The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Secrecy with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1949-1985 (17) 1987-1990 (21) 1991-1993 (16) 1994-1997 (17) 1998-1999 (31) 2000 (25) 2001 (28) 2002 (38) 2003 (50) 2004 (71) 2005 (79) 2006 (114) 2007 (124) 2008 (144) 2009 (141) 2010 (89) 2011 (127) 2012 (126) 2013 (183) 2014 (216) 2015 (275) 2016 (260) 2017 (292) 2018 (308) 2019 (294) 2020 (242) 2021 (244) 2022 (219) 2023 (240) 2024 (39)
Publication types (Num. hits)
article(2093) book(2) data(1) incollection(4) inproceedings(1940) phdthesis(30)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 812 occurrences of 415 keywords

Results
Found 4070 publication records. Showing 4070 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
159Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability
142Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
89Michael Backes 0001, Birgit Pfitzmann On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
80Ling Tang, Hao Liu 0013, Jianhui Wu 0001 Optimal MISO secrecy beamforming via quasi-convex programming with rank-one transmit covariance guarantee. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secrecy communications, convex optimization, beamforming
72João Barros, Matthieu R. Bloch Strong Secrecy for Wireless Channels (Invited Talk). Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu Relating Two Standard Notions of Secrecy. Search on Bibsonomy CSL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
71Joseph Y. Halpern, Kevin R. O'Neill Secrecy in Multiagent Systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information flow, secrecy
70Ender Tekin, Aylin Yener The General Gaussian Multiple-Access and Two-Way Wiretap Channels: Achievable Rates and Cooperative Jamming. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
69Cheng-Fen Lu, Shiuh-Pyng Winston Shieh Secure Key-Evolving Protocols for Discrete Logarithm Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key-Evolving, Backward-Secrecy, Key Management, Forward-Secrecy
63Praveen Kumar Gopala, Lifeng Lai, Hesham El Gamal On the Secrecy Capacity of Fading Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Rajeev Alur, Pavol Cerný, Steve Zdancewic Preserving Secrecy Under Refinement. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
63Imre Csiszár, Prakash Narayan Secrecy capacities for multiple terminals. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
63Philippe Godlewski, Chris J. Mitchell Key Minimal Authentication Systems for Unconditional Secrecy. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
62Chin-Chen Chang 0001, Jung-San Lee, Chang-Chu Chen On the Forward and Backward Secrecy of HLL Group Key Exchange Mechanism. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF the forward secrecy, the backward secrecy, multicast communication, group key exchange
61Yingbin Liang, H. Vincent Poor, Shlomo Shamai Secure Communication Over Fading Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Andrew Thangaraj, Souvik Dihidar, A. Robert Calderbank, Steven W. McLaughlin, Jean-Marc Merolla Applications of LDPC Codes to the Wiretap Channel. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
54Ruoheng Liu, H. Vincent Poor Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54Phillip G. Bradford, Olga V. Gavrylyako, Randy K. Smith Perfect Secrecy in Wireless Networks. Search on Bibsonomy ICPP Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
54Joseph Y. Halpern, Kevin R. O'Neill Secrecy in Multiagent Systems. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
54Aggelos Kiayias, Moti Yung Self-tallying Elections and Perfect Ballot Secrecy. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
54Jan Jürjens Secrecy-Preserving Refinement. Search on Bibsonomy FME The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
54Dennis M. Volpano Formalization and Proof of Secrecy Properties. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
54Petr Svenda, Lukás Sekanina, Václav Matyás Evolutionary design of secrecy amplification protocols for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secrecy amplification protocols, wireless sensor networks, evolutionary algorithms, key establishment
54Jan Jürjens Composability of Secrecy. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF formal specification, Network security, refinement, modularity, cryptographic protocols, computer aided software engineering, composability, secrecy
52Yingbin Liang, H. Vincent Poor Multiple-Access Channels With Confidential Messages. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Weiming Zhang, Shiqu Li Security Measurements of Steganographic Systems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52William Luh, Deepa Kundur Distributed keyless security for correlated data with applications in visual sensor networks. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed secrecy, multiterminal source coding, shannon equivocation
46Ruoheng Liu, Ivana Maric, Predrag Spasojevic, Roy D. Yates Discrete Memoryless Interference and Broadcast Channels With Confidential Messages: Secrecy Rate Regions. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Imre Csiszár, Prakash Narayan Secrecy Capacities for Multiterminal Channel Models. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Ersen Ekrem, Sennur Ulukus Effects of cooperation on the secrecy of multiple access channels with generalized feedback. Search on Bibsonomy CISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Xiaojun Tang 0001, Ruoheng Liu, Predrag Spasojevic On the Achievable Secrecy Throughput of Block Fading Channels with No Channel State Information at Transmitter. Search on Bibsonomy CISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Michael Backes 0001, Peeter Laud Computationally sound secrecy proofs by mechanized flow analysis. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data flow analysis, simulatability
