|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2327 occurrences of 1561 keywords
|
|
|
Results
Found 3459 publication records. Showing 3459 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
66 | Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
How to Construct Universal One-Way Hash Functions of Order r. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 63-76, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function |
66 | Deukjo Hong, Bart Preneel, Sangjin Lee 0002 |
Higher Order Universal One-Way Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 201-213, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Collision Resistant Hash Function (CRHF), Universal One-Way Hash Function (UOWHF), Higher Order Universal One-Way Hash Function, Hash Function |
62 | Alan T. Sherman, David A. McGrew |
Key Establishment in Large Dynamic Groups Using One-Way Function Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 29(5), pp. 444-458, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Dynamic Cryptographic Context Management (DCCM) Project, logical key hierarchy (LKH), one-functions, one-way function chain (OFC), one-way function tree (OFT), secure conferences, secure group applications, cryptography, key management, cryptographic protocols, key agreement, Broadcast encryption, key establishment, group keying, conference keying |
49 | Farzaneh Fatemipour, Mohammad Hossien Yaghmaee |
Design and Implementation of a Monitoring System Based on IPFIX Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT ![In: Third Advanced International Conference on Telecommunications (AICT 2007), May 13-19, 2007, Mauritius, pp. 22, 2007, IEEE Computer Society, 0-7695-2843-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IPFIX Protocol, One-Way Packet Loss, Measurement, Monitoring, Jitter, Traffic Flows, One-Way Delay |
49 | Joe Kilian, Erez Petrank |
An Efficient Noninteractive Zero-Knowledge Proof System for NP with General Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(1), pp. 1-27, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Efficient proofs, Noninteractive zero knowledge, Efficient proofs, Noninteractive zero knowledge, Zero knowledge, Zero knowledge, Key words, One-way permutations, One-way permutations, Circuit satisfiability, Circuit satisfiability |
49 | Yan-Cheng Chang, Chun-Yuan Hsiao, Chi-Jen Lu |
The Impossibility of Basing One-Way Permutations on Central Cryptographic Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(1), pp. 97-114, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Private information retrieval, Cryptographic primitives, Black-box reductions, Trapdoor functions, One-way permutations |
47 | Rosario Gennaro, Luca Trevisan |
Lower Bounds on the Efficiency of Generic Cryptographic Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 41st Annual Symposium on Foundations of Computer Science, FOCS 2000, 12-14 November 2000, Redondo Beach, California, USA, pp. 305-313, 2000, IEEE Computer Society, 0-7695-0850-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
generic cryptographic constructions, universal one-way hash functions, black-box access, Impagliazzo-Rudich model, cryptography, lower bounds, random number generation, file organisation, pseudo-random generators, one-way permutations |
47 | Cynthia Dwork, Moni Naor |
An Efficient Existentially Unforgeable Signature Scheme and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(3), pp. 187-208, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
One-way hash mbox{functions}, One-way hash mbox{functions}, Authentication, Authentication, Cryptography, Cryptography, Digital signatures, Digital signatures, Key words, Unforgeability, Unforgeability |
47 | Oded Goldreich 0001, Russell Impagliazzo, Leonid A. Levin, Ramarathnam Venkatesan, David Zuckerman |
Security Preserving Amplification of Hardness ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 31st Annual Symposium on Foundations of Computer Science, St. Louis, Missouri, USA, October 22-24, 1990, Volume I, pp. 318-326, 1990, IEEE Computer Society, 0-8186-2082-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
regular one-way function, security preserving amplification, weak one-way function, polynomial fraction, inverting algorithm, signatures, pseudorandom generators, hardness |
47 | Katsuhiko Nakamura |
Real-Time Language Recognition by One-Way and Two-Way Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 1999, 24th International Symposium, MFCS'99, Szklarska Poreba, Poland, September 6-10, 1999, Proceedings, pp. 220-230, 1999, Springer, 3-540-66408-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
one-way cellular automata, parallel language recognition, closure under reversal, Cellular automata |
46 | Huafei Zhu, Feng Bao 0001, Robert H. Deng |
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 207-219, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Homomorphic trapdoor one-way permutation, sequential aggregate signature, signature scheme |
45 | Emanuele Viola |
