|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1021 occurrences of 506 keywords
|
|
|
Results
Found 1470 publication records. Showing 1470 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Toshinori Araki |
Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITS ![In: Information Theoretic Security, Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008, Proceedings, pp. 2-13, 2008, Springer, 978-3-540-85092-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Junpei Kawamoto, Qiang Ma 0001, Masatoshi Yoshikawa |
Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 449-454, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Farnaz Gharibian, Kenneth B. Kent |
An embedded decryption/decompression engine using Handel-C. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIES ![In: IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008, pp. 51-57, 2008, IEEE, 978-1-4244-1994-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | David Oranchak |
Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 1717-1718, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
codebreaking, homophonic substitution, zodiac killer, zodiac murder ciphers, genetic algorithms, cryptography, evolutionary computing, constraint satisfaction |
24 | Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 297-311, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proxy cryptosystem, certificate-based encryption (CBE), pairing |
24 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 136-147, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou |
Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 148-154, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Nadia Nedjah, Luiza de Macedo Mourelle |
A Versatile Pipelined Hardware Implementation for Encryption and Decryption Using Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VECPAR ![In: High Performance Computing for Computational Science - VECPAR 2006, 7th International Conference, Rio de Janeiro, Brazil, June 10-13, 2006, Revised Selected and Invited Papers, pp. 249-259, 2006, Springer, 978-3-540-71350-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Young Whan Lee, Byung Mun Choi |
(SE-33)Intelligent ID-Based Threshold System by an Encryption and Decryption from Bilinear Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 1022-1028, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Bin B. Zhu, Shipeng Li 0001, Yang Yang |
JPEG 2000 encryption enabling fine granularity scalability without decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (6) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 6304-6307, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Sang-Su Lee, Jong Wook Han, Hyo-wook Bae |
The encryption method to share a secret binary image and its decryption system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICT ![In: Proceedings of the 1st Intenational Symposium on Information and Communication Technologies, Dublin, Ireland, September 24-26, 2003, pp. 94-99, 2003, Trinity College Dublin. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
cryptography, image reconstruction, data security, optical imaging |
24 | Emmanuel Bresson, Dario Catalano, David Pointcheval |
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 37-54, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Tieyan Li |
Time Constraint Delegation for P2P Data Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers, pp. 173-186, 2003, Springer, 3-540-20887-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Jan Camenisch, Victor Shoup |
Practical Verifiable Encryption and Decryption of Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 126-144, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Bistarelli, Iliano Cervesato, Gabriele Lenzini, Fabio Martinelli |
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 86-99, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Pierre-Alain Fouque, Guillaume Poupard, Jacques Stern |
Sharing Decryption in the Context of Voting or Lotteries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 90-104, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Tom Kean, Ann Duncan |
DES Key Breaking, Encryption and Decryption on the XC6216. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: 6th IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM '98), 15-17 April 1998, Napa Valley, CA, USA, pp. 310-311, 1998, IEEE Computer Society, 0-8186-8900-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Oded Goldreich 0001, Shafi Goldwasser, Shai Halevi |
Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 105-111, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Public-key Encryption Schemes, Computational Problems in Lattices |
18 | Thai Duong, Juliano Rizzo |
Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 481-489, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Decryption oracle attack, Unauthenticated encryption, Cryptography, Web security, Application Security |
18 | Marius Marcu, Dacian Tudor, Sebastian Fuicu |
Power efficiency analysis of multimedia secured mobile applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 387-391, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
encoding/decoding, encryption/decryption, mobile devices, energy efficiency, wireless communication, power consumption, multimedia applications |
18 | G. Praveen Kumar, Arjun Kumar Murmu, Biswas Parajuli, Prasenjit Choudhury |
MULET: A Multilanguage Encryption Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 779-782, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Software Localization and Cryptanalysis, Encryption, Decryption, Unicode |
18 | Pravin Revankar, W. Z. Gandhare, Dilip Rathod |
