|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 39 occurrences of 34 keywords
|
|
|
Results
Found 36 publication records. Showing 36 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Gil-Jong Mun, Yongmin Kim 0005, DongKook Kim, BongNam Noh |
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim 0001 |
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hyun-Sun Kang, Chang-Seop Park |
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Roman Schlegel, Serge Vaudenay |
Enforcing Email Addresses Privacy Using Tokens. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dengguo Feng, Dongdai Lin, Moti Yung (eds.) |
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tianjie Cao, Dongdai Lin |
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature |
1 | Cheol-Min Park, Myung-Hwan Kim, Moti Yung |
A Remark on Implementing the Weil Pairing. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
modified Weil pairing, separable endomorphism, distortion map, Pairing-based cryptosystem, Weil pairing |
1 | Fagen Li, Juntao Gao, Yupu Hu |
ID-Based Threshold Unsigncryption Scheme from Pairings. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
(t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof |
1 | Rui Zhang 0002, Hideki Imai |
Improvements on Security Proofs of Some Identity Based Encryption Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zhanfei Zhou |
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jong-Hyuk Roh, Kyoon-Ha Lee |
Key Management for Secure Overlay Multicast. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Key hierarchy, Key Management, Overlay Multicast, Secure Multicast |
1 | Shimin Wei, Guolong Chen, Guozhen Xiao |
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
HCTR: A Variable-Input-Length Enciphering Mode. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher |
1 | Fei Gao 0001, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu |
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hongda Li 0001, Bao Li 0001 |
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu |
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature |
1 | Jihong Teng, Shiqu Li, Xiaoying Huang |
The kth-Order Quasi-Generalized Bent Functions over Ring Zp. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song |
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo |
You Can Prove So Many Things in Zero-Knowledge. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Constructing Secure Proxy Cryptosystem. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Proxy cryptosystem, bilinear Diffie-Hellman, ID-based |
1 | Chunxiang Gu, Yuefei Zhu |
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . |
CISC |
2005 |
DBLP DOI BibTeX RDF |
bilinear pairings, fair exchange, ID-based cryptography, verifiably encrypted signatures |
1 | Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider |
Specifying Authentication Using Signal Events in CSP. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon |
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolan Joy Zhang, Brian King |
Modeling RFID Security. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz |
Towards a General RC4-Like Keystream Generator. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
random shuffle, stream ciphers, RC4, keystream generator |
1 | Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang |
Efficient Group Signatures from Bilinear Pairing. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
GDH group, Digital signature, Bilinear pairing, Group signature |
1 | Wenping Ma 0002, Fu Tai Zhang |
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing |
1 | Yongdong Wu |
Efficient Authentication of Electronic Document Workflow. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn |
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Crypto-Biometric, Fuzzy Fingerprint Vault, Geometric Hashing |
1 | Pradeep Kumar Mishra |
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Montgomery ladder, simultaneous inversion, parallel algorithm, Elliptic Curve Cryptosystems, Scalar Multiplication |
1 | Zuhua Shao |
Enhanced Aggregate Signatures from Pairings. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
security model, random oracle model, Aggregate signature |
1 | Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura |
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
An Improved Secure Two-Party Computation Protocol. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #36 of 36 (100 per page; Change: )
|
|