On Constructing Parallel Pseudorandom Generators from One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 11-15 June 2005, San Jose, CA, USA, pp. 183-197, 2005, IEEE Computer Society, 0-7695-2364-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Pseudorandom generator construction, one-way function, black-box, restriction, constant-depth circuit, noise sensitivity, hardness amplification |
45 | Sung-Ming Yen, Yuliang Zheng 0001 |
Weighted One-Way Hash Chain and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 135-148, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
One-way hash chain, Portable computing device, Cryptography, Electronic commerce, Micropayment |
44 | Dimitris A. Karras, Vasilios Zorkadis |
A Novel Suite of Tests for Evaluating One-Way Hash Functions for Electronic Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 26th EUROMICRO 2000 Conference, Informatics: Inventing the Future, 5-7 September 2000, Maastricht, The Netherlands, pp. 2464-2468, 2000, IEEE Computer Society, 0-7695-0780-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Cryptographic Mechanisms, One-way Hash Function Quality, Neural Networks, Authentication, Data Integrity, Electronic Commerce, Digital Signature, Security Protocols, Multilayer Perceptrons |
43 | Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil |
Addressing the shortcomings of one-way chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 289-296, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
one-way chain, secure group management for multicast, chameleon hash |
42 | Iftach Haitner, Omer Reingold, Salil P. Vadhan |
Efficiency improvements in constructing pseudorandom generators from one-way functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 42nd ACM Symposium on Theory of Computing, STOC 2010, Cambridge, Massachusetts, USA, 5-8 June 2010, pp. 437-446, 2010, ACM, 978-1-4503-0050-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security preserving, one-way function, pseudorandom generator |
42 | Chunming Tang 0003, Dingyi Pei, Zheng-an Yao |
5-Round Computational Zero-Knowledge Proof with Negligible Error Probability for Any NP from Any One-Way Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 407-411, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
computational zero-knowledge proof, perfectly hiding commitment, one-way permutation |
42 | Omer Gurewitz, Israel Cidon, Moshe Sidi |
One-way delay estimation using network-wide measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 52(6), pp. 2710-2724, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network measurements, maximum entropy, delay estimation, mathematical optimization, one-way delay |
42 | Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang 0001 |
The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 36(1), pp. 53-67, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
one-way hash function, micro-payment |
42 | Eli Biham, Yaron J. Goren, Yuval Ishai |
Basing Weak Public-Key Cryptography on Strong One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 55-72, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Merkle’s puzzles, quantum computing, Public-key cryptography, one-way functions, bounded storage model |
41 | Adi Akavia, Oded Goldreich 0001, Shafi Goldwasser, Dana Moshkovitz |
On basing one-way functions on NP-hardness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 38th Annual ACM Symposium on Theory of Computing, Seattle, WA, USA, May 21-23, 2006, pp. 701-710, 2006, ACM, 1-59593-134-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
adaptive versus non-adaptive machines, reductions, one-way functions, interactive proof systems, average-case complexity |
40 | Edmar Mota-Garcia, Rogelio Hasimoto-Beltrán |
Clock offset estimation using collaborative one-way transit time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2008, Annapolis, MD, USA, June 2-6, 2008, pp. 455-456, 2008, ACM, 978-1-60558-005-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
clock offset estimation, one-way transit time |
40 | Antônio Augusto de Aragão Rocha, Rosa Maria Meri Leão, Edmundo de Souza e Silva |
A Non-cooperative Active Measurement Technique for Estimating the Average and Variance of the One-Way Delay. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings, pp. 1084-1095, 2007, Springer, 978-3-540-72605-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Active network measurement, IPID field, One-way delay |
40 | Yu Gu 0004, Lee Breslau, Nick G. Duffield, Subhabrata Sen |
GRE encapsulated multicast probing: a scalable technique for measuring one-way loss. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2007, San Diego, California, USA, June 12-16, 2007, pp. 355-356, 2007, ACM, 978-1-59593-639-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
one-way loss, performance, multicast, measurement, monitoring |
40 | Iftach Haitner, Omer Reingold |
Statistically-hiding commitment from any one-way function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 1-10, 2007, ACM, 978-1-59593-631-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
