Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
167 | Rudolf Bayer, J. K. Metzger |
On the Encipherment of Search Trees and Random Access Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 1(1), pp. 37-52, 1976. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
encipherment, indexed sequential files, privacy transformation, random access files, security, privacy, cryptography, indexes, paging, protection, B-trees, search trees |
90 | R. W. Jones |
User Functions for the Generation and Distribution of Encipherment Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings, pp. 317-334, 1984, Springer, 3-540-16076-0. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
70 | Akihiro Shimizu, Shoji Miyaguchi |
Fast Data Encipherment Algorithm FEAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 267-278, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
70 | Donald W. Davies, Graeme I. P. Parkin |
The average Cycle size of the Key-Stream in Output Feedback Encipherment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982, pp. 263-279, 1982, Springer. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
50 | Kazuo Ohta, Kazumaro Aoki |
Linear Cryptanalysis of the Fast Data Encipherment Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings, pp. 12-16, 1994, Springer, 3-540-58333-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
50 | R. W. Jones, M. S. J. Baxter |
The Role of Encipherment Services in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 214-220, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
40 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 624-627, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
40 | Donald W. Davies, Wyn L. Price |
Engineering Secure Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 191-199, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
30 | Keagan Brewer |
'I beg your grace to suppress this chapter or else to have it written in secret letters': The Emotions of Encipherment in Late-Medieval Gynaecology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VOY ![In: Proceedings of the 1st International Conference on the Voynich Manuscript 2022 (VOY2022), Virtual Event, Qrendi, Malta, November 30 - December 1, 2022., 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
30 | Claire Bowern, Daniel Gaskell |
Enciphered after all? Word-level Text Metrics are Compatible with some Types of Encipherment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VOY ![In: Proceedings of the 1st International Conference on the Voynich Manuscript 2022 (VOY2022), Virtual Event, Qrendi, Malta, November 30 - December 1, 2022., 2022, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
30 | Jin-Kyoung Heo |
Distributed Object Activation for Web Application Encipherment Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Convergence Inf. Technol. ![In: J. Convergence Inf. Technol. 4(1), pp. 58-62, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
30 | JinKyoung Heo |
Web Application Encipherment Key Management using Distributed Object Activation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Content Technol. its Appl. ![In: J. Digit. Content Technol. its Appl. 3(3), pp. 81-85, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
30 | JinKyoung Heo |
Encipherment Key Management System for Massive Web Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 595-599, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
object activation, security, distributed processing |
30 | Sung-Yeal Im, Ki-Dong Chung |
A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of The 2005 International Conference on Security and Management, SAM 2005, Las Vegas, Nevada, USA, June 20-23, 2005, pp. 512-517, 2005, CSREA Press, 1-932415-82-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
30 | Cees J. A. Jansen, Piet van der Vlist |
Message encipherment with minimal expansion and redundancy - doing better than ISO-10126. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 15(7), pp. 627-632, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
30 | Thomas Hardjono, Jennifer Seberry |
Search Key Substitution in the Encipherment of B-Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB ![In: 16th International Conference on Very Large Data Bases, August 13-16, 1990, Brisbane, Queensland, Australia, Proceedings., pp. 50-58, 1990, Morgan Kaufmann, 1-55860-149-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP BibTeX RDF |
|
30 | John Linn |
Privacy enhancement for Internet electronic mail: Part I - message encipherment and authentication procedures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1113, pp. 1-34, August 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
30 | John Linn |
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 1040, pp. 1-29, January 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
30 | Akihiro Shimizu, Shoji Miyaguchi |
FEAL - Fast Data Encipherment Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Syst. Comput. Jpn. ![In: Syst. Comput. Jpn. 19(7), pp. 20-34, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
30 | John Linn |
Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 989, pp. 1-23, February 1987. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
30 | Gilbert Bloch, Ralph Erskine |
Enigma: the Dropping of the Double Encipherment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 10(3), pp. 134-141, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
30 | Józef P. Pieprzyk, Dominik Rutkowski |
Modular design of information encipherment for computer systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 4(3), pp. 211-218, 1985. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
30 | Alan G. Konheim |
Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pp. 339-341, 1984, Springer, 3-540-15658-5. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
30 | Donald W. Davies, Graeme I. P. Parkin |
The Average Cycle Size of the Key Stream in Output Feedback Encipherment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology: Proceedings of CRYPTO '82, Santa Barbara, California, USA, August 23-25, 1982., pp. 97-98, 1982, Plenum Press, New York. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
30 | Rudolf Bayer, J. K. Metzger |
On the Encipherment of Search Trees and Random Access Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB ![In: Proceedings of the International Conference on Very Large Data Bases, September 22-24, 1975, Framingham, Massachusetts, USA., pp. 452, 1975, ACM. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
30 | Theodore D. Friedman, Lance J. Hoffman |
Execution Time Requirements for Encipherment Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 17(8), pp. 445-449, 1974. The full citation details ...](Pics/full.jpeg) |
1974 |
DBLP DOI BibTeX RDF |
|
20 | David M. Horan, Richard A. Guinee |
A novel pseudorandom binary sequence generator for keystream generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2006), 21-24 May 2006, Island of Kos, Greece, 2006, IEEE, 0-7803-9389-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Sabah Mohammed, Jinan Fiaidhi |
Developing Secure Transcoding Intermediary for SVG Medical Images within Peer-to-Peer Ubiquitous Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 16-18 May 2005, Halifax, Novia Scotia, Canada, pp. 151-156, 2005, IEEE Computer Society, 0-7695-2333-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
P2P Ubiquitous Environments, Image Transcoding, XML Encryption, SVG, JXTA |
20 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 440-453, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
20 | Eiji Okamoto |
Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pp. 361-373, 1988, Springer, 3-540-50251-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
20 | A. R. Prieto, J. G. Tomas |
A model to order the encryption algorithms according to their quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. Rev. ![In: Comput. Commun. Rev. 17(3), pp. 30-47, 1987. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Marc Girault |
Hash-Functions Using Modulo-N Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 217-226, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Walter Fumy |
On the F-function of FEAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, pp. 434-437, 1987, Springer, 3-540-18796-0. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Wyn L. Price |
Standards for Data Security - A Change of Direction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, pp. 3-8, 1987, Springer, 3-540-18796-0. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
20 | Don Coppersmith |
Another Birthday Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 14-17, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
20 | Don Coppersmith |
The Real Reason for Rivest's Phenomenon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 535-536, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|