The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for secrecy with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1949-1985 (17) 1987-1990 (21) 1991-1993 (16) 1994-1997 (17) 1998-1999 (31) 2000 (25) 2001 (28) 2002 (38) 2003 (50) 2004 (71) 2005 (79) 2006 (114) 2007 (124) 2008 (144) 2009 (141) 2010 (89) 2011 (127) 2012 (126) 2013 (183) 2014 (216) 2015 (275) 2016 (260) 2017 (292) 2018 (308) 2019 (294) 2020 (242) 2021 (244) 2022 (219) 2023 (240) 2024 (39)
Publication types (Num. hits)
article(2093) book(2) data(1) incollection(4) inproceedings(1940) phdthesis(30)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 812 occurrences of 415 keywords

Results
Found 4070 publication records. Showing 4070 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Cristian Ene, Yassine Lakhnech, Van Chan Ngo Formal Indistinguishability Extended to the Random Oracle Model. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Ashish Khisti, Aslan Tchamkerten, Gregory W. Wornell Secure Broadcasting Over Fading Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26William Luh, Deepa Kundur Distributed Secret Sharing for Discrete Memoryless Networks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Yingbin Liang, Gerhard Kramer, H. Vincent Poor, Shlomo Shamai Recent results on compound wire-tap channels. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Lasse Øverlier, Paul F. Syverson Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Chaichana Mitrpant, A. J. Han Vinck, Luo Yuan An achievable region for the Gaussian wiretap channel with side information. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Seung Wook Jung, Souhwan Jung Forward Secure Password-Enabled PKI with Instant Revocation. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yi Tang 0001, Jun Yun, Quan Zhou A Multi-agent Based Method for Reconstructing Buckets in Encrypted Databases. Search on Bibsonomy IAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Amos Beimel, Matthew K. Franklin Edge Eavesdropping Games. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF graph search games, unconditional security, passive adversary, mobile adversary
26Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang A Secure Re-keying Scheme with Key Recovery Property. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Jen-Chiun Lin, Chun-yen Chou, Feipei Lai, Kuen-Pin Wu A Distributed Key Management Protocol for Dynamic Groups. Search on Bibsonomy LCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang, Hamid Sharif An approach to secure wireless communications using randomized eigenvector-based jamming signals. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF physical layer security, secrecy capacity
26Xing-Lan Zhang Authenticated Key Exchange Protocol in One-Round. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity
26Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das, Sabu Emmanuel Generalized Self-healing Key Distribution Using Vector Space Access Structure. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF forward and backward secrecy, wireless network, computational security, key distribution, self-healing, access structure
26Mike Burmester, Breno de Medeiros The Security of EPC Gen2 Compliant RFID Protocols. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EPCGen2 compliance, security, anonymity, unlinkability, forward secrecy
26Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs Secrets and lies in computer-mediated interaction: theory, methods and design. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, design, deception, secrecy
26Eun-Jun Yoon, Kee-Young Yoo An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography, Password, Elliptic curve cryptosystem, Key establishment, Perfect forward secrecy
26Yijun He, Moon-Chuen Lee, Jie Li Enhanced Mutual Authentication and Key Exchange Protocol for Wireless Communications. Search on Bibsonomy APWeb The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MAKEP, Elliptic Curve, forward secrecy, user anonymity
26Dhilak Damodaran, Rohit Singh 0004, Phu Dung Le Group Key Management in Wireless Networks Using Session Keys. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Forward and Backward Secrecy, Multicast, Wireless, Portable, Group Key, Session Keys
26Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 A Diffie-Hellman Key Exchange Protocol Without Random Oracles. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation
26Eun-Jun Yoon, Kee-Young Yoo Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Password, Key establishment, Forward Secrecy
