|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 17 publication records. Showing 17 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia |
Embedded Software Security through Key-Based Control Flow Obfuscation. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (eds.) |
Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sambaran Bandyopadhyay, Ruchira Naskar, Rajat Subhra Chakraborty |
Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Namita Tiwari, Sahadeo Padhye |
An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kunal Sadalkar, Radhesh Mohandas, Alwyn R. Pais |
Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Identity Based Online/Offline Encryption and Signcryption Schemes Revisited. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dhirendra Singh Yadav, Rajendra Kumar Sharma, Wagish Shukla |
On Applications of Singular Matrices over Finite Fields in Cryptography. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Prasanna Raghaw Mishra, Indivar Gupta, N. Rajesh Pillai |
Generalized Avalanche Test for Stream Cipher Analysis. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ratna Dutta, Dheerendra Mishra, Sourav Mukhopadhyay |
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jörn-Marc Schmidt |
Secure Implementations for the Internet of Things. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sanjay Burman |
Engineering Trustworthy Systems. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ratna Dutta |
Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Satrajit Ghosh, Abhijit Das 0004 |
An Improvement of Linearization-Based Algebraic Attacks. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Indivar Gupta, P. K. Saxena |
Distributed Signcryption Schemes with Formal Proof of Security. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Santosh Ghosh, Dipanwita Roy Chowdhury |
Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Rishabh Poddar, Amit Datta, Chester Rebeiro |
A Cache Trace Attack on CAMELLIA. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Maxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger |
"Rank Correction": A New Side-Channel Approach for Secret Key Recovery. |
InfoSecHiComNet |
2011 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #17 of 17 (100 per page; Change: )
|
|