The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACNS"( http://dblp.L3S.de/Venues/ACNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acns

Publication years (Num. hits)
2003 (33) 2004 (37) 2005 (36) 2006 (34) 2007 (32) 2008 (31) 2009 (33) 2010 (33) 2011 (32) 2012 (34) 2013 (36) 2014 (34) 2015 (34) 2016 (36) 2017 (35) 2018 (37) 2019 (30) 2022 (45) 2023 (27)
Publication types (Num. hits)
inproceedings(630) proceedings(19)
Venues (Conferences, Journals, ...)
ACNS(649)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 336 occurrences of 251 keywords

Results
Found 649 publication records. Showing 649 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Johannes Buchmann 0001, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume Merkle Signatures with Virtually Unlimited Signature Capacity. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SSL, post-quantum cryptography, Merkle signatures
1Guomin Yang, Jing Chen 0001, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang 0002 A More Natural Way to Construct Identity-Based Identification Schemes. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Concurrent attacks, Identity-based cryptography, Identification schemes
1Rui Zhang 0002 Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jiangtao Li 0001, Ninghui Li, Rui Xue 0001 Universal Accumulators with Efficient Nonmembership Proofs. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Laila El Aimani, Damien Vergnaud Gradually Convertible Undeniable Signatures. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Fagen Li, Yupu Hu, Chuanrong Zhang An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity-based signcryption, Ad hoc networks, provable security, bilinear pairings
1Stefan Tillich, Christoph Herbst, Stefan Mangard Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software countermeasures, implementation security, Advanced Encryption Standard, side-channel attacks, DPA, power analysis, instruction set extensions
1Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi Security Mediated Certificateless Signatures. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security mediated, SMC cryptography, certificateless
1Ahren Studer, Chenxi Wang Adaptive Detection of Local Scanners. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Scan Detection, Security, Internet Worms
1Nitesh Saxena Public Key Cryptography Sans Certificates in Ad Hoc Networks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stanislaw Jarecki, Jihye Kim, Gene Tsudik Authentication for Paranoids: Multi-party Secret Handshakes. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dayin Wang, Dongdai Lin, Wenling Wu An Improved Poly1305 MAC. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xinghua Li 0001, Sang-Jae Moon, Jianfeng Ma 0001 On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Camille Vuillaume, Katsuyuki Okeya Flexible Exponentiation with Resistance to Side Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fractional width, RSA, side channel attacks, simple power analysis
1Pinhui Ke, Jie Zhang 0004, Qiaoyan Wen Results on Almost Resilient Functions. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Almost resilient Function, Almost correlation immune function, Resilient function
1Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough DSO: Dependable Signing Overlay. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance
1Sébastien Canard, Aline Gouget, Emeline Hufschmitt A Handy Multi-coupon System. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Electronic coupons, security model, proof of knowledge
1Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy
1Ahto Buldas, Sven Laur Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi Physical Security Bounds Against Tampering. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Tamper-Proof Hardware, Fault Prevention, Fault Detection, Error Detection, Fault Analysis, Physical Security, Adversarial Model, Implementation Attack
1Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm Stateful Subset Cover. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka Improving the Randomized Initial Point Countermeasure Against DPA. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP
1Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Christoph Herbst, Elisabeth Oswald, Stefan Mangard An AES Smart Card Implementation Resistant to Power Analysis Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA resistance, smart card, AES
1Aggelos Kiayias, Antonina Mitrofanova Syntax-Driven Private Evaluation of Quantified Membership Queries. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sujata Doshi, Fabian Monrose, Aviel D. Rubin Efficient Memory Bound Puzzles Using Pattern Databases. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Qiang Tang 0001, Kim-Kwang Raymond Choo Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF provable security, key agreement, P2P network, CAPTCHA
1Dibyendu Chakrabarti, Jennifer Seberry Combinatorial Structures for Design of Wireless Sensor Networks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Transversal Design, Sensor Network, Key Pre- distribution, Combinatorial Design, Projective Plane
1Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam Effect of Malicious Synchronization. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity
1Dongvu Tonien, Reihaneh Safavi-Naini An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code
1Khoongming Khoo, Guang Gong, Hian-Kiat Lee The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Time-memory-data trade-off attack, Rainbow attack, Maiorana-McFarland functions
1Jianhua Yang, Yongzhong Zhang Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP packet-matching, intrusion detection, Network security, round-trip time, stepping-stone
1Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis W3Bcrypt: Encryption as a Stylesheet. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jianying Zhou 0001, Moti Yung, Feng Bao 0001 (eds.) Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding Breaking a New Instance of TTM Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1JongHyup Lee, Taekyoung Kwon 0002, JooSeok Song Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Visual secret sharing scheme, ideal contrast, secret sharing scheme
1Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd Password Based Server Aided Key Exchange . Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF three-party, Key agreement, password authentication
1Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Opportunistic, Security, Optimization, Wireless, Encryption, Tradeoff
1Zhenfeng Zhang, Duncan S. Wong, Jing Xu 0002, Dengguo Feng Certificateless Public-Key Signature: Security Model and Efficient Construction. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 Model Generalization and Its Implications on Intrusion Detection. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Machine Learning, Intrusion Detection, Generalization, Intrusion, Security Infrastructure
1Boris Skoric, Pim Tuyls, W. Ophey Robust Key Extraction from Physical Uncloneable Functions. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF speckle pattern, Challenge-Response Pair, authentication, noise, error correction, Physical Uncloneable Function
1Hsiao-Ying Lin, Wen-Guey Tzeng An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF the greater than problem, the socialist millionaires problem homomorphic encryption, secure computation
