|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 126 occurrences of 89 keywords
|
|
|
Results
Found 169 publication records. Showing 169 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
103 | Gustavus J. Simmons |
Geometric Shared Secret and/or Shared Control Schemes. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
59 | Ingemar Ingemarsson, Gustavus J. Simmons |
A Protocol to Set Up Shared Secret Schemes Without the Assistance of a Mutualy Trusted Party. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
56 | Wei Chen, Xiang Long, Yuebin Bai, Xiaopeng Gao |
A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps. |
ICPP Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Maged Hamada Ibrahim |
Verifiable Threshold Sharing of a Large Secret Safe-Prime. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS |
40 | Chin-Chen Chang 0001, Tai-Xing Yu |
Sharing a Secret Gray Image in Multiple Images. |
CW |
2002 |
DBLP DOI BibTeX RDF |
secret sharing, Visual cryptography |
36 | Joy Algesheimer, Jan Camenisch, Victor Shoup |
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
safe primes, distributed primality test, RSA, threshold cryptography |
36 | Tao Jin, Guevara Noubir, Bishal Thapa |
Zero pre-shared secret key establishment in the presence of jammers. |
MobiHoc |
2009 |
DBLP DOI BibTeX RDF |
zero pre-shared secret, spread spectrum, anti-jamming |
35 | Ren-Junn Hwang, Chin-Chen Chang 0001 |
Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing Scheme. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Claude Castelluccia, Pars Mutaf |
Shake them up!: a movement-based pairing protocol for CPU-constrained devices. |
MobiSys |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Wen Tao Zhu |
General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Yan Zong Ding, Michael O. Rabin |
Hyper-Encryption and Everlasting Security. |
STACS |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen |
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Liao-Jun Pang, Hui-Xian Li, Yu-Min Wang |
A Secure and Efficient Secret Sharing Scheme with General Access Structures. |
FSKD |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Al-Sakib Khan Pathan, Choong Seon Hong |
SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. |
Ann. des Télécommunications |
2008 |
DBLP DOI BibTeX RDF |
One-way hash chain, Shared secret key, Energy, Distance |
27 | Takashi Nishide, Kazuo Ohta |
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Bitwise Sharing, Secret Sharing, Multiparty Computation |
27 | Gustavus J. Simmons |
The Consequences of Trust in Shared Secret Schemes. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
27 | Huawang Qin, Yuewei Dai, Zhiquan Wang |
A secret sharing scheme based on (t, n) threshold and adversary structure. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Adversary structure, Cryptography, Information security, Secret sharing, Threshold |
27 | Akbar M. Sayeed, Adrian Perrig |
Secure wireless communications: Secret keys through multipath. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Emil Ong, John Kubiatowicz |
Optimizing Robustness While Generating Shared Secret Safe Primes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Distributed key generation, safe primes, threshold RSA signatures |
24 | Stefan Dziembowski, Ueli M. Maurer |
The Bare Bounded-Storage Model: The Tight Bound on the Storage Requirement for Key Agreement. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró |
On Codes, Matroids, and Secure Multiparty Computation From Linear Secret-Sharing Schemes. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Daphna Weinshall |
Cognitive Authentication Schemes Safe Against Spyware (Short Paper). |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Cong Jin, Yu Fu, Feng Tao |
The Watermarking Model for Relational Database Based on Watermarking Sharing. |
IIH-MSP |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ivan Damgård, Matthias Fitzi, Jesper Buus Nielsen, Tomas Toft |
How to Split a Shared Secret into Shared Bits in Constant-Round. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
23 | Joy Algesheimer, Jan Camenisch, Victor Shoup |
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
23 | Gustavus J. Simmons |
Prepositioned Shared Secret and/or Shared Control Schemes. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
