The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase shared-secret (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2000 (15) 2001-2003 (16) 2004-2005 (25) 2006 (20) 2007 (24) 2008 (23) 2009-2010 (18) 2011-2018 (15) 2019-2023 (13)
Publication types (Num. hits)
article(35) inproceedings(133) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 126 occurrences of 89 keywords

Results
Found 169 publication records. Showing 169 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
103Gustavus J. Simmons Geometric Shared Secret and/or Shared Control Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
59Ingemar Ingemarsson, Gustavus J. Simmons A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
56Wei Chen, Xiang Long, Yuebin Bai, Xiaopeng Gao A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps. Search on Bibsonomy ICPP Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Maged Hamada Ibrahim Verifiable Threshold Sharing of a Large Secret Safe-Prime. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS
40Chin-Chen Chang 0001, Tai-Xing Yu Sharing a Secret Gray Image in Multiple Images. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secret sharing, Visual cryptography
36Joy Algesheimer, Jan Camenisch, Victor Shoup Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF safe primes, distributed primality test, RSA, threshold cryptography
36Tao Jin, Guevara Noubir, Bishal Thapa Zero pre-shared secret key establishment in the presence of jammers. Search on Bibsonomy MobiHoc The full citation details ... 2009 DBLP  DOI  BibTeX  RDF zero pre-shared secret, spread spectrum, anti-jamming
35Ren-Junn Hwang, Chin-Chen Chang 0001 Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Claude Castelluccia, Pars Mutaf Shake them up!: a movement-based pairing protocol for CPU-constrained devices. Search on Bibsonomy MobiSys The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Wen Tao Zhu General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Yan Zong Ding, Michael O. Rabin Hyper-Encryption and Everlasting Security. Search on Bibsonomy STACS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
30Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Liao-Jun Pang, Hui-Xian Li, Yu-Min Wang A Secure and Efficient Secret Sharing Scheme with General Access Structures. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Al-Sakib Khan Pathan, Choong Seon Hong SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF One-way hash chain, Shared secret key, Energy, Distance
27Takashi Nishide, Kazuo Ohta Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bitwise Sharing, Secret Sharing, Multiparty Computation
27Gustavus J. Simmons The Consequences of Trust in Shared Secret Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
27Huawang Qin, Yuewei Dai, Zhiquan Wang A secret sharing scheme based on (t, n) threshold and adversary structure. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversary structure, Cryptography, Information security, Secret sharing, Threshold
27Akbar M. Sayeed, Adrian Perrig Secure wireless communications: Secret keys through multipath. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Emil Ong, John Kubiatowicz Optimizing Robustness While Generating Shared Secret Safe Primes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed key generation, safe primes, threshold RSA signatures
24Stefan Dziembowski, Ueli M. Maurer The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Daphna Weinshall Cognitive Authentication Schemes Safe Against Spyware (Short Paper). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Cong Jin, Yu Fu, Feng Tao The Watermarking Model for Relational Database Based on Watermarking Sharing. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft How to Split a Shared Secret into Shared Bits in Constant-Round. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
23Joy Algesheimer, Jan Camenisch, Victor Shoup Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
23Gustavus J. Simmons Prepositioned Shared Secret and/or Shared Control Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
22Runhua Shi, Liusheng Huang, Yonglong Luo, Hong Zhong 0001 A Threshold Multi-secret Sharing Scheme. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Mario Strasser, Christina Pöpper, Srdjan Capkun Efficient uncoordinated FHSS anti-jamming communication. Search on Bibsonomy MobiHoc The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless security, frequency hopping, anti-jamming
20Arshad Noor Identity protection factor (IPF). Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF asymmetric key, identification & authentication, identity protection factor (IPF), shared-secret, authentication, access control, identity management, symmetric key
19David Molnar, Andrea Soppera, David A. Wagner 0001 Privacy for RFID through trusted computing. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID, trusted computing, audit
19Moni Naor, Guy N. Rothblum Learning to impersonate. Search on Bibsonomy ICML The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Stanislaw Jarecki, Nitesh Saxena Further Simplifications in Proactive RSA Signatures. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Ozkan M. Erdem EDKM: efficient distributed key management for mobile ad hoc networks. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems
19Dennis M. Volpano, Geoffrey Smith 0001 Verifying Secrets and Relative Secrecy. Search on Bibsonomy POPL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Ueli M. Maurer Protocols for Secret Key Agreement by Public Discussion Based on Common Information. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
16Yonghwan Lee, Eunmi Choi, Dugki Min An Authenticated Key Exchange Mechanism Using One-Time Shared Key. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman
16Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF randomness expansion, pseudorandom function (PRF), leftover hash lemma (LHL), key agreement, universal hash function, randomness extraction, key exchange protocols
16Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer HMAC is a randomness extractor and applications to TLS. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key extraction, TLS, HMAC, randomness extraction
16Vladimir Shpilrain Cryptanalysis of Stickel's Key Exchange Scheme. Search on Bibsonomy CSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Emmanuel Bresson, Olivier Chevassut, David Pointcheval Provably secure authenticated group Diffie-Hellman key exchange. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptography, Diffie-Hellman, Group Key Exchange
16Robert D. Wilson, David Tse, Robert A. Scholtz Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague GBD Threshold Cryptography with an Application to RSA Key Recovery. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jaap-Henk Hoepman The Ephemeral Pairing Problem. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Art Conklin, Glenn B. Dietrich, Diane B. Walz Password-Based Authentication: A System Perspective. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas Controlled Physical Random Functions. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Mina Doosti, Lucas Hanouz, Anne Marin, Elham Kashefi, Marc Kaplan Establishing shared secret keys on quantum line networks: protocol and security. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Volodymyr Saiko, Vladimir Krasilenko, Svitlana Kiporenko, Illia Chikov, Diana Nikitovych Modeling of a Cryptographic Protocol for Matching a Shared Secret Key-Permutation of Significant Dimension with its Isomorphic Representations. Search on Bibsonomy IT&I Workshops The full citation details ... 2023 DBLP  BibTeX  RDF
16Aisha Kanwal Junejo, Fatma Benkhelifa, Boon Wong, Julie A. McCann LoRa-LiSK: A Lightweight Shared Secret Key Generation Scheme for LoRa Networks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Jie Li 0019, Okko Makkonen, Camilla Hollanti, Oliver W. Gnilke Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Ángeles Vázquez-Castro Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Youjing Lu, Fan Wu 0006, Qianyi Huang, Shaojie Tang 0001, Linghe Kong, Guihai Chen Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Usama Saeed, Lingjia Liu 0001, Kai Zeng 0001, A. Robert Calderbank Securing Wireless Channels: Reliable Shared Secret Extraction through OTFS. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Jie Li 0019, Camilla Hollanti, Oliver W. Gnilke Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
16Junwei Zhang 0001, Ning Lu 0005, Jianfeng Ma 0001, Chao Yang 0016 Universally composable secure geographic area verification without pre-shared secret. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Waqas Aman, Aneeqa Ijaz, Muhammad Mahboob Ur Rahman, Dushantha Nalin K. Jayakody, Haris Pervaiz Shared Secret Key Generation via Carrier Frequency Offsets. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
16Segundo Moises Toapanta Toapanta, Luis Antonio Palomino Romero, Felix Gustavo Mendoza Quimi, Maximo Geovani Tandazo Espinoza, Luis Enrique Mafla Gallegos Model of Shared Secret Applied to a Voting System for the National Electoral Council of Ecuador. Search on Bibsonomy CITS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Waqas Aman, Aneeqa Ijaz, Muhammad Mahboob Ur Rahman, Dushantha Nalin K. Jayakody, Haris Pervaiz Shared Secret Key Generation via Carrier Frequency Offsets. Search on Bibsonomy VTC Spring The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Tomasz Krokosz, Jarogniew Rykowski Verification of IoT Devices by Means of a Shared Secret. Search on Bibsonomy ISAT (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Chang-Seop Park One-time password based on hash chain without shared secret and re-registration. Search on Bibsonomy Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Abdulbast A. Abushgra, Khaled M. Elleithy A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels. Search on Bibsonomy IEEE Access The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo 0001, Neil Bergmann, Wen Hu Gait-Key: A Gait-Based Shared Secret Key Generation Protocol for Wearable Devices. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Sauvik Das, Gierad Laput, Chris Harrison 0001, Jason I. Hong Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks. Search on Bibsonomy CHI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Vajihe Zeinali, Hossein Khaleghi Bizaki Shared Secret Key Generation Protocol in Wireless Networks Based on the Phase of MIMO Fading Channels. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Ella Hafermalz, Dirk S. Hovorka, Kai Riemer Shared Secret Places: Social Media and Affordances. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