Neural Synchronization with Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSAP ![In: 2010 International Conference on Signal Acquisition and Processing, ICSAP 2010, Bangalore, India, February 9-10, 2010, pp. 371-374, 2010, IEEE Computer Society, 978-0-7695-3960-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Neural cryptography, mutual learning, tree parity machine, neural synchronization, encryption/decryption, neural network, query |
18 | R. Satheesh Kumar, E. Pradeep, K. Naveen, R. Gunasekaran |
Enhanced Cost Effective Symmetric Key Algorithm for Small Amount of Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSAP ![In: 2010 International Conference on Signal Acquisition and Processing, ICSAP 2010, Bangalore, India, February 9-10, 2010, pp. 354-357, 2010, IEEE Computer Society, 978-0-7695-3960-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Shared key, Small data, Security, Cryptography, Encryption, Decryption, Secret key, Symmetric key |
18 | Chong-Yen Lee, Tsang-Yean Lee, Homer Wu, Hau-Dong Tsui, Heng-Sheng Chen |
Secure Site Authentication and Message Transmission Based on Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 332-337, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Site Authentication, Grid Computing, Encryption, Decryption |
18 | Raju Halder, Parthasarathi Dasgupta, Saptarshi Naskar, Samar Sen-Sarma |
An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 22st Annual Symposium on Integrated Circuits and Systems Design: Chip on the Dunes, SBCCI 2009, Natal, Brazil, August 31 - September 3, 2009, 2009, ACM, 978-1-60558-705-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intellectual property protection (IPP), watermarking, encryption, decryption |
18 | Pooya Farshim, Bogdan Warinschi |
Certified Encryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 179-197, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption |
18 | Umit Topaloglu, Coskun Bayrak |
Secure mobile agent execution in virtual environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 16(1), pp. 1-12, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Agent and host protection, Security, Mobile agents, Virtualization, Encryption, Decryption |
18 | Sigurd Eskeland, Vladimir A. Oleshchuk |
Secure Team-Based EPR Access Acquisition in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 943-949, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Broadcast-oriented threshold decryption, Secure EPR acquisition, Access control |
18 | Saurabh Panjwani |
Tackling Adaptive Corruptions in Multicast Encryption Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 21-40, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Adaptive Corruptions, Selective Decryption, Multicast, Encryption |
18 | Borislav Stoyanov, Borislav Bedzhev, Todor Tashev, Svetlana Vasileva |
Application and statistic testing of the 5-adic summation-shrinking generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CompSysTech ![In: Proceedings of the 2007 International Conference on Computer Systems and Technologies, CompSysTech 2007, Rousse, Bulgaria, June 14-15, 2007, pp. 39, 2007, ACM, 978-954-9641-50-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
encryption and decryption, statistic testing, pseudorandom generator |
18 | Abdoul Rjoub, M. Musameh, Odysseas G. Koufopavlou |
An optimal low-power/high performance DDP-based Cobra-H64 cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007, pp. 48, 2007, ICST, 978-963-06-2670-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cobra-H64, security, cryptography, encryption, decryption |
18 | Yvo Desmedt, Kaoru Kurosawa |
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 351-361, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
threshold decryption, Goldwasser- Micali, Rabin, cryptography, Threshold signatures |
18 | Giuseppe Ateniese, Kevin Fu, Matthew Green 0001, Susan Hohenberger |
Improved proxy re-encryption schemes with applications to secure distributed storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(1), pp. 1-30, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
double decryption, key translation, bilinear maps, Proxy re-encryption |
18 | Tai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson |
DES Decoding Using FPGA and Custom Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 575-577, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Parallel Processing, Encryption, Encoder, Decoder, DES, Decryption |
18 | Byeong Kil Lee, Lizy Kurian John |
Implications of Executing Compression and Encryption Applications on General Purpose Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 54(7), pp. 917-922, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Media compression, memory behavior, MediaZip benchmark, overhead memory bandwidth, encryption, encoding, decoding, workload characterization, decryption |
18 | Chris McNear, Chrisila C. Pettey |
A free, readily upgradeable, interactive tool for teaching encryption algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference (1) ![In: Proceedings of the 43nd Annual Southeast Regional Conference, 2005, Kennesaw, Georgia, USA, March 18-20, 2005, Volume 1, pp. 280-285, 2005, ACM, 1-59593-059-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
teaching aid, simulator, cryptography, encryption, decryption |
18 | Srivaths Ravi 0001, Anand Raghunathan, Paul C. Kocher, Sunil Hattangady |
Security in embedded systems: Design challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Embed. Comput. Syst. ![In: ACM Trans. Embed. Comput. Syst. 3(3), pp. 461-491, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
processing requirements, security, Embedded systems, authentication, architecture, encryption, security protocols, hardware design, tamper resistance, decryption, cryptographic algorithms, security attacks, battery life |
