|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 812 occurrences of 415 keywords
|
|
|
Results
Found 4070 publication records. Showing 4070 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Cristian Ene, Yassine Lakhnech, Van Chan Ngo |
Formal Indistinguishability Extended to the Random Oracle Model. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Ashish Khisti, Aslan Tchamkerten, Gregory W. Wornell |
Secure Broadcasting Over Fading Channels. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
26 | William Luh, Deepa Kundur |
Distributed Secret Sharing for Discrete Memoryless Networks. |
IEEE Trans. Inf. Forensics Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Yingbin Liang, Gerhard Kramer, H. Vincent Poor, Shlomo Shamai |
Recent results on compound wire-tap channels. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Lasse Øverlier, Paul F. Syverson |
Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. |
Privacy Enhancing Technologies |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Chaichana Mitrpant, A. J. Han Vinck, Luo Yuan |
An achievable region for the Gaussian wiretap channel with side information. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Seung Wook Jung, Souhwan Jung |
Forward Secure Password-Enabled PKI with Instant Revocation. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Yi Tang 0001, Jun Yun, Quan Zhou |
A Multi-agent Based Method for Reconstructing Buckets in Encrypted Databases. |
IAT |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Amos Beimel, Matthew K. Franklin |
Edge Eavesdropping Games. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
graph search games, unconditional security, passive adversary, mobile adversary |
26 | Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim |
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang |
A Secure Re-keying Scheme with Key Recovery Property. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Jen-Chiun Lin, Chun-yen Chou, Feipei Lai, Kuen-Pin Wu |
A Distributed Key Management Protocol for Dynamic Groups. |
LCN |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Shichuan Ma, Michael Hempel, Yaoqing (Lamar) Yang, Hamid Sharif |
An approach to secure wireless communications using randomized eigenvector-based jamming signals. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
physical layer security, secrecy capacity |
26 | Xing-Lan Zhang |
Authenticated Key Exchange Protocol in One-Round. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity |
26 | Ratna Dutta, Sourav Mukhopadhyay, Amitabha Das, Sabu Emmanuel |
Generalized Self-healing Key Distribution Using Vector Space Access Structure. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
forward and backward secrecy, wireless network, computational security, key distribution, self-healing, access structure |
26 | Mike Burmester, Breno de Medeiros |
The Security of EPC Gen2 Compliant RFID Protocols. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
EPCGen2 compliance, security, anonymity, unlinkability, forward secrecy |
26 | Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs |
Secrets and lies in computer-mediated interaction: theory, methods and design. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
security, privacy, design, deception, secrecy |
26 | Eun-Jun Yoon, Kee-Young Yoo |
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
Cryptography, Password, Elliptic curve cryptosystem, Key establishment, Perfect forward secrecy |
26 | Yijun He, Moon-Chuen Lee, Jie Li |
Enhanced Mutual Authentication and Key Exchange Protocol for Wireless Communications. |
APWeb |
2008 |
DBLP DOI BibTeX RDF |
MAKEP, Elliptic Curve, forward secrecy, user anonymity |
26 | Dhilak Damodaran, Rohit Singh 0004, Phu Dung Le |
Group Key Management in Wireless Networks Using Session Keys. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Forward and Backward Secrecy, Multicast, Wireless, Portable, Group Key, Session Keys |
26 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation |
26 | Eun-Jun Yoon, Kee-Young Yoo |
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Cryptography, Password, Key establishment, Forward Secrecy |
26 | Nobuko Yoshida |
Channel dependent types for higher-order mobile processes. |
POPL |
2004 |
DBLP DOI BibTeX RDF |
the higher-order ?-calculus, access control, types, secrecy, mobile processes |
26 | Nikita Borisov, Ian Goldberg, Eric A. Brewer |
Off-the-record communication, or, why not to use PGP. |
WPES |
2004 |
DBLP DOI BibTeX RDF |
private communication, deniability, perfect forward secrecy |
26 | Mourad Debbabi, Nancy A. Durgin, Mohamed Mejri, John C. Mitchell |
Security by typing. |
Int. J. Softw. Tools Technol. Transf. |
2003 |
DBLP DOI BibTeX RDF |
Intruder abilities, Authentication, Integrity, Type System, Cryptographic Protocols, Secrecy |
26 | Joachim Biskup, Piero A. Bonatti |
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation |
26 | Joachim Biskup, Piero A. Bonatti |
Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. |
FoIKS |
2002 |
