|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 974 occurrences of 471 keywords
|
|
|
Results
Found 2885 publication records. Showing 2885 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Irina Diana Coman, Alberto Sillitti, Giancarlo Succi |
Investigating the Usefulness of Pair-Programming in a Mature Agile Team. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XP ![In: Agile Processes in Software Engineering and Extreme Programming, 9th International Conference, XP 2008, Limerick, Ireland, June 10-14, 2008. Proceedings, pp. 127-136, 2008, Springer, 978-3-540-68254-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XP, Agile Methods, Pair-programming, PP |
18 | Dimitrios Lymberopoulos, Nissanka Bodhi Priyantha, Michel Goraczko, Feng Zhao 0001 |
Towards Energy Efficient Design of Multi-radio Platforms for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPSN ![In: Proceedings of the 7th International Conference on Information Processing in Sensor Networks, IPSN 2008, St. Louis, Missouri, USA, April 22-24, 2008, pp. 257-268, 2008, IEEE Computer Society, 978-0-7695-3157-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Arif Ozgun Harmanci, Gaurav Sharma 0001, David H. Mathews |
Probabilistic structural alignment of RNA sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2008, March 30 - April 4, 2008, Caesars Palace, Las Vegas, Nevada, USA, pp. 645-648, 2008, IEEE, 1-4244-1484-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Piotr Szczechowiak, Leonardo B. Oliveira, Michael Scott, Martin Collier, Ricardo Dahab |
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWSN ![In: Wireless Sensor Networks, 5th European Conference, EWSN 2008, Bologna, Italy, January 30-February 1, 2008, Proceedings, pp. 305-320, 2008, Springer, 978-3-540-77689-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, implementation, Elliptic Curve Cryptography, pairings, cryptographic primitives |
18 | Eustáquio São José de Faria, Keiji Yamanaka, Josimeire do Amaral Tavares, Geraldo Henrique Lacerda Pinto, Lowghan Henrique Sudário de Melo |
Intelligent Software Agents Mediating the Pair Participation in a Distributed Intelligent Pair-Software Development Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 517-520, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Shangping Wang, Pei Han, Yaling Zhang, Xiaofeng Wang |
An Improved ID-based Restrictive Partially Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 295-300, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Blind Signature, ID-based |
18 | Jia Yu 0003, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li |
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 83-97, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital signature, forward security, bilinear maps, computation Diffie-Hellman problem |
18 | David Galindo, Rodrigo Roman, Javier López 0001 |
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 120-132, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identity-based key agreement, key distribution, pairings, underwater wireless sensor networks |
18 | Ahmed M. El-Garhy, M. E. El-Shimy |
Development of decoupling scheme for high order MIMO process based on PSO technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 26(3), pp. 217-229, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multiple input multiple output (MIMO) process, Relative gain array (RGA), Decoupling compensation matrix, Particle swarm optimization |
18 | Raymond Chiong, Sandeep Dhakal, Lubo Jankovic |
Effects of Neighbourhood Structure on Evolution of Cooperation in N-Player Iterated Prisoner's Dilemma. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2007, 8th International Conference, Birmingham, UK, December 16-19, 2007, Proceedings, pp. 950-959, 2007, Springer, 978-3-540-77225-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
N-player iterated prisoner’s dilemma, bidding game, game strategies, neighbourhood structure |
18 | Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart |
Identity-Based Traitor Tracing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 361-376, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Men Long, David Durham |
Human Perceivable Authentication: An Economical Solution for Security Associations in Short-Distance Wireless Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 16th International Conference on Computer Communications and Networks, IEEE ICCCN 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007, pp. 257-264, 2007, IEEE, 978-1-4244-1251-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Christophe Nicolas Magnan, Cécile Capponi, François Denis |
A Protocol to Detect Local Affinities Involved in Proteins Distant Interactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIBM ![In: Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2007, Silicon Valley, CA, USA, November 2-4, 2007, pp. 252-257, 2007, IEEE Computer Society, 0-7695-3031-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Feiselia Tan, Sebastien Ardon, Robert Hsieh |
The Impact of User Mobility Patterns on Opportunistic Content Distribution Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia, pp. 365-370, 2007, IEEE, 1-4244-1230-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Jianhong Zhang |
An Efficient Identity-Based Ring Signature Scheme and Its Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 63-74, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Compact E-Cash from Bounded Accumulator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 178-195, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
compact e-cash, bounded accumulator, bilinear pairings |
18 | Haitong Sun, Jonathan H. Manton, Zhi Ding 0001 |
Progressive linear precoder optimization for MIMO packet retransmissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 24(3), pp. 448-456, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Alexander W. Dent, Steven D. Galbraith |
