The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACNS"( http://dblp.L3S.de/Venues/ACNS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acns

Publication years (Num. hits)
2003 (33) 2004 (37) 2005 (36) 2006 (34) 2007 (32) 2008 (31) 2009 (33) 2010 (33) 2011 (32) 2012 (34) 2013 (36) 2014 (34) 2015 (34) 2016 (36) 2017 (35) 2018 (37) 2019 (30) 2022 (45) 2023 (27)
Publication types (Num. hits)
inproceedings(630) proceedings(19)
Venues (Conferences, Journals, ...)
ACNS(649)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 336 occurrences of 251 keywords

Results
Found 649 publication records. Showing 649 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Weiming Zhang, Shiqu Li Security Measurements of Steganographic Systems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin A Best Practice for Root CA Key Update in PKI. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Proof of equality of discrete logarithms (PEQDL), Threshold decryption, Threshold ElGamal, Threshold RSA, Batch verification
1Michael E. Locasto, Angelos D. Keromytis CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1BaiJie Kuang, Yuefei Zhu, YaJuan Zhang An Improved Algorithm for uP + vQ Using JSF13. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang 0005 Private Keyword-Based Push and Pull with Applications to Anonymous Communication. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Palash Sarkar 0001, Pradeep Kumar Mishra, Rana Barua New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn). Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF elliptic curves, Scalar multiplication, hyperelliptic curves, normal basis, look-up table, window methods, Frobenius map
1Stephen W. Boyd, Angelos D. Keromytis SQLrand: Preventing SQL Injection Attacks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 Some Observations on Zap and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability
1Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
1Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao 0001, Robert H. Deng, M. U. Siddiqi Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Anonymity, Watermarking, Fingerprinting, Copyright Protection, Traitor Tracing
1Ali Kanso More Generalized Clock-Controlled Alternating Step Generator. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Clock-Controlled Registers, Alternating Step Generator and Clock-Controlled Alernating Step Generator, Stream Ciphers
1Willy Susilo, Yi Mu 0001 Deniable Ring Authentication Revisited. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Daisuke Inoue, Masahiro Kuroda FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
1Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim Limited Verifier Signature from Bilinear Pairings. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Chunyan Bai, Gui Liang Feng Improved Algebraic Traitor Tracing Scheme. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF broadcast, Reed-Solomon code, traitor tracing, algebraic-geometric code
1Gene Itkis, Peng Xie Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Johann Großschädl, Guy-Armand Kamendje Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu An Efficient Tree-Based Group Key Agreement Using Bilinear Map. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TGDH, Bilinear Diffie-Hellman, Pairings, Bilinear map, Group key agreement
1Kwong H. Yung Using Feedback to Improve Masquerade Detection. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF feedback-on-alarm, feedback policy, sequential classifier, online classifier, adaptive classifier, masquerading session, masquerading user, intrusion detection, naive-Bayes classifier, masquerade detection
1Ching Lin, Vijay Varadharajan Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Security, Trust, Mobile Agent System
1Chun Ruan, Vijay Varadharajan An Authorization Model for E-consent Requirement in a Health Care Application. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF e-consent, access control, Authorization, security management
1Ventzislav Nikov, Svetla Nikova, Bart Preneel Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sandeepan Chowdhury, Subhamoy Maitra Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Block Oriented Software Implementation, Boolean Function, Linear Feedback Shift Register, Resiliency, Nonlinearity, Algebraic Degree
1Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji Optimized Chi2-Attack against RC6. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 2-attack, Cryptanalysis, Block Cipher, RC6
1Pierre Dusart, Gilles Letourneux, Olivier Vivolo Differential Fault Analysis on A.E.S. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Taenam Cho, Sang-Ho Lee A Key Recovery Mechanism for Reliable Group Key Management. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Roman Novak Side-Channel Attack on Substitution Blocks. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dong Jin Kwak, Sang-Jae Moon Efficient Distributed Signcryption Scheme as Group Signcryption. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Public-key Cryptography, Group signature, Signcryption
1Fan Min 0001, Jun-yan Zhang, Guo-wie Yang An IP Traceback Scheme Integrating DPM and PPM. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking
1Mohamed Al-Ibrahim, Anton Cerný Proxy and Threshold One-Time Signatures. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature
1Yuko Tamura, Atsuko Miyaji Anonymity-Enhanced Pseudonym System. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Chong-zhi Gao, Zheng-an Yao, Lei Li 0022 A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Rui Zhang 0002, Hideki Imai Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng A Threshold GQ Signature Scheme. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold signature scheme, GQ signature scheme
1Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang Common Vulnerability Markup Language. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano Using OCSP to Secure Certificate-Using Transactions in M-commerce. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF certificate status checking, certification, m-commerce, broker, OCSP
1Luciano Rila, Chris J. Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cardholder authentication, biometrics, smartcards
1Jianying Zhou 0001, Moti Yung, Yongfei Han (eds.) Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sung-Ryul Kim Improved Scalable Hash Chain Traversal. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF efficient hash chain traversal, secure hash, pebbles
1Tieyan Li, Yongdong Wu Trust on Web Browser: Attack vs. Defense. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sarbani Palit, Bimal K. Roy, Arindom De A Fast Correlation Attack for LFSR-Based Stream Ciphers. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF LFSR polynomial, Correlation immune function, Stream cipher, Correlation attack
1Gang Yao, Kui Ren 0001, Feng Bao 0001, Robert H. Deng, Dengguo Feng Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, Mobile ad hoc networks, key agreement, hierarchical
1Guilin Wang, Xiaoxi Han, Bo Zhu On the Security of Two Threshold Signature Schemes with Traceable Signers. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signature, threshold signature
1Yasuyuki Sakai, Kouichi Sakurai Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Parallel modular exponentiation, Side channel attack, Montgomery multiplication, Timing attack, RSA cryptosystems
1Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intrusion detection, Network security, Data visualization, Multivariate data analysis
1Guofei Gu, Bin B. Zhu, Shipeng Li 0001, Shiyong Zhang PLI: A New Framework to Protect Digital Content for P2P Networks. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digital content protection, Public License Infrastructure (PLI), License Authority (LA), proactive shares update, distributed trust model, secret sharing, intrusion tolerance, Peer-to-Peer (P2P), Digital Rights Management (DRM)
Displaying result #601 - #649 of 649 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license