|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Michael Luby, Charles Rackoff |
A Study of Password Security. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
33 | Siddhartha Chhabra, Brian Rogers, Yan Solihin, Milos Prvulovic |
Making secure processors OS- and performance-friendly. |
ACM Trans. Archit. Code Optim. |
2009 |
DBLP DOI BibTeX RDF |
Secure processor architectures, memory encryption, memory integrity verification, virtualization |
33 | Dennis Hofheinz, Dominique Unruh |
Towards Key-Dependent Message Security in the Standard Model. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Key-dependent message security, symmetric encryption schemes, security proofs |
33 | Praveen R. Samala, Hamid Vakilzadian, Dietmar P. F. Möller |
Modeling and simulation of common primitive operations used in block ciphers. |
SCSC |
2007 |
DBLP BibTeX RDF |
discrete event simulation, hardware modeling, encryption algorithms |
33 | Dae Hyun Yum, Pil Joong Lee |
Separable Implicit Certificate Revocation. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
certificate-based encryption, PKI, certificate revocation |
33 | Máire McLoone, John V. McCanny |
Rijndael FPGA Implementations Utilising Look-Up Tables. |
J. VLSI Signal Process. |
2003 |
DBLP DOI BibTeX RDF |
encryption, AES, Rijndael, FPGA implementation |
33 | Shucheng Yu, Cong Wang 0001, Kui Ren 0001, Wenjing Lou |
Attribute based data sharing with attribute revocation. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
revocation, attribute based encryption, proxy re-encryption |
33 | Rafail Ostrovsky, William E. Skeith III |
Communication Complexity in Algebraic Two-Party Protocols. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
fully homomorphic encryption, PIR writing, algebraic lower bounds, communication complexity, keyword search, private information retrieval, homomorphic encryption |
33 | Palash Sarkar 0001 |
Improving Upon the TET Mode of Operation. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
tweakable encryption, strong pseudo-random permutation, disk encryption, modes of operations |
33 | Sanjit Chatterjee, Palash Sarkar 0001 |
Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Multi-receiver encryption, bilinear pairing, identity based encryption |
33 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
On the Security of Tweakable Modes of Operation: TBC and TAE. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher |
33 | Riza Aditya, Byoungcheon Lee, Colin Boyd, Ed Dawson |
An Efficient Mixnet-Based Voting Scheme Providing Receipt-Freeness. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
mixnet, designated-verifier re-encryption proof, randomization, Electronic voting, receipt-freeness, re-encryption |
33 | Jan Camenisch, Anna Lysyanskaya |
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
pseudonym system, circular encryption, key-oblivious encryption, Privacy protection, blind signatures, e-cash, credential system |
33 | Helena Handschuh, Yiannis Tsiounis, Moti Yung |
Decision Oracles are Equivalent to Matching Oracles. |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Diffie-Hellman variants, randomized reductions, uniform reductions, homomorphic encryption functions (ElGamal, Goldwasser-Micali, Okamoto-Uchiyama, Naccache-Stern), random self-reducibility, universal malleability, public-key encryption, decision problems, matching problems |
32 | Jan Camenisch, Ivan Damgård |
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Stefan Lucks |
On the Security of Remotely Keyed Encryption. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
30 | Yang Lu 0001, Jiguo Li 0001 |
Forward-Secure Certificate-Based Encryption. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Hongxia Jin, Jeffery Lotspiech |
Broadcast Encryption for Differently Privileged. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Iftach Haitner, Thomas Holenstein |
On the (Im)Possibility of Key Dependent Encryption. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
Key-dependent input, Black-box separations, One-way functions |
30 | Jan Camenisch, Nishanth Chandran, Victor Shoup |
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Su-Wan Park, Sang-Uk Shin |
Combined Scheme of Encryption and Watermarking in H.264/Scalable Video Coding (SVC). |
New Directions in Intelligent Interactive Multimedia |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Watermarking, Contents protection, H.264/SVC |
30 | Vincenzo Iovino, Giuseppe Persiano |
Hidden-Vector Encryption with Groups of Prime Order. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Yongliang Xiao, Limin Xia |
A New Hyper-Chaotic Algorithm for Image Encryption. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Carmine Ventre, Ivan Visconti |
Completely Non-malleable Encryption Revisited. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Dan Tang, Xiaojing Wang |
Image Encryption Based on Bivariate Polynomials. |
CSSE (6) |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Jianhong Zhang, Cheng Ji |
On the Security of two Authenticated Encryption Schemes. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
30 | R. Charles |
KARIS: A multiple-scheme framework for encryption based on an annotation model for enhanced information security. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart |
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Alexandra Boldyreva, Serge Fehr, Adam O'Neill |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Charlie Obimbo, Behzad Salami 0002 |
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. |
J. Supercomput. |
2007 |
DBLP DOI BibTeX RDF |
Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations |
30 | Nithin M. Thomas, Damien Lefol, David R. Bull, David W. Redmill |
A Novel Secure H.264 Transcoder using Selective Encryption. |
ICIP (4) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Andrew Kingston, Simone Colosimo, Patrizio Campisi, Florent Autrusseau |
Lossless Image Compression and Selective Encryption using a Discrete Radon Transform. |
