The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CANS"( http://dblp.L3S.de/Venues/CANS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cans

Publication years (Num. hits)
2005 (28) 2006 (27) 2007 (18) 2008 (28) 2009 (36) 2010 (24) 2011 (21) 2012 (23) 2013 (19) 2014 (26) 2015 (19) 2016 (57) 2017 (28) 2018 (27) 2019 (30) 2020 (31) 2021 (29) 2022 (21) 2023 (26)
Publication types (Num. hits)
inproceedings(499) proceedings(19)
Venues (Conferences, Journals, ...)
CANS(518)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 240 occurrences of 182 keywords

Results
Found 518 publication records. Showing 518 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.) Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peng Zhang, Bing Sun 0001, Chao Li 0002 Saturation Attack on the Block Cipher HIGHT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HIGHT, Saturation attack, Block cipher, Distinguisher
1Benoît Libert, Damien Vergnaud Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF verifier-local revocation, backward unlinkability, Group signatures, standard model, bilinear maps
1Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF linear hulls, algebraic analysis, systems of sparse polynomial equations of low degree, RFID, block ciphers
1G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy preserving Set operations, Multiparty Computation
1Lin Yang, Meiqin Wang, Siyuan Qiao Side Channel Cube Attack on PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cube attack, Cryptanalysis, Side channel attack, PRESENT
1Xavier Boyen HPAKE : Password Authentication Secure against Cross-Site User Impersonation. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, Hossein Arabnezhad Khanooki MIBS: A New Lightweight Block Cipher. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Low-cost RFID Tags, Block Cipher, Lightweight, Resource-Constrained Devices
1Jiali Choy, Huihui Yap, Khoongming Khoo An Analysis of the Compact XSL Attack on BES and Embedded SMS4. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Compact XSL Attack, ESMS4, BES
1Chong Hee Kim, Gildas Avoine RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distance bounding protocol, authentication, RFID, relay attack
1Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF supersingular curve, multi-core, Tate pairing, finite field arithmetic, ? T pairing
1Liming Fang 0001, Willy Susilo, Chunpeng Ge, Jiandong Wang A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public key encryption with keyword search, without random oracle, searchable encryption
1Wenting Jin, Jing Xu 0002 An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm
1Shaojing Fu, Chao Li 0002, Kanta Matsuura, Longjiang Qu Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Boolean Function, Nonlinearity, Algebraic Immunity, Rotation Symmetry
1Xiangxi Li, Yu Zhang, Yuxin Deng Verifying Anonymous Credential Systems in Applied Pi Calculus. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Craig Gentry Computing on Encrypted Data. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann Anonymizer-Enabled Security and Privacy for RFID. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan Unconditionally Reliable Message Transmission in Directed Hypergraphs. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Unbounded Computing Power, Unconditional Reliability
1Robert H. Deng, Jian Weng 0001, Shengli Liu 0001, Kefei Chen Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bilinear pairing, chosen-ciphertext security, Proxy re-encryption
1Michel Abdalla, Malika Izabachène, David Pointcheval Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Marc Joye An Efficient On-Line/Off-Line Signature Scheme without Random Oracles. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF on-line/off-line signing, Cryptography, digital signature, standard model
1Koichi Shimizu, Daisuke Suzuki, Toyohiro Tsurumaru High-Speed Search System for PGP Passphrases. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Youming Qiao, Christophe Tartary Counting Method for Multi-party Computation over Non-abelian Groups. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Neighbor-Avoiding Walk, Random Walk, Graph Coloring, Multiparty Computation, Non-Abelian Groups, Passive Adversary
1Bogdan Carbunar, Mahesh V. Tripunitara Conditional Payments for Computing Markets. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo 0001, Huaxiong Wang Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LSBS-RSA, short exponent attack, lattice reduction technique, the Boneh-Durfee attack, RSA, least significant bits (LSBs)
1Tiancheng Lou, Christophe Tartary Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate
1Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor, Hossein Ghodosi Cryptanalysis of MV3 Stream Cipher. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MV3 Algorithm, Cryptanalysis, Stream Ciphers, Distinguishing Attack
1David Galindo, Rodrigo Roman, Javier López 0001 A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF identity-based key agreement, key distribution, pairings, underwater wireless sensor networks
1Huafei Zhu Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols
1Chao Li 0002, Shaojing Fu, Bing Sun 0001 Construction of Resilient Functions with Multiple Cryptographic Criteria. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Nonlinearity, Linear Code, Resilient function, Linear structure
1Julien Bringer, Hervé Chabanne, Thomas Icart Cryptanalysis of EC-RAC, a RFID Identification Protocol. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, RFID, Cryptanalysis, Identification, Zero-Knowledge
1Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong (eds.) Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation
1Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan Hybrid Damgård Is CCA1-Secure under the DDH Assumption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems
1Atefeh Mashatan, Douglas R. Stinson A New Message Recognition Protocol for Ad Hoc Pervasive Networks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad Hoc Networks, Authentication, Recognition, Cryptographic Protocols, Pervasive Networks
1Peishun Wang, Huaxiong Wang, Josef Pieprzyk Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Keyword field, dynamic group, conjunctive keyword search
1Fagen Li, Masaaki Shirase, Tsuyoshi Takagi On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack
1Raylin Tso, Xun Yi, Xinyi Huang 0001 Efficient and Short Certificateless Signature. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bilinear pairing, random oracle, short signature, certificateless signature
1Yu Zhang An Open Framework for Remote Electronic Elections. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu 0001 Sanitizable Signatures Revisited. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sanitizable signatures, standard model, pairings
1Shaojing Fu, Chao Li 0002, Bing Sun 0001 Enumeration of Homogeneous Rotation Symmetric Functions over Fp. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Minimal function, Monic monomial, Algebraic degree, Rotation symmetry
1Yumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Katou, Yoshitaka Morikawa Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jorge Nakahara Jr. 3D: A Three-Dimensional Block Cipher. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF block cipher design, 3-dimensional state
1Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu Authenticated Directed Diffusion. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Directed Diffusion
1Vicente Benjumea, Seung Geol Choi, Javier López 0001, Moti Yung Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF group signatures, ring signatures, Anonymous authentication, X.509 certificates, traceable signatures
1Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu How to Secure Your Email Address Book and Beyond. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF self-spreading malicious emails, self-replicating malicious emails, email address book, encryption
1Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk Forward-Secure Key Evolution in Wireless Sensor Networks. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF communication in sensor networks, directed random graphs, key management, key distribution, forward security
1Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini Achieving Mobility and Anonymity in IP-Based Networks. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobility, anonymity, Mobile IP, location privacy, IP networks, Tor
1Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang 0001 Extended Private Information Retrieval and Its Application in Biometrics Authentications. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing (eds.) Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Rui Zhang 0002, Hideki Imai Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yinxia Sun, Futai Zhang, Joonsang Baek Strongly Secure Certificateless Public Key Encryption Without Pairing. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificateless public key encryption, public key encryption, Computational Diffie-Hellman problem
1Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin An Intelligent Network-Warning Model with Strong Survivability. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Strong Survivability, Network-Warning, Intelligence, Equality
1Jihwan Lim, Sangjin Kim, Heekuck Oh A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure location service, ad hoc network, position-based routing
1Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Reliable and Secure Communication, Information Theoretic Security, Directed Networks, Communication Efficiency
1Solahuddin B. Shamsuddin, Michael E. Woodward Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data base, Anomaly, Network Intrusion Detection System
1Loránd Szöllösi, Tamás Marosits, Gábor Fehér, András Recski Fast Digital Signature Algorithm Based on Subgraph Isomorphism. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto Toward Non-parallelizable Client Puzzles. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Non-Parallelizable Cryptographic Puzzles, Client Puzzles, Denial of Service Attacks
1Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto Efficient ID-Based Digital Signatures with Message Recovery. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF k-BDHI problem, pairing, short signature, ID-based signature, message recovery
1Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 A Generic Construction for Universally-Convertible Undeniable Signatures. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Universally-Convertible, Provable Security, Undeniable Signature, Generic Construction
1Fuchun Guo, Yi Mu 0001, Zhide Chen Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mutative Identity, ID-based Signature
1Sherman S. M. Chow Running on Karma - P2P Reputation and Currency Systems. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF peer-to-peer, reputation, Byzantine agreement, free riding, micropayments, Decentralized systems, currency
1Rongxing Lu, Zhenfu Cao, Xiaolei Dong Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jianqin Zhou, Qiang Zheng A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3). Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, linear complexity, periodic sequence, minimal polynomial