Hidden Pairings and Trapdoor DDH Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: Algorithmic Number Theory, 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings, pp. 436-451, 2006, Springer, 3-540-36075-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Haiyong Bao, Zhenfu Cao, Shengbao Wang |
Identity-Based Threshold Proxy Signature Scheme with Known Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, Third International Conference, TAMC 2006, Beijing, China, May 15-20, 2006, Proceedings, pp. 538-546, 2006, Springer, 3-540-34021-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | David Cohen-Steiner, Herbert Edelsbrunner, Dmitriy Morozov |
Vines and vineyards by updating persistence in linear time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCG ![In: Proceedings of the 22nd ACM Symposium on Computational Geometry, Sedona, Arizona, USA, June 5-7, 2006, pp. 119-126, 2006, ACM, 1-59593-340-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
folding trajectories, persistent homology groups, stability, implementation, dynamic algorithms, combinatorial topology |
18 | Jérémie Chalopin, Shantanu Das 0001, Nicola Santoro |
Groupings and Pairings in Anonymous Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 20th International Symposium, DISC 2006, Stockholm, Sweden, September 18-20, 2006, Proceedings, pp. 105-119, 2006, Springer, 3-540-44624-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Lucas Layman |
Changing Students' Perceptions: An Analysis of the Supplementary Benefits of Collaborative Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEE&T ![In: 19th Conference on Software Engineering Education and Training (CSEE&T 2006), 19-21 April 2006, Turtle Bay, Hawaii, USA, pp. 159-166, 2006, IEEE Computer Society, 0-7695-2557-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Limin Yang, Jie Yang 0002, Hongtao Wu |
Fingerprint Matching Based on Octantal Nearest-Neighbor Structure and Core Points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICVGIP ![In: Computer Vision, Graphics and Image Processing, 5th Indian Conference, ICVGIP 2006, Madurai, India, December 13-16, 2006, Proceedings, pp. 931-940, 2006, Springer, 3-540-68301-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Core point, Corresponding minutia pair, Fingerprint alignment, Fingerprint matching |
18 | Seung Geol Choi, Kunsoo Park, Moti Yung |
Short Traceable Signatures Based on Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 88-103, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures |
18 | Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun |
Loud and Clear: Human-Verifiable Authentication Based on Audio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal, pp. 10, 2006, IEEE Computer Society, 0-7695-2540-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Shi Cui, Pu Duan, Choong Wah Chan |
An efficient identity-based signature scheme with batch verifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 1st International Conference on Scalable Information Systems, Infoscale 2006, Hong Kong, May 30-June 1, 2006, pp. 22, 2006, ACM, 1-59593-428-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Paul W. Schermerhorn, Matthias Scheutz |
Social coordination without communication in multi-agent territory exploration tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan, May 8-12, 2006, pp. 654-661, 2006, ACM, 1-59593-303-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
collective and emergent agent behavior, social choice mechanisms, cooperation and coordination among agents |
18 | Serge Vaudenay |
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 1-9, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Robert W. Zhu, Guomin Yang, Duncan S. Wong |
An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 500-509, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Xiaoli Li 0001, Soon-Heng Tan, See-Kiong Ng |
Protein Interaction Prediction Using Inferred Domain Interactions and Biologically-Significant Negative Dataset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 318-326, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Huai-Kuang Tsai, Jinn-Moon Yang, Yuan-Fang Tsai, Cheng-Yan Kao |
An evolutionary algorithm for large traveling salesman problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 34(4), pp. 1718-1729, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, So Ran Ine |
Threshold Password-Based Authentication Using Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 350-363, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo |
An Efficient Signature Scheme from Bilinear Pairings and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 277-290, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
A Ring Signature Scheme Using Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 160-169, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Willy Susilo, Yi Mu 0001, Fangguo Zhang |
Perfect Concurrent Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 14-26, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Ken-etsu Fujita |
A Sound and Complete CPS-Translation for lambda-mu-Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TLCA ![In: Typed Lambda Calculi and Applications, 6th International Conference, TLCA 2003, Valencia, Spain, June 10-12, 2003, Proceedings., pp. 120-134, 2003, Springer, 3-540-40332-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Robert L. Grossman, Richard G. Larson |
An Algebraic Approach to Data Mining: Some Examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 9-12 December 2002, Maebashi City, Japan, pp. 613-616, 2002, IEEE Computer Society, 0-7695-1754-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Kenny Wong, Scott R. Tilley |
Connecting technical communicators with technical developers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 20st annual international conference on Documentation, SIGDOC 2002, Toronto, Ontario, Canada, October 20-23, 2002, pp. 258-262, 2002, ACM, 1-58113-543-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