ICIP (4) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Shoko Imaizumi, Masaaki Fujiyoshi, Yoshito Abe, Hitoshi Kiya |
Collusion Attack-Resilient Hierarchical Encryption of JPEG 2000 Codestreams with Scalable Access Control. |
ICIP (2) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Lanxiang Chen, Dan Feng 0001, Lingfang Zeng, Yu Zhang |
A Direction to Avoid Re-encryption in Cryptographic File Sharing. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
FPGA, access control, ASIC, cryptographic file system |
30 | Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly. |
MICRO |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Jun Furukawa 0001, Nuttapong Attrapadung |
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. |
ICALP |
2007 |
DBLP DOI BibTeX RDF |
Fully Collusion Resistant, Revocation, Traitor Tracing, Black-Box |
30 | Aggelos Kiayias, Yiannis Tsiounis, Moti Yung |
Group Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Shiuh-Jeng Wang, Hung Hsuan Chen, Pin-You Chen, Yuh-Ren Tsai |
Security Cryptanalysis in High-Order Improved Fast Encryption Algorithm for Multimedia. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata |
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard. |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez |
A Comparison of Two Approaches Providing Data Encryption and Authentication on a Processor Memory Bus. |
PATMOS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Eike Kiltz |
Chosen-Ciphertext Security from Tag-Based Encryption. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai |
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Walid Bagga, Refik Molva |
Collusion-Free Policy-Based Encryption. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Policy, Credentials, Pairing-Based Cryptography |
30 | Ryotaro Hayashi 0001, Keisuke Tanaka |
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Alexander Wong, William D. Bishop |
Expert Knowledge Based Automatic Regions-of-Interest (ROI) Selection in Scanned Documents for Digital Image Encryption. |
CRV |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Chenyu Yan, Daniel Englender, Milos Prvulovic, Brian Rogers, Yan Solihin |
Improving Cost, Performance, and Security of Memory Encryption and Authentication. |
ISCA |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Himanshu Khurana, Jin Heo, Meenal Pant |
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Kikuko Kamisaka, Masato Oguchi, Saneyasu Yamaguchi |
Performance Evaluation of iSCSI System Optimized for Encryption Processing in the Upper Layer. |
ICDE Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Tianbo Lu, Binxing Fang, Yuzhong Sun, Li Guo 0001 |
Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Kyoungwoo Lee, Nikil D. Dutt, Nalini Venkatasubramanian |
An Experimental Study on Energy Consumption of Video Encryption for Mobile Handheld Devices. |
ICME |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Amit Sahai, Brent Waters |
Fuzzy Identity-Based Encryption. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Chi-Jen Lu |
Encryption against Storage-Bounded Adversaries from On-Line Strong Extractors. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Everlasting security, List-decodable codes, Expander graphs, Randomness extractors, Bounded-storage model |
30 | Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Craig Gentry, Zulfikar Ramzan |
RSA Accumulator Based Broadcast Encryption. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Ran Canetti, Shai Halevi, Jonathan Katz |
Chosen-Ciphertext Security from Identity-Based Encryption. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Cynthia Dwork, Moni Naor, Omer Reingold |
Immunizing Encryption Schemes from Decryption Errors. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Zheng Liu, Xue Li 0001 |
Motion Vector Encryption in Multimedia Streaming. |
MMM |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai |
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Craig Gentry |
Certificate-Based Encryption and the Certificate Revocation Problem. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Yevgeniy Dodis, Jee Hea An |
Concealment and Its Applications to Authenticated Encryption. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Jonathan Katz |
Binary Tree Encryption: Constructions and Applications. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Efficient Convertible Authenticated Encryption Scheme and Its Variant. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen |
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Chi-Jen Lu |
Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Mihir Bellare, Chanathip Namprempre |
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
30 | Mihir Bellare, Amit Sahai |
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Yiannis Tsiounis, Moti Yung |
On the Security of ElGamal Based Encryption. |
Public Key Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
30 | Matthew K. Franklin, Stuart Haber |
Joint Encryption and Message-Efficient Secure Computation. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
30 | Ralph C. Merkle |
Fast Software Encryption Functions. |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
30 | Yu Chen 0003, Manuel Charlemagne, Zhi Guan, Jian-bin Hu, Zhong Chen 0001 |
Identity-based encryption based on DHIES. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
DHIES, combination, identity-based encryption, bilinear map |
30 | Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf |
PBES: a policy based encryption system with application to data sharing in the power grid. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
multi-party data sharing, phasor measurement units (PMUs), policy based encryption, power grid |
30 | Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Conditional proxy re-encryption, random oracle, chosen-ciphertext security |
30 | Eike Kiltz, Krzysztof Pietrzak |