26Nobuko Yoshida Channel dependent types for higher-order mobile processes. Search on Bibsonomy POPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF the higher-order ?-calculus, access control, types, secrecy, mobile processes
26Nikita Borisov, Ian Goldberg, Eric A. Brewer Off-the-record communication, or, why not to use PGP. Search on Bibsonomy WPES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF private communication, deniability, perfect forward secrecy
26Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell Security by typing. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Intruder abilities, Authentication, Integrity, Type System, Cryptographic Protocols, Secrecy
26Joachim Biskup, Piero A. Bonatti Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation
26Joachim Biskup, Piero A. Bonatti Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Search on Bibsonomy FoIKS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Potential secret, Reliability, Inference control, Secrecy, User log, Lying, Refusal, Controlled query evaluation
26Andrew L. Cohen, Debra Cash, Michael J. Muller Designing to support adversarial collaboration. Search on Bibsonomy CSCW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF adversarial collaboration, cooperative collaboration, lawyers, privacy, design, documents, collaborative writing, secrecy, collaborative editing
26Reiner Sailer, Matthias Kabatnik History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks
26Alain J. Mayer, Moti Yung Secure Protocol Transformation via "Expansion": From Two-Party to Groups. Search on Bibsonomy CCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF complexity theoretic proofs, key transport, protocol transformation, secure group protocols, authentication, protocol design, forward secrecy
26Yongge Wang, Yvo Desmedt Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Perfect secrecy, Privacy, Reliability, Network security
26Stefan Wolf 0001 Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement
26Ueli M. Maurer, Stefan Wolf 0001 Privacy Amplification Secure Against Active Adversaries. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement
26Bruce Schneier, Chris Hall An Improved E-Mail Security Protocol. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy
26Mike Just, Serge Vaudenay Authenticated Multi-Party Key Agreement. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF confirmation, authentication, key agreement, forward secrecy
26Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden A Logic for Reasoning About Security. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF composition knowledge, security, integrity, policy, time, logic, secrecy, permission, obligation, possible-worlds
26Gary W. Smith Modeling Security-Relevant Data Semantics. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF inference vulnerability, extended data model, Semantic Data Model for Security, signaling vulnerabilities, security-relevant data semantics, multilevel secure automated information system, database management systems, security of data, database design, security requirements, secrecy
21Faisal S. Alanazi Secrecy Outage Probability and Strictly Positive Secrecy Capacity of Cognitive Radio Networks with Adaptive Transmit Power. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
21Yebo Gu, Zhilu Wu, Zhendong Yin Secrecy-Capacity-Optimization-Artificial-Noise in Large-Scale MIMO: Ergodic Lower Bound on Secrecy Capacity and Optimal Power Allocation. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Yuqing Zhao, Abraham O. Fapojuwo Secrecy Outage Probability and Secrecy Capacity for Autonomous Driving in a Cascaded Rayleigh Fading Environment. Search on Bibsonomy VTC Fall The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Mai Tran Truc Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Sudakar Singh Chauhan, Gaurav Verma, Anshul Singh, Sandeep Singh, Avinash Singh Average secrecy rate and probability of non-zero secrecy capacity of wiretap generalised gamma fading channels. Search on Bibsonomy Int. J. Wirel. Mob. Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Nate Rosenblatt Localism as Secrecy: Efficiency-Secrecy Tradeoffs in the Recruitment of ISIS Foreign Fighters. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
21Diana Pamela Moya Osorio, Hirley Alves, Edgar Eduardo Benitez Olivo On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
21Gabriela Suntaxi Preserving Secrecy in Online Social Networks: Data Outsourcing, Access Control, and Secrecy Schemes. Search on Bibsonomy 2020   RDF
