The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for key with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1956-1961 (38) 1962-1967 (15) 1968-1971 (15) 1972-1975 (23) 1976 (23) 1977-1978 (30) 1979 (23) 1980 (26) 1981 (25) 1982 (53) 1983 (44) 1984 (69) 1985 (89) 1986 (62) 1987 (110) 1988 (114) 1989 (186) 1990 (170) 1991 (144) 1992 (158) 1993 (203) 1994 (264) 1995 (365) 1996 (457) 1997 (522) 1998 (621) 1999 (881) 2000 (1219) 2001 (1632) 2002 (1849) 2003 (2429) 2004 (3346) 2005 (4194) 2006 (4700) 2007 (5290) 2008 (5168) 2009 (3729) 2010 (1592) 2011 (1223) 2012 (1158) 2013 (1296) 2014 (1347) 2015 (1422) 2016 (1724) 2017 (1551) 2018 (1665) 2019 (1786) 2020 (1898) 2021 (2024) 2022 (1948) 2023 (2119) 2024 (569)
Publication types (Num. hits)
article(19865) book(46) data(5) incollection(453) inproceedings(40846) phdthesis(295) proceedings(98)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 41555 occurrences of 11846 keywords

Results
Found 61687 publication records. Showing 61608 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
68Ari Juels, Jorge Guajardo RSA Key Generation with Verifiable Randomness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF verifiable randomness, public-key infrastructure, zero knowledge, non-repudiation, certificate authority, key generation
64Charles R. Blair On Computer Transcription of Manual Morse. Search on Bibsonomy J. ACM The full citation details ... 1959 DBLP  DOI  BibTeX  RDF
60Arshad Noor Securing the core with an Enterprise Key Management Infrastructure (EKMI). Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XML encryption (XENC), XML signature (DSIG), enterprise key management infrastructure (EKMI), symmetric key client library (SKCL), symmetric key management system (SKMS), symmetric key services (SKS), symmetric key services markup language (SKSML), key-management (KM), public key infrastructure (PKI)
60Junzuo Lai, Weidong Kou Self-Generated-Certificate Public Key Encryption Without Pairing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-Generated-Certificate Public Key Cryptography, Self-Certified-Key, Certificateless Public Key Cryptography
59Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai Parallel Key-Insulated Public Key Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
59M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Exchange, Insider Attacks, Key Compromise Impersonation
58Michel Abdalla, Pierre-Alain Fouque, David Pointcheval Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
56Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai Toward Fair International Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Key escrow/recovery system, Diffie-Hellman key distribution, Distributed Cryptography, Security policy, Trusted Third Party
55Adam L. Young, Moti Yung Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Auto-Recoverable Auto-Certifiable Cryptosystems, NIZK, software key escrow, escrow hierarchy, RSA, Public Key, Key Escrow, ElGamal
53Yvo Desmedt, Mike Burmester, Jennifer Seberry Equitability in Retroactive Data Confiscation versus Proactive Key Escrow. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF data confiscation, key escrow, RIP
52Marc Joye RSA Moduli with a Predetermined Portion: Techniques and Applications. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression
51Benoît Libert, Jean-Jacques Quisquater, Moti Yung Parallel Key-Insulated Public Key Encryption Without Random Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel key-insulated encryption, standard model, pairings
50Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews Chinese remainder theorem based group key management. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management
50K. C. Reddy, Divya Nalla Identity Based Authenticated Group Key Agreement Protocol. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing
49Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure
49Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung Strong Key-Insulated Signature Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Rakeshbabu Bobba, Himanshu Khurana DLPKH - Distributed Logical Public-Key Hierarchy. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF decentralized key distribution, logical key hierarchy, public-key trees, key agreement, Group key management
46Sven Laur, Sylvain Pasini SAS-Based Group Authentication and Key Agreement Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Groups, key agreement, message authentication, multi-party
45Seyit Ahmet Çamtepe, Bülent Yener Combinatorial design of key distribution mechanisms for wireless sensor networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF combinatorial design theory, generalized quadrangles (GQ), key pre-distribution (deterministic and hybrid), key-chains, security in wireless sensor networks (WSN), symmetric balanced incomplete block design (BIBD), key management
44Vijay Varadharajan, Rajan Shankaran, Michael Hitchens Security services and public key infrastructure for ATM networks. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF ATM protocol stack, security layer, data origin authentication, user plane, key establishment protocol, ATM signaling protocol, call setup procedures, ATM nodes, public key certificate retrieval, public key certificate distribution, B-ISDN Protocol Reference Model, integrity, public key cryptography, confidentiality, ATM networks, public key infrastructure, Certification Authority, security services
44Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
44Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
44Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval Password-Based Group Key Exchange in a Constant Number of Rounds. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Group Key Exchange, Password-based Authentication
44Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha A Lattice Based Public Key Cryptosystem Using Polynomial Representations. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF GGH cryptosystem, lattice based public key cryptosystem, polynomial representation
