|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 293 occurrences of 177 keywords
|
|
|
Results
Found 543 publication records. Showing 543 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Dan Forsberg |
Use Cases of Implicit Authentication and Key Establishment with Sender and Receiver ID Binding. |
WOWMOM |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Zhijie Shi, Xiao Yang 0001, Ruby B. Lee |
Arbitrary Bit Permutations in One or Two Cycles. |
ASAP |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Sung-Min Lee 0006, Tai-Yun Kim |
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature. |
SAFECOMP |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Wen-Shenq Juang |
A Simple and Efficient Conference Scheme for Mobile Communications. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys |
17 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
15 | Akinori Kawachi, Christopher Portmann |
On the Power of Quantum Encryption Keys. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan |
A Secure Authenticated Key Agreement Protocol For Wireless Security. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Biswajit Panja, Sanjay Kumar Madria |
An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial. |
ADHOC-NOW |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Fang Liu 0025, Jose Manny Rivera, Xiuzhen Cheng 0001 |
Location-aware key establishment in wireless sensor networks. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
in-situ key establishment, security, wireless sensor networks |
15 | DaeHun Nyang, Abedelaziz Mohaisen |
Cooperative Public Key Authentication Protocol in Wireless Sensor Network. |
UIC |
2006 |
DBLP DOI BibTeX RDF |
Public Key Authentication, Cooperative Protocol, Voting |
15 | Muxiang Zhang |
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Benny Applebaum, David Cash, Chris Peikert, Amit Sahai |
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
Key-dependent message security, Learning problems, Encryption, Lattice-based cryptography |
15 | Dan Feng 0001, Lanxiang Chen, Lingfang Zeng, Zhongying Niu |
FPGA/ASIC based Cryptographic Object Store System. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato |
On The Security of Key Derivation Functions. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Perrig, Dawn Song |
Looking for Diamonds in the Desert - Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Gill R. Tsouri |
Securing wireless communication with implanted medical devices using reciprocal carrier-phase quantization. |
WOWMOM |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee |
HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, network security, Key predistribution |
14 | Neeraj Kumar Nehra, R. B. Patel |
MASLKE: Mobile Agent Based Secure Location aware Key Establishment in sensor networks. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas La Porta |
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. |
IEEE Trans. Mob. Comput. |
2007 |
DBLP DOI BibTeX RDF |
probabilistic key management, probabilistic authentication, hybrid network security, Heterogeneous sensor networks |
14 | David Cash, Yan Zong Ding, Yevgeniy Dodis, Wenke Lee, Richard J. Lipton, Shabsi Walfish |
Intrusion-Resilient Key Exchange in the Bounded Retrieval Model. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ting Yuan, Shiyong Zhang, YiPing Zhong |
A Matrix-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
14 | E. C. Park, Ian F. Blake |
Reducing Communication Overhead of Key Distribution Schemes for Wireless Sensor Networks. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Sungyoung Lee, Heejo Lee |
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Haowen Chan, Adrian Perrig |
PIKE: peer intermediaries for key establishment in sensor networks. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Ross J. Anderson, Haowen Chan, Adrian Perrig |
Key Infection: Smart Trust for Smart Dust. |
ICNP |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Ran Canetti, Shai Halevi, Jonathan Katz |
A Forward-Secure Public-Key Encryption Scheme. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Bilinear Diffie-Hellman, Encryption, Forward security, Key exposure |
14 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia |
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. |
ICNP |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck |
CryptoGraphics: Secret Key Cryptography Using Graphics Cards. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES |
14 | Yevgeniy Dodis, Joel Spencer |
On the (non)Universality of the One-Time Pad. |
FOCS |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Stefano Basagni, Kris Herrin, Danilo Bruschi, Emilia Rosti |
Secure pebblenets. |
MobiHoc |
2001 |
DBLP DOI BibTeX RDF |
security, wireless sensor networks, ad hoc networks, key management |
13 | Mohamed Seifelnasr, Riham AlTawy, Amr M. Youssef |
SKAFS: Symmetric Key Authentication Protocol With Forward Secrecy for Edge Computing. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Vimala Devi Parthasarathy, Kalaichelvi Visvalingam |
Healthcare data security in cloud storage using light weight symmetric key algorithm. |
Int. Arab J. Inf. Technol. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Pousali Dey, Pratyay Mukherjee, Swagata Sasmal, Rohit Sinha 0001 |
HiSE: Hierarchical (Threshold) Symmetric-key Encryption. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
13 | Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf |
Robust and lightweight symmetric key exchange algorithm for next-generation IoE. |
Internet Things |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Hongyuan Wang, Wanting Zhu, Baokai Zu, Yafang Li |
An Efficient and Universal Real-Time Data Integrity Verification Scheme Based on Symmetric Key in Stream Computing System. |
Symmetry |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jie Lin, Manfred von Willich, Hoi-Kwong Lo |
