The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for HMAC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2004 (19) 2005-2006 (28) 2007 (19) 2008 (19) 2009 (16) 2010-2012 (19) 2013-2014 (19) 2015-2016 (19) 2017-2019 (18) 2020-2022 (20) 2023 (5)
Publication types (Num. hits)
article(85) incollection(2) inproceedings(114)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 134 occurrences of 78 keywords

Results
Found 201 publication records. Showing 201 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Yu Sasaki, Gaoli Wang, Lei Wang 0031 Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Johannes Merkle, Manfred Lochter HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3. Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Shuang Wu Cryptanalysis of HMAC/NMAC-Whirlpool. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Mihir Bellare, Anna Lysyanskaya Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro Generic Security of NMAC and HMAC with Input Whitening. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
22Lennart Beringer, Adam Petcher, Katherine Q. Ye, Andrew W. Appel Verified Correctness and Security of OpenSSL HMAC. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
22Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma New HMAC Message Patches: Secret Patch and CrOw Patch. Search on Bibsonomy ICISS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Saiful Adli Ismail, Md. Asri Ngadi, Johan Mohamad Sharif, Nazri Kama, Othman Mohd Yusop HMAC Authentication Mechanisms in a Grid Computing Environment Using Gridsim Toolkit. Search on Bibsonomy SoMeT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro Generic Security of NMAC and HMAC with Input Whitening. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Limin Guo, Lihui Wang, Dan Liu, Weijun Shan, Zhimin Zhang, Qing Li 0064, Jun Yu A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3. Search on Bibsonomy CIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
22Denis Ovsienko Babel Hashed Message Authentication Code (HMAC) Cryptographic Authentication. Search on Bibsonomy RFC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Peter Gazi, Krzysztof Pietrzak, Michal Rybár The Exact PRF-Security of NMAC and HMAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
22Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Peter Gazi, Krzysztof Pietrzak, Michal Rybár The Exact PRF-Security of NMAC and HMAC. Search on Bibsonomy CRYPTO (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Jian Guo 0001, Thomas Peyrin, Yu Sasaki, Lei Wang 0031 Updates on Generic Attacks against HMAC and NMAC. Search on Bibsonomy CRYPTO (1) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Selman Yakut, Ahmet Bedri Özer HMAC based one tıme password generator. Search on Bibsonomy SIU The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Marcio Juliato, Catherine H. Gebotys A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong Security Analysis of HMAC/NMAC by Using Fault Injection. Search on Bibsonomy J. Appl. Math. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Krzysztof Pietrzak A Closer Look at HMAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
22Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
22Neal Koblitz, Alfred Menezes Another look at HMAC. Search on Bibsonomy J. Math. Cryptol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Yu Sasaki, Lei Wang 0031 Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
22Susana Eiroa, Iluminada Baturone FPGA implementation and DPA resistance analysis of a lightweight HMAC construction based on photon hash family. Search on Bibsonomy FPL The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Shuang Wu Cryptanalysis of HMAC/NMAC-Whirlpool. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Yusuke Naito 0001, Yu Sasaki, Lei Wang 0031, Kan Yasuda Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Seung Wook Jung, Souhwan Jung HRP: A HMAC-based RFID mutual authentication protocol using PUF. Search on Bibsonomy ICOIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Harris E. Michail, George Athanasiou, Vasilios I. Kelefouras, George Theodoridis, Costas E. Goutis On the exploitation of a high-throughput SHA-256 FPGA design for HMAC. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Changhui Hu, Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li Efficient HMAC-based secure communication for VANETs. Search on Bibsonomy Comput. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Love Hörnquist-Åstrand, Tom Yu Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos. Search on Bibsonomy RFC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Thomas Peyrin, Yu Sasaki, Lei Wang 0031 Generic Related-key Attacks for HMAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
22Neal Koblitz, Alfred Menezes Another look at HMAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