44Jae Hyung Koo, Bum Han Kim, Dong Hoon Lee 0001 Authenticated Public Key Distribution Scheme Without Trusted Third Party. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Management and Authentication, Public-key Cryptography, Public Key Infrastructure (PKI)
44Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li Identity-Based Key-Insulated Signature with Secure Key-Updates. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure
43Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson Key recovery for the commercial environment. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Commercial key recovery, Software key recovery, Key management, Key escrow
43Maurizio Adriano Strangio On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key agreement protocols, key compromise impersonation
43Petros Mol, Moti Yung Recovering NTRU Secret Key from Inversion Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis
42Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key material, security, scalability, group communication, group key management
42Kouichi Sakurai, Hiroki Shizuya A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Computational number theory, Computational number theory, Securi, Security, Randomness, Randomness, Public-key cryptography, Public-key cryptography, Elliptic curves, Elliptic curves, Key exchange, Key exchange, Discrete logarithm, Discrete logarithm, Key words, Cryptosystem, Cryptosystem
42Satoshi Koga, Kouichi Sakurai A Distributed Online Certificate Status Protocol with a Single Public Key. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Yoshinori Aono A New Lattice Construction for Partial Key Exposure Attack for RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction
41Yevgeniy Dodis, Moti Yung Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman
41Yonghwan Lee, Eunmi Choi, Dugki Min An Authenticated Key Exchange Mechanism Using One-Time Shared Key. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman
40Michel Abdalla, Xavier Boyen, Céline Chevalier, David Pointcheval Distributed Public-Key Cryptography from Weak Secrets. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Takeshi Koshiba On Sufficient Randomness for Secure Public-Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Wen-Guey Tzeng, Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF revocation, broadcast encryption, traitor tracing
40Jintai Ding, Christopher Wolf, Bo-Yin Yang l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trapdoor, Encryption, Public Key, Signing
40Dima Ruinskiy, Adi Shamir, Boaz Tsaban Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Thompson’s group, Shpilrain-Ushakov, Subgroup distance function, Cryptanalysis, Key agreement
40David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
39Christian Wieschebrink An Attack on a Modified Niederreiter Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography
39Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang Tractable Rational Map Signature. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tractable rational maps, digital signature, finite field, public key, multivariate
39Jakob Jonsson, Matthew J. B. Robshaw Securing RSA-KEM via the AES. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA-KEM, key derivation function, AES
39Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems
39Mathias Herrmann, Gregor Leander A Practical Key Recovery Attack on Basic TCHo. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCHo, stream cipher, chosen ciphertext attack
39Yi-Ru Liu, Wen-Guey Tzeng Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Broadcast encryption, collusion, polynomial interpolation
39Kristin E. Lauter, Anton Mityagin Security Analysis of KEA Authenticated Key Exchange Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Jong-Myoung Kim, Young-Ju Han, Seon-Ho Park, Tai-Myoung Chung N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless sensor networks, key management, key pre- distribution
38Valery I. Korzhik, Viktor Yakovlev, Alexander Sinuk Achievability of the Key-Capacity in a Scenario of Key Sharing. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Wire-tap channel, public discussion, key capacity, privacy amplification, Renyi entropy
38Bruce Schneier, Chris Hall An Improved E-Mail Security Protocol. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy
38Ayesha Naureen, Attiya Akram, Rabia Riaz, Ki-Hyung Kim, H. Farooq Ahmed A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Symmetric Key Cryptography (SKC), Security, Wireless Sensor Network (WSN), Key Management, Public Key Cryptography (PKC)
38Kenneth G. Paterson, Sriramkrishnan Srinivasan Building Key-Private Public-Key Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple trusted authorities, TA anonymity, standard model, public-key encryption, identity-based encryption, key-privacy
38Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
37Alan T. Sherman, David A. McGrew Key Establishment in Large Dynamic Groups Using One-Way Function Trees. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Dynamic Cryptographic Context Management (DCCM) Project, logical key hierarchy (LKH), one-functions, one-way function chain (OFC), one-way function tree (OFT), secure conferences, secure group applications, cryptography, key management, cryptographic protocols, key agreement, Broadcast encryption, key establishment, group keying, conference keying
37Koichiro Akiyama, Yasuhiro Goto, Hideyuki Miyake An Algebraic Surface Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Section, Public-key Cryptosystem, Algebraic Surface
37Christopher Wolf, Bart Preneel Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public Key Schemes, Multivariate Quadratic Equations
37Yuliang Zheng 0001 Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF High Order Residues, RSA, Signature, Public Key Encryption, Signcryption
37Yung-Cheng Lee, Chi-Sung Laih On the Key Recovery of the Key Escrow System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy
37Chong Hee Kim, Pil Joong Lee New Key Recovery in WAKE Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Pierre-Alain Fouque, Jacques Stern One Round Threshold Discrete-Log Key Generation without Private Channels. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Threshold DLK Generation, Publicly Verifiable Encryption, Adaptive and Concurrent Adversary
