent encryption, JPEG 2000
49Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters Attribute-based encryption for fine-grained access control of encrypted data. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption
49Jeremy Epstein, Tim Williams Using Fortezza For Transparent File Encryption. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development
47Josef Pieprzyk, David Pointcheval Josef Pieprzyk, David Pointcheval. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy, authentication, parallelization, Signcryption
47Rosario Gennaro, Shai Halevi More on Key Wrapping. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic Encryption, Key Wrapping, Modes of Operation, Symmetric Encryption
46Ronald L. Rivest All-or-Nothing Encryption and the Package Transform. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
46Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability
44Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Thomas Stütz, Andreas Uhl Transparent Image Encryption Using Progressive JPEG. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Ran Canetti, Shai Halevi, Jonathan Katz Adaptively-Secure, Non-interactive Public-Key Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Yevgeniy Dodis, Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Soichi Furuya, Kouichi Sakurai Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF real-or-random security, Stream cipher, provable security, message authentication, mode of operation
44Thomas Kunkelmann, Uwe Horn Video Encryption Based on Data Partitioning and Scalable Coding - A Comparison. Search on Bibsonomy IDMS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
44Peter Gazi, Ueli M. Maurer Cascade Encryption Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cascade encryption, random system, indistinguishability, ideal cipher model
44Alexander W. Dent A survey of certificateless encryption schemes and security models. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography, Public-key cryptography, Certificateless cryptography, Certificateless encryption
44Shiguo Lian, Jinsheng Sun, Guangjie Liu, Zhiquan Wang Efficient video encryption scheme based on advanced video coding. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multimedia content protection, Digital right management, AVC, Video encryption
44Saurabh Panjwani Tackling Adaptive Corruptions in Multicast Encryption Protocols. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Adaptive Corruptions, Selective Decryption, Multicast, Encryption
44Yibo Fan, Jidong Wang, Takeshi Ikenaga, Yukiyasu Tsunoo, Satoshi Goto A New Video Encryption Scheme for H.264/AVC. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Video, Encryption, H.264/AVC
44Giuseppe Ateniese, Kevin Fu, Matthew Green 0001, Susan Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF double decryption, key translation, bilinear maps, Proxy re-encryption
44Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
44Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
44Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF compact encryption/decryption implementation, FPGA, Cryptography, AES, DES
44Rosario Gennaro, Yael Gertner, Jonathan Katz Lower bounds on the efficiency of encryption and digital signature schemes. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF lower bounds, digital signatures, encryption, black-box
44Eiichiro Fujisaki, Tatsuaki Okamoto Secure Integration of Asymmetric and Symmetric Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Adaptive chosen-ciphertext attack, Random oracle model, Indistinguishability, Hybrid encryption
44Oliver Jung, Christoph Ruland Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF SDH/SONET, Cryptography, Encryption, Confidentiality, Modes of Operation, Broadband Networks, Self-Synchronization
44Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Practical ID-based encryption for wireless sensor network. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF online/offline encryption, identity-based encryption, wireless sensor network security
44Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa Encryption over Semi-trusted Database. Search on Bibsonomy DASFAA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Database cryptography, server-based encryption, client-based encryption, semi-trusted database, mixed cryptography
44Kristen Dietiker PGP whole disk encryption: blazing trails in IT security at UW Medicine. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protected health information, whole disk encryption, encryption, compliance, Macintosh, software deployment, HIPAA, PGP, Windows XP
44Mihir Bellare, Adriana Palacio Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key update, Encryption, Identity-based encryption, Key exposure
44David Galindo A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tag-based encryption, identity-based encryption, Foundations
44Ulrich Kühn 0001 Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA encryption, Side-channel attack, ElGamal encryption
44Markus Jakobsson On Quorum Controlled Asymmetric Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF asymmetric proxy re-encryption, translation certificate, El Gamal encryption, quorum control, privacy, robustness
44Dominik Engel, Thomas Stütz, Andreas Uhl Format-compliant jpeg2000 encryption with combined packet header and packet body protection. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF format-compliant encryption, packet body encryption, packet header encryption, JPEG2000
44Jonathan K. Millen, Hai-Ping Ko Narrowing terminates for encryption. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF term replacement rules, reduction properties, symbolic encryption operations, narrowing steps, infinite sequence, popular abstract encryption operators, terminating algorithm, cryptography, encryption, access protocols, protocol analysis
43Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Adam L. Young, Moti Yung Hiding Information Hiding. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
42Yang Ou, Chul Sur, Kyung Hyune Rhee A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams. Search on Bibsonomy MMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Joint Compression and Encryption, Packet Header Encryption, JPEG2000, Arithmetic Coding
41Jiang Delei, Bai Sen, Dong Wenming An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-Filter. Search on Bibsonomy CSSE (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Adam L. Young, Moti Yung Sliding Encryption: A Cryptographic Tool for Mobile Agents. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
41Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard Practical Symmetric On-Line Encryption. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversary, Symmetric encryption, chosen plaintext attacks
41Sherman S. M. Chow, Volker Roth 0002, Eleanor Gilbert Rieffel General Certificateless Encryption and Timed-Release Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security-mediated certificateless encryption, standard model, timed-release encryption
40Hung-Min Sun, Muh-Chyi Leu A Real-Time Selective Video Encryption Using Context-Key Control. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Haifeng Qian, Yuan Zhou 0008, Zhibin Li 0005, Zecheng Wang, Bing Zhang 0008 Efficient public key encryption with smallest ciphertext expansion from factoring. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
40Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Online/Offline Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Tingjian Ge, Stanley B. Zdonik Fast, Secure Encryption for Indexing in a Column-Oriented DBMS. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Min-Sung Koh, Esteban Rodriguez-Marek, Claudio Talarico A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen-Plaintext Attacks. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Kwangjin Hong, Keechul Jung Partial Encryption of Digital Contents Using Face Detection Algorithm. Search on Bibsonomy PRICAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Chung-Ping Wu, C.-C. Jay Kuo Design of integrated multimedia compression and encryption systems. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Ulf T. Mattsson A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases: Protection against External and Internal Attacks on Databases. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Andris Ambainis, Adam D. Smith Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Antonio Servetti, Juan Carlos De Martin Perception-based partial encryption of compressed speech. Search on Bibsonomy IEEE Trans. Speech Audio Process. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Craig Gentry Fully homomorphic encryption using ideal lattices. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fully homomorphic encryption
39Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
Displaying result #1 - #100 of 21739 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license