The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IWSEC"( http://dblp.L3S.de/Venues/IWSEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iwsec

Publication years (Num. hits)
2006 (31) 2007 (31) 2008 (20) 2009 (15) 2010 (25) 2011 (15) 2012 (17) 2013 (21) 2014 (22) 2015 (22) 2016 (20) 2017 (15) 2018 (21) 2019 (24) 2020 (17) 2021 (15) 2022-2023 (28)
Publication types (Num. hits)
inproceedings(341) proceedings(18)
Venues (Conferences, Journals, ...)
IWSEC(359)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 107 occurrences of 90 keywords

Results
Found 359 publication records. Showing 359 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Weiyao Wang 0004, Yuntao Wang 0002, Atsushi Takayasu, Tsuyoshi Takagi Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Terry Shue Chien Lau, Chik How Tan Key Recovery Attack on McNie Based on Low Rank Parity Check Codes and Its Reparation. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Louis Cianciullo, Hossein Ghodosi Improvements to Almost Optimum Secret Sharing with Cheating Detection. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino, Ken Naganuma Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem. Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ebo van der Laan, Erik Poll, Joost Rijneveld, Joeri de Ruiter, Peter Schwabe, Jan Verschuren Is Java Card Ready for Hash-Based Signatures? Search on Bibsonomy IWSEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Gaurav Sharma 0006, Rajeev Anand Sahu, Tarunpreet Bhatia, Olivier Markowitch Secure Certificateless Proxy Re-encryption Without Pairing. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rui Zhang 0002, Kai He Multipurpose Public-Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Fuyang Fang, Bao Li 0001, Xin Wang Deterministic Identity-Based Encryption from Lattices with More Compact Public Parameters. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Satoshi Obana, Koji Chida (eds.) Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rui Xu 0006, Kirill Morozov, Anirban Basu 0001, Mohammad Shahriar Rahman, Shinsaku Kiyomoto Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Haiyang Xue, Bao Li 0001, Xianhui Lu IND-PCA Secure KEM Is Enough for Password-Based Authenticated Key Exchange (Short Paper). Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang 0002 The Beauty and the Beasts - The Hard Cases in LLL Reduction. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nasser Mohammed Al-Fannah, Wanpeng Li Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai Evasion Attacks Against Statistical Code Obfuscation Detectors. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Aleksandr Lenin, Jan Willemson, Anton Charnamord Simple Infeasibility Certificates for Attack Trees. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Baptiste Vinh Mau, Koji Nuida Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012 (Short Paper). Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bingqing Xia, Dongyao Ji, Gang Yao Enhanced TLS Handshake Authentication with Blockchain and Smart Contract (Short Paper). Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Akinori Hosoyamada, Kazumaro Aoki On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers. Search on Bibsonomy IWSEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wenbin Zhang 0003, Chik How Tan On the Security and Key Generation of the ZHFE Encryption Scheme. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zejun Xiang 0001, Wentao Zhang, Dongdai Lin On the Division Property of Simon48 and Simon64. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zimin Lin, Rui Wang 0032, Xiaoqi Jia, Shengzhi Zhang, Chuankun Wu Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Denis Butin, Denise Demirel, Johannes Buchmann 0001 Formal Policy-Based Provenance Audit. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, Kazuki Yoneyama UC-Secure Dynamic Searchable Symmetric Encryption Scheme. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hiroshi Onuki, Tadanori Teruya, Naoki Kanayama, Shigenori Uchiyama Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Filipe Beato, Kimmo Halunen, Bart Mennink Recipient Privacy in Online Social Networks. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hiroaki Yamamoto Secure Automata-Based Substring Search Scheme on Encrypted Data. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, Kazuo Sakiyama Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei Xie 0007, Yong Tang, Shuhui Chen, Yi Zhang, Yuanming Gao Security of Web of Things: A Survey. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1François-Xavier Aguessy, Olivier Bettan, Gregory Blanc, Vania Conan, Hervé Debar Hybrid Risk Assessment Model Based on Bayesian Networks. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Gerardo Pelosi A Note on Fault Attacks Against Deterministic Signature Schemes. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ji-Hoon Jeong, Hyung Chan Kim, Il Hwan Park, Bong-Nam Noh Hooking Graceful Moments: A Security Analysis of Sudo Session Handling. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tao Zhang 0014, Sherman S. M. Chow, Zhe Zhou 0001, Ming Li 0006 Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Takato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai 0001, Tatsuji Munaka Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Momonari Kudo, Junpei Yamaguchi, Yang Guo, Masaya Yasuda Practical Analysis of Key Recovery Attack Against Search-LWE Problem. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qianqian Yang 0003, Lei Hu, Siwei Sun, Ling Song 0001 Related-Key Impossible Differential Analysis of Full Khudra. Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kazuto Ogawa, Katsunari Yoshioka (eds.) Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liqiang Peng, Lei Hu, Yao Lu 0002, Zhangjie Huang, Jun Xu 0022 Implicit Factorization of RSA Moduli Revisited (Short Paper). Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wei Yu, Kwang Ho Kim, Myong Song Jo New Fast Algorithms for Elliptic Curve Arithmetic in Affine Coordinates. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ben Smyth, Yoshikazu Hanatani, Hirofumi Muratani NM-CPA Secure Encryption with Proofs of Plaintext Knowledge. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jingnan He, Bao Li 0001, Xianhui Lu, Dingding Jia, Haiyang Xue, Xiaochao Sun Identity-Based Lossy Encryption from Learning with Errors. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shunsuke Taketani, Wakaha Ogata Improvement of UC Secure Searchable Symmetric Encryption Scheme. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fuyang Fang, Bao Li 0001, Xianhui Lu, Xiaochao Sun Improved Efficiency of MP12. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Takaya Ezaki, Tomohiro Date, Hiroyuki Inoue An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi k-Anonymous Microdata Release via Post Randomisation Method. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jae Hong Seo, Keita Emura Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shahidatul Sadiah, Toru Nakanishi 0001, Nobuo Funabiki Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fuqun Wang, Kunpeng Wang, Bao Li 0001 LWE-Based FHE with Better Parameters. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Reina Yagasaki, Kazuo Sakiyama Artifact-Metric-Based Authentication for Bottles of Wine (Short Paper). Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Siwei Sun, Lei Hu, Kexin Qiao, Xiaoshuang Ma, Jinyong Shan, Ling Song 0001 Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Keisuke Tanaka, Yuji Suga (eds.) Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qinglong Zhang, Zongbin Liu, Cunqing Ma, Jiwu Jing Bit Error Probability Evaluation of Ring Oscillator PUF (Short Paper). Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto Secure Multi-Party Computation Using Polarizing Cards. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Taechan Kim 0001, Mehdi Tibouchi Invalid Curve Attacks in a GLS Setting. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hidetaka Hoshino, Satoshi Obana Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tingting Zhang, Hongda Li 0001 Fully Leakage-Resilient Non-malleable Identification Schemes in the Bounded-Retrieval Model. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tong Liu, Yazhe Wang Beyond Scale: An Efficient Framework for Evaluating Web Access Control Policies in the Era of Big Data. Search on Bibsonomy IWSEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Avijit Dutta, Goutam Paul 0001 Deterministic Hard Fault Attack on Trivium. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nilanjan Datta, Mridul Nandi Characterization of EME with Linear Mixing. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aslí Bay, Jialin Huang, Serge Vaudenay Improved Linear Cryptanalysis of Reduced-Round MIBS. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hailong Zhang 0001 How to Effectively Decrease the Resource Requirement in Template Attack? Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kuniyasu Suzaki, Toshiki Yagi, Kazukuni Kobara, Toshiaki Ishiyama Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yun-An Chang, Wei-Chih Hong, Ming-Chun Hsiao, Bo-Yin Yang, An-Yeu Wu, Chen-Mou Cheng Hydra: An Energy-Efficient Programmable Cryptographic Coprocessor Supporting Elliptic-Curve Pairings over Fields of Large Characteristics. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jan Hajny, Lukas Malina, Ondrej Tethal Privacy-Friendly Access Control Based on Personal Attributes. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kosei Endo, Noboru Kunihiro On the Security Proof of an Authentication Protocol from Eurocrypt 2011. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Satoshi Obana, Kazuya Tsuchida Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marina Krotofil, Jason Larsen Are You Threatening My Hazards? Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maki Yoshida, Koichi Mouri (eds.) Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rui Xu 0006, Kirill Morozov, Tsuyoshi Takagi Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammet Ali Evci, Selçuk Kavut DPA Resilience of Rotation-Symmetric S-boxes. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Masaya Sato, Toshihiro Yamauchi Complicating Process Identification by Replacing Process Information for Attack Avoidance. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paolo Palmieri 0001, Johan A. Pouwelse Key Management for Onion Routing in a True Peer to Peer Setting. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Satsuya Ohata, Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura More Constructions of Re-splittable Threshold Public Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Koutarou Suzuki, Kazuki Yoneyama Secure Multi-Party Computation for Elliptic Curves. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dingding Jia, Bao Li 0001, Xianhui Lu, Qixiang Mei Related Key Secure PKE from Hash Proof Systems. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shoichi Akagi, Yasuyuki Nogami Exponentiation Inversion Problem Reduced from Fixed Argument Pairing Inversion on Twistable Ate Pairing and Its Difficulty. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fu-Kuo Tseng, Rong-Jaye Chen, Bao-Shuh Paul Lin Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Sayantan Mukherjee Framework for Efficient Search and Statistics Computation on Encrypted Cloud Data. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dai Yamamoto, Masahiko Takenaka, Kazuo Sakiyama, Naoya Torii A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering. Search on Bibsonomy IWSEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shotaro Sano, Takuma Otsuka, Hiroshi G. Okuno Solving Google's Continuous Audio CAPTCHA with HMM-Based Automatic Speech Recognition. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yutaro Kiyomura, Tsuyoshi Takagi Efficient Algorithm for Tate Pairing of Composite Order. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama One-Round Authenticated Key Exchange without Implementation Trick. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wakaha Ogata, Keita Koiwa, Akira Kanaoka, Shin'ichiro Matsuo Toward Practical Searchable Symmetric Encryption. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Takahiro Matsuda 0002, Goichiro Hanaoka Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yosuke Todo, Yu Sasaki New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yi Deng 0002, Yang Zhang 0021, Liang Cheng 0004, Xiaoshan Sun Static Integer Overflow Vulnerability Detection in Windows Binary. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Haruna Higo, Keisuke Tanaka, Kenji Yasunaga Game-Theoretic Security for Bit Commitment. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yasufumi Hashimoto Cryptanalysis of the Quaternion Rainbow. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen, Bao-Shuh Paul Lin Statistics on Encrypted Cloud Data. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1José Moreira, Marcel Fernandez, Grigory Kabatiansky Constructions of Almost Secure Frameproof Codes Based on Small-Bias Probability Spaces. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kazuo Sakiyama, Masayuki Terada (eds.) Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mostafa M. I. Taha, Patrick Schaumont Differential Power Analysis of MAC-Keccak at Any Key-Length. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001, Yu Sasaki, Lei Wang 0031, Kan Yasuda Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Paolo Palmieri 0001, Olivier Pereira Unconditionally Secure Oblivious Transfer from Real Network Behavior. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yun-Ju Huang, Christophe Petit 0001, Naoyuki Shinohara, Tsuyoshi Takagi Improvement of Faugère et al.'s Method to Solve ECDLP. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 359 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license