22Thomas Peyrin, Yu Sasaki, Lei Wang 0031 Generic Related-Key Attacks for HMAC. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Alireza Beikverdi, Ian K. T. Tan Improved look-ahead re-synchronization window for HMAC-based one-time password. Search on Bibsonomy ICWCA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Yevgeniy Dodis, Thomas Ristenpart, John P. Steinberger, Stefano Tessaro To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Bart Preneel HMAC. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Sean Turner, Lily Chen Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Donald E. Eastlake III, Tony Hansen US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF). Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Fan Zhang 0010, Zhijie Jerry Shi Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool. Search on Bibsonomy ITNG The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Fu-Tung Wang, Tzong-Dar Wu, Yu-Chung Lu Applying HMAC to Enhance Information Security for Mobile Reader RFID System. Search on Bibsonomy CSEE (1) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Hugo Krawczyk, Pasi Eronen HMAC-based Extract-and-Expand Key Derivation Function (HKDF). Search on Bibsonomy RFC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Zheng Yuan, Jintao Liu, Xiaoqiu Ren Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
22Sawinee Sangsuriyun, Sanparith Marukatat, Kitsana Waiyamai Hierarchical Multi-label Associative Classification (HMAC) using negative rules. Search on Bibsonomy IEEE ICCI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Bradley Baker, C. Edward Chow HTEE: An HMAC based Tamper Evident Encryption. Search on Bibsonomy SECRYPT The full citation details ... 2010 DBLP  BibTeX  RDF
22Manav Bhatia, Vishwas Manral, Matthew J. Fanto, Russ White, Michael Barnes, Tony Li, Randall J. Atkinson OSPFv2 HMAC-SHA Cryptographic Authentication. Search on Bibsonomy RFC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Yu Sasaki A Full Key Recovery Attack on HMAC-AURORA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
22Hongbo Yu, Xiaoyun Wang 0001 Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai An Update on the Analysis and Design of NMAC and HMAC Functions. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2008 DBLP  BibTeX  RDF
22Christian Rechberger, Vincent Rijmen New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr Design Space Exploration of a Reconfigurable HMAC-Hash Unit. Search on Bibsonomy J. Res. Pract. Inf. Technol. The full citation details ... 2008 DBLP  BibTeX  RDF
22Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr Corrections to "Design and Performance Analysis of a Unified, Reconfigurable HMAC-Hash Unit" [Dec 07 2683-2695]. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr Design and Performance Analysis of a Unified, Reconfigurable HMAC-Hash Unit. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Donald E. Eastlake III HMAC SHA (Hashed Message Authentication Code, Secure Hash Algorithm) TSIG Algorithm Identifiers. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Karthik Jaganathan, Larry Zhu, John Brezak The RC4-HMAC Kerberos Encryption Types Used by Microsoft Windows. Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Martin Euchner HMAC-Authenticated Diffie-Hellman for Multimedia Internet KEYing (MIKEY). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Donald E. Eastlake III, Tony Hansen US Secure Hash Algorithms (SHA and HMAC-SHA). Search on Bibsonomy RFC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Vlastimil Klíma A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
22Donghoon Chang, Mridul Nandi General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
22Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
22Mihir Bellare New Proofs for NMAC and HMAC: Security Without Collision-Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
22Scott Contini, Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
22Christian Rechberger, Vincent Rijmen On Authentication with HMAC and Non-Random Properties. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
22Bart Preneel HMAC. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22David M'Raïhi, Mihir Bellare, Frank Hoornaert, David Naccache, Ohad Ranen HOTP: An HMAC-Based One-Time Password Algorithm. Search on Bibsonomy RFC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Harris E. Michail, Athanasios P. Kakarountas, Athanasios Milidonis, Costas E. Goutis Efficient implementation of the keyed-hash message authentication code (HMAC) using the SHA-1 hash function. Search on Bibsonomy ICECS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Jim Schaad, Russell Housley Wrapping a Hashed Message Authentication Code (HMAC) key with a Triple-Data Encryption Standard (DES) Key or an Advanced Encryption Standard (AES) Key. Search on Bibsonomy RFC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Angelos D. Keromytis, Niels Provos The Use of HMAC-RIPEMD-160-96 within ESP and AH. Search on Bibsonomy RFC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Cheryl Madson, Rob Glenn The Use of HMAC-SHA-1-96 within ESP and AH. Search on Bibsonomy RFC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