21Aymen Omri, Mazen O. Hasna Average Secrecy Outage Rate and Average Secrecy Outage Duration of Wireless Communication Systems With Diversity Over Nakagami-m Fading Channels. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Liwei Tao, Weiwei Yang 0001, Yueming Cai, Dechuan Chen On Secrecy Outage Probability and Average Secrecy Rate of Large-Scale Cellular Networks. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Monir Abughalwa, Aymen Omri, Mazen O. Hasna On the Average Secrecy Outage Rate and Average Secrecy Outage Duration of Wiretap Channels with Rician Fading. Search on Bibsonomy IWCMC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Lu Xia, Xiaohui Qi Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Wei Cao, Jing Lei 0001, Weidong Hu, Wei Li 0074 Secrecy Capacity Achievable Time Reversal Pre-filter in MISO Communication System and the Unequal Secrecy Protection Application. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Andre Saito Guerreiro, Gustavo Fraidenraich, Richard Demo Souza On the ergodic secrecy capacity and secrecy outage probability of the MIMOME Rayleigh wiretap channel. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Chao Qi, Bin Dai 0003, Xiaohu Tang Achieving both positive secrecy rates of the users in two-way wiretap channel by individual secrecy. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
21Zheng Chu 0001, Hong Xing, Martin Johnston, Stéphane Y. Le Goff Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Xiaoyan Hu, Pengcheng Mu, Bo Wang 0017, Zongmian Li, Huiming Wang 0001, Ying Ju Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint. Search on Bibsonomy WCNC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
21Zheng Chu 0001, Kanapathippillai Cumanan, Zhiguo Ding 0001, Martin Johnston, Stéphane Y. Le Goff Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Zheng Chu 0001, Kanapathippillai Cumanan, Zhiguo Ding 0001, Martin Johnston, Stéphane Y. Le Goff Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Bo Wang 0017, Pengcheng Mu, Zongze Li Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Pengcheng Mu, Xiaoyan Hu, Bo Wang 0017, Zongmian Li Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers Under Secrecy Outage Probability Constraint. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Long Chen 0006, Liusheng Huang, Hongli Xu, Chenkai Yang, Zehao Sun, Xinglong Wang Primary Secrecy Is Achievable: Optimal Secrecy Rate in Overlay CRNs with an Energy Harvesting Secondary Transmitter. Search on Bibsonomy ICCCN The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
21Kanapathippillai Cumanan, Zhiguo Ding 0001, Bayan S. Sharif, Guiyun Tian, Kin K. Leung Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Barbara Miller Project on Government Secrecy/Secrecy News. Federation of American Scientists, 1725 DeSales Street NW, Suite 600, Washington, DC 20036-4413 (2014). Search on Bibsonomy Gov. Inf. Q. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21T. V. Nguyen, Y. Jeong, J. S. Kwak, H. Shin Secure multiple-input single-output communication - Part II: δ-secrecy symbol error probability and secrecy diversity. Search on Bibsonomy IET Commun. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Seong Ho Chae, Wan Choi 0001, Jung Hoon Lee, Tony Q. S. Quek Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Pengcheng Mu, Peizhi Yang, Bo Wang 0017, Huiming Wang 0001, Qinye Yin 0001 A new scheme to improve the secrecy throughput under the constraints of secrecy outage probability and average transmit power. Search on Bibsonomy ICC Workshops The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Fuchun Lin, Cong Ling 0001, Jean-Claude Belfiore Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices. Search on Bibsonomy ISIT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Shuiyin Liu, Yi Hong 0001, Emanuele Viterbo Unshared secret key cryptography: Achieving Shannon's ideal secrecy and perfect secrecy. Search on Bibsonomy ITW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
21Zheng Chu 0001, Kanapathippillai Cumanan, Zhiguo Ding 0001, Martin Johnston, Stéphane Y. Le Goff Secrecy rate optimization for a MIMO secrecy channel based on Stackelberg game. Search on Bibsonomy EUSIPCO The full citation details ... 2014 DBLP  BibTeX  RDF
21Ramachandran Rajesh, Shahid Mehraj Shah, Vinod Sharma On Secrecy above Secrecy Capacity Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
21George Voutsadakis Secrecy Logic: Protoalgebraic S-Secrecy Logics. Search on Bibsonomy Reports Math. Log. The full citation details ... 2012 DBLP  BibTeX  RDF
