Results
Found 19 publication records. Showing 19 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Wei Du, Mingxing He, Xiao Li |
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings, pp. 832-843, 2009, Springer, 978-3-642-03094-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Self-healing Key Distribution, Constant Storage, Backward Security, Forward Security, WSNs |
20 | Shouhuai Xu |
On the security of group communication schemes based on symmetric key cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SASN ![In: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005, pp. 22-31, 2005, ACM, 1-59593-227-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
backward-security, security, key management, group communication, broadcast encryption, forward-security |
16 | Leo Dorrendorf, Zvi Gutterman, Benny Pinkas |
Cryptanalysis of the windows random number generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 476-485, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pseudo random number generator (prng), windows operating system, cryptanalysis |
15 | Xi Zhang, Ye Su, Zhongkai Wei, Wenting Shen, Jing Qin 0002 |
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIS&P (1) ![In: Artificial Intelligence Security and Privacy - First International Conference on Artificial Intelligence Security and Privacy, AIS&P 2023, Guangzhou, China, December 3-5, 2023, Proceedings, Part I, pp. 342-357, 2023, Springer, 978-981-99-9784-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Peng Xu 0003, Willy Susilo, Wei Wang 0088, Tianyang Chen, Qianhong Wu, Kaitai Liang, Hai Jin 0001 |
ROSE: Robust Searchable Encryption With Forward and Backward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 17, pp. 1115-1130, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Shabnam Kasra Kermanshahi, Shifeng Sun 0001, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Wang Fat Lau, Man Ho Allen Au |
Geometric Range Search on Encrypted Data With Forward/Backward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(1), pp. 698-716, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Mengwei Yang, Chungen Xu, Pan Zhang |
Geometric Range Searchable Encryption with Forward and Backward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings, pp. 476-495, 2022, Springer, 978-3-031-23019-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Zhenhua Liu 0001, Jingwan Gong, Yuanju Ma, Yaxin Niu, Baocang Wang |
Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCS ![In: Frontiers in Cyber Security - 5th International Conference, FCS 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings, pp. 324-345, 2022, Springer, 978-981-19-8444-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | |
ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 489, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Tianyang Chen, Peng Xu 0003, Wei Wang 0088, Yubo Zheng, Willy Susilo, Hai Jin 0001 |
Bestie: Very Practical Searchable Encryption with Forward and Backward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II, pp. 3-23, 2021, Springer, 978-3-030-88427-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Xi Zhang, Ye Su, Jing Qin 0002 |
A Dynamic Searchable Symmetric Encryption Scheme for Multiuser with Forward and Backward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 2020, pp. 8893016:1-8893016:13, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | |
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 628, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Cong Zuo, Shifeng Sun 0001, Joseph K. Liu, Jun Shao 0001, Josef Pieprzyk |
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II, pp. 228-246, 2018, Springer, 978-3-319-98988-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Mike Burmester, Jorge Munilla |
Lightweight RFID authentication with forward and backward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 14(1), pp. 11:1-11:26, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
12 | Lauri I. W. Pesonen, David M. Eyers, Jean Bacon |
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEBS ![In: Proceedings of the 2007 Inaugural International Conference on Distributed Event-Based Systems, DEBS 2007, Toronto, Ontario, Canada, June 20-22, 2007, pp. 104-115, 2007, ACM, 978-1-59593-665-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
administrative domains, attribute encryption, secure publish/subscribe systems, distributed access control |
12 | Boaz Barak, Shai Halevi |
A model and architecture for pseudo-random generation with applications to /dev/random. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 203-212, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
dev/random, mixing functions, true randomness, entropy, smart-cards, pseudo-randomness |
12 | Wen Tao Zhu |
Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 35-48, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li |
Dynamic Access Control for Multi-privileged Group Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 508-519, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
8 | Alan T. Sherman, David A. McGrew |
Key Establishment in Large Dynamic Groups Using One-Way Function Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 29(5), pp. 444-458, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Dynamic Cryptographic Context Management (DCCM) Project, logical key hierarchy (LKH), one-functions, one-way function chain (OFC), one-way function tree (OFT), secure conferences, secure group applications, cryptography, key management, cryptographic protocols, key agreement, Broadcast encryption, key establishment, group keying, conference keying |
Displaying result #1 - #19 of 19 (100 per page; Change: )
|