Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
72 | Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong |
Recoverable and Untraceable E-Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 206-214, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Untraceable, E-Cash, Recoverable |
71 | Tatsuaki Okamoto, Kazuo Ohta |
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 481-496, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
55 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Untraceable Electronic Cash System Using Fair Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 24-26 October 2006, Shanghai, China, pp. 39-46, 2006, IEEE Computer Society, 0-7695-2645-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fair blind signature, privacy, electronic cash, cryptology |
55 | Birgit Pfitzmann, Michael Waidner |
How To Break and Repair A "Provably Secure" Untraceable Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 338-350, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
39 | Jen-Ho Yang, Chin-Chen Chang 0001, Chih-Hung Wang |
A Practical Solution to the (t, n) Threshold Untraceable Signature with (k, l) Verification Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 998-1007, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Laurent Bussard, Yves Roudier, Refik Molva |
Untraceable Secret Credentials: Trust Establishment with Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA, pp. 122-126, 2004, IEEE Computer Society, 0-7695-2106-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | Chih-Hung Wang |
Untraceable Fair Network Payment Protocols with Off-Line TTP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 173-187, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signatures, Cryptography, Electronic Commerce, Undeniable Signature, Electronic cash, Payment System |
39 | Hua Wang, Yanchuan Zhang |
Untraceable Off-line Electronic Cash Flow in E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSC ![In: 24th Australasian Computer Science Conference (ACSC 2001), 29 January - 1 February 2001, Gold Coast, Queensland, Australia, pp. 191-198, 2001, IEEE Computer Society, 0-7695-0963-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Cut-and-Choose technique, DLA, Hash function, Random oracle model, Electronic-cash |
39 | Shingo Miyazaki, Kouichi Sakurai |
A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings, pp. 296-308, 1998, Springer, 3-540-64951-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
39 | David Chaum, Amos Fiat, Moni Naor |
Untraceable Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 319-327, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
33 | Luis von Ahn, Andrew Bortz, Nicholas J. Hopper |
k-anonymous message transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 122-130, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
untraceable communication, privacy, anonymity, cryptographic protocols, multiparty computation, anonymous communication |
31 | Shinsaku Kiyomoto, Toshiaki Tanaka |
Anonymous attribute authentication scheme using self-blindable certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 215-217, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Carlos Aguilar Melchor, Yves Deswarte |
pMIX: Untraceability for Small Hiding Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 27-29 July 2005, Cambridge, MA, USA, pp. 29-40, 2005, IEEE Computer Society, 0-7695-2326-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Feng Bao 0001 |
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 417-429, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Olivier Billet, Henri Gilbert |
A Traceable Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 331-346, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance |
31 | Birgit Pfitzmann, Michael Waidner |
Strong Loss Tolerance of Electronic Coin Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 15(2), pp. 194-213, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
privacy, electronic cash, Byzantine faults, payment systems |
31 | Tatsuaki Okamoto |
An Efficient Divisible Electronic Cash Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 438-451, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
31 | Tatsuaki Okamoto, Kazuo Ohta |
Universal Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 324-337, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Mengjie Wu, Jingui Ma, Run Wang, Sidan Zhang, Ziyou Liang, Boheng Li, Chenhao Lin, Liming Fang 0001, Lina Wang 0001 |
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20-27, 2024, Vancouver, Canada, pp. 19965-19973, 2024, AAAI Press. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Saeed Banaeian Far, Maryam Rajabzadeh Asaar, Afrooz Haghbin |
Distributed auditing protocol for untraceable transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 73, pp. 103429, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Jian Shen 0001, Huijie Yang, Pandi Vijayakumar, Neeraj Kumar 0001 |
A Privacy-Preserving and Untraceable Group Data Sharing Scheme in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(4), pp. 2198-2210, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Reham Abdellatif Abouhogail |
Untraceable Authentication Protocol for IEEE802.11s Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 13(3), December 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Reham Abdellatif Abouhogail |