22 | Runhua Shi, Liusheng Huang, Yonglong Luo, Hong Zhong 0001 |
A Threshold Multi-secret Sharing Scheme. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Mario Strasser, Christina Pöpper, Srdjan Capkun |
Efficient uncoordinated FHSS anti-jamming communication. |
MobiHoc |
2009 |
DBLP DOI BibTeX RDF |
wireless security, frequency hopping, anti-jamming |
20 | Arshad Noor |
Identity protection factor (IPF). |
IDtrust |
2008 |
DBLP DOI BibTeX RDF |
asymmetric key, identification & authentication, identity protection factor (IPF), shared-secret, authentication, access control, identity management, symmetric key |
19 | David Molnar, Andrea Soppera, David A. Wagner 0001 |
Privacy for RFID through trusted computing. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
privacy, RFID, trusted computing, audit |
19 | Moni Naor, Guy N. Rothblum |
Learning to impersonate. |
ICML |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Stanislaw Jarecki, Nitesh Saxena |
Further Simplifications in Proactive RSA Signatures. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Ozkan M. Erdem |
EDKM: efficient distributed key management for mobile ad hoc networks. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi |
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems |
19 | Dennis M. Volpano, Geoffrey Smith 0001 |
Verifying Secrets and Relative Secrecy. |
POPL |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Ueli M. Maurer |
Protocols for Secret Key Agreement by Public Discussion Based on Common Information. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
16 | Yonghwan Lee, Eunmi Choi, Dugki Min |
An Authenticated Key Exchange Mechanism Using One-Time Shared Key. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
One-Time Shared key, Authentication, Key Exchange, Diffie- Hellman |
16 | Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto |
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
randomness expansion, pseudorandom function (PRF), leftover hash lemma (LHL), key agreement, universal hash function, randomness extraction, key exchange protocols |
16 | Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
HMAC is a randomness extractor and applications to TLS. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
key extraction, TLS, HMAC, randomness extraction |
16 | Vladimir Shpilrain |
Cryptanalysis of Stickel's Key Exchange Scheme. |
CSR |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Provably secure authenticated group Diffie-Hellman key exchange. |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Cryptography, Diffie-Hellman, Group Key Exchange |
16 | Robert D. Wilson, David Tse, Robert A. Scholtz |
Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague |
GBD Threshold Cryptography with an Application to RSA Key Recovery. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Jaap-Henk Hoepman |
The Ephemeral Pairing Problem. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Art Conklin, Glenn B. Dietrich, Diane B. Walz |
Password-Based Authentication: A System Perspective. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Controlled Physical Random Functions. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Mina Doosti, Lucas Hanouz, Anne Marin, Elham Kashefi, Marc Kaplan |
Establishing shared secret keys on quantum line networks: protocol and security. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Volodymyr Saiko, Vladimir Krasilenko, Svitlana Kiporenko, Illia Chikov, Diana Nikitovych |
Modeling of a Cryptographic Protocol for Matching a Shared Secret Key-Permutation of Significant Dimension with its Isomorphic Representations. |
IT&I Workshops |
2023 |
DBLP BibTeX RDF |
|
16 | Aisha Kanwal Junejo, Fatma Benkhelifa, Boon Wong, Julie A. McCann |
LoRa-LiSK: A Lightweight Shared Secret Key Generation Scheme for LoRa Networks. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Jie Li 0019, Okko Makkonen, Camilla Hollanti, Oliver W. Gnilke |
Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR. |
IEEE J. Sel. Areas Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Ángeles Vázquez-Castro |
Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared Secret. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Youjing Lu, Fan Wu 0006, Qianyi Huang, Shaojie Tang 0001, Linghe Kong, Guihai Chen |
