Results
Found 99 publication records. Showing 99 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
90 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
42 | Robert Law |
Using student blogs for documentation in software development projects. |
ITiCSE |
2011 |
DBLP DOI BibTeX RDF |
|
42 | Patrick Bas, François Cayre |
Achieving subspace or key security for WOA using natural or circular watermarking. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
WOA, circular watermarking, key-security, natural watermarking, subspace-security, watermarking |
28 | Xinghua Li 0001, Jianfeng Ma 0001, Sang-Jae Moon |
On the Security of the Canetti-Krawczyk Model. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | François Cayre, Patrick Bas |
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jin Wang, Xi Bai 0002, Jia Yu 0005, Daxing Li |
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. |
TAMC |
2007 |
DBLP DOI BibTeX RDF |
key-insulated cryptosystem, bilinear pairings, Identity-based cryptography, key escrow, key exposure |
21 | Hongji Wang, Gang Yao, Qingshan Jiang |
An Identity-Based Group Key Agreement Protocol from Pairing. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
18 | John A. Trono |
Comments on "Tagged Semaphores". |
ACM SIGOPS Oper. Syst. Rev. |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Fan Zhang, Jianfeng Ma 0001, Sang-Jae Moon |
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Michael Backes 0001, Markus Dürmuth, Dominique Unruh |
OAEP Is Secure under Key-Dependent Messages. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Key-dependent message security, RSA-OAEP, chosen ciphertext attacks |
16 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Inter/Intra Core Network Security with PKI for 3G-and-Beyond Systems. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
Network Domain Security, Mobile Networks, UMTS, PKI, IPsec, SSL/TLS |
15 | Win Aye, Mohammad Umar Siddiqi |
ESKD: An Efficient and Scalable Key Distribution Scheme for Secure Group Communication. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Seungjun Baek 0002, Giyoon Kim, Yongjin Jeon, Jongsung Kim |
Enhancing the Related-Key Security of PIPO Through New Key Schedules. |
ICISC (1) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen |
Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
15 | Baodong Qin, Shengli Liu 0001, Tsz Hon Yuen, Robert H. Deng, Kefei Chen |
Continuous Non-malleable Key Derivation and Its Application to Related-Key Security. |
Public Key Cryptography |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Susan Thomson 0001 |
Public-key cryptography with joint and related-key security. |
|
2014 |
RDF |
|
15 | Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
The Long-Short-Key Primitive and Its Applications to Key Security. |
IWSEC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Eun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo |
An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Hualiang Hu, Deren Chen, Changqin Huang |
Securing role-based distributed collaboration system. |
SMC (6) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Lakshmi Sujatha Grandhi, Srimannarayana Grandhi, Santoso Wibowo |
A Security-UTAUT Framework for Evaluating Key Security Determinants in Smart City Adoption by the Australian City Councils. |
SNPD Winter |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Vanesa Daza, Javier Herranz, Germán Sáez |
On the Computational Security of a Distributed Key Distribution Scheme. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Keith Harrison, Shouhuai Xu |
Protecting Cryptographic Keys from Memory Disclosure Attacks. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
cryptographic key security, memory disclosure |
12 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
On Session Key Construction in Provably-Secure Key Establishment Protocols. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Hung-Min Sun, Bin-Tsan Hsieh, Shin-Mu Tseng |
Cryptanalysis of Aydos et al.'s ECC-Based Wireless Authentication Protocol. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
|
11 | Samuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor |
