The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for encrypted with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1965-1987 (19) 1988-1991 (16) 1992-1994 (15) 1995-1996 (20) 1997-1998 (31) 1999 (21) 2000 (31) 2001 (40) 2002 (57) 2003 (62) 2004 (100) 2005 (153) 2006 (164) 2007 (165) 2008 (200) 2009 (143) 2010 (82) 2011 (85) 2012 (89) 2013 (143) 2014 (177) 2015 (200) 2016 (253) 2017 (279) 2018 (386) 2019 (470) 2020 (427) 2021 (458) 2022 (444) 2023 (469) 2024 (118)
Publication types (Num. hits)
article(2306) book(2) data(7) incollection(20) inproceedings(2942) phdthesis(35) proceedings(5)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1140 occurrences of 654 keywords

Results
Found 5317 publication records. Showing 5317 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
88Ian F. Blake, Vladimir Kolesnikov Conditional Encrypted Mapping and Comparing Encrypted Numbers. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Two Millionaires with encrypted inputs, private selective payments, conditional encrypted mapping, auctions
67Einar Mykletun, Gene Tsudik Aggregation Queries in the Database-As-a-Service Model. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
66Lei Zhang 0009, Qianhong Wu, Bo Qin Identity-Based Verifiably Encrypted Signatures without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Fair Exchange, Identity-Based Cryptography, Verifiably Encrypted Signature
66Tiziano Bianchi, Alessandro Piva, Mauro Barni Efficient pointwise and blockwise encrypted operations. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF packed representation of signals, signal processing in the encrypted domain, homomorphic encryption
62Sun S. Chung, Gultekin Özsoyoglu Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Mauro Barni Processing encrypted signals: a new frontier for multimedia security. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
60Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee Collect and broadcast news in security. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cipher text, plaintext, algorithm, encryption, decryption
60Tomas Sander, Adam L. Young, Moti Yung Non-Interactive CryptoComputing For NC1. Search on Bibsonomy FOCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cryptocomputing, cryptography, public key, complexity theory, homomorphic encryption, secure computation
59Michel Abdalla, David Pointcheval Simple Password-Based Encrypted Key Exchange Protocols. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encrypted key exchange, Password, Diffie-Hellman assumptions
57Yasuhiro Ohtaki Constructing a Searchable Encrypted Log using Encrypted Inverted Indexes. Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig Intrusion Detection for Encrypted Web Accesses. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Tieyan Li, Yongdong Wu, Huafei Zhu An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Alina Oprea, Michael K. Reiter On Consistency of Encrypted Files. Search on Bibsonomy DISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu Efficient Sharing of Encrypted Data. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
53Sarvar Patel Number Theoretic Attacks on Secure Password Schemes. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF number theoretic attacks, secure password schemes, Encrypted Key Exchange, EKE, authenticated information exchange, insecure network, secret key cryptography, randomized confounders, RSA version, half encrypted versions, Direct Authentication Protocol, Secret Public Key Protocol versions, secure protocols, message authentication, dictionary attacks, active attacks, password guessing attacks
52Prasenjit Mitra, Chi-Chun Pan, Peng Liu 0005, Vijayalakshmi Atluri Privacy-preserving semantic interoperation and access control of heterogeneous databases. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
51Peishun Wang, Huaxiong Wang, Josef Pieprzyk Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Common secure index, Paillier’s cryptosystem, search on encrypted data
51Shuhua Wu, Yuefei Zhu Efficient Augmented Password-Based Encrypted Key Exchange Protocol. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted key exchange, password, Diffie-Hellman assumptions
51Chunxiang Gu, Yuefei Zhu An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear pairings, fair exchange, ID-based cryptography, verifiably encrypted signatures
51M. Choudary Gorantla, Ashutosh Saxena Verifiably Encrypted Signature Scheme Without Random Oracles. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Bilinear Pairings, Fair Exchange, Random Oracles, Verifiably Encrypted Signature
47Xu An Wang 0001, Xiaoyuan Yang 0002, Qingquan Peng On Security Notions for Verifiably Encrypted Signature. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Markus Rückert, Dominique Schröder Security of Verifiably Encrypted Signatures and a Construction without Random Oracles. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos Mamoulis Secure kNN computation on encrypted databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, encryption, knn