statistically hiding and computationally binding commitment, cryptography, one-way functions |
40 | Bartosz Zoltak |
VMPC One-Way Function and Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 210-225, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
lower bound, cryptanalysis, stream cipher, one-way function, RC4 |
40 | Bradley T. Vander Zanden, Richard L. Halterman, Brad A. Myers, Richard G. McDaniel, Robert C. Miller, Pedro A. Szekely, Dario A. Giuse, David S. Kosbie |
Lessons learned about one-way, dataflow constraints in the Garnet and Amulet graphical toolkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 23(6), pp. 776-796, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Constraint experience, constraint usage, eager evaluation, one-way dataflow constraints, constraint satisfaction, lazy evaluation |
40 | Mahmut T. Kandemir, Alok N. Choudhary, Prithviraj Banerjee, J. Ramanujam, U. Nagaraj Shenoy |
Minimizing Data and Synchronization Costs in One-Way Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 11(12), pp. 1232-1251, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
One-way communication, redundant synchronization, linear algebra techniques, message-passing, compiler optimizations, data-flow analysis, data-parallel languages |
40 | Johannes Buchmann 0001, Sachar Paulus |
A One Way Function Based on Ideal Arithmetic in Number Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 385-394, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
number fields, shortest vectors in lattices, One way function |
40 | Bin Lin 0009, Jianwen Su |
One Way Distance: For Shape Based Similarity Search of Moving Object Trajectories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GeoInformatica ![In: GeoInformatica 12(2), pp. 117-142, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
one way distance, similarity search, moving objects, trajectory, index |
39 | Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang |
A new multi-stage secret sharing scheme using one-way function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(1), pp. 48-55, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multi-stage, cryptography, secret sharing, one-way function, threshold scheme |
39 | Gaëtan Leurent |
MD4 is Not One-Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 412-428, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
39 | Marek Sawerwain |
Parallel Algorithm for Simulation of Circuit and One-Way Quantum Computation Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 7th International Conference, PPAM 2007, Gdansk, Poland, September 9-12, 2007, Revised Selected Papers, pp. 530-539, 2007, Springer, 978-3-540-68105-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
one-way quantum computation simulation, parallel vector state transformation, quantum computation, circuit simulation |
38 | Ueli M. Maurer, Dominik Raub |
Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 427-443, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations |
38 | Bradley T. Vander Zanden, David K. Baker, Jing Jin |
An explanation-based, visual debugger for one-way constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIST ![In: Proceedings of the 17th Annual ACM Symposium on User Interface Software and Technology, Santa Fe, NM, USA, October 24-27, 2004, pp. 207-216, 2004, ACM, 1-58113-957-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
one-way constraints, data structures, constraint satisfaction, software visualization, visual debugging |
37 | Yih-Chun Hu, Markus Jakobsson, Adrian Perrig |
Efficient Constructions for One-Way Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 423-441, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Christopher Marberry, Philip Craiger |
Factors Affecting One-Way Hashing of CD-R Media. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics III - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 28-31, 2007, pp. 149-161, 2007, Springer, 978-0-387-73741-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
one-way hashing, CD-R media, Cryptographic hash functions |
36 | Daniele Micciancio |
Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way Functions from Worst-Case Complexity Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 43rd Symposium on Foundations of Computer Science (FOCS 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings, pp. 356-365, 2002, IEEE Computer Society, 0-7695-1822-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
cyclic lattices, worst-case average-case connection, Knapsack problem, one-way functions |
36 | Russell Impagliazzo, Michael Luby |
One-way Functions are Essential for Complexity Based Cryptography (Extended Abstract) ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989, pp. 230-235, 1989, IEEE Computer Society, 0-8186-1982-1. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
complexity based cryptography, authentication, protocol, identification, one-way functions, bit commitment, coin flipping |