Managing Risk of IT Security Outsourcing in the Decision-Making Stage. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
11 | Ingrid Verbauwhede, Frank Hoornaert, Joos Vandewalle, Hugo De Man |
Security Considerations in the Design and Implementation of a new DES chip. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
11 | Dannan Lin, Charles A. Shoniregun, Galyna A. Akmayeva |
The softphone security. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Alessandro Cilardo, Luigi Coppolino, Antonino Mazzeo, Luigi Romano |
Combining Programmable Hardware and Web Services Technologies for Delivering High-Performance and Interoperable Security. |
PDP |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Viktor Yakovlev, Valery I. Korzhik, Guillermo Morales-Luna |
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Douglas Wikström |
Designated Confirmer Signatures Revisited. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jie Huang, Jiangyi Yi |
The key security management scheme of cloud storage based on blockchain and digital twins. |
J. Cloud Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
9 | Mina Soltani Siapoush, Jim Alves-Foss |
Is Formal Verification of seL4 Adequate to Address the Key Security Challenges of Kernel Design? |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Song Deng, Qicong Hu, Di Wu 0056, Yi He 0007 |
BCTC-KSM: A blockchain-assisted threshold cryptography for key security management in power IoT data sharing. |
Comput. Electr. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
9 | Jörg Schwenk, Douglas Stebila |
A reduction-based proof for authentication and session key security in three-party Kerberos. |
Int. J. Appl. Cryptogr. |
2022 |
DBLP DOI BibTeX RDF |
|
9 | RunQi Li |
Research on Key Security Detection Method of Cross Domain Information Sharing Based on PKG Trust Gateway. |
J. Interconnect. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
9 | Tsz Hon Yuen, Cong Zhang 0001, Sherman S. M. Chow |
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. |
ACNS |
2022 |
DBLP DOI BibTeX RDF |
|
9 | |
To improve user key security and cloud user region-based resource scheduler using rail fence region-based load balancing algorithm. |
J. Ambient Intell. Humaniz. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
9 | Feja Lesniewska, Uchenna Daniel Ani, Jeremy M. Watson, Madeline Carr |
The Internet of Things in Ports: Six Key Security and Governance Challenges for the UK (Policy Brief). |
CoRR |
2021 |
DBLP BibTeX RDF |
|
9 | Guma Ali, Mussa Ally Dida, Anael Elikana Sam |
Evaluation of Key Security Issues Associated with Mobile Money Systems in Uganda. |
Inf. |
2020 |
DBLP DOI BibTeX RDF |
|
9 | Weilong Wang, Xiangdong Meng, Yangyang Fei, Zhi Ma |
Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator. |
Quantum Inf. Process. |
2020 |
DBLP DOI BibTeX RDF |
|
9 | Wenqi Yu, Yuqing Zhao, Chun Guo 0002 |
Provable Related-Key Security of Contracting Feistel Networks. |
Inscrypt |
2020 |
DBLP DOI BibTeX RDF |
|
9 | Chun Guo 0002 |
Understanding the Related-Key Security of Feistel Ciphers From a Provable Perspective. |
IEEE Trans. Inf. Theory |
2019 |
DBLP DOI BibTeX RDF |
|
9 | Jörg Schwenk, Douglas Stebila |
A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
9 | Da-Zhi Sun, Li Sun |
On Secure Simple Pairing in Bluetooth Standard v5.0-Part I: Authenticated Link Key Security and Its Home Automation and Entertainment Applications. |
Sensors |
2019 |
DBLP DOI BibTeX RDF |
|
9 | Srimannarayana Grandhi, Santoso Wibowo, Prasanna Balasooriya |
Sec-HOTE-Fit Framework for Assessing Key Security Determinants in Cloud Computing Adoption. |
PACIS |
2019 |
DBLP BibTeX RDF |
|
9 | Richard M. Marzan, Ariel M. Sison |
An Enhanced Key Security of Playfair Cipher Algorithm. |
ICSCA |
2019 |
DBLP DOI BibTeX RDF |
|
9 | Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson |
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. |
J. Cryptol. |
2018 |
DBLP DOI BibTeX RDF |
|
9 | Chun Guo 0002 |
Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
9 | Pratik Soni, Stefano Tessaro |
Naor-Reingold Goes Public: The Complexity of Known-key Security. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