47Ravi Chandra Jammalamadaka, Sharad Mehrotra Querying Encrypted XML Documents. Search on Bibsonomy IDEAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Jianhong Zhang, Wei Zou A Robust Verifiably Encrypted Signature Scheme. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Peter L. Reiher, Kevin Eustice, Kai-Min Sung Adapting Encrypted Data Streams in Open Architectures. Search on Bibsonomy Active Middleware Services The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
45Eiji Okamoto, K. Nakamura Lifetimes of Keys in Cryptographic Key Management Systems. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
44Riyad Alshammari, Peter Lichodzijewski, Malcolm I. Heywood, Nur Zincir-Heywood Classifying SSH encrypted traffic with minimum packet header features using genetic programming. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF defense applications, encrypted traffic classification, security, genetic programming, active learning, supervised learning, teaming, packet, problem decomposition
44Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung Two-Party Computing with Encrypted Data. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Computing with Encrypted Data, CryptoComputing, oblivious transfer, Secure Two-Party Computation
41Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yung Secure Multi-party Computation Minimizing Online Rounds. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Computing with Encrypted Data, Universal Composition, Cryptographic Protocols, Public key Cryptography, Multi-Party Computation
41Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, William E. Skeith III Public Key Encryption That Allows PIR Queries. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public-key Encryption with special properties, Database security, Private Information Retrieval, Searching on encrypted data
41Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear pairing, group signature, ID-based cryptography, verifiably encrypted signature
41Eberhard von Faber, R. Hammelrath, F.-P. Heider The Secure Distribution of Digital Contents. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems
40Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin On Compression of Data Encrypted with Block Ciphers. Search on Bibsonomy DCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Daniel Schonberg, Stark C. Draper, Chuohao Yeo, Kannan Ramchandran Toward Compression of Encrypted Images and Video Sequences. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Tiziano Bianchi, Alessandro Piva, Mauro Barni Discrete cosine transform of encrypted images. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Changyu Dong, Giovanni Russello, Naranker Dulay Shared and Searchable Encrypted Data for Untrusted Servers. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen Encrypted Shared Data Spaces. Search on Bibsonomy COORDINATION The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato Tracing back attacks against encrypted protocols. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption, intrusion detection system (IDS), traceback
40Daniel Schonberg, Chuohao Yeo, Stark C. Draper, Kannan Ramchandran On Compression of Encrypted Video. Search on Bibsonomy DCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Jianhong Zhang, Jian Mao A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Efficient Conjunctive Keyword Search on Encrypted Data Storage System. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Yi Tang 0001 Sharing Session Keys in Encrypted Databases. Search on Bibsonomy ICEBE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Myungjin Lee, Hyokyung Bahn, Kijoon Chae A New Key Management Scheme for Distributed Encrypted Storage Systems. Search on Bibsonomy ICCSA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Zheng-Fei Wang, Jing Dai, Wei Wang 0009, Baile Shi Fast Query Over Encrypted Character Data in Database. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Xinyuan Wang 0005, Douglas S. Reeves, Shyhtsun Felix Wu Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang Commutative Encryption and Watermarking in Video Compression. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Ozan Ünay, Taflan Imre Gündem A survey on querying encrypted XML documents for databases as a service. Search on Bibsonomy SIGMOD Rec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF database as a service, querying encrypted XML document algorithms, XML, encryption
36Kenji Yasu, Yasuhiko Akahane, Masami Ozaki, Koji Semoto, Ryôichi Sasaki Development and Evaluation of a System for Checking for Improper Sending of Personal Information in Encrypted E-Mail. Search on Bibsonomy I3E The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encrypted e-mail, check system, security, privacy, network, personal information
36Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, Lili Qiu Statistical Identification of Encrypted Web Browsing Traffic. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypted web traffic, identification
36Mark Cullen, Leon Pintsov, Brian Romansky Reading encrypted postal indicia. Search on Bibsonomy ICDAR The full citation details ... 1995 DBLP  DOI  BibTeX  RDF postal services, encrypted postal indicia reading, postal revenue block, postal fraud, digital printing technologies, revenue block information, robustness, encryption, document image processing, fraud, verification process
34Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Recipient Anonymity, Access Control on Encrypted Data, Attribute-Based Encryption, Ciphertext Policy
34Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data
34Josep Domingo-Ferrer A Provably Secure Additive and Multiplicative Privacy Homomorphism. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Encrypted data processing, Delegation of computing and data, E-gambling, Cryptography, Multilevel security, Privacy homomorphisms
32Liang Chen, Chengmin Gao, Yong Xu Non-interactive Evaluation of Encrypted Elementary Functions. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Quan Feng, Fei Su, Anni Cai Encrypted Fuzzy Vault Based on Fingerprint. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Vik Tor Goh, Jacob Zimmermann, Mark Looi Towards Intrusion Detection for Encrypted Networks. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy Investigating Encrypted Material. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Public & Private Keys, Encryption, RSA, OpenPGP, Ciphertext
32Rohit Pathak, Satyadhar Joshi Secure Multi-party Computation Using Virtual Parties for Computation on Encrypted Data. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure Multi-party Computation (SMC), Privacy, Protocol, Information Security
32Zhi Wang 0004, Xuxian Jiang, Weidong Cui, Xinyuan Wang 0005, Mike Grace ReFormat: Automatic Reverse Engineering of Encrypted Messages. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Data Lifetime Analysis, Security, Reverse Engineering, Encryption, Network Protocols
32Charles V. Wright, Lucas Ballard, Scott E. Coull, Fabian Monrose, Gerald M. Masson Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, traffic analysis, voice over IP
32Hyun-A Park, Dong Hoon Lee 0001, Justin Zhan, Gary Blosser Efficient keyword index search over encrypted documents of groups. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Peishun Wang, Huaxiong Wang, Josef Pieprzyk Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Keyword field, dynamic group, conjunctive keyword search
32Hakan Hacigümüs, Bijit Hore, Balakrishna R. Iyer, Sharad Mehrotra Search on Encrypted Data. Search on Bibsonomy Secure Data Management in Decentralized Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Zan Li, Kai Fan 0001 A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Jian-Hong Wang, Jen-Yi Pan, Yi-Chi Cheng Session recognition and Bandwidth Guarantee for Encrypted Internet Voice Traffic : Case Study of Skype. Search on Bibsonomy CIDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Jianhong Zhang A verifiably encrypted signature scheme with strong unforgeability. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security analysis, proof, verifiably encryption
32Marc Liberatore, Brian Neil Levine Inferring the source of encrypted HTTP connections. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF low-latency anonymity, traffic analysis, network forensics
32Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu A Key-Recovery System for Long-term Encrypted Documents. Search on Bibsonomy EDOC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Yan-Cheng Chang, Michael Mitzenmacher Privacy Preserving Keyword Searches on Remote Encrypted Data. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Jun Li, Edward Omiecinski Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32George Dean Bissias, Marc Liberatore, David D. Jensen, Brian Neil Levine Privacy Vulnerabilities in Encrypted HTTP Streams. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Markku-Juhani Olavi Saarinen Encrypted Watermarks and Linux Laptop Security. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Steven M. Bellovin, Michael Merritt Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