Untraceable Authentication Protocol for IEEE802.11s Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Networks Inf. Secur. ![In: Int. J. Commun. Networks Inf. Secur. 13(3), December 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Chengqian Guo, Jingqiang Lin, Quanwei Cai 0001, Fengjun Li, Qiongxiao Wang, Jiwu Jing, Bin Zhao, Wei Wang 0314 |
UPPRESSO: Untraceable and Unlinkable Privacy-PREserving Single Sign-On Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.10396, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
24 | Aïda Diop, Nicolas Desmoulins, Jacques Traoré |
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS Workshops ![In: Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings, pp. 417-435, 2021, Springer, 978-3-030-81644-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Maximilian Collatz |
Two stories about trying to trace the untraceable: B-cell epitope prediction and deciphering circadian clocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2021 |
RDF |
|
24 | Jaemin Lim, Kiyeon Kim, Hyunwoo Yu, Suk-Bok Lee |
Making Connected Cars Untraceable via DSRC Radios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 224932-224946, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Hyunkyung Shin |
Analysis of Subway Passenger Flow for a Smarter City: Knowledge Extraction From Seoul Metro's 'Untraceable' Big Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 8, pp. 69296-69310, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Shigeo Shioda, Keisuke Nakajima |
Existence of Twitter Users with Untraceable Retweet Paths and its Implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNAMS ![In: Seventh International Conference on Social Networks Analysis, Management and Security, SNAMS 2020, Virtual Event, France, December 14-16, 2020, pp. 1-8, 2020, IEEE, 978-0-7381-1180-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
24 | Pinaki Ghosh, T. R. Mahesh 0001 |
Untraceable privacy-preserving authentication protocol for RFID tag using salted hash algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Adv. Intell. Paradigms ![In: Int. J. Adv. Intell. Paradigms 13(1/2), pp. 193-209, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Xiuqing Chen, Kai Ma, Deqin Geng, Jingxuan Zhai, Wei Liu, Hongwei Zhang, Tingting Zhu, Xue Piao |
Untraceable Analysis of Scalable RFID Security Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 109(3), pp. 1747-1767, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Defa Zhu, Si Liu 0001, Wentao Jiang, Chen Gao, Tianyi Wu, Guodong Guo |
UGAN: Untraceable GAN for Multi-Domain Face Translation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1907.11418, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
24 | Dong Chen, Wei Lu 0010, Weiwei Xing, Na Wang 0003 |
An Untraceable Data Sharing Scheme in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 19(1), pp. 114, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Ghazaleh Beigi, Ruocheng Guo, Alexander Nou, Yanchao Zhang, Huan Liu 0001 |
Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSDM ![In: Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, WSDM 2019, Melbourne, VIC, Australia, February 11-15, 2019, pp. 213-221, 2019, ACM, 978-1-4503-5940-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Kazi Md. Rokibul Alam, Adnan Maruf, Md. Rezaur Rahman Rakib, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto |
An Untraceable Voting Scheme Based on Pairs of Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 20(4), pp. 774-787, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Raylin Tso |
Untraceable and Anonymous Mobile Payment Scheme Based on Near Field Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symmetry ![In: Symmetry 10(12), pp. 685, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Ghazaleh Beigi, Ruocheng Guo, Alexander Nou, Yanchao Zhang, Huan Liu 0001 |
Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1811.09340, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Ruhul Amin 0001, SK Hafizul Islam, Neeraj Kumar 0001, Kim-Kwang Raymond Choo |
An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 104, pp. 133-144, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Ngoc-Tu Nguyen 0003, Chin-Chen Chang 0001 |
Untraceable biometric-based three-party authenticated key exchange for dynamic systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 11(3), pp. 644-663, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Christiane Kuhn, Friederike Kitzing, Thorsten Strufe |
An Attack on Untraceable Linear Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: IEEE Global Communications Conference, GLOBECOM 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018, pp. 1-6, 2018, IEEE, 978-1-5386-4727-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Md. Abdullah Al Rahat Kutubi, Kazi Md. Rokibul Alam, Rafaf Tahsin, G. G. Md. Nawaz Ali, Peter Han Joo Chong, Yasuhiko Morimoto |
An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 11(5), pp. 2628-2645, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | ZahidMehmood, Gongliang Chen, Jianhua Li 0001, Aiiad Albeshri |
An Untraceable ECC-Based Remote User Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 11(3), pp. 1742-1760, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Michiya Yamamoto, Hirofumi Sakiyama, Satoshi Fukumori, Takashi Nagamatsu |