software engineering, documentation, program understanding, pair programming, technical communication |
18 | Richard Ehrenborg |
k-Eulerian Posets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Order ![In: Order 18(3), pp. 227-236, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
cd-index, flag operators |
18 | Çigdem Eroglu Erdem, Günes Karabulut, Evsen Yanmaz, Emin Anarim |
Motion estimation in the frequency domain using fuzzy c-planes clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 10(12), pp. 1873-1879, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | John H. Reif |
Parallel Biomolecular Computation: Models and Simulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 25(2-3), pp. 142-175, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Parallel RAM, Nondeterministic computation, Recombinant DNA, Parallel computation, DNA, NP, Biomolecular computation, Biotechnology |
18 | Panayiotis Alefragis, Christos Goumopoulos, Efthymios Housos, Peter Sanders 0001, Tuomo Takkula, Dag Wedelin |
Parallel Crew Scheduling in PAROS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par ![In: Euro-Par '98 Parallel Processing, 4th International Euro-Par Conference, Southampton, UK, September 1-4, 1998, Proceedings, pp. 1104-1113, 1998, Springer, 3-540-64952-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Richard Statman |
On Cartesian Monoids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSL ![In: Computer Science Logic, 10th International Workshop, CSL '96, Annual Conference of the EACSL, Utrecht, The Netherlands, September 21-27, 1996, Selected Papers, pp. 446-459, 1996, Springer, 3-540-63172-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
18 | Roberto Di Cosmo, Delia Kesner |
Combining First Order Algebraic Rewriting Systems, Recursion and Extensional Lambda Calculi. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 21st International Colloquium, ICALP94, Jerusalem, Israel, July 11-14, 1994, Proceedings, pp. 462-472, 1994, Springer, 3-540-58201-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
18 | Paul J. Voda |
Subrecursion as a Basis for a Feasible Programming Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSL ![In: Computer Science Logic, 8th International Workshop, CSL '94, Kazimierz, Poland, September 25-30, 1994, Selected Papers, pp. 324-338, 1994, Springer, 3-540-60017-5. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
14 | Mohammad Reza Abbasy, Bharanidharan Shanmugam |
Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4-9, 2011, pp. 385-390, 2011, IEEE Computer Society, 978-1-4577-0879-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
DNA base pairing rules, complementary rules, DNA binary coding, Cloud Computing, Data hiding, DNA sequence, data confidentiality |
14 | Yan Zhu 0010, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang |
Cryptographic role-based security mechanisms based on role-key hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 314-319, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
role-based cryptosystem, role-key hierarchy, access control, pairing-based cryptosystem |
14 | Byoungcheon Lee |
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 54-61, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Unified public key infrastructure, Private key issuing protocol, Key generation and certification authority, Key privacy agent, Certificate-based cryptography, Hybrid cryptography, Bilinear pairing, ID-based cryptography |
14 | Jiin-Chiou Cheng, Chi-Sung Laih |
Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(1), pp. 37-48, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Conference key agreement, Modified Weil pairing, Fault-tolerance, Elliptic curve |
14 | Shengbao Wang, Zhenfu Cao, ZhaoHui Cheng, Kim-Kwang Raymond Choo |
Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(8), pp. 1358-1370, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
modular security proof, provable security, bilinear pairing, authenticated key agreement, perfect forward secrecy |
14 | Kasper Bonne Rasmussen, Claude Castelluccia, Thomas S. Heydt-Benjamin, Srdjan Capkun |
Proximity-based access control for implantable medical devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 410-419, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secure pairing, ultrasonic communication, access control, medical devices, distance bounding |
14 | Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai |
Conditional proxy re-encryption secure against chosen-ciphertext attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 322-332, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security |
14 | Minkyu Kim, Jung Hee Cheon, Jin Hong 0001 |
Subset-Restricted Random Walks for Pollard rho Method on Fpm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 54-67, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pollard rho method, pairing, normal basis, discrete logarithm problem |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 310-325, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
14 | Paul Tarau |
An embedded declarative data transformation language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 11th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, September 7-9, 2009, Coimbra, Portugal, pp. 171-182, 2009, ACM, 978-1-60558-568-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
computational mathematics, dag and hypergraph encodings, functions and permutations, goedel numberings, hereditarily finite sets, pairing functions, prolog data representations, ranking/unranking bijections, digraph |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 61-75, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography |
14 | David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwächter, Markus Langenberg, Dominik Auras, Gerd Ascheid, Rudolf Mathar |
Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 254-271, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Barreto-Naehrig curves, elliptic-curve cryptography (ECC), design-space exploration, Application-specific instruction-set processor (ASIP), arithmetic, pairing-based cryptography |