46Avik Chaudhuri, Martín Abadi Secrecy by Typing and File-Access Control. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Dusko Pavlovic, Catherine Meadows 0001 Deriving Secrecy in Key Establishment Protocols. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Robert W. Zhu, Guomin Yang, Duncan S. Wong An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Gerald Gilbert, Michael Hamrick Secrecy, Computational Loads and Rates in Practical Quantum Cryptography. Search on Bibsonomy Algorithmica The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
46Véronique Cortier, Jonathan K. Millen, Harald Rueß Proving Secrecy is Easy Enough. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Ueli M. Maurer, Stefan Wolf 0001 Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
45Bin Li A Forward-Secrecy WTLS Handshake Protocol Based on XTR. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF WTLS, Intermediator Attack, Forward Secrecy, XTR
45Cunsheng Ding, Xiaojian Tian Three Constructions of Authentication Codes with Perfect Secrecy. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF perfect nonlinear mappings, cryptography, secrecy, authentication codes
44Xiaojun Tang 0001, Ruoheng Liu, Predrag Spasojevic, H. Vincent Poor On the Throughput of Secure Hybrid-ARQ Protocols for Gaussian Block-Fading Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Sabina Petride, Riccardo Pucella Perfect cryptography, S5 knowledge, and algorithmic knowledge. Search on Bibsonomy TARK The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF modular security proof, provable security, bilinear pairing, authenticated key agreement, perfect forward secrecy
43Michele Boreale Quantifying Information Leakage in Process Calculi. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information theory, process calculi, secrecy, information leakage
43Eun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo Robust and Simple Authentication Protocol for Secure Communication on the Web. Search on Bibsonomy ICWE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Denning-Sacco attack, Security, Authentication, Cryptography, Smart card, Key establishment, Forward Secrecy
43Wansuck Yi, Seungjoo Kim, Dongho Won Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF known-key secrecy, authentication, pervasive computing, biometrics, smart card, key exchange, forward secrecy
37Enric Serradell-López, Victor Cavaller Cultural Aspects of Secrecy in Global Economy. Search on Bibsonomy WSKS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secrets, management of the secret, innovation, patents
37Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad, Janet Jackel Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy. Search on Bibsonomy UC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37George T. Amariucai, Shuangqing Wei Secrecy rates of binary wiretapper channels using feedback schemes. Search on Bibsonomy CISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell Inductive Proofs of Computational Secrecy. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Véronique Cortier, Steve Kremer, Ralf Küsters, Bogdan Warinschi Computationally Sound Symbolic Secrecy in the Presence of Hash Functions. Search on Bibsonomy FSTTCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Andrew D. Gordon 0001, Alan Jeffrey Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. Search on Bibsonomy CONCUR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Bruno Blanchet Automatic Proof of Strong Secrecy for Security Protocols. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Jonathan Katz, Rafail Ostrovsky, Moti Yung Forward Secrecy in Password-Only Key Exchange Protocols. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Jonathan K. Millen, Harald Rueß Protocol-Independent Secrecy. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
37Dennis M. Volpano Safety versus Secrecy. Search on Bibsonomy SAS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Guomin Li, Dake He, Wei Guo Password-Based Tripartite Key Exchange Protocol with Forward Secrecy. Search on Bibsonomy RSKT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Password-based tripartite authenticated key exchange, Known key attacks, Forward secrecy
36Daeyoung Kim 0004, Younggang Cui, Sangjin Kim, Heekuck Oh A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward Secrecy. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, authentication, UMTS, perfect forward secrecy
36Martín Abadi, Bruno Blanchet Analyzing security protocols with secrecy types and logic programs. Search on Bibsonomy J. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF secrecy properties, logic programming, Cryptographic protocols, typing, process calculi
36Kamel Adi, Liviu Pene Secrecy Correctness for Security Protocols. Search on Bibsonomy DFMA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Protocol Correctness, Security Protocols, Formal Analysis, Secrecy
36Giampaolo Bella, Lawrence C. Paulson Kerberos Version 4: Inductive Analysis of the Secrecy Goals. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF secure key, non-expired timestamp, inductive method, machine proof, secrecy
35Ender Tekin, Aylin Yener The Gaussian Multiple Access Wire-Tap Channel. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Lifeng Lai, Hesham El Gamal, H. Vincent Poor The Wiretap Channel With Feedback: Encryption Over the Channel. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35David M. Nicol Performance analysis of real traffic carried with encrypted cover flows: Invited talk 2. Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Zhaozhi Zhang A Simplified Method for Computing the Key Equivocation for Additive-Like Instantaneous Block Encipherers. Search on Bibsonomy GTIT-C The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Jens Groth Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Roberto Giacobazzi, Isabella Mastroeni Proving Abstract Non-interference. Search on Bibsonomy CSL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF abstract non-interference, verification, Abstract interpretation, language-based security