18 | Rajiv K. Nekkanti, Chung-wei Lee |
Trust based adaptive on demand ad hoc routing protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 88-93, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
encryption/decryption, trust factor, AODV, security level, ad-hoc routing protocol |
18 | Anand Raghunathan, Nachiketh R. Potlapally, Srivaths Ravi 0001 |
Securing Wireless Data: System Architecture Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), October 2-4, 2002, Kyoto, Japan, pp. 195-200, 2002, ACM / IEEE Computer Society, 1-58113-576-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
18 | Hiroto Yasuura, Hiroyuki Tomiyama, Takanori Okuma, Yun Cao |
Data Memory Design Considering Effective Bitwidth for Low-Energy Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Proceedings of the 15th International Symposium on System Synthesis (ISSS 2002), October 2-4, 2002, Kyoto, Japan, pp. 201-206, 2002, ACM / IEEE Computer Society, 1-58113-576-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
WTLS, security, performance, mobile computing, embedded system, wireless communications, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
18 | Srivaths Ravi 0001, Anand Raghunathan, Nachiketh R. Potlapally, Murugan Sankaradass |
System design methodologies for a wireless security processing platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 39th Design Automation Conference, DAC 2002, New Orleans, LA, USA, June 10-14, 2002, pp. 777-782, 2002, ACM, 1-58113-461-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, performance, embedded system, wireless, encryption, AES, RSA, design methodology, system architecture, platform, DES, IPSec, SSL, decryption, handset, 3DES, security processing |
18 | J. H. Jiang, Shih-Chieh Chang, Wen-Ben Jone |
Embedded Core Testing Using Broadcast Test Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 16th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2001), 24-26 October 2001, San Francisco, CA, USA, Proceedings, pp. 95-103, 2001, IEEE Computer Society, 0-7695-1203-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
test pattern broadcasting, data decryption, IEEE P1500 standard, data encryption, core-based testing |
18 | Bruce Schneier, Chris Hall |
An Improved E-Mail Security Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 227-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy |
18 | Lein Harn, David Huang |
A Protocol for Establishing Secure Communication Channels in a Large Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 6(1), pp. 188-191, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange |
17 | Mohamed Nabeel, Ning Shang, John Zage, Elisa Bertino |
Mask: a system for privacy-preserving policy-based access to published content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 1239-1242, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
broadcast systems, privacy, access control, identity, group key management |
17 | Hsiang-Cheh Huang, Yueh-Hong Chen |
Genetic fingerprinting for copyright protection of multicast media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 13(4), pp. 383-391, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Melissa Chase, Sherman S. M. Chow |
Improving privacy and security in multi-authority attribute-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 121-130, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-authority, removing trusted party, privacy, attribute based encryption, anonymous credential |
17 | Ribao Wei, Dingfeng Ye |
Delegate predicate encryption and its application to anonymous authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 372-375, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
predicate encryption, anonymous authentication |
17 | Weidong Zhang, Baocang Wang, Yupu Hu |
A New Knapsack Public-Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 53-56, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Felix Leder, Peter Martini |
NGBPA Next Generation BotNet Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 307-317, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 473-484, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
17 | Mabroka Ali Mayouf, Zarina Shukur |
Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVIC ![In: Visual Informatics: Bridging Research and Practice, First International Visual Informatics Conference, IVIC 2009, Kuala Lumpur, Malaysia, November 11-13, 2009, Proceedings, pp. 510-520, 2009, Springer, 978-3-642-05035-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
possible attacks, animation, active learning, cryptographic protocols, visual metaphor |
17 | Zhiyao Liang, Rakesh M. Verma |
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 101-116, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
insecurity, Cryptographic protocols, secrecy, NP |
17 | Mustafa Canim, Murat Kantarcioglu, Ali Inan |
Query Optimization in Encrypted Relational Databases by Vertical Schema Partitioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings, pp. 1-16, 2009, Springer, 978-3-642-04218-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki |
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 215-234, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Michel Abdalla, Dario Catalano, Dario Fiore 0001 |
Verifiable Random Functions from Identity-Based Key Encapsulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 554-571, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Crystal Clough, John Baena, Jintai Ding, Bo-Yin Yang, Ming-Shing Chen |
Square, a New Multivariate Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 252-264, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Huiju Cheng, Howard M. Heys, Cheng Wang |
PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 11th Euromicro Conference on Digital System Design: Architectures, Methods and Tools, DSD 2008, Parma, Italy, September 3-5, 2008, pp. 383-390, 2008, IEEE Computer Society, 978-0-7695-3277-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ryan Pries, Wei Yu 0002, Xinwen Fu, Wei Zhao 0001 |
A New Replay Attack Against Anonymous Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2008, Beijing, China, 19-23 May 2008, pp. 1578-1582, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Christopher James Hargreaves, Howard Chivers |
Recovery of Encryption Keys from Memory Using a Linear Scan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1369-1376, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Live Forensics, Encryption, Digital Evidence, Forensic Computing |
17 | Sanmitra Kale, Snehal Naphade, Vinod Valecha |
Application for a Secure Fax System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 5th International Conference, ICDCIT 2008, New Delhi, India, December 10-12, 2008. Proceedings, pp. 83-88, 2008, Springer, 978-3-540-89736-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Masaki Nakanishi |
An FPGA Configuration Scheme for Bitstream Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARC ![In: Reconfigurable Computing: Architectures, Tools and Applications, 4th International Workshop, ARC 2008, London, UK, March 26-28, 2008. Proceedings, pp. 326-331, 2008, Springer, 978-3-540-78609-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
FPGA configuration, bitstream protection, bitstream encryption, bitstream authentication |
17 | Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 185-198, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Identity-Based Encryption, Proxy re-encryption, Personal Health Record |
17 | Sandip Dutta, Avijit Kar, N. C. Mahanti, B. N. Chatterji |
Network Security Using Biometric and Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 10th International Conference, ACIVS 2008, Juan-les-Pins, France, October 20-24, 2008. Proceedings, pp. 38-44, 2008, Springer, 978-3-540-88457-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptography, Biometric, Watermarking, DES, MD5 |
17 | Benoît Chevallier-Mames, David Naccache, Jacques Stern |
Linear Bandwidth Naccache-Stern Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 327-339, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ns cryptosystem, multiplicative knapsack, efficiency, Public key cryptography |
17 | Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda |
Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 31-48, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | David Lubicz, Thomas Sirvent |
Attribute-Based Broadcast Encryption Scheme Made Efficient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 325-342, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Public-key broadcast encryption, Generic model of groups with pairing, Attribute-based encryption |
17 | Michael J. Jacobson Jr., Renate Scheidler, Daniel Weimer |
An Adaptation of the NICE Cryptosystem to Real Quadratic Orders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 191-208, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera |
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: The 6th ACS/IEEE International Conference on Computer Systems and Applications, AICCSA 2008, Doha, Qatar, March 31 - April 4, 2008, pp. 679-685, 2008, IEEE Computer Society, 978-1-4244-1967-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang |
Commutative Encryption and Watermarking in Video Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 17(6), pp. 774-778, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | YiWei Zhang, YuMin Wang, XuBang Shen |
A chaos-based image encryption algorithm using alternate structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 334-341, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
chaotic encryption, general cat-map, OCML, image encryption |
17 | Ling Cheung, Calvin C. Newport |
Provably secure ciphertext policy ABE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 456-465, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute-based encryption |
17 | Kashif Kifayat, Madjid Merabti, Qi Shi 0001, David Llewellyn-Jones |
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 44-49, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Key Management, Data Aggregation |
17 | Anna Zych, Milan Petkovic, Willem Jonker |
The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 95-97, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Mehran Mozaffari Kermani, Arash Reyhani-Masoleh |
A Structure-independent Approach for Fault Detection Hardware Implementations of the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007, FDTC 2007: Vienna, Austria, 10 September 2007, pp. 47-53, 2007, IEEE Computer Society, 0-7695-2982-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Hua Li, Jianzhou Li |
A New Compact Architecture for AES with Optimized ShiftRows Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2007), 27-20 May 2007, New Orleans, Louisiana, USA, pp. 1851-1854, 2007, IEEE, 1-4244-0920-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Fuhr 0001, Pascal Paillier |
Decryptable Searchable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 228-236, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Ellen Jochemsz, Alexander May 0001 |
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 395-411, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT |
17 | Rui Xue 0001, Dengguo Feng |
Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 239-253, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa |
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(4), pp. 241-255, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Verifiable shuffles, Paillier public-key system, Privacy, Mix-nets, Formal security model |