Shared Secret Key Generation by Exploiting Inaudible Acoustic Channels. |
ACM Trans. Sens. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Usama Saeed, Lingjia Liu 0001, Kai Zeng 0001, A. Robert Calderbank |
Securing Wireless Channels: Reliable Shared Secret Extraction through OTFS. |
CNS |
2022 |
DBLP DOI BibTeX RDF |
|
16 | Jie Li 0019, Camilla Hollanti, Oliver W. Gnilke |
Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
16 | Junwei Zhang 0001, Ning Lu 0005, Jianfeng Ma 0001, Chao Yang 0016 |
Universally composable secure geographic area verification without pre-shared secret. |
Sci. China Inf. Sci. |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Waqas Aman, Aneeqa Ijaz, Muhammad Mahboob Ur Rahman, Dushantha Nalin K. Jayakody, Haris Pervaiz |
Shared Secret Key Generation via Carrier Frequency Offsets. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
16 | Segundo Moises Toapanta Toapanta, Luis Antonio Palomino Romero, Felix Gustavo Mendoza Quimi, Maximo Geovani Tandazo Espinoza, Luis Enrique Mafla Gallegos |
Model of Shared Secret Applied to a Voting System for the National Electoral Council of Ecuador. |
CITS |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Waqas Aman, Aneeqa Ijaz, Muhammad Mahboob Ur Rahman, Dushantha Nalin K. Jayakody, Haris Pervaiz |
Shared Secret Key Generation via Carrier Frequency Offsets. |
VTC Spring |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Tomasz Krokosz, Jarogniew Rykowski |
Verification of IoT Devices by Means of a Shared Secret. |
ISAT (1) |
2019 |
DBLP DOI BibTeX RDF |
|
16 | Chang-Seop Park |
One-time password based on hash chain without shared secret and re-registration. |
Comput. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
16 | Abdulbast A. Abushgra, Khaled M. Elleithy |
A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels. |
IEEE Access |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Weitao Xu, Chitra Javali, Girish Revadigar, Chengwen Luo 0001, Neil Bergmann, Wen Hu |
Gait-Key: A Gait-Based Shared Secret Key Generation Protocol for Wearable Devices. |
ACM Trans. Sens. Networks |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Sauvik Das, Gierad Laput, Chris Harrison 0001, Jason I. Hong |
Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks. |
CHI |
2017 |
DBLP DOI BibTeX RDF |
|
16 | Vajihe Zeinali, Hossein Khaleghi Bizaki |
Shared Secret Key Generation Protocol in Wireless Networks Based on the Phase of MIMO Fading Channels. |
Wirel. Pers. Commun. |
2016 |
DBLP DOI BibTeX RDF |
|
16 | Ella Hafermalz, Dirk S. Hovorka, Kai Riemer |
Shared Secret Places: Social Media and Affordances. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
16 | Dongrun Qin, Zhi Ding 0001 |
Exploiting Multi-Antenna Non-Reciprocal Channels for Shared Secret Key Generation. |
IEEE Trans. Inf. Forensics Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
16 | Kostas Pentikousis, Emma Zhang, Yang Cui |
IKEv2-Derived Shared Secret Key for the One-Way Active Measurement Protocol (OWAMP) and Two-Way Active Measurement Protocol (TWAMP). |
RFC |
2015 |
DBLP DOI BibTeX RDF |
|
16 | Ella Hafermalz, Dirk S. Hovorka, Kai Riemer |
Shared Secret Places: Social Media and Affordances. |
ACIS |
2015 |
DBLP BibTeX RDF |
|
16 | Alexey D. Smolyakov, Amir I. Sulimov, Arkadij V. Karpov, Aidar V. Galiev |
Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment. |
SECRYPT |
2015 |
DBLP DOI BibTeX RDF |
|
16 | Tohari Ahmad, Hudan Studiawan, Hafidh Sholihuddin Ahmad, Royyana M. Ijtihadie, Waskitho Wibisono |
Shared secret-based steganography for protecting medical data. |
IC3INA |
2014 |
DBLP DOI BibTeX RDF |
|
16 | Lifeng Sang, Anish Arora |
A shared-secret free security infrastructure for wireless networks. |
ACM Trans. Auton. Adapt. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Tom Yuan Gao, David Kearney |
A shared secret security broker implementation in a commercial context. |
ICITST |
2012 |
DBLP BibTeX RDF |
|
16 | Lu Zhang, Qingqi Pei, Hongning Li |
Anti-jamming Scheme Based on Zero Pre-shared Secret in Cognitive Radio Network. |
CIS |
2012 |
DBLP DOI BibTeX RDF |
|
16 | Romain Giot, Mohamad El-Abed, Baptiste Hemery, Christophe Rosenberger |
Unconstrained keystroke dynamics authentication with shared secret. |
