The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACNS"( http://dblp.L3S.de/Venues/ACNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acns

Publication years (Num. hits)
2003 (33) 2004 (37) 2005 (36) 2006 (34) 2007 (32) 2008 (31) 2009 (33) 2010 (33) 2011 (32) 2012 (34) 2013 (36) 2014 (34) 2015 (34) 2016 (36) 2017 (35) 2018 (37) 2019 (30) 2022 (45) 2023 (27)
Publication types (Num. hits)
inproceedings(630) proceedings(19)
Venues (Conferences, Journals, ...)
ACNS(649)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 336 occurrences of 251 keywords

Results
Found 649 publication records. Showing 649 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Erich Wenger Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chee Meng Tey, Payas Gupta, Debin Gao, Yan Zhang Keystroke Timing Analysis of on-the-fly Web Apps. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kwangsu Lee, Dong Hoon Lee 0001, Moti Yung Sequential Aggregate Signatures Made Shorter. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Samuel Neves, Zooko Wilcox-O'Hearn, Christian Winnerlein BLAKE2: Simpler, Smaller, Fast as MD5. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud Analysis and Improvement of Lindell's UC-Secure Commitment Schemes. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yu Sasaki Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sven Laur, Riivo Talviste, Jan Willemson From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yi-Ruei Chen, Cheng-Kang Chu, Wen-Guey Tzeng, Jianying Zhou 0001 CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tilo Müller, Michael Spreitzenbarth FROST - Forensic Recovery of Scrambled Telephones. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ryan Henry, Ian Goldberg Batch Proofs of Partial Knowledge. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexander Wild, Tim Güneysu, Amir Moradi 0001 Attacking Atmel's CryptoMemory EEPROM with Special-Purpose Hardware. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jin Han, Su Mon Kywe, Qiang Yan 0001, Feng Bao 0001, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou 0001 Launching Generic Attacks on iOS with Approved Third-Party Applications. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Maggie E. Habeeb, Delaram Kahrobaei, Charalambos Koupparis, Vladimir Shpilrain Public Key Exchange Using Semidirect Product of (Semi)Groups. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Henson, Stephen Taylor Beyond Full Disk Encryption: Protection on Security-Enhanced Commodity Processors. Search on Bibsonomy ACNS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fangguo Zhang, Qiping Lin, Shengli Liu 0001 Zero-Value Point Attacks on Kummer-Based Cryptosystem. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Zongyang Zhang, Dongdai Lin, Zhenfu Cao Identity-Based Extractable Hash Proofs and Their Applications. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Panagiotis Rizomiliotis, Stefanos Gritzalis GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gilles Piret, Thomas Roche, Claude Carlet PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Boyang Wang, Baochun Li, Hui Li 0006 Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa Secure Accumulators from Euclidean Rings without Trusted Setup. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Feng Hao 0001, Dylan Clarke Security Analysis of a Multi-factor Authenticated Key Exchange Protocol. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhiqiang Liu 0001, Dawu Gu, Ya Liu 0001, Wei Li 0013 Linear Fault Analysis of Block Ciphers. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiang Xie, Rui Xue 0001, Rui Zhang 0002 Inner-Product Lossy Trapdoor Functions and Applications. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Taiichi Saito, Keita Xagawa Security Enhancements by OR-Proof in Identity-Based Identification. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang 0006 A General Construction for 1-Round δ-RMT and (0, δ)-SMT. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao RIKE: Using Revocable Identities to Support Key Escrow in PKIs. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan The Shy Mayor: Private Badges in GeoSocial Networks. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Afonso Arriaga, Manuel Barbosa, Pooya Farshim On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tilo Müller, Benjamin Taubmann, Felix C. Freiling TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031 Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tingwen Liu, Yong Sun, Alex X. Liu, Li Guo 0001, Binxing Fang A Prefiltering Approach to Regular Expression Matching for Network Security Systems. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Minh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Basel Alomair Authenticated Encryption: How Reordering Can Impact Performance. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao A New Framework for Privacy of RFID Path Authentication. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Haibin Zhang Length-Doubling Ciphers and Tweakable Ciphers. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jason Gionta, Peng Ning, Xiaolan Zhang 0001 iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Pierangela Samarati, Jianying Zhou 0001 (eds.) Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo Breaking an Animated CAPTCHA Scheme. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xin Ye 0002, Thomas Eisenbarth 0001 Wide Collisions in Practice. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zi Chu, Indra Widjaja, Haining Wang Detecting Social Spam Campaigns on Twitter. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, Evangelos P. Markatos ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuki Asano, Shingo Yanagihara, Tetsu Iwata Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer On Structural Signatures for Tree Data Structures. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zekeriya Erkin, Gene Tsudik Private Computation of Spatial and Temporal Power Consumption with Smart Meters. Search on Bibsonomy ACNS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ashish Choudhury, Kaoru Kurosawa, Arpita Patra Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mansoor Alicherry, Angelos D. Keromytis Misuse Detection in Consent-Based Networks. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Keith B. Frikken, Hao Yuan, Mikhail J. Atallah Secure Authenticated Comparisons. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Javier López 0001, Gene Tsudik (eds.) Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ashwin Chaugule, Zhi Xu 0004, Sencun Zhu A Specification Based Intrusion Detection Framework for Mobile Phones. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tomer Ashur, Orr Dunkelman Linear Analysis of Reduced-Round CubeHash. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Ilya Kizhvatov, Bin Zhang 0003 Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto Analysis of Message Injection in Stream Cipher-Based Hash Functions. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jacob C. N. Schuldt, Goichiro Hanaoka Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Patrick Butler, Kui Xu 0002, Danfeng (Daphne) Yao Quantitatively Analyzing Stealthy Communication Channels. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yipeng Wang 0001, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo 0001 Inferring Protocol State Machine from Network Traces: A Probabilistic Approach. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Henrich Christopher Pöhls, Kai Samelin, Joachim Posegga Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Werner Schindler, Kouichi Itoh Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wenling Wu, Lei Zhang 0012 LBlock: A Lightweight Block Cipher. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dana Dachman-Soled, Tal Malkin, Mariana Raykova 0001, Moti Yung Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong Generic Fully Simulatable Adaptive Oblivious Transfer. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy 0001, Michael Steiner 0001, Wietse Z. Venema Composable Security Analysis of OS Services. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Emiliano De Cristofaro, Mark Manulis, Bertram Poettering Private Discovery of Common Social Contacts. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marc Fischlin, Cristina Onete Relaxed Security Notions for Signatures of Knowledge. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo Double-Trapdoor Anonymous Tags for Traceable Signatures. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kari Kostiainen, N. Asokan, Alexandra Afanasyeva Towards User-Friendly Credential Transfer on Open Credential Platforms. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Duong Hieu Phan, David Pointcheval, Mario Strefler Security Notions for Broadcast Encryption. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Cihangir Tezcan, Serge Vaudenay On Hiding a Plaintext Length by Preencryption. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefan Kölbl, Florian Mendel Practical Attacks on the Maelstrom-0 Compression Function. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux Cache Timing Analysis of RC4. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Rosario Gennaro, Orazio Puglisi Fully Non-interactive Onion Routing with Forward-Secrecy. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daiki Chiba 0002, Takahiro Matsuda 0002, Jacob C. N. Schuldt, Kanta Matsuura Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Carlos Cid Cold Boot Key Recovery by Solving Polynomial Systems with Noise. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Luan Ibraimi, Svetla Nikova, Pieter H. Hartel, Willem Jonker Public-Key Encryption with Delegated Search. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao Hierarchical Identity-Based Chameleon Hash and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rishiraj Bhattacharyya, Avradip Mandal On the Indifferentiability of Fugue and Luffa. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paolo D'Arco, Angel L. Pérez del Pozo Fighting Pirates 2.0. Search on Bibsonomy ACNS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu, Jing Pan, Jerry den Hartog Principles on the Security of AES against First and Second-Order Differential Power Analysis. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Matthew K. Franklin, Payman Mohassel Efficient and Secure Evaluation of Multivariate Polynomials and Applications. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bogdan Carbunar, Radu Sion Regulatory Compliant Oblivious RAM. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud Batch Groth-Sahai. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Robert H. Deng, Yingjiu Li Revisiting Unpredictability-Based RFID Privacy Models. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Benny Pinkas, Bertram Poettering Privacy-Preserving Group Discovery with Linear Complexity. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xuhua Ding A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nicolas Méloni, Christophe Nègre, M. Anwar Hasan High Performance GHASH Function for Long Messages. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser 0001, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder Redactable Signatures for Tree-Structured Data: Definitions and Constructions. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chengfang Fang, Qiming Li, Ee-Chien Chang Secure Sketch for Multiple Secrets. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Brent Waters Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa, Bingsheng Zhang Two New Efficient PIR-Writing Protocols. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Serdar Pehlivanoglu Improving the Round Complexity of Traitor Tracing Schemes. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rosario Gennaro, Hugo Krawczyk, Tal Rabin Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee Trapdoor Sanitizable Signatures Made Easy. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andrew Chi-Chih Yao, Yunlei Zhao Deniable Internet Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Bertram Poettering, Gene Tsudik Affiliation-Hiding Key Exchange with Untrusted Group Authorities. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi S. Sandhu Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 649 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license