16Dongrun Qin, Zhi Ding 0001 Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Kostas Pentikousis, Emma Zhang, Yang Cui IKEv2-Derived Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP). Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Ella Hafermalz, Dirk S. Hovorka, Kai Riemer Shared Secret Places: Social Media and Affordances. Search on Bibsonomy ACIS The full citation details ... 2015 DBLP  BibTeX  RDF
16Alexey D. Smolyakov, Amir I. Sulimov, Arkadij V. Karpov, Aidar V. Galiev Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment. Search on Bibsonomy SECRYPT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Tohari Ahmad, Hudan Studiawan, Hafidh Sholihuddin Ahmad, Royyana M. Ijtihadie, Waskitho Wibisono Shared secret-based steganography for protecting medical data. Search on Bibsonomy IC3INA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Lifeng Sang, Anish Arora A shared-secret free security infrastructure for wireless networks. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Tom Yuan Gao, David Kearney A shared secret security broker implementation in a commercial context. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
16Lu Zhang, Qingqi Pei, Hongning Li Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network. Search on Bibsonomy CIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Romain Giot, Mohamad El-Abed, Baptiste Hemery, Christophe Rosenberger Unconstrained keystroke dynamics authentication with shared secret. Search on Bibsonomy Comput. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Neal Patwari, Jessica Croft, Suman Jana, Sneha Kumar Kasera High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Tao Ma, Michael Hempel, Dongming Peng, Hamid Sharif A Novel Image Authentication Approach Using an Overlap-Based Shared Secret for Collaborative Wireless Sensors. Search on Bibsonomy VTC Spring The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Imre Csiszár, Prakash Narayan Capacity of a shared secret key. Search on Bibsonomy ISIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Biplob R. Ray, Morshed U. Chowdhury Enhanced RFID Mutual Authentication Scheme Based on Shared Secret Information. Search on Bibsonomy CAINE The full citation details ... 2010 DBLP  BibTeX  RDF
16Kai Zeng 0001, Daniel Wu, An (Jack) Chan, Prasant Mohapatra Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks. Search on Bibsonomy INFOCOM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad Analysis of RFID Authentication Protocols Based on Static and Dynamic Shared Secret. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
16Michael A. Forman, Derek Young A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple Domains. Search on Bibsonomy ICCCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Michaela C. Vanderveen, Hesham Soliman Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Alia Fourati, Khaldoun Al Agha A shared secret-based algorithm for securing the OLSR routing protocol. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OLSR routing, Control messages integrity, Security, Ad hoc, Threshold cryptography
16Dinei A. F. Florêncio, Cormac Herley KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jean Cardinal, Gilles Van Assche Construction of a shared secret key using continuous variables. Search on Bibsonomy ITW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16E. C. Tan, P. C. Leong, L. T. Sio Group-Access Control of Confidential Files in E-Commerce Management Using Shared-Secret Scheme. Search on Bibsonomy Electron. Commer. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Amos Beimel, Mike Burmester, Yvo Desmedt, Eyal Kushilevitz Computing Functions of a Shared Secret. Search on Bibsonomy SIAM J. Discret. Math. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Dario Catalano, Rosario Gennaro, Shai Halevi Computing Inverses over a Shared Secret Modulus. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16He Jingmin, Ed Dawson Shared Secret Reconstruction. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16He Jingmin, Ed Dawson How to Fairly Reconstruct a Shared Secret. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
16Roland Nehl Robuste Shared Secret Schemes. Search on Bibsonomy 1993   RDF
14Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai An Enhanced Authentication Key Exchange Protocol . Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Yang Wu, Li Yang Practical Quantum No-key Protocol with Identification. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu GAnGS: gather, authenticate 'n group securely. Search on Bibsonomy MobiCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF group protocol, operator error, security, key establishment
13Chwan-Hwa John Wu, Tong Liu Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion
13Bhavana Kanukurthi, Leonid Reyzin An Improved Robust Fuzzy Extractor. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Security, Key Establishment, Frequency Hopping, Anti-jamming
13Korporn Panyim, Prashant Krishnamurthy A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Carl Bosley, Yevgeniy Dodis Does Privacy Require True Randomness? Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Philippe Golle, David A. Wagner 0001 Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 169 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license