Comput. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Neal Patwari, Jessica Croft, Suman Jana, Sneha Kumar Kasera |
High-Rate Uncorrelated Bit Extraction for Shared Secret Key Generation from Channel Measurements. |
IEEE Trans. Mob. Comput. |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Tao Ma, Michael Hempel, Dongming Peng, Hamid Sharif |
A Novel Image Authentication Approach Using an Overlap-Based Shared Secret for Collaborative Wireless Sensors. |
VTC Spring |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Imre Csiszár, Prakash Narayan |
Capacity of a shared secret key. |
ISIT |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Biplob R. Ray, Morshed U. Chowdhury |
Enhanced RFID Mutual Authentication Scheme Based on Shared Secret Information. |
CAINE |
2010 |
DBLP BibTeX RDF |
|
16 | Kai Zeng 0001, Daniel Wu, An (Jack) Chan, Prasant Mohapatra |
Exploiting Multiple-Antenna Diversity for Shared Secret Key Generation in Wireless Networks. |
INFOCOM |
2010 |
DBLP DOI BibTeX RDF |
|
16 | Xiaowen Zhang, Qinghai Gao, Mohamed K. Saad |
Analysis of RFID Authentication Protocols Based on Static and Dynamic Shared Secret. |
Security and Management |
2009 |
DBLP BibTeX RDF |
|
16 | Michael A. Forman, Derek Young |
A Generalized Scheme for the Creation of Shared Secret Keys through Uncorrelated Reciprocal Channels in Multiple Domains. |
ICCCN |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Michaela C. Vanderveen, Hesham Soliman |
Extensible Authentication Protocol Method for Shared-secret Authentication and Key Establishment (EAP-SAKE). |
RFC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Alia Fourati, Khaldoun Al Agha |
A shared secret-based algorithm for securing the OLSR routing protocol. |
Telecommun. Syst. |
2006 |
DBLP DOI BibTeX RDF |
OLSR routing, Control messages integrity, Security, Ad hoc, Threshold cryptography |
16 | Dinei A. F. Florêncio, Cormac Herley |
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jean Cardinal, Gilles Van Assche |
Construction of a shared secret key using continuous variables. |
ITW |
2003 |
DBLP DOI BibTeX RDF |
|
16 | E. C. Tan, P. C. Leong, L. T. Sio |
Group-Access Control of Confidential Files in E-Commerce Management Using Shared-Secret Scheme. |
Electron. Commer. Res. |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Amos Beimel, Mike Burmester, Yvo Desmedt, Eyal Kushilevitz |
Computing Functions of a Shared Secret. |
SIAM J. Discret. Math. |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Dario Catalano, Rosario Gennaro, Shai Halevi |
Computing Inverses over a Shared Secret Modulus. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
16 | He Jingmin, Ed Dawson |
Shared Secret Reconstruction. |
Des. Codes Cryptogr. |
1998 |
DBLP DOI BibTeX RDF |
|
16 | He Jingmin, Ed Dawson |
How to Fairly Reconstruct a Shared Secret. |
Cryptography: Policy and Algorithms |
1995 |
DBLP DOI BibTeX RDF |
|
16 | Roland Nehl |
Robuste Shared Secret Schemes. |
|
1993 |
RDF |
|
14 | Ren-Junn Hwang, Sheng-Hua Shiau, Chih-Hua Lai |
An Enhanced Authentication Key Exchange Protocol . |
AINA |
2003 |
DBLP DOI BibTeX RDF |
|
13 | Yang Wu, Li Yang |
Practical Quantum No-key Protocol with Identification. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Chia-Hsin Owen Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu |
GAnGS: gather, authenticate 'n group securely. |
MobiCom |
2008 |
DBLP DOI BibTeX RDF |
group protocol, operator error, security, key establishment |
13 | Chwan-Hwa John Wu, Tong Liu |
Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion |
13 | Bhavana Kanukurthi, Leonid Reyzin |
An Improved Robust Fuzzy Extractor. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Mario Strasser, Christina Pöpper, Srdjan Capkun, Mario Cagalj |
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Wireless Security, Key Establishment, Frequency Hopping, Anti-jamming |
13 | Korporn Panyim, Prashant Krishnamurthy |
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Carl Bosley, Yevgeniy Dodis |
Does Privacy Require True Randomness? |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Philippe Golle, David A. Wagner 0001 |
Cryptanalysis of a Cognitive Authentication Scheme (Extended Abstract). |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 169 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|