14 | Ding Yong |
Tamper Difficult Technique for Data Residing on Passive Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 439-442, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Passive storage, Pairing, Tamper |
14 | Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo |
Privacy for Private Key in Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 84-95, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack |
14 | Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 |
Publicly Verifiable Privacy-Preserving Group Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 72-83, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography |
14 | Koray Karabina, Edlyn Teske |
On Prime-Order Elliptic Curves with Embedding Degrees k = 3, 4, and 6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: Algorithmic Number Theory, 8th International Symposium, ANTS-VIII, Banff, Canada, May 17-22, 2008, Proceedings, pp. 102-117, 2008, Springer, 978-3-540-79455-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
embedding degree, MNT curves, Elliptic curves, pairing-based cryptosystems |
14 | Keijo Haataja |
Further Classification of Bluetooth-Enabled Ad-Hoc Networks Depending on a Risk Analysis within Each Classified Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Seventh International Conference on Networking (ICN 2008), 13-18 April 2008, Cancun, Mexico, pp. 232-237, 2008, IEEE Computer Society, 978-0-7695-3106-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Simple Pairing, Classification, Ad-hoc Networks, Bluetooth, Wireless Security |
14 | S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan |
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 115-129, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem |
14 | Robert H. Deng, Jian Weng 0001, Shengli Liu 0001, Kefei Chen |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 1-17, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bilinear pairing, chosen-ciphertext security, Proxy re-encryption |
14 | Raylin Tso, Xun Yi, Xinyi Huang 0001 |
Efficient and Short Certificateless Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 64-79, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Bilinear pairing, random oracle, short signature, certificateless signature |
14 | Ke Zeng |
Access with Fast Batch Verifiable Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 65-80, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
fine-grained revocation, pairing, batch verification, anonymous credential |
14 | Volker Roth 0002, Wolfgang Polak, Eleanor Gilbert Rieffel, Thea Turner |
Simple and effective defense against evil twin access points. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the First ACM Conference on Wireless Network Security, WISEC 2008, Alexandria, VA, USA, March 31 - April 02, 2008, pp. 220-235, 2008, ACM, 978-1-59593-814-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
evil twin, usable security, wireless security, device pairing |
14 | Dong-Guk Han, Sung-Kyoung Kim, Howon Kim 0001, Kyoil Chung, Jongin Lim 0001 |
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 238-253, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
left-to-right, right-to-left, Side channel attacks, elliptic curve cryptosystems, pairing-based cryptosystems |
14 | Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 297-311, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proxy cryptosystem, certificate-based encryption (CBE), pairing |
14 | Hung-Yu Chien |
ID-Based Key Agreement with Anonymity for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2007, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 333-345, 2007, Springer, 978-3-540-77091-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ad hoc networks, anonymity, bilinear pairing, key agreement, identity-based cryptosystem |
14 | Jai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo |
An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, 5th International Symposium, ISPA 2007, Niagara Falls, Canada, August 29-31, 2007, Proceedings, pp. 446-456, 2007, Springer, 978-3-540-74741-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ID-based encryption, Bilinear Pairing, Key Agreement protocol |
14 | Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto |
Efficient ID-Based Digital Signatures with Message Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 47-59, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
k-BDHI problem, pairing, short signature, ID-based signature, message recovery |
14 | Hamid Hentous, Farid Benhammadi, Mohamed Aissani, Kadda Beghdad Bey |
Fingerprint Matching Based on Minutiae Covering Zones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 26-29 June 2006, Cagliari, Sardinia, Italy, pp. 233-238, 2006, IEEE Computer Society, 0-7695-2588-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ridge feature matching, Minutia pairing, AFIS, Fingerprint identification |
14 | Balaji Gopalakrishnan, Ellis L. Johnson |
Airline Crew Scheduling: State-of-the-Art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 140(1), pp. 305-337, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
airline crew scheduling, crew pairing optimization, crew scheduling |
14 | Antoine Joux |
A One Round Protocol for Tripartite Diffie-Hellman. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 17(4), pp. 263-276, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Elliptic curve, Key exchange, Discrete logarithm, Pairing, Cryptosystem |
14 | Theodore Diament, Homin K. Lee, Angelos D. Keromytis, Moti Yung |
The dual receiver cryptosystem and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 330-343, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
useful secure computation, digital signature, elliptic curves, public key, key escrow, puzzles, pairing-based cryptography |
14 | Joonsang Baek, Yuliang Zheng 0001 |