DBLP DOI BibTeX RDF |
Potential secret, Reliability, Inference control, Secrecy, User log, Lying, Refusal, Controlled query evaluation |
26 | Andrew L. Cohen, Debra Cash, Michael J. Muller |
Designing to support adversarial collaboration. |
CSCW |
2000 |
DBLP DOI BibTeX RDF |
adversarial collaboration, cooperative collaboration, lawyers, privacy, design, documents, collaborative writing, secrecy, collaborative editing |
26 | Reiner Sailer, Matthias Kabatnik |
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks |
26 | Alain J. Mayer, Moti Yung |
Secure Protocol Transformation via "Expansion": From Two-Party to Groups. |
CCS |
1999 |
DBLP DOI BibTeX RDF |
complexity theoretic proofs, key transport, protocol transformation, secure group protocols, authentication, protocol design, forward secrecy |
26 | Yongge Wang, Yvo Desmedt |
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
Perfect secrecy, Privacy, Reliability, Network security |
26 | Stefan Wolf 0001 |
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
unconditional secrecy, authentication, information theory, privacy amplification, Secret-key agreement |
26 | Ueli M. Maurer, Stefan Wolf 0001 |
Privacy Amplification Secure Against Active Adversaries. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Unconditional secrecy, Information theory, Extractors, Privacy amplification, Authentication codes, Secret-key agreement |
26 | Bruce Schneier, Chris Hall |
An Improved E-Mail Security Protocol. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
electronic mail security protocol, long-term private key, message decryption, short-term private-key/public-key key pairs, encryption, vulnerability, electronic mail, secrecy |
26 | Mike Just, Serge Vaudenay |
Authenticated Multi-Party Key Agreement. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
confirmation, authentication, key agreement, forward secrecy |
26 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
A Logic for Reasoning About Security. |
ACM Trans. Comput. Syst. |
1992 |
DBLP DOI BibTeX RDF |
composition knowledge, security, integrity, policy, time, logic, secrecy, permission, obligation, possible-worlds |
26 | Gary W. Smith |
Modeling Security-Relevant Data Semantics. |
IEEE Trans. Software Eng. |
1991 |
DBLP DOI BibTeX RDF |
inference vulnerability, extended data model, Semantic Data Model for Security, signaling vulnerabilities, security-relevant data semantics, multilevel secure automated information system, database management systems, security of data, database design, security requirements, secrecy |
21 | Faisal S. Alanazi |
Secrecy Outage Probability and Strictly Positive Secrecy Capacity of Cognitive Radio Networks with Adaptive Transmit Power. |
Wirel. Pers. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Yebo Gu, Zhilu Wu, Zhendong Yin |
Secrecy-Capacity-Optimization-Artificial-Noise in Large-Scale MIMO: Ergodic Lower Bound on Secrecy Capacity and Optimal Power Allocation. |
Wirel. Commun. Mob. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Yuqing Zhao, Abraham O. Fapojuwo |
Secrecy Outage Probability and Secrecy Capacity for Autonomous Driving in a Cascaded Rayleigh Fading Environment. |
VTC Fall |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Truong Xuan Quach, Hung Tran, Elisabeth Uhlemann, Mai Tran Truc |
Secrecy Performance of Cooperative Cognitive Radio Networks Under Joint Secrecy Outage and Primary User Interference Constraints. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Sudakar Singh Chauhan, Gaurav Verma, Anshul Singh, Sandeep Singh, Avinash Singh |
Average secrecy rate and probability of non-zero secrecy capacity of wiretap generalised gamma fading channels. |
Int. J. Wirel. Mob. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Nate Rosenblatt |
Localism as Secrecy: Efficiency-Secrecy Tradeoffs in the Recruitment of ISIS Foreign Fighters. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
21 | Diana Pamela Moya Osorio, Hirley Alves, Edgar Eduardo Benitez Olivo |
On the Secrecy Performance and Power Allocation in Relaying Networks With Untrusted Relay in the Partial Secrecy Regime. |
IEEE Trans. Inf. Forensics Secur. |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Gabriela Suntaxi |
Preserving Secrecy in Online Social Networks: Data Outsourcing, Access Control, and Secrecy Schemes. |
|
2020 |
RDF |
|
21 | Aymen Omri, Mazen O. Hasna |
Average Secrecy Outage Rate and Average Secrecy Outage Duration of Wireless Communication Systems With Diversity Over Nakagami-m Fading Channels. |
IEEE Trans. Wirel. Commun. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Liwei Tao, Weiwei Yang 0001, Yueming Cai, Dechuan Chen |
On Secrecy Outage Probability and Average Secrecy Rate of Large-Scale Cellular Networks. |
Wirel. Commun. Mob. Comput. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Monir Abughalwa, Aymen Omri, Mazen O. Hasna |
On the Average Secrecy Outage Rate and Average Secrecy Outage Duration of Wiretap Channels with Rician Fading. |