22Cheryl Madson, Rob Glenn The Use of HMAC-MD5-96 within ESP and AH. Search on Bibsonomy RFC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
22Michael J. Oehler, Robert Glenn HMAC-MD5 IP Authentication with Replay Prevention. Search on Bibsonomy RFC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
22Hugo Krawczyk, Mihir Bellare, Ran Canetti HMAC: Keyed-Hashing for Message Authentication. Search on Bibsonomy RFC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
15Keon Jang, Sangjin Han, Seungyeop Han, Sue B. Moon, KyoungSoo Park Accelerating SSL with GPUs. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF GPU, CUDA, SSL
15Hung-Min Sun, King-Hang Wang, Chien-Ming Chen 0001 On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Shweta Agrawal, Dan Boneh Homomorphic MACs: MAC-Based Integrity for Network Coding. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Tong Liu, Jiya Jiang, Ying Li Research on File Content Tamper-proofing System for Distribution Environment. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Binod Vaidya, Jong Hyuk Park, Joel J. P. C. Rodrigues HOTP-Based User Authentication Scheme in Home Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Hongbo Yu, Xiaoyun Wang 0001 Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, distinguishing attack, SHA-256
15Zheng Gong, Xuejia Lai, Kefei Chen A synthetic indifferentiability analysis of some block-cipher-based hash functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classifications 68W40, 68Q25
15Hidenori Kuwakado, Shoichi Hirose Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Sébastien Canard, Amandine Jambert Group Key Management: From a Non-hierarchical to a Hierarchical Structure. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Access Control, Key Management, Hierarchy
15Marc Fischlin Security of NMACand HMACBased on Non-malleability. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Taeshik Shon, Wook Choi An Analysis of Mobile WiMAX Security: Vulnerabilities and Solutions. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Ian M. Molloy, Jiangtao Li 0001, Ninghui Li Dynamic Virtual Credit Card Numbers. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF credit card theft, e-commerce
15Md. Mamun-Or-Rashid, Muhammad Mahbub Alam, Md. Abdur Razzaque, Choong Seon Hong Reliable Event Detection and Congestion Avoidance in Wireless Sensor Networks. Search on Bibsonomy HPCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Rehan Akbani, Turgay Korkmaz, G. V. S. Raju 0001 HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks. Search on Bibsonomy SpringSim (1) The full citation details ... 2007 DBLP  BibTeX  RDF security, MANETs, mobile ad-hoc networks, authentication, HEAP
15Jean-Philippe Aumasson, Willi Meier Analysis of Multivariate Hash Functions. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Karl Scheibelhofer A Bit-Slice Implementation of the Whirlpool Hash Function. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Yu Liu, Charles G. Boncelet Jr. The CRC-NTMAC for Noisy Message Authentication. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis Rescheduling for Optimized SHA-1 Calculation. Search on Bibsonomy SAMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Ryo Nojima, Kazukuni Kobara, Hideki Imai Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Ilsun You Improving the CGA-OMIPv6 Protocol for Low-Power Mobile Nodes. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Jung-Muk Lim, Hyung-Jin Lim, Tai-Myoung Chung Performance Evaluation of Public Key Based Mechanisms for Mobile IPv4 Authentication in AAA Environments. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Jing Lu, John W. Lockwood IPSec Implementation on Xilinx Virtex-II Pro FPGA and Its Application. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Xiangguo Li, Jianhua Yang, Zhaohui Wu 0001 An NFSv4-Based Security Scheme for NAS. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Tadayoshi Kohno Attacking and repairing the winZip encryption scheme. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WinZip, Zip, security fixes, compression, encryption, attacks, applied cryptography
15Yihui Luo, Changsheng Xie, Chengfeng Zhang A Security Scheme for United Storage Network. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Bert den Boer, Bart Van Rompay, Bart Preneel, Joos Vandewalle New (Two-Track-)MAC Based on the Two Trails of RIPEMD. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway UMAC: Fast and Secure Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Jee Hea An, Mihir Bellare Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 201 (100 per page; Change: )
Pages: [<<][1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license