37Feng Bao 0001, Robert H. Deng A Signcryption Scheme with Signature Directly Verifiable by Public Key. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
37JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow
36Hyesun Kwak, Seonhong Min, Yongsoo Song Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity. Search on Bibsonomy Public Key Cryptography (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
36Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. Search on Bibsonomy Public Key Cryptography The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
36Florian Böhl, Gareth T. Davies, Dennis Hofheinz Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
36Hoeteck Wee Public Key Encryption against Related Key Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
36Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo Privacy for Private Key in Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack
36Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 A Diffie-Hellman Key Exchange Protocol Without Random Oracles. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation
36Ganapathi Padmavathi, Samukutty Annadurai Improved Key Management Technique for Secure Multicasting over IP. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rekeying and logical key hierarchy, Multicasting, key management, group key
36Lei Wang 0015, Zhiping Chen 0002, Xinhua H. Jiang Researches on scheme of pairwise key establishment for distributed sensor networks. Search on Bibsonomy WMuNeP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hierarchical hypercube model, key pool, sensor networks, key predistribution, pairwise key
36Roberto Di Pietro, Antonio Durante, Luigi V. Mancini A Reliable Key Authentication Schema for Secure Multicast Communications. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management
36Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park New Public-Key Cryptosystem Using Braid Groups. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem
36Eiji Okamoto, K. Nakamura Lifetimes of Keys in Cryptographic Key Management Systems. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
36Yuji Watanabe, Hideki Imai Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Jie Zhou, Yong-hao Ou Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Distribution Scheme, Key tree, Group member subtree, root ID algorithm, Chinese Remainder Theorem
36Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad hoc network, network security, key management, certificateless public key cryptography
36Jintai Ding, Jason E. Gower Inoculating Multivariate Schemes Against Differential Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, plus, cryptography, public key, perturbation, differential, multivariate
36Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih Fast Multi-computations with Integer Similarity Strategy. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications
36Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption
36Sattam S. Al-Riyami, Kenneth G. Paterson CBE from CL-PKE: A Generic Construction and Efficient Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings
36Christian Tobias Security Analysis of the MOR Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem
36Helena Handschuh, Yiannis Tsiounis, Moti Yung Decision Oracles are Equivalent to Matching Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems
36Satoshi Hada, Kouichi Sakurai A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Eike Kiltz Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval The Twist-AUgmented Technique for Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Jean-Sébastien Coron Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Emmanuel Bresson, Dario Catalano Constant Round Authenticated Group Key Agreement via Distributed Computation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Emmanuel Bresson, Olivier Chevassut, David Pointcheval New Security Results on Encrypted Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Simon Blake-Wilson, Alfred Menezes Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Masahiro Mambo, Hiroki Shizuya A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Shoichi Hirose, Susumu Yoshida An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Akihiro Yamamura Public-Key Cryptosystems Using the Modular Group. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
35Donggang Liu, Peng Ning, Rongfang Li Establishing pairwise keys in distributed sensor networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Sensor networks, key management, key predistribution, pairwise key
35Youngsook Lee, Junghyun Nam, Dongho Won An Inter-domain Key Agreement Protocol Using Weak Passwords. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, password, Key exchange, public key
35Fengguang An, Xiuzhen Cheng 0001, Jose Manny Rivera, Jiang Li 0009, Z. Cheng PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Sensor networks, key management, key distribution
35Sahar Mohamed Ghanem, Hussein M. Abdel-Wahab A Simple XOR-Based Technique for Distributing Group Key in Secure Multicasting. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Logical Hierarchical Key Tree, Key Distribution Center, Secure Multicasting
35Quazi Ehsanul Kabir Mamun, Sita Ramakrishnan SecCOSEn - A Key Management Scheme for Securing Chain Oriented Sensor Networks. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF partial key, WSN, Key management, key pre-distribution, symmetric cryptography
35Chi-Sung Laih, Lein Harn, Jau-Yien Lee On the Design of a Single-Key-Lock Mechanism Based on Newton's Interpolating Polynomial. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF recursive generation, single-key-lock mechanism, access matrix, computer protection system, key selection, lock values, Newton interpolating polynomial, user/file, key positions, user-hierarchy structure, interpolation, polynomials, security of data, information resources, computational load
35Akitoshi Izumi, Yoshifumi Ueshige A proposal of efficient scheme of key management using ID-based encryption and Biometrics. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 61608 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license