An unobservable and untraceable input method for public spaces by reconstructing points of gaze only on servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUI ![In: Proceedings of the 5th Symposium on Spatial User Interaction, SUI 2017, Brighton, United Kingdom, October 16 - 17, 2017, pp. 155, 2017, ACM, 978-1-4503-5486-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Jin Wang 0009, Kejie Lu, Jianping Wang 0001, Junda Zhu, Chunming Qiao |
ULNC: An Untraceable Linear Network Coding Mechanism for Mobile Devices in Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 65(9), pp. 7621-7633, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari |
An anonymous and untraceable password-based authentication scheme for session initiation protocol using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 29(13), pp. 1956-1967, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Feng Wang 0020, Chin-Chen Chang 0001, Changlu Lin |
Security Analysis on Secure Untraceable Off-line Electronic Cash System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 18(3), pp. 454-458, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
24 | Chin-Chen Chang 0001, Ngoc-Tu Nguyen 0003 |
An Untraceable Biometric-Based Multi-server Authenticated Key Agreement Protocol with Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 90(4), pp. 1695-1715, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Christian Franck, Uli Sorger |
Untraceable VoIP Communication based on DC-nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1610.06549, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
24 | Qi Jiang 0001, Jianfeng Ma 0001, Fushan Wei, Youliang Tian, Jian Shen 0001, Yuanyuan Yang |
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 76, pp. 37-48, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Khairul Alam, Kazi Md. Rokibul Alam, Omar Faruq, Yasuhiko Morimoto |
A comparison between RSA and ElGamal based untraceable blind signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSysS ![In: International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016, pp. 1-4, 2016, IEEE, 978-1-5090-0203-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Goran Mausa, Tihana Galinac Grbac |
Assessing the Impact of Untraceable Bugs on the Quality of Software Defect Prediction Datasets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SQAMIA ![In: Proceedings of the Fifth Workshop on Software Quality Analysis, Monitoring, Improvement, and Applications, Budapest, Hungary, August 29-31, 2016., pp. 47-56, 2016, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
24 | Yalin Chen, Jue-Sam Chou |
ECC-based untraceable authentication for large-scale active-tag RFID systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 15(1), pp. 97-120, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Hai-Duong Le, Chin-Chen Chang 0001, Yeh-Chieh Chou |
A Novel Untraceable Authentication Scheme for Mobile Roaming in GLOMONET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 17(4), pp. 395-404, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
24 | Eun-Kyung Ryu, Dae-Soo Kim, Kee-Young Yoo |
On Elliptic Curve Based Untraceable RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IH&MMSec ![In: Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, IH&MMSec 2015, Portland, OR, USA, June 17 - 19, 2015, pp. 147-153, 2015, ACM, 978-1-4503-3587-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Sviatoslav Edelev |
Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
24 | Ya-Fen Chang, Wei-Liang Tai, Hung-Chin Chang |
Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 27(11), pp. 3430-3440, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Yalin Chen, Jue-Sam Chou |
Cryptanalysis on "Secure untraceable off-line electronic cash system". ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 63, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
24 | Youngmi Lee, Younggi Kim, Younghee Lee |
Untraceable Blind Packet Forwarding Using Centralized Path Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MILCOM ![In: 2014 IEEE Military Communications Conference, MILCOM 2014, Baltimore, MD, USA, October 6-8, 2014, pp. 268-273, 2014, IEEE, 978-1-4799-6770-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
24 | Chin-Chen Chang 0001, Hai-Duong Le, Ching-Hsiang Chang |
Novel Untraceable Authenticated Key Agreement Protocol Suitable for Mobile Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 71(1), pp. 425-437, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Yaser Baseri, Benyamin Takhtaei, Javad Mohajeri |
Secure untraceable off-line electronic cash system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Iran. ![In: Sci. Iran. 20(3), pp. 637-646, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Vinícius Maia Pacheco, Ricardo Staciarini Puttini |
Untraceable Anonymous Service Consumption in SaaS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLOSER ![In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April, 2012, pp. 96-101, 2012, SciTePress, 978-989-8565-05-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
24 | Ziba Eslami, Mehdi Talebi |