Composable Security of Distributed Symmetric Key Exchange Protocol. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha |
A Survey on Fault Attacks on Symmetric Key Cryptosystems. |
ACM Comput. Surv. |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Shiyao Chen, Chun Guo 0002, Jian Guo 0001, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu |
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
13 | Shiyao Chen, Chun Guo 0002, Jian Guo 0001, Li Liu, Meiqin Wang, Puwen Wei, Zeyu Xu |
Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives. |
IACR Trans. Symmetric Cryptol. |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa |
Accountable Ring Signatures from Symmetric-Key Primitives. |
candar |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Taniya Hasija, K. R. Ramkumar, Bhupendra Singh, Amanpreet Kaur, Sudesh Kumar Mittal |
Symmetric Key Cryptography: Review, Algorithmic Insights, and Challenges in the Era of Quantum Computers. |
ICCCNT |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Awaneesh Kumar Yadav, Manoj Misra, Pradumn Kumar Pandey, An Braeken, Madhusanka Liyanage |
An improved and provably secure symmetric-key based 5G-AKA Protocol. |
Comput. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kristtopher Kayo Coelho, Michele Nogueira, Mateus Coutinho Marim, Edelberto Franco Silva, Alex Borges Vieira, José Augusto Miranda Nacif |
LORENA: Low memORy symmEtric-Key geNerAtion Method for Based on Group Cryptography Protocol Applied to the Internet of Healthcare Things. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Vincent Omollo Nyangaresi, Musheer Ahmad 0002, Ahmed Alkhayyat, Wei Feng 0011 |
Artificial neural network and symmetric key cryptography based verification protocol for 5G enabled Internet of Things. |
Expert Syst. J. Knowl. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | R. Rajashree, Vijayakumar Peroumal, Lalit Kishore, K. Venkata Diwakar Reddy, Srujan Reddy, M. Jagannath |
Implementation of high speed and lightweight symmetric key encryption algorithm-based authentication protocol for resource constrained devices. |
Int. J. Electron. Secur. Digit. Forensics |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Miodrag J. Mihaljevic, Aleksandar Radonjic, Lianhai Wang, Shujiang Xu |
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel. |
Symmetry |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Manreet Sohal, Sandeep Sharma 0002 |
BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. |
J. King Saud Univ. Comput. Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Subhadeep Koley |
A feature adaptive image watermarking framework based on Phase Congruency and Symmetric Key Cryptography. |
J. King Saud Univ. Comput. Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Wentian Cai, Huijun Yao |
A Secure Transmission Method of Network Communication Data Based on Symmetric Key Encryption Algorithm. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mustafizur Rahman, Liang Zhou 0004, Shantanu Chakrabartty |
SPoTKD: A Protocol for Symmetric Key Distribution Over Public Channels Using Self-Powered Timekeeping Devices. |
IEEE Trans. Inf. Forensics Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu |
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
13 | Michele Fabbrini |
FC1: A Powerful, Non-Deterministic, Symmetric Key Cipher. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
13 | Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam |
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
13 | Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad |
Post-Quantum ID-based Ring Signatures from Symmetric-key Primitives. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
13 | Thibaut Vandervelden, Ruben de Smet, Kris Steenhaut, An Braeken |
Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Piotr Palka, Rafael A. Perez, Tianyang Fang, Jafar Saniie |
Design Flow of Blowfish Symmetric-Key Block Cipher on FPGA. |
EIT |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Pegah Nikbakht Bideh, Christian Gehrmann |
RoSym: Robust Symmetric Key Based IoT Software Upgrade Over-the-Air. |
CPSIOTSEC@CCS |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha |
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. |
CCS |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Laasya Bangalore, Rishabh Bhadauria, Carmit Hazay, Muthuramakrishnan Venkitasubramaniam |
On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives. |
TCC (1) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Mohit Chandra Saxena, Preeti Bajaj |
A Novel method of End-to-End data security using symmetric key based data encryption and SDWAN networking. |
IC3I |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Maxime Buser, Joseph K. Liu, Ron Steinfeld, Amin Sakzad |
Post-quantum ID-Based Ring Signatures from Symmetric-Key Primitives. |
ACNS |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu |
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. |
ACISP |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Poulami Das 0003, Julia Hesse, Anja Lehmann |
DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password. |
AsiaCCS |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Anit Kumar Ghosal, Satrajit Ghosh, Dipanwita Roychowdhury |
Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model. |
ProvSec |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Junchao Ma, Mustafa A. Al Sibahee, Mustafa S. Khalefa, Dhafer G. Honi |
MAC-Based Symmetric Key Protocol for Secure Traffic Forwarding in Drones. |
FABULOUS |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Bikash Debnath, Jadav Chandra Das, Debashis De |
SQCA: symmetric key-based crypto-codec for secure nano-communication using QCA. |
Photonic Netw. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Sreeparna Chakrabarti, G. N. K. Suresh Babu |