33 | Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury |
Generation of Expander Graphs Using Cellular Automata and Its Applications to Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACRI ![In: Cellular Automata, 7th International Conference on Cellular Automata, for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings, pp. 636-645, 2006, Springer, 3-540-40929-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Efficiency, Cellular Automata, Expander Graphs, One-way functions |
32 | Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel |
Reducing Complexity Assumptions for Statistically-Hiding Commitment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(3), pp. 283-310, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Statistical hiding, Regular one way functions, Bit commitment |
32 | Michel Abdalla, Bogdan Warinschi |
On the Minimal Assumptions of Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 1-13, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
minimal assumptions, Group signatures, one-way functions, trapdoor permutations |
31 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 113-127, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
30 | Adrian Perrig |
The BiBa one-time signature and broadcast authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 28-37, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
signature based on a one-way function without trapdoor, source authentication for multicast, broadcast authentication, one-time signature |
30 | Jeong Han Kim, Daniel R. Simon, Prasad Tetali |
Limits on the Efficiency of One-Way Permutation-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 40th Annual Symposium on Foundations of Computer Science, FOCS '99, 17-18 October, 1999, New York, NY, USA, pp. 535-542, 1999, IEEE Computer Society, 0-7695-0409-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
cryptography, Oracle, complexity theory, relativization |
30 | Jörg Rothe |
Some facets of complexity theory and cryptography: A five-lecture tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 34(4), pp. 504-549, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
public-key cryptography, Complexity theory, one-way functions, interactive proof systems, zero-knowledge protocols |
30 | K. C. Reddy, Divya Nalla |
Identity Based Authenticated Group Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 215-233, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
key trees, one-way function trees, cryptography, elliptic curves, Key Agreement, group Key Agreement, Diffie-Hellman, Key Agreement Protocols, ID-based, Identity based, Weil pairing |
29 | Eerika Savia, Kai Puolamäki, Samuel Kaski |
Two-Way Grouping by One-Way Topic Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDA ![In: Advances in Intelligent Data Analysis VIII, 8th International Symposium on Intelligent Data Analysis, IDA 2009, Lyon, France, August 31 - September 2, 2009. Proceedings, pp. 178-189, 2009, Springer, 978-3-642-03914-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Michael Wybrow, Kim Marriott, Linda McIver, Peter J. Stuckey |
Comparing usability of one-way and multi-way constraints for diagram editing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Hum. Interact. ![In: ACM Trans. Comput. Hum. Interact. 14(4), pp. 19:1-19:38, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
diagram manipulation, layout tools, Constraints |
29 | Chunguang Ma, Peng Wu, Lingling Wang, Guoyin Zhang |
A Novel Method to Authenticate Transitively Closed Undirected Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 537-542, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
transitively closed graph, one-way accumulators, authentication, signatures |
29 | Satoshi Hada, Toshiaki Tanaka |
A Relationship between One-Wayness and Correlation Intractability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 82-96, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
correlation intractability, zero-knowledge, One-way functions, random oracle, interactive proofs, round complexity |
29 | Mikael Goldmann, Mats Näslund |
The Complexity of Computing Hard Core Predicates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 1-15, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
small-depth circuit, one-way function, Pseudo-randomness |
29 | Daniel Bleichenbacher, Ueli M. Maurer |
On the Efficiency of One-Time Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, pp. 145-158, 1996, Springer, 3-540-61872-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Cryptography, Digital signature, Directed acyclic graph, One-way function, Partially ordered set |
28 | Ying Liu, Jingbo Xia, Jing Dai |
A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2007, Dalian, China, September 18-21, 2007, Proceedings, pp. 23-30, 2007, Springer, 978-3-540-74783-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Military Grid, hierarchical one-way chains, proxy certificate, GSI, hash value |
28 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 375-387, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