IWCMC |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Zhihao Zhong, Jianhua Peng, Kaizhi Huang, Lu Xia, Xiaohui Qi |
Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets. |
KSII Trans. Internet Inf. Syst. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Wei Cao, Jing Lei 0001, Weidong Hu, Wei Li 0074 |
Secrecy Capacity Achievable Time Reversal Pre-filter in MISO Communication System and the Unequal Secrecy Protection Application. |
Wirel. Pers. Commun. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Andre Saito Guerreiro, Gustavo Fraidenraich, Richard Demo Souza |
On the ergodic secrecy capacity and secrecy outage probability of the MIMOME Rayleigh wiretap channel. |
Trans. Emerg. Telecommun. Technol. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Chao Qi, Bin Dai 0003, Xiaohu Tang |
Achieving both positive secrecy rates of the users in two-way wiretap channel by individual secrecy. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
21 | Zheng Chu 0001, Hong Xing, Martin Johnston, Stéphane Y. Le Goff |
Secrecy Rate Optimizations for a MISO Secrecy Channel with Multiple Multiantenna Eavesdroppers. |
IEEE Trans. Wirel. Commun. |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoyan Hu, Pengcheng Mu, Bo Wang 0017, Zongmian Li, Huiming Wang 0001, Ying Ju |
Secrecy rate maximization for SIMO wiretap channel with uncoordinated cooperative jamming under secrecy outage probability constraint. |
WCNC |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Zheng Chu 0001, Kanapathippillai Cumanan, Zhiguo Ding 0001, Martin Johnston, Stéphane Y. Le Goff |
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Cooperative Jammer. |
IEEE Trans. Veh. Technol. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Zheng Chu 0001, Kanapathippillai Cumanan, Zhiguo Ding 0001, Martin Johnston, Stéphane Y. Le Goff |
Robust Outage Secrecy Rate Optimizations for a MIMO Secrecy Channel. |
IEEE Wirel. Commun. Lett. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Bo Wang 0017, Pengcheng Mu, Zongze Li |
Secrecy Rate Maximization With Artificial-Noise-Aided Beamforming for MISO Wiretap Channels Under Secrecy Outage Constraint. |
IEEE Commun. Lett. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Pengcheng Mu, Xiaoyan Hu, Bo Wang 0017, Zongmian Li |
Secrecy Rate Maximization With Uncoordinated Cooperative Jamming by Single-Antenna Helpers Under Secrecy Outage Probability Constraint. |
IEEE Commun. Lett. |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Long Chen 0006, Liusheng Huang, Hongli Xu, Chenkai Yang, Zehao Sun, Xinglong Wang |
Primary Secrecy Is Achievable: Optimal Secrecy Rate in Overlay CRNs with an Energy Harvesting Secondary Transmitter. |
ICCCN |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Kanapathippillai Cumanan, Zhiguo Ding 0001, Bayan S. Sharif, Guiyun Tian, Kin K. Leung |
Secrecy Rate Optimizations for a MIMO Secrecy Channel With a Multiple-Antenna Eavesdropper. |
IEEE Trans. Veh. Technol. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Barbara Miller |
Project on Government Secrecy/Secrecy News. Federation of American Scientists, 1725 DeSales Street NW, Suite 600, Washington, DC 20036-4413 (2014). |
Gov. Inf. Q. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | T. V. Nguyen, Y. Jeong, J. S. Kwak, H. Shin |
Secure multiple-input single-output communication - Part II: δ-secrecy symbol error probability and secrecy diversity. |
IET Commun. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Seong Ho Chae, Wan Choi 0001, Jung Hoon Lee, Tony Q. S. Quek |
Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone. |
IEEE Trans. Inf. Forensics Secur. |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Pengcheng Mu, Peizhi Yang, Bo Wang 0017, Huiming Wang 0001, Qinye Yin 0001 |
A new scheme to improve the secrecy throughput under the constraints of secrecy outage probability and average transmit power. |
ICC Workshops |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Fuchun Lin, Cong Ling 0001, Jean-Claude Belfiore |
Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices. |
ISIT |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Shuiyin Liu, Yi Hong 0001, Emanuele Viterbo |
Unshared secret key cryptography: Achieving Shannon's ideal secrecy and perfect secrecy. |
ITW |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Zheng Chu 0001, Kanapathippillai Cumanan, Zhiguo Ding 0001, Martin Johnston, Stéphane Y. Le Goff |
Secrecy rate optimization for a MIMO secrecy channel based on Stackelberg game. |
EUSIPCO |
2014 |
DBLP BibTeX RDF |
|
21 | Ramachandran Rajesh, Shahid Mehraj Shah, Vinod Sharma |
On Secrecy above Secrecy Capacity |
CoRR |
2012 |
DBLP BibTeX RDF |
|
21 | George Voutsadakis |
Secrecy Logic: Protoalgebraic S-Secrecy Logics. |
Reports Math. Log. |
2012 |
DBLP BibTeX RDF |
|
21 | Ramachandran Rajesh, Shahid Mehraj Shah, Vinod Sharma |
On secrecy above secrecy capacity. |
ICCS |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Dennis Hyatt |
