Results
Found 166 publication records. Showing 166 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Jianhong Zhang, Zhengtao Jiang |
Identity-and-data privacy forward security public auditing protocol in the standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Commun. Syst. ![In: Int. J. Commun. Syst. 32(15), 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Colin Boyd, Kai Gellert |
A Modern View on Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1362, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
11 | Michel Abdalla, Manuel Barbosa |
Perfect Forward Security of SPAKE2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 1194, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
11 | Nimrod Aviram, Kai Gellert, Tibor Jager |
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 228, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
11 | Nimrod Aviram, Kai Gellert, Tibor Jager |
Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (2) ![In: Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part II, pp. 117-150, 2019, Springer, 978-3-030-17655-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
11 | Xiaohan Yue, Mingheng Hui, Xibo Wang |
基于群签名的前向安全VANET匿名认证协议 (Forward Security Anonymous Authentication Protocol Based on Group Signature for Vehicular Ad Hoc Network). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 45(11A), pp. 382-388, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
11 | Xingjia Wei, Jinghua Zhang, Zengfang Liu, Dianjun Lu |
具有前向安全性质的基于身份的聚合签名方案 (Identity Based Aggregate Signature Scheme with Forward Security). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 45(6A), pp. 387-391, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
11 | Xingchen Wang, Yunlei Zhao |
Order-Revealing Encryption: File-Injection Attack and Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II, pp. 101-121, 2018, Springer, 978-3-319-98988-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
11 | Bangyi Sun, Jianfeng Chu, Liang Hu 0001, Hongtu Li, Guangkun Shi |
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 11(9), pp. 4609-4623, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
11 | Jianghong Wei, Xinyi Huang 0001, Wenfen Liu, Xuexian Hu |
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Found. Comput. Sci. ![In: Int. J. Found. Comput. Sci. 28(7), pp. 843-868, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
11 | Xingchen Wang, Yunlei Zhao |
File-injection Attack and Forward Security for Order-revealing Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 1086, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
11 | Mihir Bellare, Adam O'Neill, Igors Stepanovs |
Forward-Security under Continual Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 476, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
11 | Mihir Bellare, Adam O'Neill, Igors Stepanovs |
Forward-Security Under Continual Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers, pp. 3-26, 2017, Springer, 978-3-030-02640-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
11 | Giorgia Azzurra Marson |
Real-World Aspects of Secure Channels: Fragmentation, Causality, and Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2017 |
RDF |
|
11 | Raphael Bost, Pierre-Alain Fouque, David Pointcheval |
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 62, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
11 | Zhicai Shi, Fei Wu 0006, Changzhi Wang, Shitao Ren |
A Lightweight RFID Authentication Protocol with Forward Security and Randomized Identifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpaCCS ![In: Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings, pp. 1-13, 2016, 978-3-319-49147-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
11 | Xi Jun Lin, Ran Ren, Zhengang Wei, Lin Sun 0005 |
Comment on "Identity-based non-interactive key distribution with forward security". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 75(1), pp. 1-7, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
11 | Xinyi Huang 0001, Joseph K. Liu, Shaohua Tang, Yang Xiang 0001, Kaitai Liang, Li Xu 0002, Jianying Zhou 0001 |
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 64(4), pp. 971-983, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
11 | Qiang Tang 0001 |
Towards Forward Security Properties for PEKS and IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 127-144, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
11 | Weiqiang Wen, Libin Wang, Min Xie |
One-Round Deniable Key Exchange with Perfect Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 661, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
11 | Qiang Tang 0001 |
An Investigation of Some Forward Security Properties for PEKS and IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 560, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
11 | Saravanan Sundaresan, Robin Doss, Wanlei Zhou 0001 |
RFID tags - Grouping proof with forward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFID-TA ![In: 2013 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2013, Johor Bahru, Malaysia, September 4-5, 2013, pp. 1-6, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang |
Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIDWT ![In: 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013, pp. 407-413, 2013, IEEE Computer Society, 978-0-7695-5044-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
11 | Min Xie, Libin Wang |
One-round identity-based key exchange with Perfect Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 112(14-15), pp. 587-591, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
11 | Zuowen Tan |
Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 6(8), pp. 1982-1997, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
11 | Rainer Steinwandt, Adriana Suárez Corona |
Identity-based non-interactive key distribution with forward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 64(1-2), pp. 195-208, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
11 | Hai Huang |
An eCK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Inf. Secur. ![In: J. Internet Serv. Inf. Secur. 1(2/3), pp. 32-43, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
11 | Madeline González Muñiz, Peeter Laud |
Strong Forward Security in Identity-Based Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 156, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
11 | Hai Huang |
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 346, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
11 | Hai Huang |
Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pp. 389-397, 2011, Springer, 978-3-642-24315-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
11 | Hua Guo, Yi Mu 0001, Xiyong Zhang, Zhoujun Li 0001 |
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 5(2/3), pp. 173-187, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
11 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
One Round Group Key Exchange with Forward Security in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 83, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
11 | Shuhua Wu, Yuefei Zhu |
Proof of Forward Security for Password-based Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 7(3), pp. 335-341, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
11 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon |
Pairing-based public-key encryption schemes with backward-and-forward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 23(4), 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
11 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon |
Pairing-based public-key encryption schemes with backward-and-forward security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 23(1), 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