21Ramachandran Rajesh, Shahid Mehraj Shah, Vinod Sharma On secrecy above secrecy capacity. Search on Bibsonomy ICCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21Dennis Hyatt Secrecy: Report of the Commission on Protecting and Reducing Government Secrecy: By Daniel Patrick Moynihan, New York, Chairman. Washington, DC: Government Printing Office, 1997. S.Doc.105-2, 114 p., with appendices. $25.00 (paper). ISBN 0-16-054119-0. LC 97-152453. From the t.p.: "This report can be found on the Internet at the Government Printing Office's (GPO) World Wide Web address: http: //www.access.gpo.gov/int.". Search on Bibsonomy Gov. Inf. Q. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Shinji Hirata, Kenta Takahashi Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Neri Merhav Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Lifeng Lai, Hesham El Gamal The Relay-Eavesdropper Channel: Cooperation for Secrecy. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Mari Kobayashi, Mérouane Debbah On the secrecy capacity of frequency-selective fading channels : A practical vandermonde precoding. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Anongporn Salaiwarakul, Mark Dermot Ryan Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Daniel J. Weitzner Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF digital privacy protection, Technology and Society, cryptography
19Michael O. Rabin, Rocco A. Servedio, Christopher Thorpe Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications. Search on Bibsonomy LICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Sangjin Kim, Changyong Lee, Daeyoung Kim 0004, Heekuck Oh A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols. Search on Bibsonomy ICDCIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. Search on Bibsonomy PerCom Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mingyan Li, Radha Poovendran Disenrollment with perfect forward secrecy in threshold schemes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Rudolf Ahlswede, Ning Cai 0001, Zhaozhi Zhang Secrecy Systems for Identification Via Channels with Additive-Like Instantaneous Block Encipherer. Search on Bibsonomy GTIT-C The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Melanie Volkamer, Robert Krimmer Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly Secrecy, flagging, and paranoia: adoption criteria in encrypted email. Search on Bibsonomy CHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted e-mail, extended case method, security, activism
19David C. Parkes, Michael O. Rabin, Stuart M. Shieber, Christopher Thorpe Practical secrecy-preserving, verifiably correct and trustworthy auctions. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Pai Peng, Peng Ning, Douglas S. Reeves On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang Secrecy Analysis of Purchase Transaction in Electronic Purses. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Peeter Laud Secrecy types for a simulatable cryptographic library. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF type systems, simulatability
19Rob Delicata, Steve A. Schneider Temporal Rank Functions for Forward Secrecy. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Christian Haack, Alan Jeffrey Timed Spi-Calculus with Types for Secrecy and Authenticity. Search on Bibsonomy CONCUR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Angelo Troina, Alessandro Aldini, Roberto Gorrieri Towards a Formal Treatment of Secrecy Against Computational Adversaries. Search on Bibsonomy Global Computing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Liana Bozga, Yassine Lakhnech, Michaël Périn HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols. Search on Bibsonomy CAV The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Cunsheng Ding, Arto Salomaa, Patrick Solé, Xiaojian Tian Three Constructions of Authentication/Secrecy Codes. Search on Bibsonomy AAECC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Martín Abadi, Bruno Blanchet Analyzing security protocols with secrecy types and logic programs. Search on Bibsonomy POPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Bruno Blanchet From Secrecy to Authenticity in Security Protocols. Search on Bibsonomy SAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson Static Analysis for Secrecy and Non-interference in Networks of Processes. Search on Bibsonomy PaCT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Pankaj Kakkar, Carl A. Gunter, Martín Abadi Reasoning about Secrecy for Active Networks. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Colin Boyd Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
19Ben J. M. Smeets, Peter Vanroose, Zhe-xian Wan On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
19Marijke De Soete Some Constructions for Authentication-Secrecy Codes. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 4070 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license