9 | Ashwin Jha, Mridul Nandi |
Applications of H-Technique: Revisiting Symmetric Key Security Analysis. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
9 | Pratik Soni, Stefano Tessaro |
Naor-Reingold Goes Public: The Complexity of Known-Key Security. |
EUROCRYPT (3) |
2018 |
DBLP DOI BibTeX RDF |
|
9 | Atul Luykx, Bart Mennink, Kenneth G. Paterson |
Analyzing Multi-Key Security Degradation. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
9 | Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim |
Human-readable Proof of the Related-Key Security of AES-128. |
IACR Trans. Symmetric Cryptol. |
2017 |
DBLP DOI BibTeX RDF |
|
9 | Atul Luykx, Bart Mennink, Kenneth G. Paterson |
Analyzing Multi-key Security Degradation. |
ASIACRYPT (2) |
2017 |
DBLP DOI BibTeX RDF |
|
9 | Anass Misbah, Ahmed Ettalbi |
Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure. |
IBICA |
2017 |
DBLP DOI BibTeX RDF |
|
9 | Stephen Rodriguez, Paolina Centonze |
Dynamic Encryption Key Security Scheme (DEKSS) for Mobile and Cloud Systems. |
MOBILESoft@ICSE |
2017 |
DBLP DOI BibTeX RDF |
|
9 | Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani |
Enhanced Public Key Security for the McEliece Cryptosystem. |
J. Cryptol. |
2016 |
DBLP DOI BibTeX RDF |
|
9 | Jianwei Liu 0001, Weiran Liu, Qianhong Wu, Dawei Li, Shigang Chen |
Survey on key security technologies for space information networks. |
J. Commun. Inf. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
9 | Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim |
Human-readable Proof of the Related-Key Security of AES-128. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
9 | Benoît Cogliati, Yannick Seurin |
Strengthening the Known-Key Security Notion for Block Ciphers. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
9 | Benoît Cogliati, Yannick Seurin |
Strengthening the Known-Key Security Notion for Block Ciphers. |
FSE |
2016 |
DBLP DOI BibTeX RDF |
|
9 | Elena Andreeva 0001, Andrey Bogdanov, Bart Mennink |
Towards Understanding the Known-Key Security of Block Ciphers. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
9 | Michel Abdalla, Fabrice Benhamouda, Alain Passelègue |
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
9 | Nicky Mouha, Atul Luykx |
Multi-Key Security: The Even-Mansour Construction Revisited. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
9 | Pooya Farshim, Gordon Procter |
The Related-Key Security of Iterated Even-Mansour Ciphers. |
FSE |
2015 |
DBLP DOI BibTeX RDF |
|
9 | Michel Abdalla, Fabrice Benhamouda, Alain Passelègue |
An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. |
CRYPTO (1) |
2015 |
DBLP DOI BibTeX RDF |
|
9 | Nicky Mouha, Atul Luykx |
Multi-key Security: The Even-Mansour Construction Revisited. |
CRYPTO (1) |
2015 |
DBLP DOI BibTeX RDF |
|
9 | Pooya Farshim, Gordon Procter |
The Related-Key Security of Iterated Even-Mansour Ciphers. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
9 | Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson |
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
9 | Xianhui Lu, Bao Li 0001, Dingding Jia |
Related-Key Security for Hybrid Encryption. |
ISC |
2014 |
DBLP DOI BibTeX RDF |
|
9 | Michel Abdalla, Fabrice Benhamouda, Alain Passelègue, Kenneth G. Paterson |
Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier. |
CRYPTO (1) |
2014 |
DBLP DOI BibTeX RDF |
|
9 | Elena Andreeva 0001, Andrey Bogdanov, Bart Mennink |
Towards Understanding the Known-Key Security of Block Ciphers. |
FSE |
2013 |
DBLP DOI BibTeX RDF |
|
9 | Wenxue Tan, Jinju Xi, Xiping Wang |
A RSA Key Security Gradating Algorithm Based on Threshold Attack Time. |
J. Softw. |
2011 |
DBLP DOI BibTeX RDF |
|
9 | Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani |
Enhanced public key security for the McEliece cryptosystem |
CoRR |
2011 |
DBLP BibTeX RDF |
|
9 | Sandeep Chowdary Kolli, Maciej J. Zawodniok |
Energy-efficient multi-key security scheme for wireless sensor network. |
LCN |
2009 |
DBLP DOI BibTeX RDF |
|
9 | John F. Buford, Rakesh Kumar |
Analysis of using java card for DRM master key security. |
CCNC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Yasir Ali, Sean W. Smith |