system overheads trade-off, one-way mapping, key management, broadcast encryption, pseudorandom number generators, erasure channels |
27 | Zhenkai Liang, Weiqing Sun, V. N. Venkatakrishnan, R. Sekar 0001 |
Alcatraz: An Isolated Environment for Experimenting with Untrusted Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(3), pp. 14:1-14:37, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
one-way isolation, Isolation |
27 | Iftach Haitner, Omer Reingold, Salil P. Vadhan, Hoeteck Wee |
Inaccessible entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31 - June 2, 2009, pp. 611-620, 2009, ACM, 978-1-60558-506-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
interactive hashing, computational complexity, cryptography, zero knowledge, one-way functions, commitment schemes |
27 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 7(4-5), pp. 371-389, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
27 | Edith Elkind, Helger Lipmaa |
Small Coalitions Cannot Manipulate Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 285-297, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
vote manipulation, Electronic voting, one-way functions |
27 | Weifeng Chen 0001, Yong Huang, Bruno F. Ribeiro, Kyoungwon Suh, Honggang Zhang 0003, Edmundo de Souza e Silva, James F. Kurose, Donald F. Towsley |
Exploiting the IPID Field to Infer Network Path and End-System Characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAM ![In: Passive and Active Network Measurement, 6th International Workshop, PAM 2005, Boston, MA, USA, March 31 - April 1, 2005, Proceedings, pp. 108-120, 2005, Springer, 3-540-25520-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IPID field, one-way delay difference, traffic activity, load-balanced server counting, estimation |
27 | Wen-Shenq Juang |
A Simple and Efficient Conference Scheme for Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 81-95, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys |
27 | Nikolay P. Varnovsky, Vladimir A. Zakharov |
On the Possibility of Provably Secure Obfuscating Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ershov Memorial Conference ![In: Perspectives of Systems Informatics, 5th International Andrei Ershov Memorial Conference, PSI 2003, Akademgorodok, Novosibirsk, Russia, July 9-12, 2003, Revised Papers, pp. 91-102, 2003, Springer, 3-540-20813-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hard-core predicate, security, program transformation, mutual information, obfuscation, one-way function |
27 | Iftach Haitner, Danny Harnik, Omer Reingold |
Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 228-239, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Min Liu, Lue Chen, Nianchuan Jian, Peng Guo, Jing Kong, Mei Wang, Qianqian Han, Jinsong Ping, Mengjie Wu |
Preliminary Estimations of Mars Atmospheric and Ionospheric Profiles from Tianwen-1 Radio Occultation One-Way, Two-Way, and Three-Way Observations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Remote. Sens. ![In: Remote. Sens. 15(23), pp. 5506, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Johan Håstad, Mats Näslund |
Practical Construction and Analysis of Pseudo-Randomness Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(1), pp. 1-26, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hard core function, One-way function, Pseudo random generator, Exact security |
27 | Al-Sakib Khan Pathan, Choong Seon Hong |
SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 63(9-10), pp. 529-541, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
One-way hash chain, Shared secret key, Energy, Distance |
27 | Taketsugu Yao, Shigeru Fukunaga, Toshihisa Nakai |
Reliable Broadcast Message Authentication in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 271-280, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
One-way Key Chain, Secure Acknowledgment, Sensor Networks, Message Authentication, Software Update, Symmetric-key |
27 | Bin Lin 0009, Jianwen Su |
Shapes based trajectory queries for moving objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 13th ACM International Workshop on Geographic Information Systems, ACM-GIS 2005, November 4-5, 2005, Bremen, Germany, Proceedings, pp. 21-30, 2005, ACM, 1-59593-146-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
one way distance, spatial shape, similarity search, moving object trajectories |
27 | Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian |
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings, pp. 396-397, 2004, IEEE Computer Society, 0-7695-2209-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Cryptographic Key Assignment and User Hierarchy, Access Control, One-Way Hash Function |
27 | Brad T. Vander Zanden, Richard L. Halterman |
Reducing the Storage Requirements of Constraint Dataflow Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Symposium on User Interface Software and Technology ![In: Proceedings of the 12th Annual ACM Symposium on User Interface Software and Technology, UIST 1999, Asheville, North Carolina, USA, November 7-10, 1999, pp. 83-92, 1999, ACM, 1-58113-075-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