On the Security of Padding-Based Encryption Schemes - or - Why We Cannot Prove OAEP Secure in the Standard Model. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Padding-based encryption, ideal trapdoor permutations, black-box, OAEP |
30 | Benoît Libert, Damien Vergnaud |
Adaptive-ID Secure Revocable Identity-Based Encryption. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
provable security, revocation, Identity-based encryption |
30 | Zhiming Qu, Tongbin Ma, Yunlong Zhang |
Application of Parameter Modulation in E-Commerce Security Based on Chaotic Encryption. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
parameter modulation, chaotic encryption, security, E-commerce |
30 | Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters |
Black-box accountable authority identity-based encryption. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
accountable authority, identity-based encryption |
30 | Judicaël Courant, Marion Daubignard, Cristian Ene, Pascal Lafourcade 0001, Yassine Lakhnech |
Towards automated proofs for asymmetric encryption schemes in the random oracle model. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
asymmetric encryption, automated proofs, provable security, hoare logics, random oracle model |
30 | Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi |
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data |
30 | Tetsu Iwata |
Authenticated Encryption Mode for Beyond the Birthday Bound Security. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher |
30 | Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski |
Practical Deniable Encryption. |
SOFSEM |
2008 |
DBLP DOI BibTeX RDF |
deniable encryption |
30 | George Danezis |
Breaking four mix-related schemes based on Universal Re-encryption. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Universal re-encryption, Traffic analysis, Anonymous communications |
30 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen |
Pirate decoder for the broadcast encryption schemes from Crypto 2005. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
pirate decoder, broadcast encryption, traitor tracing |
30 | Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles). |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Encryption, Bilinear Maps, Chosen Ciphertext Security |
30 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Parallel Key-Insulated Public Key Encryption Without Random Oracles. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
parallel key-insulated encryption, standard model, pairings |
30 | Chen Dong 0008, Jifang Li, Lifeng Xi, Jie Hao, Ran Jin |
Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
Kolmogorov flow, Liu chaotic system, Image encryption, Chaotic |
30 | Gary S.-W. Yeo, Raphael Chung-Wei Phan |
On the security of the WinRAR encryption feature. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Encryption feature, WinRAR, WinZip, Compression, Attacks |
30 | Geoffrey Smith 0001, Rafael Alpízar |
Secure information flow with random assignment and encryption. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
IND-CCA, IND-CPA, encryption, type systems, reductions, noninterference, secure information flow |
30 | Feiyu Lei, Wen Chen 0001, Kefei Chen |
A Non-committing Encryption Scheme Based on Quadratic Residue. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
non-committing encryption, information security, multiparty computation, adaptive security, quadratic residue |
30 | Kenneth G. Paterson, Arnold K. L. Yau |
Cryptography in Theory and Practice: The Case of Encryption in IPsec. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
integrity, encryption, IPsec, ESP |
30 | Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Changshe Ma |
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Parallel Key-Insulation, Bilinear Pairings, Identity-Based Encryption, Key-Exposure |
30 | Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
Non-interactive Zero-knowledge Proofs, Public-key Encryption, Semantic Security, Non-malleability |
30 | Jinyong Fang, Jun Sun 0005 |
A Format-Compliant Encryption Framework for JPEG2000 Image Code-Streams in Broadcasting Applications. |
PCM |
2006 |
DBLP DOI BibTeX RDF |
Format-Compliant encryption, JPSEC, Broadcasting application, JPEG2000 |
30 | Jen-Chieh Lai, Chia-Hui Wang |
Buffer Occupancy Feedback Security Control and Changing Encryption Keys to Protect MOD Services. |
PSIVT |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption, playback buffer occupancy (PBO), feedback control, MOD |
30 | Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez |
A parallelized way to provide data encryption and integrity checking on a processor-memory bus. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
bus encryption, data confidentiality and integrity, architectures |
30 | Byeong Kil Lee, Lizy Kurian John |
Implications of Executing Compression and Encryption Applications on General Purpose Processors. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
Media compression, memory behavior, MediaZip benchmark, overhead memory bandwidth, encryption, encoding, decoding, workload characterization, decryption |
30 | Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros |
Untraceable RFID tags via insubvertible encryption. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
RFID privacy, universal re-encryption, bilinear maps |
30 | Lars Eilebrecht |
Ciphire Mail Email Encryption and Authentication. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Ciphire, secure email, email encryption, email authentication, fingerprint system, digital signatures, fingerprints, certificates, PKI |
30 | Serge Mister, Robert J. Zuccherato |
An Attack on CFB Mode Encryption as Used by OpenPGP. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Cipher-Feedback Mode, encryption, chosen-ciphertext attacks, OpenPGP |
30 | Hsiao-Ying Lin, Wen-Guey Tzeng |
An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
the greater than problem, the socialist millionaires problem homomorphic encryption, secure computation |
Displaying result #201 - #300 of 21739 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|