30Qin Liu 0001, Guojun Wang 0001, Jie Wu 0001 An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Jerry Cheng, Hao Yang 0004, Starsky H. Y. Wong, Petros Zerfos, Songwu Lu Design and Implementation of Cross-Domain Cooperative Firewall. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Chuanfeng Lv, Qiangfu Zhao Integration of Data Compression and Cryptography: Another Way to Increase the Information Security. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Xuefei Cao Design of Secure Watermarking Scheme for Watermarking Protocol. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Hyun-A Park, Bum Han Kim, Dong Hoon Lee 0001, Yon Dohn Chung, Justin Zhan Secure Similarity Search. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, Anthony Tomasic Simultaneous scalability and security for data-intensive web applications. Search on Bibsonomy SIGMOD Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Huafei Zhu, Feng Bao 0001 More on Stand-Alone and Setup-Free Verifiably Committed Signatures. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Yingpeng Sang, Hong Shen 0001, Yasushi Inoguchi, Yasuo Tan, Naixue Xiong Secure Data Aggregation in Wireless Sensor Networks: A Survey. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Bin B. Zhu, Yang Yang, Shipeng Li 0001 JPEG 2000 syntax-compliant encryption preserving full scalability. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30V. Radha 0001, N. Hemanth Kumar EISA - An Enterprise Application Security Solution for Databases. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Ryotaro Hayashi 0001, Keisuke Tanaka Universally Anonymizable Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy
30Osamu Watanabe 0002, Akiko Nakazaki, Hitoshi Kiya A scalable encryption method allowing backward compatibility with JPEG2000 images. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Rakesh Agrawal 0001, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu Order-Preserving Encryption for Numeric Data. (PDF / PS) Search on Bibsonomy SIGMOD Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Kyu B. Doh, Kyeongwha Kim, Jungho Ohn, Ting-C. Poon Information Security Based on Fourier Plane Random Phase Coding and Optical Scanning. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Kyu B. Doh, Kyeongwha Kim, Ting-C. Poon Computer Generated Holographic Image Processing for Information Security. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Tage Stabell-Kulø, Arne Helme, Gianluca Dini Detecting Key-Dependencies. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
29Jong Hwan Park Efficient Hidden Vector Encryption for Conjunctive Queries on Encrypted Data. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Hidden vector encryption, bilinear maps, search on encrypted data, database privacy
29David Lai, Zhongwei Zhang Self-Authentication of Encrypted Channels in Service Network Graph. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Self authentication, Encrypted Channels, Service Network Graphs
29Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly Secrecy, flagging, and paranoia: adoption criteria in encrypted email. Search on Bibsonomy CHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted e-mail, extended case method, security, activism
29Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Key management for multi-user encrypted databases. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encrypted/indexing databases, hierarchical key derivation schema, selective access
29Jianzhong Huang 0001, Changsheng Xie, Bin Cai Research and Implement of an Encrypted File System Used to NAS. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Encrypted File System, Storage Security, NAS, Stackable File System
26Meena Dilip Singh, P. Radha Krishna 0001, Ashutosh Saxena A cryptography based privacy preserving solution to mine cloud data. Search on Bibsonomy Bangalore Compute Conf. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF encrypted data, private equality test, cryptography, privacy preserving data mining
26Juan Ramón Troncoso-Pastoriza, Stefan Katzenbeisser 0001, Mehmet Utku Celik, Aweke N. Lemma A secure multidimensional point inclusion protocol. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF point inclusion, signal processing in the encrypted domain, computational geometry, secure multiparty computation, homomorphic encryption
26Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He 0002, Min Wu 0001, Douglas W. Oard Confidentiality-preserving rank-ordered search. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encrypted domain search, secure index, ranked retrieval
26Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, Bodo Möller, David Pointcheval Provably secure password-based authentication in TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted key exchange, password authentication, TLS
26Jörg Platte, Raúl Durán Díaz, Edwin Naroska An Operating System Design for the Security Architecture for Microprocessors. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Encrypted Programs, Secure Processors, Secure Operating Systems, Certified Execution
Displaying result #1 - #100 of 5317 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license