The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACNS"( http://dblp.L3S.de/Venues/ACNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acns

Publication years (Num. hits)
2003 (33) 2004 (37) 2005 (36) 2006 (34) 2007 (32) 2008 (31) 2009 (33) 2010 (33) 2011 (32) 2012 (34) 2013 (36) 2014 (34) 2015 (34) 2016 (36) 2017 (35) 2018 (37) 2019 (30) 2022 (45) 2023 (27)
Publication types (Num. hits)
inproceedings(630) proceedings(19)
Venues (Conferences, Journals, ...)
ACNS(649)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 336 occurrences of 251 keywords

Results
Found 649 publication records. Showing 649 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Baudoin Collard, François-Xavier Standaert Multi-trail Statistical Saturation Attacks. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing How to Construct Interval Encryption from Binary Tree Encryption. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, Thomas Icart Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang 0003 Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen Efficient Implementation of the Orlandi Protocol. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nicolas Veyrat-Charvillon, François-Xavier Standaert Adaptive Chosen-Message Side-Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann On RFID Privacy with Mutual Authentication and Tag Corruption. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Markus Rückert, Michael Schneider 0002, Dominique Schröder Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wei Xu, Sencun Zhu, Heng Xu COP: A Step toward Children Online Privacy. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yuechuan Wei, Ping Li, Bing Sun 0001, Chao Li 0002 Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Atefeh Mashatan, Serge Vaudenay A Message Recognition Protocol Based on Standard Assumptions. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Moti Yung (eds.) Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Laurie Genelle, Emmanuel Prouff, Michaël Quisquater Secure Multiplicative Masking of Power Functions. Search on Bibsonomy ACNS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF algorithmic tamper proof (ATP), counter unit, PIN authentication
1Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer Attacking ECDSA-Enabled RFID Devices. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Implementation Security, Radio-Frequency Identification, RFID, Elliptic Curve Cryptography, Side-Channel Analysis, ECDSA
1Patrick Longa, Catherine H. Gebotys Novel Precomputation Schemes for Elliptic Curve Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple scalar multiplication, precomputation scheme, conjugate addition, Elliptic curve cryptosystem, scalar multiplication
1Shweta Agrawal, Dan Boneh Homomorphic MACs: MAC-Based Integrity for Network Coding. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christian Cachin, Martin Geisler 0001 Integrity Protection for Revision Control. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hash trees, memory checking, fork linearizability, storage security, applied cryptography
1Jörg Lenhard, Karsten Loesing, Guido Wirtz Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Hideki Imai Dual-Policy Attribute Based Encryption. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key policy, Attribute-based encryption, Ciphertext policy
1Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou 0001 A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean Monnerat, Sylvain Pasini, Serge Vaudenay Efficient Deniable Authentication for Signatures. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Seiko Arita, Koji Tsurudome Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption
1Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF randomness expansion, pseudorandom function (PRF), leftover hash lemma (LHL), key agreement, universal hash function, randomness extraction, key exchange protocols
1Thomas Plantard, Willy Susilo Broadcast Attacks against Lattice-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Broadcast attack, lattice-based cryptosystem, knapsack cryptosystem, intersecting lattice
1Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Practical Secure Evaluation of Semi-private Functions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SFE of semi-private functions, Yao’s protocol, optimization, privacy, compiler, topology
1Nitesh Saxena, Md. Borhan Uddin Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Evil Twin Attacks, Security, Usability, Authentication, Wireless Communication, Device Pairing
1Martin Eian Fragility of the Robust Security Network: 802.11 Denial of Service. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i
1Florian Mendel, Tomislav Nad, Martin Schläffer Collision Attack on Boole. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lei Liu 0021, Songqing Chen Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud (eds.) Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Cas J. F. Cremers Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Session- state reveal, Ephemeral Key reveal, Provably-secure, Authenticated Key Exchange
1Joseph K. Liu, Jianying Zhou 0001 An Efficient Identity-Based Online/Offline Encryption Scheme. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Serdar Pehlivanoglu Tracing and Revoking Pirate Rebroadcasts. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ayman Jarrous, Benny Pinkas Secure Hamming Distance Based Computation and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
1Eric Brier, Thomas Peyrin Cryptanalysis of CubeHash. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CubeHash, hash functions, collision
1Mark Manulis Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Christian Rechberger, Martin Schläffer Cryptanalysis of Twister. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Twister, hash function, collision-, preimage attack, SHA-3, second-preimage-
1MoonShik Lee, Daegun Ma, MinJae Seo Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public-key traitor tracing, black-box tracing, self-defensive pirates, linear attack, cryptanalysis
1Alok Tongaonkar, R. Sekar 0001, Sreenaath Vasudevan Fast Packet Classification Using Condition Factorization. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Emmanuel Prouff, Matthieu Rivain Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1François-Xavier Standaert, François Koeune, Werner Schindler How to Compare Profiled Side-Channel Attacks?. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Self-Recoverability, Ad Hoc Networks, Authentication, Recognition, Cryptographic Protocols, Pervasive Networks
1Dana Dachman-Soled, Tal Malkin, Mariana Raykova 0001, Moti Yung Efficient Robust Private Set Intersection. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptographic Protocols, Privacy Preserving Data Mining, Secure Two-party Computation, Set Intersection
1Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong Generic Security-Amplifying Methods of Ordinary Digital Signatures. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability
1Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang Traceable and Retrievable Identity-Based Encryption. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PKG, Trust, Retrievability, Traceability, Identity-based Encryption
1Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger Replay Attack in a Fair Exchange Protocol. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Aline Gouget Anonymity in Transferable E-cash. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Nikita Borisov, Soumyadeb Mitra Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Khaled Ouafi, Raphael C.-W. Phan Traceable Privacy of Recent Provably-Secure RFID Protocols. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, RFID, Authentication protocols, Untraceability
1Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer On the Security of the CCM Encryption Mode and of a Slight Variant. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCM, CBC-MAC, Counter mode
1Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis Pushback for Overlay Networks: Protecting Against Malicious Insiders. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1David Canright, Lejla Batina A Very Compact "Perfectly Masked" S-Box for AES. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composite Galois field, AES, DPA, S-box, masking
1Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng New Differential-Algebraic Attacks and Reparametrization of Rainbow. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF oil-and-vinegar, rank, algebraic attack, differential attack
1David Pointcheval, Sébastien Zimmer Multi-factor Authenticated Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Fabien Laguillaumie, Michel Milhau TrapdoorSanitizable Signatures and Their Application to Content Protection. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos Peeking Through the Cloud: DNS-Based Estimation and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Client Density Estimation, Web-metering, Network Security, Botnets
1Ghaith Hammouri, Berk Sunar PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HB+, tamper resilience, provable security, PUF
1Joonsang Baek, Jianying Zhou 0001, Feng Bao 0001 Generic Constructions of Stateful Public Key Encryption and Their Applications. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Somitra Kumar Sanadhya, Palash Sarkar 0001 Attacking Reduced Round SHA-256. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung (eds.) Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Patrick P. Tsang, Sean W. Smith PPAA: Peer-to-Peer Anonymous Authentication. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, VANets, reputation systems, credentials, anonymous authentication, secret handshakes
1Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Liang Xie 0002, Hui Song, Sencun Zhu On the Effectiveness of Internal Patching Against File-Sharing Worms. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Vladimir Shpilrain, Alexander Ushakov An Authentication Scheme Based on the Twisted Conjugacy Problem. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marina Blanton Improved Conditional E-Payments. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yevgeniy Dodis, Prashant Puniya Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Breno de Medeiros The Security of EPC Gen2 Compliant RFID Protocols. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EPCGen2 compliance, security, anonymity, unlinkability, forward secrecy
1John C. Mitchell, Arnab Roy 0001, Paul D. Rowe, Andre Scedrov Analysis of EAP-GPSK Authentication Protocol. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ramnath Prasad, Nitesh Saxena Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Brian King wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Frank Stajano, Daniel Cvrcek, Matt Lewis Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Recipient Anonymity, Access Control on Encrypted Data, Attribute-Based Encryption, Ciphertext Policy
1Marek Klonowski, Miroslaw Kutylowski, Anna Lauks Repelling Detour Attack Against Onions with Re-encryption. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ronghua Li, Chuankun Wu An Unconditionally Secure Protocol for Multi-Party Set Intersection. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy-preserving set ntersection, Secure multi-party computation, unconditional security
1Diana von Bidder, David A. Basin, Germano Caronni Midpoints Versus Endpoints: From Protocols to Firewalls. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Zhengqin Luo, Xiaojuan Cai, Jun Pang 0001, Yuxin Deng Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Keith B. Frikken Privacy-Preserving Set Union. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner Cryptanalysis of the TRMC-4 Public Key Cryptosystem. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TRMC, linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
1Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim 0001, Tsuyoshi Takagi Compressed XTR. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF On-line/off-line signatures, Key exposure, Chameleon hashing
1Qiong Huang 0001, Duncan S. Wong, Yiming Zhao Generic Transformation to Strongly Unforgeable Signatures. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Roberto Tamassia, Nikos Triandopoulos Efficient Content Authentication in Peer-to-Peer Networks. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF the Wiener attack, most significant bit, RSA, exhaustive-searching, continued fraction
1Philip Zigoris, Hongxia Jin Bayesian Methods for Practical Traitor Tracing. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Chunxiang Gu, Yuefei Zhu, Yonghui Zheng Certified E-Mail Protocol in the ID-Based Setting. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certified e-mail protocols, bilinear pairings, ID-based cryptography, verifiably encrypted signatures
1Jonathan Katz, Moti Yung (eds.) Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park Sliding Window Method for NTRU. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF nonce-chained authentication, scalability, Cryptography, provable security, binary tree, group key exchange
1Stanislaw Jarecki, Xiaomin Liu Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Matthew Green 0001, Giuseppe Ateniese Identity-Based Proxy Re-encryption. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity-based encryption, bilinear maps, proxy re-encryption
1Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee 0001 Efficient Certificateless Signature Schemes. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bahador Bakhshi, Babak Sadeghiyan A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blakley’s algorithm, modular multiplication, timing attack, DSA
1Sven Laur, Helger Lipmaa A New Protocol for Conditional Disclosure of Secrets and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption
1Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF session key distribution, sensor network, computational security, self-healing, revocation
1Patrick Schaller, Srdjan Capkun, David A. Basin BAP: Broadcast Authentication Using Cryptographic Puzzles. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 649 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license