34Zhiyao Liang, Rakesh M. Verma Improving Techniques for Proving Undecidability of Checking Cryptographic Protocols. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF insider, authentication, formal method, cryptographic protocol, undecidability, secrecy
34Ya-Fen Chang, Chin-Chen Chang 0001 An efficient authentication protocol for mobile satellite communication systems. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, satellite communication, perfect forward secrecy
34Ivan Damgård, Mads Jurik A Length-Flexible Threshold Cryptosystem with Applications. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF length-flexible, length-invariant, group decryption, self-tallying, perfect ballot secrecy, election, mix-net
34Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
34Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi Secure Audio Teleconference. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF identification, signature, bridging, secrecy
34Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia Efficient and secure keys management for wireless mobile communications. Search on Bibsonomy POMC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF backward secrecy, network dynamics management, cryptography, distributed algorithms, wireless communications, key distribution, secure multicast, forward secrecy, collusion, key generation, key management protocol
28Yingbin Liang, Anelia Somekh-Baruch, H. Vincent Poor, Shlomo Shamai, Sergio Verdú Capacity of Cognitive Interference Channels With and Without Secrecy. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai Secrecy Capacity of Wireless LAN. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Phillip A. Regalia Cryptographic Secrecy of Steganographic Matrix Embedding. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Mario Gerla, Roberto G. Cascella, Zhen Cao, Bruno Crispo, Roberto Battiti An efficient weak secrecy scheme for network coding data dissemination in VANET. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Amjad Gawanmeh, Sofiène Tahar, Leila Jemni Ben Ayed Event-B based invariant checking of secrecy in group key protocols. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Amjad Gawanmeh, Sofiène Tahar Rank Theorems for Forward Secrecy in Group Key Management Protocols. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Liana Bozga, Yassine Lakhnech, Michaël Périn Pattern-based abstraction for verifying secrecy in protocols. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Widening, Security, Verification, Abstract interpretation, Cryptographic protocols
28Martín Abadi, Ricardo Corin, Cédric Fournet Computational Secrecy by Typing for the Pi Calculus. Search on Bibsonomy APLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Min Zhang, Guoqiang Li 0001, Yuxi Fu Secrecy of Signals by Typing in Signal Transduction. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert Secrecy Analysis in Protocol Composition Logic. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Cas J. F. Cremers, Sjouke Mauw Checking Secrecy by Means of Partial Order Reduction. Search on Bibsonomy SAM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Luke McAven, Reihaneh Safavi-Naini, Moti Yung Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Liana Bozga, Yassine Lakhnech, Michaël Périn Pattern-Based Abstraction for Verifying Secrecy in Protocols. Search on Bibsonomy TACAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Rachid Echahed, Frédéric Prost, Wendelin Serwe Statically assuring secrecy for dynamic concurrent processes. Search on Bibsonomy PPDP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF abstract interpretation, safety, noninterference
28Ramaswamy Ramanujam, S. P. Suresh Tagging Makes Secrecy Decidable with Unbounded Nonces as Well. Search on Bibsonomy FSTTCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Dong Jin Kwak, JaeCheol Ha, Hoon-Jae Lee 0001, Hwankoo Kim, Sang-Jae Moon A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. Search on Bibsonomy CDMA International Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Martín Abadi, Bruno Blanchet Secrecy Types for Asymmetric Communication. Search on Bibsonomy FoSSaCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Luca Cardelli, Giorgio Ghelli, Andrew D. Gordon 0001 Secrecy and Group Creation. Search on Bibsonomy CONCUR The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Bert den Boer Oblivous Transfer Protecting Secrecy. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
28Marijke De Soete Bounds and Constructions for Authentication-Secrecy Codes with Splitting. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
28Gordon B. Agnew Secrecy and Privacy in a Local Area Network Environment. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
28David K. Gifford Cryptographic Sealing for Information Secrecy and Authentication (Summary). Search on Bibsonomy SOSP The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
28Dionysia K. Petraki, Markos P. Anastasopoulos, Symeon Papavassiliou Secrecy Capacity for Satellite Networks under Rain Fading. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Secrecy capacity, rain fading, satellite networks, outage probability
28Véronique Cortier, Ben Smyth Attacking and Fixing Helios: An Analysis of Ballot Secrecy. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Ballot Independence, Ballot Secrecy, Helios, Privacy, Attack, Electronic Voting, Applied Pi Calculus
28Tanfeng Sun, Lili Cui, Shuxun Wang Research on Technology of Chaos Secrecy Communications in Digital Watermarking. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Keyword: Chaos Secrecy Communication, Difference Chaos Shift Key, Wavelet Transformation, Watermarking
26Mengbo Hou, Qiuliang Xu A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 4070 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license