The Security Enhancement of Symmetric Key Crypto Mechanism based on Double Stage Secret Model. |
Inf. Secur. J. A Glob. Perspect. |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Jorge Munilla, Mike Burmester, Raquel Barco |
An enhanced symmetric-key based 5G-AKA protocol. |
Comput. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Kalyanapu Srinivas, V. Janaki |
Symmetric key generation algorithm using image-based chaos logistic maps. |
Int. J. Adv. Intell. Paradigms |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, S. Mary Saira Bhanu |
ESKEA: Enhanced Symmetric Key Encryption Algorithm Based Secure Data Storage in Cloud Networks with Data Deduplication. |
Wirel. Pers. Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Min-Yan Tsai, Hsin-Hung Cho |
A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model. |
Mob. Networks Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord |
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | Christoph Dobraunig, Daniel Kales, Christian Rechberger, Markus Schofnegger, Greg Zaverucha |
Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | Amril Syalim, Takashi Nishide, Kouichi Sakurai |
Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | Gizem Kara, Oguz Yayla |
Gröbner Basis Attack on STARK-Friendly Symmetric-Key Primitives: JARVIS, MiMC and GMiMCerf. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | Ripon Patgiri |
symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha 0001 |
Amortized Threshold Symmetric-key Encryption. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | Mircea Digulescu |
Applications of SKREM-like symmetric key ciphers. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
13 | RatnaKumari Challa, VijayaKumari Gunta |
Towards the Construction of Reed-Muller Code Based Symmetric Key FHE. |
Ingénierie des Systèmes d Inf. |
2021 |
DBLP DOI BibTeX RDF |
|
13 | K. Sundara Krishnan, S. P. Raja 0001, B. Jaison |
A Symmetric Key Multiple Color Image Cipher Based on Cellular Automata, Chaos Theory and Image Mixing. |
Inf. Technol. Control. |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Sijo V. Panicker, P. Mohamed Shameem, N. R. Mruthula |
Aggregated symmetric key-based hierarchical group data sharing in cloud. |
Int. J. Comput. Aided Eng. Technol. |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Xinrui Ge, Jia Yu 0005, Hanlin Zhang, Chengyu Hu, Zengpeng Li, Zhan Qin, Rong Hao |
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. |
IEEE Trans. Dependable Secur. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Mihai Christodorescu, Sivanarayana Gaddam, Pratyay Mukherjee, Rohit Sinha 0001 |
Amortized Threshold Symmetric-key Encryption. |
CCS |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Anubhab Baksi |
Classical and Physical Security of Symmetric Key Cryptographic Algorithms. |
VLSI-SoC |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Colin Boyd, Gareth T. Davies, Bor de Kock, Kai Gellert, Tibor Jager, Lise Millerjord |
Symmetric Key Exchange with Full Forward Security and Robust Synchronization. |
ASIACRYPT (4) |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Taerim Lee, Ho-Se Moon, Juwook Jang |
Data encryption method using CP-ABE with symmetric key algorithm in blockchain network. |
ICTC |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Eik List |
Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers. |
|
2021 |
RDF |
|
13 | Daniel Coggia |
Techniques of cryptanalysis for symmetric-key primitives. (Techniques de cryptanalyse dédiées au chiffrement à bas coût). |
|
2021 |
RDF |
|
13 | Simon Landry |
Étude de la résistance des algorithmes cryptographiques symétriques face à la cryptanalyse moderne. (Study of the resistance of symmetric-key algorithms against modern cryptanalysis). |
|
2021 |
RDF |
|
13 | Anubhab Baksi |
Classical and physical security of symmetric key cryptographic algorithms |
|
2021 |
DOI RDF |
|
13 | Yi-Li Huang, Fang-Yie Leu, Ruey-Kai Sheu, Jung-Chun Liu, Heru Susanto |
A secure and efficient WSN by employing symmetric key matrix and rectangular frame scheme. |
Concurr. Comput. Pract. Exp. |
2020 |
DBLP DOI BibTeX RDF |
|
13 | An Braeken |
Symmetric key based 5G AKA authentication protocol satisfying anonymity and unlinkability. |
Comput. Networks |
2020 |
DBLP DOI BibTeX RDF |
|
13 | SungJin Yu, YoungHo Park 0005 |
Comments on "ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments". |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Zeeshan Ali, Sajid Hussain, Haseeb Ur Rehman, Asmaa Munshi, Misbah Liaqat, Neeraj Kumar 0001, Shehzad Ashraf Chaudhry |
ITSSAKA-MS: An Improved Three-Factor Symmetric-Key Based Secure AKA Scheme for Multi-Server Environments. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Borislav Stoyanov, Gyurhan H. Nedzhibov |
Symmetric Key Encryption Based on Rotation-Translation Equation. |
Symmetry |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Placide Shabisha, An Braeken, Kris Steenhaut |
Symmetric Key-Based Secure Storage and Retrieval of IoT Data on a Semi-trusted Cloud Server. |
Wirel. Pers. Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
13 | R. Geetha, T. Padmavathy, T. Thilagam, A. Lallithasree |
Tamilian Cryptography: An Efficient Hybrid Symmetric Key Encryption Algorithm. |
Wirel. Pers. Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Xunhua Wang, Ben Huson |
Robust distributed symmetric-key encryption. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
13 | Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha |
Fault Attacks In Symmetric Key Cryptosystems. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
13 | Shweta Agrawal, Shota Yamada 0001 |
CP-ABE for Circuits (and more) in the Symmetric Key Setting. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
Displaying result #101 - #200 of 543 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|