17 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security analysis of CRT-based cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(3), pp. 177-185, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem |
17 | Farshid Delgosha, Faramarz Fekri |
Public-key cryptography using paraunitary matrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Signal Process. ![In: IEEE Trans. Signal Process. 54(9), pp. 3489-3504, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Sun S. Chung, Gultekin Özsoyoglu |
Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 98, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar |
Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Information Processing ![In: Intelligent Information Processing III, IFIP TC12 International Conference on Intelligent Information Processing (IIP 2006), September 20-23, Adelaide, Australia, pp. 171-178, 2006, Springer, 978-0-387-44639-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES |
17 | Huizhang Shen, Jidi Zhao, Huanchen Wang |
Illegal Intrusion Detection Based on Hidden Information Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 79-84, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Ricardo Chaves, Georgi Kuzmanov, Stamatis Vassiliadis, Leonel Sousa |
Reconfigurable memory based AES co-processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), Proceedings, 25-29 April 2006, Rhodes Island, Greece, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Konstantinos Chalkias, George Stephanides |
Timed Release Cryptography from Bilinear Pairings Using Hash Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 130-140, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Timed-Release Cryptography, S/Key, bilinear pairings, hash chains, sealed-bid auctions |
17 | Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park |
Capacity Planning for Scalable Fingerprint Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part I, pp. 906-915, 2006, Springer, 3-540-46535-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Authentication Protocol, Fingerprint Verification |
17 | Daniel J. T. Chong, Robert H. Deng |
Privacy-enhanced superdistribution of layered content with trusted access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006, pp. 37-44, 2006, ACM, 1-59593-555-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
digital distribution, usage rights, privacy, access control, trusted computing, DRM, copyrights, licensing |
17 | Yitao Duan, John F. Canny |
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 244-261, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Misung Cho, Seokryul Kim, Maenghee Sung, Giwon On |
3D Fingerprinting and Encryption Principle for Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AXMEDIS ![In: Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2006, Leeds, UK, December 13-15, 2006, pp. 121-127, 2006, IEEE Computer Society, 0-7695-2625-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Louis Granboulan, Antoine Joux, Jacques Stern |
Inverting HFE Is Quasipolynomial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 345-356, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Brian Rogers, Yan Solihin, Milos Prvulovic |
Memory predecryption: hiding the latency overhead of memory encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGARCH Comput. Archit. News ![In: SIGARCH Comput. Archit. News 33(1), pp. 27-33, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Mark D. Corner, Brian D. Noble |
Protecting File Systems with Transient Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 11(1-2), pp. 7-19, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Deepak Kapur, Paliath Narendran, Lida Wang |
A Unification Algorithm for Analysis of Protocols with Blinded Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mechanizing Mathematical Reasoning ![In: Mechanizing Mathematical Reasoning, Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday, pp. 433-451, 2005, Springer, 3-540-25051-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Jae-Pyo Park, Hong-jin Kim, Keun-Wang Lee, Keun-Soo Lee |
A PKI Based Digital Rights Management System for Safe Playback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Advances in Intelligent Computing, International Conference on Intelligent Computing, ICIC 2005, Hefei, China, August 23-26, 2005, Proceedings, Part II, pp. 801-810, 2005, Springer, 3-540-28227-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Khaled Z. Ibrahim |
Efficient Architectural Support for Secure Bus-Based Shared Memory Multiprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 10th Asia-Pacific Conference, ACSAC 2005, Singapore, October 24-26, 2005, Proceedings, pp. 640-654, 2005, Springer, 3-540-29643-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Hua Li, Jianzhou Li |
A High Performance Sub-Pipelined Architecture for AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 23rd International Conference on Computer Design (ICCD 2005), 2-5 October 2005, San Jose, CA, USA, pp. 491-496, 2005, IEEE Computer Society, 0-7695-2451-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
sub-pipelined architecture, FPGA, cryptography, AES |
17 | Jun-Hong Chen, Ming-Der Shieh, Chien-Ming Wu |
Concurrent algorithm for high-speed point multiplication in elliptic curve cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (5) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 5254-5257, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang |
t-Out-of-n String/Bit Oblivious Transfers Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 410-421, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 1470 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|