dataflow constraints, user interface toolkits, space optimization, one-way |
26 | Joachim Fabini, Wolfgang Karner, Lukas Wallentin, Thomas Baumgartner |
The Illusion of Being Deterministic - Application-Level Considerations on Delay in 3G HSPA Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2009, 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings, pp. 301-312, 2009, Springer, 978-3-642-01398-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
HSPA, Measurements, User Experience, 3G, One-way Delay |
26 | Kazuo Ohzeki, Yuki Seo, Engyoku Gi |
Discontinuity of SVD Embedding Mapping Used for Watermarks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2009 Workshops, Confederated International Workshops and Posters, ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009, Vilamoura, Portugal, November 1-6, 2009. Proceedings, pp. 4-5, 2009, Springer, 978-3-642-05289-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mapping, SVD, norm, one-way function, eigen-value |
26 | Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang |
A user authentication system using back-propagation network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 14(3), pp. 243-249, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Neural network, Information security, User authentication, One-way hash function, Back-propagation network |
26 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 258-276, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators |
26 | Ivan Damgård, Jens Groth |
Non-interactive and reusable non-malleable commitment schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing, June 9-11, 2003, San Diego, CA, USA, pp. 426-437, 2003, ACM, 1-58113-674-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
signature, commitment, one-way function, universal composability, non-malleability |
26 | Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park |
New Public-Key Cryptosystem Using Braid Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 166-183, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
hard problem, non-commutative group, public key cryptosystem, public key infrastructure, key exchange, one-way function, braid group, conjugacy problem |
26 | Oscar H. Ibarra, Stephen M. Sohn |
On Mapping Systolic Algorithms onto the Hypercube. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 1(1), pp. 48-63, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
parallel to parallel mappings, time-space graph, one way linear systolic array, systolic array algorithms, fixed-size hypercube architecture, two-dimensional systolic arrays, 64-node NCUBE/7 MIMD hypercube machine, shuffle scheduling problem, finite impulse response filtering, linear context-free language recognition, Boolean transitive closure, performance evaluation, parallel algorithms, computational complexity, parallel computers, parallel architectures, hypercube, matrix multiplication, interprocessor communication, cellular arrays, systolic algorithms, local computation |
26 | Ziv Bar-Yossef, T. S. Jayram, Iordanis Kerenidis |
Exponential separation of quantum and classical one-way communication complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004, pp. 128-137, 2004, ACM, 1-58113-852-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
hidden matching, quantum computation, communication complexity, separation |
26 | Iftach Haitner, Thomas Holenstein |
On the (Im)Possibility of Key Dependent Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 202-219, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Key-dependent input, Black-box separations, One-way functions |
26 | Jongmin Lee 0002, Soontae Kim |
An energy-delay efficient 2-level data cache architecture for embedded system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2009 International Symposium on Low Power Electronics and Design, 2009, San Fancisco, CA, USA, August 19-21, 2009, pp. 343-346, 2009, ACM, 978-1-60558-684-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
2-level data cache, early cache hit predictor, one-way write |
26 | Jungyeop Kim, Sungeon Hong |
Development of digital watermarking technology to protect cadastral map information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 923-929, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
digital cadastral map, watermark key, security, robustness, topology, digital watermarking, copyright, one-way function, fidelity, vector data |
26 | Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt |
DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 395-397, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DEMEM, DRETA, delayed key disclosure, forwarded message, one-way key chain, previous forwarder, validation message, MANET, AODV, OLSR, HMAC |
26 | Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood |
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-Hoc and Sensor Networks, Third International Conference, MSN 2007, Beijing, China, December 12-14, 2007, Proceedings, pp. 737-748, 2007, Springer, 978-3-540-77023-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
one-way hash chains, security, sensor networks, key distribution, secure group communication |
26 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
On the Effectiveness of TMTO and Exhaustive Search Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 337-352, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, one-way function |
26 | Chin-Chen Chang 0001, Yeu-Pong Lai |
A convertible group signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(4), pp. 58-65, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
group signature, discrete logarithm problem, convertible, one way hash function |
26 | Simon N. Foley |
Using Trust Management to Support Transferable Hash-Based Micropayments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 1-14, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Trust Management, Delegation, Public Key Certificates, One-way Hash Functions, Digital Cash |
26 | Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai |
Broadcast encryption with short keys and transmissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003, pp. 55-66, 2003, ACM, 1-58113-786-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
constant transmission rate, one-way accumulators, revocation scheme, copyright protection, broadcast encryption |
26 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 270-277, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
26 | Yoshito Tobe, Yosuke Tamura, Anastasio Molano, Sourav Ghosh, Hideyuki Tokuda |
Achieving Moderate Fairness for UDP Flows by Path-Status Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 252-261, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
moderate fairness, path-status classification, continuous UDP flow, relative one-way trip time, UDP stream, time-ROTT graph, congestion-related losses, path-status based rate control, PASTRA, Internet, Internet, transport protocols, packet switching, RTP, real-time transport protocol, continuous media, telecommunication congestion control, receiver, spike-trains |
26 | Jerrold F. Stach, Eun Kyo Park |
Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), October 12-15, 1998, Lafayette, Louisiana, USA, pp. 289-295, 1998, IEEE Computer Society, 0-8186-9014-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Personal Communications System (PCS), Non-repudiation of services, traffic analysis, one way function |
26 | Colin Boyd |
Towards a classification of key agreement protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 38-43, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
one-way junctions, classification, protocols, security of data, key agreement protocols |
25 | Xinyu Mao, Noam Mazor, Jiapeng Zhang |
Non-adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (4) ![In: Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part IV, pp. 502-531, 2023, Springer, 978-3-031-30633-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Xinyu Mao, Noam Mazor, Jiapeng Zhang |
Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR22, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
25 | Clément Rudel, Sébastien Pernet, Jean-Philippe Brazier |
Numerical Factorization of Propagation Operator for Hyperbolic Equations and Application to One-way, True Amplitude One-way Equations and Bremmer Series. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Sci. Comput. ![In: J. Sci. Comput. 93(1), pp. 27, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Xinyu Mao, Noam Mazor, Jiapeng Zhang |
Non-Adaptive Universal One-Way Hash Functions from Arbitrary One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 431, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
25 | Justin Holmgren, Alex Lombardi |
Cryptographic Hashing from Strong One-Way Functions (Or: One-Way Product Functions and Their Applications). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, pp. 850-858, 2018, IEEE Computer Society, 978-1-5386-4230-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Danilo Gligoroski |
On a Family of Minimal Candidate One-way Functions and One-way Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 8(3), pp. 211-220, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
25 | Dongkeun Kim, Jaiyong Lee |
End-to-end one-way delay estimation using one-way delay variation and round-trip time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QSHINE ![In: 4th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QSHINE 2007, Vancouver, Canada, August 14-17, 2007, pp. 19, 2007, ACM, 978-1-59593-756-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Danilo Gligoroski |
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0510018, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
25 | Jonathan Katz, Chiu-Yuen Koo |
On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 328, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 3459 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|