Flexible and Scalable Public Key Security for SSH. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Mahdi Abdelguerfi, Burton S. Kaliski Jr., Wayne Patterson |
Guest Editors' Introduction: Public-Key Security Systems. |
IEEE Micro |
1996 |
DBLP DOI BibTeX RDF |
|
7 | Kaigui Bian, Jung-Min Park 0001 |
Security vulnerabilities in IEEE 802.22. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
IEEE 802.22, cognitive MAC, incumbent coexistence, self-coexistence, security |
7 | Kjell Jørgen Hole, Vebjørn Moen, Thomas Tjøstheim |
Case Study: Online Banking Security. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
Internet attacks, authentication, case study, phishing, online banking |
7 | Hong Yan 0002, Hui Zhang 0001, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha |
Information leak vulnerabilities in SIP implementations. |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
7 | Sandeep S. Kumar, Christof Paar |
Reconfigurable Instruction Set Extension for Enabling ECC on an 8-Bit Processor. |
FPL |
2004 |
DBLP DOI BibTeX RDF |
|
7 | Willi Geiselmann, Rainer Steinwandt |
Special-Purpose Hardware in Cryptanalysis: The Case of 1, 024-Bit RSA. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
5 | Eleni Kosta, Martin Meints, Marit Hansen, Mark Gasson |
An analysis of security and privacy issues relating to RFID enabled ePassports. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
5 | Hafizur Rahaman 0001, Jimson Mathew, Biplab K. Sikdar, Dhiraj K. Pradhan |
Transition Fault Testability in Bit Parallel Multipliers over GF(2^{m}). |
VTS |
2007 |
DBLP DOI BibTeX RDF |
cryptography, polynomials, Multipliers, Galois field, error control code, Transition fault, C-testable |
5 | Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas |
A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks. |
QSHINE |
2005 |
DBLP DOI BibTeX RDF |
|
4 | Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar |
IPv6 Security Challenges. |
Computer |
2009 |
DBLP DOI BibTeX RDF |
|
4 | Edoardo Biagioni, Yingfei Dong, Wesley Peterson, Kazuo Sugihara |
Practical distributed voter-verifiable secret ballot system. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
secret ballot, voter verifiable, end-to-end, voting systems |
4 | Ravi Chugh, Jeffrey A. Meister, Ranjit Jhala, Sorin Lerner |
Staged information flow for javascript. |
PLDI |
2009 |
DBLP DOI BibTeX RDF |
integrity, web applications, confidentiality, flow analysis, set constraints |
4 | Terri Oda, Glenn Wurster, Paul C. van Oorschot, Anil Somayaji |
SOMA: mutual approval for included content in web pages. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
cross-site request forgery (XSRF), javascript, web security, cross-site scripting (XSS), same origin policy |
4 | David W. Chadwick, Wensheng Xu, Sassa Otenko, Romain Laborde, Bassem Nasser |
Multi-session Separation of Duties (MSoD) for RBAC. |
ICDE Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
4 | Anindya Banerjee 0001, David A. Naumann, Stan Rosenberg |
Towards a logical account of declassification. |
PLAS |
2007 |
DBLP DOI BibTeX RDF |
information flow, confidentiality, aliasing |
4 | Gilles Barthe, Pierre Courtieu, Guillaume Dufay, Simão Melo de Sousa |
Tool-Assisted Specification and Verification of Typed Low-Level Languages. |
J. Autom. Reason. |
2005 |
DBLP DOI BibTeX RDF |
virtual machine, theorem proving, Java Card, bytecode verification |
4 | Douglas Thain |
Identity Boxing: A New Technique for Consistent Global Identity. |
SC |
2005 |
DBLP DOI BibTeX RDF |
|
4 | Gilles Barthe, Guillaume Dufay |
A Tool-Assisted Framework for Certified Bytecode Verification. |
FASE |
2004 |
DBLP DOI BibTeX RDF |
|
4 | Martín Abadi, Bruno Blanchet |
Computer-Assisted Verification of a Protocol for Certified Email. |
SAS |
2003 |
DBLP DOI BibTeX RDF |
|
4 | Gilles Barthe, Sorin Stratulat |
Validation of the JavaCard Platform with Implicit Induction Techniques. |
RTA |
2003 |
DBLP DOI BibTeX RDF |
|
4 | Gilles Barthe, Pierre Courtieu, Guillaume Dufay, Simão Melo de Sousa |
Tool-Assisted Specification and Verification of the JavaCard Platform. |
AMAST |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #99 of 99 (100 per page; Change: )
|