1Xiyong Zhang, Hua Guo, Jinjiang Yuan A Note of Perfect Nonlinear Functions. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jian Kang 0001, Yuan Zhang, Jiu-bin Ju Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nathalie Dagorn Cooperative Intrusion Detection for Web Applications. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Tae Hyun Kim 0003, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim 0001, Jongin Lim 0001 Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Randomized projective coordinate systems, Eta pairing, Side channel attacks, Differential Power Analysis, Pairing based cryptosystems
1Jinquan Zeng, XiaoJie Liu, Tao Li 0016, Feixian Sun, Lingxi Peng, Caiming Liu An Immune-Based Model for Service Survivability. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF service survivability, artificial immune system, risk evaluation
1Xiaomin Wang, Jiashu Zhang, Wenfang Zhang Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Nonlinear digital filter, Chaos, Cryptology, Keystream
1Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang Smart Architecture for High-Speed Intrusion Detection and Prevention Systems. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Christophe Tartary, Huaxiong Wang Achieving Multicast Stream Authentication Using MDS Codes. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF erasure codes, stream authentication, polynomial reconstruction
1Hongsong Shi, Mingxing He, Zhiguang Qin Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Clustering, Ad hoc networks, Bilinear pairings, Group key agreement, Hierarchical routing
1Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 A Diffie-Hellman Key Exchange Protocol Without Random Oracles. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation
1Qutaiba Albluwi, Ibrahim Kamel Watermarking Essential Data Structures for Copyright Protection. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Liming Wang, Chuan-Kun Wu Authenticated Group Key Agreement for Multicast. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Feng Cao, Zhenfu Cao Security Model of Proxy-Multi Signature Schemes. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chester Rebeiro, A. David Selvakumar, A. S. L. Devi Bitslice Implementation of AES. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Guan Jie, Zhang Zhongya Improved Collision Attack on Reduced Round Camellia. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Block cipher, Collision attack, Camellia
1Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nuttapong Attrapadung, Jun Furukawa 0001, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002 Efficient Identity-Based Encryption with Tight Security Reduction. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cramer-Shoup framework, subgroup membership problems, public key encryption, chosen ciphertext security, hybrid encryption
1Jianhua Yang, Byong Lee, Yongzhong Zhang Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection, Network security, round-trip time, stepping-stone
1Sujing Zhou, Dongdai Lin Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF LRSW Assumption, Verifier-Local Revocation, Group Signature, Bilinear Map
1Lan Yu, Willy Susilo, Reihaneh Safavi-Naini X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XRep, X2Rep and X2BTRep, P2P, Reputation System
1David Pointcheval, Yi Mu 0001, Kefei Chen (eds.) Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan Steganalysis Based on Differential Statistics. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF HCF, differentiation, co-occurrence matrix, COM
1Xianxian Li, Lijun Liu A Multi-agent Cooperative Model and System for Integrated Security Monitoring. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Knowledge Management, Network security, Security monitoring, Multi-agent cooperation
1Sven Laur, Kaisa Nyberg Efficient Mutual Data Authentication Using Manually Authenticated Strings. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Haiyong Bao, Zhenfu Cao, Haifeng Qian On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López 0001 A Novel Method to Maintain Privacy in Mobile Agent Applications. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DCSC, privacy, Mobile agent, secure computation
1Yvo Desmedt, Huaxiong Wang, Yi Mu 0001, Yongqing Li (eds.) Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang On the Security of Certificateless Signature Schemes from Asiacrypt 2003. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Bilinear Pairing, Attack Model, Certificateless Cryptography, Certificateless Signature
1Fanyu Kong, Daxing Li A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF signed window algorithm, elliptic curve cryptosystems, point multiplication, signed-digit number representations
1Zhenfeng Zhang, Jing Xu 0002, Dengguo Feng Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security protocol, Fair exchange, Identity-based signature, Certified E-mail
1Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco Design and Implementation of an Inline Certified E-mail Service. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 The Second-Preimage Attack on MD4. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision differential path, weak message, Hash function, second-preimage
1Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo On Securing RTP-Based Streaming Content with Firewalls. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF streaming content, Network security, firewall
1Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese On the Performance and Analysis of DNS Security Extensions. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 518 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license