A new untraceable off-line electronic cash system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. Appl. ![In: Electron. Commer. Res. Appl. 10(1), pp. 59-66, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Raphael C.-W. Phan, Jiang Wu 0001, Khaled Ouafi, Douglas R. Stinson |
Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 61(1), pp. 69-81, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Andreu Pere Isern-Deyà, Magdalena Payeras-Capellà, Macià Mut Puigserver, Josep Lluís Ferrer-Gomila |
Untraceable, anonymous and fair micropayment scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2011 - The Nineth International Conference on Advances in Mobile Computing and Multimedia, 5-7 December 2011, Ho Chi Minh City, Vietnam, pp. 42-49, 2011, ACM, 978-1-4503-0785-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Bin Wang, Maode Ma |
An untraceable and server-independent RFID authentication scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: 8th International Conference on Information, Communications & Signal Processing, ICICS 2011, Singapore, Singapore, December 13-16, 2011, pp. 1-5, 2011, IEEE, 978-1-4577-0029-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Kyusuk Han, Kwangjo Kim, Taeshik Shon |
Untraceable Mobile Node Authentication in WSN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 10(5), pp. 4410-4429, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Ann Cavoukian, Max Snijder, Alex Stoianov, Michelle Chibba |
Privacy and Biometrics for Authentication Purposes: A Discussion of Untraceable Biometrics and Biometric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEB ![In: Ethics and Policy of Biometrics - Third International Conference on Ethics and Policy of Biometrics and International Data Sharing, ICEB 2010, Hong Kong, January 4-5, 2010. Revised Papers, pp. 14-22, 2010, Springer, 978-3-642-12594-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Akihiro Shimoda, Tatsuya Mori, Shigeki Goto |
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings, pp. 22-30, 2010, IEEE Computer Society, 978-1-4244-7526-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
low-interaction, unused IP address, malware, honeypot |
24 | Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede |
Low-cost untraceable authentication protocols for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, 2010, pp. 55-64, 2010, ACM, 978-1-60558-923-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
search protocol, tracking attack, privacy, elliptic curve cryptography, authentication protocol, rfid |
24 | Carlo Blundo, Angelo De Caro, Giuseppe Persiano |
Untraceable Tags based on Mild Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 380, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
24 | Ton van Deursen, Sasa Radomirovic |
Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 332, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
24 | Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube, Alessandro Sorniotti |
A Security Pattern for Untraceable Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 8-14, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Carlo Blundo, Angelo De Caro, Giuseppe Persiano |
Untraceable Tags Based on Mild Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DPM/SETOP ![In: Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers, pp. 178-192, 2009, Springer, 978-3-642-11206-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Min-Chih Kao, Yi-Shiung Yeh, Chuan Chi Wang |
Untraceable Identity Management Framework for Mobile Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISDA (2) ![In: Eighth International Conference on Intelligent Systems Design and Applications, ISDA 2008, 26-28 November 2008, Kaohsiung, Taiwan, 3 Volumes, pp. 614-620, 2008, IEEE Computer Society, 978-0-7695-3382-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro |
Provably Secure Untraceable Electronic Cash against Insider Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5), pp. 980-991, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Chun-I Fan |
Ownership-attached unblinding of blind signatures for untraceable electronic cash, . ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 176(3), pp. 263-284, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Untraceable Forward-Secure Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMECS ![In: Proceedings of the International MultiConference of Engineers and Computer Scientists 2006, IMECS '06, June 20-22, 2006, Hong Kong, China, pp. 441-446, 2006, Newswood Limited, 988-98671-3-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
24 | Youngjoon Seo, Hyunrok Lee, Kwangjo Kim |
A Scalable and Untraceable Authentication Protocol for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 252-261, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros |
Untraceable RFID tags via insubvertible encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 92-101, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
RFID privacy, universal re-encryption, bilinear maps |
24 | Chin-Chen Chang 0001, Ya-Fen Chang |
The Security Flaw of an Untraceable Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEB ![In: The Fourth International Conference on Electronic Business - Shaping Business Strategy in a Networked World, pp. 1379-1381, 2004, Academic Publishers/World Publishing Corporation, 7-5062-7342-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
