The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACNS"( http://dblp.L3S.de/Venues/ACNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acns

Publication years (Num. hits)
2003 (33) 2004 (37) 2005 (36) 2006 (34) 2007 (32) 2008 (31) 2009 (33) 2010 (33) 2011 (32) 2012 (34) 2013 (36) 2014 (34) 2015 (34) 2016 (36) 2017 (35) 2018 (37) 2019 (30) 2022 (45) 2023 (27)
Publication types (Num. hits)
inproceedings(630) proceedings(19)
Venues (Conferences, Journals, ...)
ACNS(649)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 336 occurrences of 251 keywords

Results
Found 649 publication records. Showing 649 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Angela Jäschke, Frederik Armknecht Accelerating Homomorphic Computations on Rational Numbers. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xiejun Ni, Daojing He, Sammy Chan, Farooq Ahmad Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yunwen Liu, Qingju Wang 0001, Vincent Rijmen Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Weizhi Meng 0001, Wenjuan Li 0001, Duncan S. Wong, Jianying Zhou 0001 TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kâafar Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Krzysztof Grining, Marek Klonowski, Piotr Syga Practical Fault-Tolerant Data Aggregation. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Ahmad-Reza Sadeghi, Steve A. Schneider (eds.) Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ian Goldberg, Graeme Jenkinson, Frank Stajano Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hamza Abusalah, Georg Fuchsbauer Constrained PRFs for Unbounded Inputs with Short Keys. Search on Bibsonomy ACNS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes 0001, Ninja Marnau, Peter Druschel Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Berry Schoenmakers, Meilof Veeningen Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jing Xu 0002, Xuexian Hu, Zhenfeng Zhang Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kenta Takahashi, Takahiro Matsuda 0002, Takao Murakami, Goichiro Hanaoka, Masakatsu Nishigaki A Signature Scheme with a Fuzzy Private Key. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tobias Schneider 0002, Amir Moradi 0001, Tim Güneysu Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky Communication-Optimal Proactive Secret Sharing for Dynamic Groups. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Florian Kelbert, Alexander Pretschner A Fully Decentralized Data Usage Control Enforcement Infrastructure. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré Scalable Divisible E-cash. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven Recovering Lost Device-Bound Credentials. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weiyu Jiang, Jingqiang Lin, Zhan Wang, Huorong Li, Lei Wang 0135 LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Esha Ghosh, Olga Ohrimenko, Roberto Tamassia Zero-Knowledge Authenticated Order Queries and Order Statistics on a List. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yansong Gao, Damith Chinthana Ranasinghe, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott mrPUF: A Novel Memristive Device Based Physical Unclonable Function. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu, Zhen Li, Matt Henricksen Time-Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU - (Extended Abstract). Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Satrajit Ghosh, Aniket Kate Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget). Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cong Chen, Thomas Eisenbarth 0001, Ingo von Maurich, Rainer Steinwandt Differential Power Analysis of a McEliece Cryptosystem. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones 0001, Bertram Poettering Cryptographic Enforcement of Information Flow Policies Without Public Information. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bart Mennink, Bart Preneel On the XOR of Multiple Random Permutations. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhengan Huang, Shengli Liu 0001, Xianping Mao, Kefei Chen Non-malleability Under Selective Opening Attacks: Implication and Separation. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Aniket Kate, Sebastian Meiser 0001, Tim Ruffing Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis (eds.) Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aleksandar Kircanski Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Handan Kilinç, Serge Vaudenay Optimal Proximity Proofs Revisited. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Céline Chevalier Generic Construction of UC-Secure Oblivious Transfer. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Sonia Belaïd, David Pointcheval, Sylvain Ruhault, Damien Vergnaud Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Atsushi Takayasu, Noboru Kunihiro Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuval Yarom, Gefei Li 0001, Damith Chinthana Ranasinghe Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Craig Gentry, Shai Halevi, Charanjit S. Jutla, Mariana Raykova 0001 Private Database Access with HE-over-ORAM Architecture. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jiang Ming 0002, Zhi Xin, Pengwei Lan, Dinghao Wu, Peng Liu 0005, Bing Mao Replacement Attacks: Automatically Impeding Behavior-Based Malware Specifications. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jonas Schneider 0001, Dominique Schröder Foundations of Reconfigurable PUFs. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhen Liu 0008, Duncan S. Wong Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dachuan Liu, Bo Dong, Xing Gao 0001, Haining Wang Exploiting Eye Tracking for Smartphone Authentication. Search on Bibsonomy ACNS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kevin Lewi, Hart William Montgomery, Ananth Raghunathan Improved Constructions of PRFs Secure Against Related-Key Attacks. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Haya Schulmann, Michael Waidner Fragmentation Considered Leaking: Port Inference for DNS Poisoning. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liang Feng Zhang, Reihaneh Safavi-Naini Verifiable Multi-server Private Information Retrieval. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Taechan Kim 0001, Mehdi Tibouchi Bit-Flip Faults on Elliptic Curve Base Fields, Revisited. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xinran Wang, Tadayoshi Kohno, Bob Blakley 0001 Polymorphism as a Defense for Automated Attack of Websites. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama Password-Based Authenticated Key Exchange without Centralized Trusted Setup. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Céline Blondeau, Andrey Bogdanov, Meiqin Wang On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Martin Kreuzer, Alexey D. Myasnikov, Alexander Ushakov A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Sylvain Guilley, Annelie Heuser Detecting Hidden Leakages. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001, Kazuki Yoneyama, Kazuo Ohta Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Rainer W. Gerling, Sebastian Gerling, Stefan Nürnberger, Dominique Schröder, Mark Simkin 0001 WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jia Xu 0006, Jianying Zhou 0001 Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sabyasachi Karati, Abhijit Das 0004 Faster Batch Verification of Standard ECDSA Signatures Using Summation Polynomials. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001 A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Julien Devigne, Olivier Sanders Delegating a Pairing Can Be Both Secure and Efficient. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Henrich Christopher Pöhls, Kai Samelin On Updatable Redactable Signatures. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhe Liu 0001, Erich Wenger, Johann Großschädl MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor Networks. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andriy Stetsko, Tobiás Smolka, Vashek Matyás, Martin Stehlík Improving Intrusion Detection Systems for Wireless Sensor Networks. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel BackRef: Accountability in Anonymous Communication Networks. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhangjie Huang, Lei Hu, Jun Xu 0022, Liqiang Peng, Yonghong Xie Partial Key Exposure Attacks on Takagi's Variant of RSA. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zongyang Zhang, Yu Chen 0003, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao All-but-One Dual Projective Hashing and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yong Li 0021, Sven Schäge, Zheng Yang 0005, Christoph Bader, Jörg Schwenk New Modular Compilers for Authenticated Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ioana Boureanu, Philippe Owesarski, Serge Vaudenay (eds.) Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yanfeng Wang, Wenling Wu, Zhiyuan Guo, Xiaoli Yu Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hadi Ahmadi, Reihaneh Safavi-Naini Private Message Transmission Using Disjoint Paths. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche Sakura: A Flexible Coding for Tree Hashing. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte Practical Signatures from the Partial Fourier Recovery Problem. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Brett Cooley, Haining Wang, Angelos Stavrou Activity Spoofing and Its Defense in Android Smartphones. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum, Thomas Schneider 0003, Axel Schröpfer Automatic Protocol Selection in Secure Two-Party Computations. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros Certified Bitcoins. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yao Lu 0002, Rui Zhang 0002, Dongdai Lin New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Franziskus Kiefer, Mark Manulis Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yu Sasaki Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sonia Bogos, Ioana Boureanu, Serge Vaudenay Primeless Factoring-Based Cryptography - -Solving the Complexity Bottleneck of Public-Key Generation-. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tore Kasper Frederiksen, Jesper Buus Nielsen Fast and Maliciously Secure Two-Party Computation Using the GPU. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1N. Asokan, Alexandra Dmitrienko, Marcin Nagy, Elena Reshetova, Ahmad-Reza Sadeghi, Thomas Schneider 0003, Stanislaus Stelle CrowdShare: Secure Mobile Resource Sharing. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad Etemad, Alptekin Küpçü Transparent, Distributed, and Replicated Dynamic Provable Data Possession. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dan Boneh, Craig Gentry, Shai Halevi, Frank Wang, David J. Wu 0001 Private Database Queries Using Somewhat Homomorphic Encryption. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aurore Guillevic Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Björn Deiseroth, Victoria Fehr, Marc Fischlin, Manuel Maasz, Nils Fabian Reimers, Richard Stein Computing on Authenticated Data for Adjustable Predicates. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jacques Patarin Generic Attacks for the Xor of k Random Permutations. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ana Helena Sánchez, Francisco Rodríguez-Henríquez NEON Implementation of an Attribute-Based Encryption Scheme. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov, Yelena Yuditsky Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract). Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Filip Zagórski, Richard Carback, David Chaum, Jeremy Clark, Aleksander Essex, Poorvi L. Vora Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Laila El Aimani, Marc Joye Toward Practical Group Encryption. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthias Schäfer 0002, Vincent Lenders, Ivan Martinovic Experimental Analysis of Attacks on Next Generation Air Traffic Communication. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rikke Bendlin, Sara Krehbiel, Chris Peikert How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sören Bleikertz, Sven Bugiel, Hugo Ideler, Stefan Nürnberger, Ahmad-Reza Sadeghi Client-Controlled Cryptography-as-a-Service in the Cloud. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Cristina Onete Terrorism in Distance Bounding: Modeling Terrorist-Fraud Resistance. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Koutarou Suzuki, Kazuki Yoneyama Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Le Trieu Phong Leakage Resilient IBE and IPE under the DLIN Assumption. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Arno Mittelbach Cryptophia's Short Combiner for Collision-Resistant Hash Functions. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Bernhard, Georg Fuchsbauer, Essam Ghadafi Efficient Signatures of Knowledge and DAA in the Standard Model. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael J. Jacobson Jr., Michael E. Locasto, Payman Mohassel, Reihaneh Safavi-Naini (eds.) Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiangxue Li, Haifeng Qian, Yu Yu 0001, Yuan Zhou 0008, Jian Weng 0001 Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 649 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license