Results
Found 12 publication records. Showing 12 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Paolo Gasti, Yu Chen 0002 |
Breaking and Fixing the Self Encryption Scheme for Data Security in Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2010, Pisa, Italy, February 17-19, 2010, pp. 624-630, 2010, IEEE Computer Society, 978-0-7695-3939-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Self-Encryption, mobile computing, pervasive computing, stream ciphers, PDA, data security, smartphone, iPhone |
15 | Shai Halevi, Hugo Krawczyk |
Security under key-dependent inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 466-475, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
circular encryption, key-dependent input, self encryption |
10 | Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang |
ID-based self-encryption via Hyperledger Fabric based smart contract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.01605, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | Ilya Grishkov, Roland Kromes, Thanassis Giannetsos, Kaitai Liang |
ID-Based Self-encryption via Hyperledger Fabric Based Smart Contract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BlockTEA ![In: Blockchain Technology and Emerging Technologies - Second EAI International Conference, BlockTEA 2022, Virtual Event, November 21-22, 2022, Proceedings, pp. 3-18, 2022, Springer, 978-3-031-31419-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
10 | Gwangbae Choi, F. Betül Durak, Serge Vaudenay |
Post-Compromise Security in Self-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: 2nd Conference on Information-Theoretic Cryptography, ITC 2021, July 23-26, 2021, Virtual Conference., pp. 25:1-25:23, 2021, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 978-3-95977-197-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
10 | Yongjoo Shin, Seungjae Shin, Minsoo Kim, Hyunsoo Yoon |
A Secure Self-Encryption Scheme for Resource Limited Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITCS ![In: Proceedings of the International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012, pp. 121-129, 2012, Springer, 978-94-007-5859-9. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
10 | Yu Chen 0002, Wei-Shinn Ku |
Self-Encryption Scheme for Data Security in Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 6th IEEE Consumer Communications and Networking Conference, CCNC 2009, Las Vegas, NV, USA, 10-13 Jan., 2009, pp. 1-5, 2009, IEEE, 978-1-4244-2308-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Yixin Jiang, Chuang Lin 0002, Minghui Shi, Xuemin Shen |
A self-encryption authentication protocol for teleconference services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 1(3/4), pp. 198-205, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Yixin Jiang, Chuang Lin 0002, Minghui Shi, Xuemin Shen |
A self-encryption authentication protocol with identity anonymity for teleconference services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November - 2 December 2005, pp. 5, 2005, IEEE, 0-7803-9414-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Kuo-Feng Hwang, Chin-Chen Chang 0001 |
A self-encryption mechanism for authentication of roaming and teleconference services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 2(2), pp. 400-407, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
7 | Feng Bao 0001 |
Analysis of a secure conference scheme for mobile communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 5(8), pp. 1984-1986, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
7 | Feng Bao 0001 |
Analysis of a Conference Scheme Under Active and Passive Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 157-163, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #12 of 12 (100 per page; Change: )
|