24 | Cheng-Chi Lee, Wei-Pang Yang, Min-Shiang Hwang |
Untraceable Blind Signature Schemes Based on Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fundam. Informaticae ![In: Fundam. Informaticae 55(3-4), pp. 307-320, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | Min-Shiang Hwang, Cheng-Chi Lee, Yan-Chi Lai |
An Untraceable Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(7), pp. 1902-1906, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | Markus Jakobsson, Filippo Menczer |
Untraceable Email Cluster Bombs: On Agent-Based Distributed Denial of Service ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR cs.CY/0305042, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | Markus Jakobsson, Filippo Menczer |
Untraceable Email Cluster Bombs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 28(6), 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
24 | David Chaum |
Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Electronic Voting ![In: Secure Electronic Voting, pp. 211-219, 2003, Springer, 1-4020-7301-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Jiejun Kong, Xiaoyan Hong |
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2003, Annapolis, Maryland, USA, June 1-3, 2003, pp. 291-302, 2003, ACM, 1-58113-684-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
trapdoor, mobile ad-hoc network, broadcast, anonymity, pseudonymity, on-demand routing, untraceability |
24 | Chun-I Fan, Chin-Laung Lei |
A User Efficient Fair Blind Signature Scheme for Untraceable Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 18(1), pp. 47-58, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
24 | Narn-Yih Lee, Tzonelih Hwang, Chuan-Ming Li |
(t, n) Threshold Untraceable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 16(6), pp. 835-846, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
24 | Hua Wang 0002, Yanchun Zhang |
A Protocol for Untraceable Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web-Age Information Management ![In: Web-Age Information Management, First International Conference, WAIM 2000, Shanghai, China, June 21-23, 2000, Proceedings, pp. 189-197, 2000, Springer, 3-540-67627-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
24 | Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik |
Untraceable mobility or how to travel incognito. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 31(8), pp. 871-884, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Cristian Radu, Frederic Klopfert, Jan De Meester |
Interoperable and Untraceable Debit-Tokens for Electronic Fee Collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Applications, This International Conference, CARDIS '98, Louvain-la-Neuve, Belgium, September 14-16, 1998, Proceedings, pp. 29-42, 1998, Springer, 3-540-67923-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Stefan Brands |
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 302-318, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Andreas Pfitzmann, Birgit Pfitzmann, Michael Waidner |
ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Kommunikation in Verteilten Systemen ![In: Kommunikation in Verteilten Systemen, Grundlagen, Anwendungen, Betrieb, GI/ITG-Fachtagung, Mannheim, 20.-22. Februar 1991, Proceedings, pp. 451-463, 1991, Springer, 3-540-53721-X. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Barry Hayes |
Anonymous One-Time Signatures and Flexible Untraceable Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUSCRYPT ![In: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings, pp. 294-305, 1990, Springer, 3-540-53000-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
24 | David Chaum |
Blind Signatures for Untraceable Payments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982., pp. 199-203, 1982, Plenum Press, New York. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
24 | David Chaum |
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 24(2), pp. 84-88, 1981. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
|
16 | Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik |
Universally Composable RFID Identification and Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(4), pp. 21:1-21:33, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication and key-exchange protocols, universal composability, RFID security |
16 | Georgios Androulidakis, Vasilis Chatzigiannakis, Symeon Papavassiliou |
Network anomaly detection and classification via opportunistic sampling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 23(1), pp. 6-12, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Junfeng Fan, Lejla Batina, Ingrid Verbauwhede |
Light-weight implementation options for curve-based cryptography: HECC is also ready for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITST ![In: Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, ICITST 2009, London, UK, November 9-12, 2009, pp. 1-6, 2009, IEEE, 978-1-4244-5648-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Chase Gray, Jason Byrnes, Srihari Nelakuditi |
Pair-wise resistance to traffic analysis in MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGMOBILE Mob. Comput. Commun. Rev. ![In: ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1), pp. 20-22, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|