1John Ioannidis, Angelos D. Keromytis, Moti Yung (eds.) Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jens Groth Non-interactive Zero-Knowledge Arguments for Voting. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yan-Cheng Chang, Michael Mitzenmacher Privacy Preserving Keyword Searches on Remote Encrypted Data. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Guomin Yang, Duncan S. Wong, Xiaotie Deng Efficient Anonymous Roaming and Its Security Analysis. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Anonymous Roaming, Authenticated Key Exchange
1Rui Zhang 0002, Jun Furukawa 0001, Hideki Imai Short Signature and Universal Designated Verifier Signature Without Random Oracles. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gene Itkis, Robert McNerney, Scott Russell Intrusion-Resilient Secure Channels. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jiangtao Li 0001, Ninghui Li OACerts: Oblivious Attribute Certificates. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yih-Chun Hu, Markus Jakobsson, Adrian Perrig Efficient Constructions for One-Way Hash Chains. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wenliang Du, Michael T. Goodrich Searching for High-Value Rare Events with Uncheatable Grid Computing. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Grid computing, obfuscation, cheating, cryptographic hash functions
1Michael K. Reiter, XiaoFeng Wang 0001, Matthew K. Wright Building Reliable Mix Networks with Fair Exchange. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, flash worms, network security, diversity, traffic shaping
1Flavio D. Garcia, Jaap-Henk Hoepman Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decentralised systems, security, peer-to-peer, grid, free-riding, micropayments
1Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval Optimal Asymmetric Encryption and Signature Paddings. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Markus Jakobsson, Liu Yang Quantifying Security in Hybrid Cellular Networks. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Abdulrahman Alharby, Hideki Imai IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF alarm reduction, Intrusion detection, sequential patterns
1Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette SCARE of the DES. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui Efficient Identity Based Ring Signature. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor Two-Server Password-Only Authenticated Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Lan Nguyen, Reihaneh Safavi-Naini Dynamic k-Times Anonymous Authentication. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Virgil Griffith, Markus Jakobsson Messin' with Texas Deriving Mother's Maiden Names Using Public Records. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Martin Boesgaard, Thomas Christensen, Erik Zenner Badger - A Fast and Provably Secure MAC. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tree, MAC, universal hash, pseudo-random generator
1Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon 0002 Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jin Wook Byun, Dong Hoon Lee 0001 N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Benoît Libert, Jean-Jacques Quisquater Identity Based Encryption Without Redundancy. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ID-based encryption, redundancies, provable security
1Jintai Ding, Dieter Schmidt Rainbow, a New Multivariable Polynomial Signature Scheme. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Oil and Vinegar, public-key, multivariable, quadratic polynomials
1Vladimir Shpilrain, Alexander Ushakov Thompson's Group and Public Key Cryptography. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Thomas Pornin, Julien P. Stern Digital Signatures Do Not Guarantee Exclusive Ownership. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Raphael Chung-Wei Phan, Bok-Min Goi Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF client-to-client, unknown key-share, cryptanalysis, replay attack, Password-authenticated key exchange
1Benoît Chevallier-Mames New Signature Schemes with Coupons and Tight Reduction. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia Indexing Information for Data Forensics. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF data forensics, data marking, combinatorial group testing, data structures, data integrity, information hiding, tamper detection
1John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee A Traitor Tracing Scheme Based on RSA for Fast Decryption. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1SeongHan Shin, Kazukuni Kobara, Hideki Imai Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen Centralized Management of Virtual Security Zones in IP Networks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pre-distributed data, Verifiable secret sharing, multiparty protocols
1Markus Jakobsson, Moti Yung, Jianying Zhou 0001 (eds.) Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Andrew K. Wright, John A. Kinast, Joe McCarty Low-Latency Cryptographic Protection for SCADA Communications. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF verifiable shuffles, Paillier public-key system, Privacy, mix-nets, formal security model
1Shuhong Wang 0001, Jie Wang 0038, Maozhi Xu Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cross-realm setting, Security, Dictionary attacks, Password-authenticated key exchange
1Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee 0001 One-Round Protocols for Two-Party Authenticated Key Exchange. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li A Parallel Intrusion Detection System for High-Speed Networks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hyung-Woo Lee Advanced Packet Marking Mechanism with Pushback for IP Traceback. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein A Pay-per-Use DoS Protection Mechanism for the Web. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tao Wan 0004, Evangelos Kranakis, Paul C. van Oorschot S-RIP: A Secure Distance Vector Routing Protocol. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Distance Fraud, Security Analysis, Routing Security, Distance Vector
1Dong Yu 0001, Deborah A. Frincke A Novel Framework for Alert Correlation and Understanding. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano Success Probability in Chi2-Attacks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RC5-64, 2 attack, statistical analysis, RC6
1Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Two-lock cryptosystem, Cryptanalysis, Knapsack problem
1Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai On the Security of Cryptosystems with All-or-Nothing Transform. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jens Groth Evaluating Security of Voting Schemes in the Universal Composability Framework. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Philippe Golle, Jessica Staddon, Brent R. Waters Secure Conjunctive Keyword Search over Encrypted Data. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo X2Rep: Enhanced Trust Semantics for the XRep Protocol. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Muxiang Zhang Password Authenticated Key Exchange Using Quadratic Residues. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Wenbo Mao, Kenneth G. Paterson Key Agreement Using Statically Keyed Authenticators. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Atsuko Miyaji, Kozue Umeda A Fully-Functional Group Signature Scheme over Only Known-Order Group. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 649 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license