Identity-Based Threshold Signature Scheme from the Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 124-128, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack |
14 | Antoine Joux, Kim Nguyen |
Separating Decision Diffie-Hellman from Computational Diffie-Hellman in Cryptographic Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 16(4), pp. 239-247, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Elliptic curve, Discrete logarithm, Diffie-Hellman, Weil pairing |
12 | Shangxi Wu, Jitao Sang, Kaiyan Xu, Guanhua Zheng, Changsheng Xu |
Adaptive Adversarial Logits Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Multim. Comput. Commun. Appl. ![In: ACM Trans. Multim. Comput. Commun. Appl. 20(2), pp. 56:1-56:16, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mojtaba Goodarzi, Ziba Eslami, Nasrollah Pakniat |
Certificateless directed signature scheme without bilinear pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 33(3), pp. 268-284, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Thierry Mefenza, Damien Vergnaud |
Lattice attacks on pairing-based signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 33(2), pp. 138-157, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Matthew Corbett, Jiacheng Shang, Bo Ji 0001 |
GazePair: Efficient Pairing of Augmented Reality Devices Using Gaze Tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 23(3), pp. 2407-2421, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sandeep Singh Rana, Gaurav Verma, O. P. Sahu |
Machine Learning Based Improved User-Pairing and Power Allocation with Imperfect-Successive Interference Cancellation for Downlink NOMA-UAV System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Inf. Networks ![In: Int. J. Wirel. Inf. Networks 31(1), pp. 29-36, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | SK Hafizul Islam, Krittibas Parai, Daya Sagar Gupta |
PF-IBDA: Provably secure and pairing-free identity-based deniable authentication protocol for MANET environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 238, pp. 110113, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Eman Abouelkheir, Shamia El-sherbiny |
A Pairing Free Provable Public Key Dual Receiver Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 55918-55924, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jianhong Zhang, Chenghe Dong, Yining Liu 0002 |
Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(3), pp. 4348-4361, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Oussama Azzouzi, Mohamed Anane, Mouloud Koudil, Mohamed Issad, Yassine Himeur |
Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 80(2), pp. 2633-2659, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Dmitrii I. Koshelev |
Correction to: Subgroup membership testing on elliptic curves via the Tate pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 14(1), pp. 127-128, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sujit Sangram Sahoo, Vijay Kumar Chaurasiya |
EASB: ECC based aggregate signature without bilinear pairing for blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(12), pp. 34581-34600, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Momoko Fukuda, Makoto Ikeda |
Template-Based Design Optimization for Selecting Pairing-Friendly Curve Parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3), pp. 549-556, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Rikuhiro Kojima, Jacob C. N. Schuldt, Goichiro Hanaoka |
A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3), pp. 193-202, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Lisha Bai, Lei Yong, Zhixian Chen, Jun Shao |
Pairing-free public-key authenticated encryption with keyword search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 88, pp. 103793, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Baoyi Wang, Xue Guo, Shaomin Zhang |
A Secure and Efficient Pairing-Free Certificateless Aggregate Signcryption Scheme for V2G Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 18(1), pp. 282-293, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Haoyang An, Debiao He, Cong Peng 0005, Min Luo 0002, Lianhai Wang |
Efficient Certificateless Online/Offline Signcryption Scheme Without Bilinear Pairing for Smart Home Consumer Electronics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Consumer Electron. ![In: IEEE Trans. Consumer Electron. 70(1), pp. 4005-4015, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Diyi Liu, Weijie Du, Lin Lin, James P. Vary, Chao Yang |
An Efficient Quantum Circuit for Block Encoding a Pairing Hamiltonian. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.11205, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Jaeill Kim, Duhun Hwang, Eunjung Lee, Jangwon Suh, Jimyeong Kim, Wonjong Rhee |
Enhancing Contrastive Learning with Efficient Combinatorial Positive Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.05730, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Craig Messner, Tom Lippincott |
Pairing Orthographically Variant Literary Words to Standard Equivalents Using Neural Edit Distance Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.15068, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Alexander Unnervik, Hatef Otroshi-Shahreza, Anjith George, Sébastien Marcel |
Model Pairing Using Embedding Translation for Backdoor Attack Detection on Open-Set Classification Tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.18718, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Isaac Ahlgren, Jack West, Kyuin Lee, George K. Thiruvathukal, Neil Klingensmith |
A Signal Injection Attack Against Zero Involvement Pairing and Authentication for the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.14018, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Shiping Cai, Kaizhan Lin, Chang-An Zhao |
Pairing Optimizations for Isogeny-based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 575, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
Displaying result #401 - #500 of 2885 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|