11 | Xuanwu Zhou, Ping Wei 0005 |
Anonymous Proxy Authorization Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 872-875, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Tingjun Liu, Shuhua Wu, Yuefei Zhu |
Forward Security for an Efficient Password-Based Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007, pp. 647-651, 2007, IEEE Computer Society, 0-7695-3072-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yunfa Li 0001, Deqing Zou, Zongfen Han, Weizhong Qiang |
Research on Group Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Res. Dev. ![In: J. Comput. Res. Dev. 43(12), pp. 2069-2075, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
11 | Jason E. Holt |
Logcrypt: forward security and public verification for secure audit logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 203-211, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
11 | Jianhong Zhang, Qianhong Wu, Yumin Wang |
A New Efficient Group Signature With Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 29(3), pp. 321-326, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
11 | Jason E. Holt, Kent E. Seamons |
Logcrypt: Forward Security and Public Verification for Secure Audit Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 2, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
11 | Jianhong Zhang, Qianhong Wu, Yumin Wang |
A New Efficient Group Signature With Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 28(2), pp. 153-157, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
11 | Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya |
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 212, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
11 | H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li |
Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Wireless Networks ![In: Proceedings of the International Conference on Wireless Networks, ICWN '04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 1, pp. 202-209, 2004, CSREA Press, 1-932415-38-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
11 | Mihir Bellare, Bennet S. Yee |
Forward-Security in Private-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2001, pp. 35, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
11 | Mike Burmester, Vassilios Chrissikopoulos, Panayiotis Kotzanikolaou, Emmanouil Magkos |
Strong Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Trusted Information: The New Decade Challenge, IFIP TC11 Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France, pp. 109-122, 2001, Kluwer, 0-7923-7389-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
11 | Michel Abdalla, Sara K. Miner, Chanathip Namprempre |
Forward Security in Threshold Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2000, pp. 31, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
11 | Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, Xiang-Yang Li 0001, Yunhao Liu 0001 |
Randomizing RFID Private Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Seventh Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2009, 9-13 March 2009, Galveston, TX, USA, pp. 1-10, 2009, IEEE Computer Society, 978-1-4244-3304-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Kuo-Hui Yeh, Nai-Wei Lo |
Improvement of an EPC Gen2 Compliant RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 532-535, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
9 | George Poulopoulos, Konstantinos Markantonakis, Keith Mayes |
A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 706-711, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
9 | JaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd |
Low-Cost and Strong-Security RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 795-807, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
strong-privacy, authentication, traceability, RFID system, indistinguishability |
9 | Zvi Gutterman, Benny Pinkas, Tzachy Reinman |
Analysis of the Linux Random Number Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 371-385, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Boaz Barak, Shai Halevi |
A model and architecture for pseudo-random generation with applications to /dev/random. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 203-212, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
dev/random, mixing functions, true randomness, entropy, smart-cards, pseudo-randomness |
9 | Mihir Bellare, Sara K. Miner |
A Forward-Secure Digital Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 431-448, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
7 | Zheng-Tao Jiang, Yong-Bin Wang, Yong Wang, Yu-Min Wang |
Investigations on smart card-based secure protocols for autenticated key establishment in Digital pay-TV systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the 8th IEEE International Conference on Cognitive Informatics, ICCI 2009, June 15-17, 2009, Hong Kong, China, pp. 538-541, 2009, IEEE Computer Society, 978-1-4244-4642-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
7 | Sherman S. M. Chow, Raphael C.-W. Phan |
Proxy Re-signatures in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 260-276, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Proxy re-signature, compartment signature, standard model |
7 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 11-24, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ECDL problem, GDH problem, signcryption, ECDSA |
7 | Ran Canetti, Shai Halevi, Jonathan Katz |
Adaptively-Secure, Non-interactive Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 150-168, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
5 | Ran Halprin, Moni Naor |
Games for extracting randomness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
5 | Han Chiang Tan, Jun Wen Wong, Jianying Zhou 0001 |
Implementation and performance analysis for key divergent and evolution protocols in wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2008, July 21-25, 2008, Dublin, Ireland, 2008, ICST / ACM, 978-963-9799-27-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
energy analysis, key management, wireless sensor network security, MicaZ |
5 | Yongquan Cai, Xiuying Li |
Identity-Based Conference Key Distribution Scheme Using Sealed Lock. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 7th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2008, 14-16 May 2008, Portland, Oregon, USA, pp. 282-286, 2008, IEEE Computer Society, 978-0-7695-3131-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Sealed Lock, Anonymity, Identity-based, Conference Key |
5 | N. R. Sunitha, B. B. Amberker |
Proxy Re-signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 156-157, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature |
5 | Sang-Soo Yeo, Kouichi Sakurai, Sung-Eon Cho, KiSung Yang, Sung Kwon Kim |
Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, ISPA 2007 International Workshops SSDSN, UPWN, WISH, SGC, ParDMCom, HiPCoMB, and IST-AWSN Niagara Falls, Canada, August 28 - September 1, 2007, Proceedings, pp. 245-254, 2007, Springer, 978-3-540-74766-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
5 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 459-475, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
5 | Yi-Hwa Chen, Jinn-ke Jan |
Enhancement of digital signature with message recovery using self-certified public keys and its variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 39(3), pp. 90-96, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
self-certified public key, authenticated encryption, forward secrecy |
5 | Ozkan M. Erdem |
EDKM: efficient distributed key management for mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 325-330, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #166 of 166 (100 per page; Change: ) Pages: [ <<][ 1][ 2] |