Secrecy: Report of the Commission on Protecting and Reducing Government Secrecy: By Daniel Patrick Moynihan, New York, Chairman. Washington, DC: Government Printing Office, 1997. S.Doc.105-2, 114 p., with appendices. $25.00 (paper). ISBN 0-16-054119-0. LC 97-152453. From the t.p.: "This report can be found on the Internet at the Government Printing Office's (GPO) World Wide Web address: http: //www.access.gpo.gov/int.". |
Gov. Inf. Q. |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Shinji Hirata, Kenta Takahashi |
Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching. |
ICB |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Neri Merhav |
Shannon's Secrecy System With Informed Receivers and its Application to Systematic Coding for Wiretapped Channels. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Lifeng Lai, Hesham El Gamal |
The Relay-Eavesdropper Channel: Cooperation for Secrecy. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Mari Kobayashi, Mérouane Debbah |
On the secrecy capacity of frequency-selective fading channels : A practical vandermonde precoding. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Anongporn Salaiwarakul, Mark Dermot Ryan |
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Daniel J. Weitzner |
Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces. |
IEEE Internet Comput. |
2007 |
DBLP DOI BibTeX RDF |
digital privacy protection, Technology and Society, cryptography |
19 | Michael O. Rabin, Rocco A. Servedio, Christopher Thorpe |
Highly Efficient Secrecy-Preserving Proofs of Correctness of Computations and Applications. |
LICS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Sangjin Kim, Changyong Lee, Daeyoung Kim 0004, Heekuck Oh |
A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols. |
ICDCIT |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi |
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. |
PerCom Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mingyan Li, Radha Poovendran |
Disenrollment with perfect forward secrecy in threshold schemes. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Rudolf Ahlswede, Ning Cai 0001, Zhaozhi Zhang |
Secrecy Systems for Identification Via Channels with Additive-Like Instantaneous Block Encipherer. |
GTIT-C |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Melanie Volkamer, Robert Krimmer |
Secrecy forever? Analysis of Anonymity in Internet-based Voting Protocols. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly |
Secrecy, flagging, and paranoia: adoption criteria in encrypted email. |
CHI |
2006 |
DBLP DOI BibTeX RDF |
encrypted e-mail, extended case method, security, activism |
19 | David C. Parkes, Michael O. Rabin, Stuart M. Shieber, Christopher Thorpe |
Practical secrecy-preserving, verifiably correct and trustworthy auctions. |
ICEC |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Pai Peng, Peng Ning, Douglas S. Reeves |
On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Il-Gon Kim, Hyun Seok Kim, Ji-Yeon Lee, Jin-Young Choi, Inhye Kang |
Secrecy Analysis of Purchase Transaction in Electronic Purses. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Peeter Laud |
Secrecy types for a simulatable cryptographic library. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
type systems, simulatability |
19 | Rob Delicata, Steve A. Schneider |
Temporal Rank Functions for Forward Secrecy. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Christian Haack, Alan Jeffrey |
Timed Spi-Calculus with Types for Secrecy and Authenticity. |
CONCUR |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Angelo Troina, Alessandro Aldini, Roberto Gorrieri |
Towards a Formal Treatment of Secrecy Against Computational Adversaries. |
Global Computing |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Liana Bozga, Yassine Lakhnech, Michaël Périn |
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols. |
CAV |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Cunsheng Ding, Arto Salomaa, Patrick Solé, Xiaojian Tian |
Three Constructions of Authentication/Secrecy Codes. |
AAECC |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Martín Abadi, Bruno Blanchet |
Analyzing security protocols with secrecy types and logic programs. |
POPL |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Bruno Blanchet |
From Secrecy to Authenticity in Security Protocols. |
SAS |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson |
Static Analysis for Secrecy and Non-interference in Networks of Processes. |
PaCT |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Pankaj Kakkar, Carl A. Gunter, Martín Abadi |
Reasoning about Secrecy for Active Networks. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Colin Boyd |
Enhancing Secrecy by Data Compression: Theoretical and Practical Aspects. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
19 | Ben J. M. Smeets, Peter Vanroose, Zhe-xian Wan |
On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
19 | Marijke De Soete |
Some Constructions for Authentication-Secrecy Codes. |
EUROCRYPT |
1988 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 4070 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|