|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Melissa Chase, Sherman S. M. Chow |
Improving privacy and security in multi-authority attribute-based encryption. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
multi-authority, removing trusted party, privacy, attribute based encryption, anonymous credential |
21 | Nuttapong Attrapadung, Hideki Imai |
Dual-Policy Attribute Based Encryption. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Key policy, Attribute-based encryption, Ciphertext policy |
21 | Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez |
On Some Weaknesses in the Disk Encryption Schemes EME and EME2. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
Tweakable Enciphering Schemes, Disc Encryption, EME, Modes of operation |
21 | Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong |
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Key-Insulated Encryption, Wireless Sensor Network, Key pre-distribution |
21 | Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar |
Authenticated Encryption in WSN Using eSTREAM Ciphers. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption |
21 | Dennis Hofheinz, Eike Kiltz |
Practical Chosen Ciphertext Secure Encryption from Factoring. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
factoring, public-key encryption, chosen-ciphertext security |
21 | Davide Alessio, Marc Joye |
A simple construction for public-key encryption with revocable anonymity: the honest-sender case. |
Digital Rights Management Workshop |
2009 |
DBLP DOI BibTeX RDF |
anonymity, public-key encryption, key-privacy |
21 | Laila El Aimani |
Anonymity from Public Key Encryption to Undeniable Signatures. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction |
21 | Benny Applebaum, David Cash, Chris Peikert, Amit Sahai |
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
Key-dependent message security, Learning problems, Encryption, Lattice-based cryptography |
21 | Vivaksha J. Jariwala, Devesh C. Jinwala |
A taxonomy of security attacks on the advanced encryption standard. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
advanced encryption standard, attacks, cipher |
21 | Charanjit S. Jutla |
Encryption Modes with Almost Free Message Integrity. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Pairwise independent, Parallelizable, Authentication, Encryption, Block ciphers |
21 | Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani |
The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Windows operating system, performance, wireless, throughput, encryption, response time |
21 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
black-box constructions, Public-key encryption, semantic security, non-malleability |
21 | Christopher James Hargreaves, Howard Chivers |
Recovery of Encryption Keys from Memory Using a Linear Scan. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Live Forensics, Encryption, Digital Evidence, Forensic Computing |
21 | Victor Korobitsin, Sergey Ilyin |
GOST-28147 Encryption Implementation on Graphics Processing Units. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
ciphering algorithm, graphics processing units, encryption |
21 | Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri |
An Image Encryption System by Cellular Automata with Memory. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
image security, Lossy method, Cryptography, Cellular automata, image encryption, CA |
21 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. |
Pairing |
2008 |
DBLP DOI BibTeX RDF |
multi-TA IBE, multiple trusted authorities, anonymity, identity-based encryption |
21 | Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta |
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Recipient Anonymity, Access Control on Encrypted Data, Attribute-Based Encryption, Ciphertext Policy |
21 | Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 |
Effect of Security Increment to Symmetric Data Encryption through AES Methodology. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption |
21 | Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, Zhihui Zhang |
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Internally Perturbed Plus, Encryption Scheme, Quadratic Polynomial, Multivariate Public Key Cryptosystem |
21 | Renfei Liu, Keshab K. Parhi |
Fast composite field S-box architectures for advanced encryption standard. |
ACM Great Lakes Symposium on VLSI |
2008 |
DBLP DOI BibTeX RDF |
advanced encryption standard (aes), composite finite field, s-box, precomputation |
21 | Laszlo Hars |
Discryption: Internal Hard-Disk Encryption for Secure Storage. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
Discryption, hard-disk encryption, security, data storage |
21 | Jie Chen 0055, YuPu Hu, Yueyu Zhang |
Impossible differential cryptanalysis of Advanced Encryption Standard. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis |
21 | Jong Hwan Park, Dong Hoon Lee 0001 |
Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Chosen Ciphertext Security, Hierarchical Identity Based Encryption |
21 | Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides |
Low-cost Anonymous Timed-Release Encryption. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
multiple time-servers, cryptographic protocols, bilinear pairings, timed-release encryption |
21 | Lauri I. W. Pesonen, David M. Eyers, Jean Bacon |
Encryption-enforced access control in dynamic multi-domain publish/subscribe networks. |
DEBS |
2007 |
DBLP DOI BibTeX RDF |
administrative domains, attribute encryption, secure publish/subscribe systems, distributed access control |
21 | Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Relations Among Notions of Non-malleability for Encryption. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption, Non-malleability |
21 | Ting Chen, Feng Li |
Analysis of Pi Series and Its Application to Image Encryption. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Pi Series, Quasi-chaotic Characteristics, Chaotic Series, Image Encryption Algorithm, Security Analysis |
21 | Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides |
Improved Anonymous Timed-Release Encryption. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
pre-computations, multiple receivers, bilinear pairings, timed-release encryption |
21 | Chin-Chen Chang 0001, Yu-Wei Su, Iuon-Chang Lin |
A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
multicast key management, broadcast encryption |
21 | Yao Zhang, Chun Yuan, Yuzhuo Zhong |
Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
Authorized Domain, DRM, Broadcast Encryption, P2P Networks |
21 | Rajarathnam Chandramouli, Satish Bapatla, K. P. Subbalakshmi, R. N. Uma |
Battery power-aware encryption. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Low-power encryption, optimization, profiling |
21 | Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh |
Forgery attack on the RPC incremental unforgeable encryption scheme. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
incremental encryption, forgery attack |
21 | Zhenyong Chen, Zhang Xiong 0001, Long Tang |
A Novel Scrambling Scheme for Digital Video Encryption. |
PSIVT |
2006 |
DBLP DOI BibTeX RDF |
MPEG-4, Scrambling, Video Encryption |
21 | Hamdy S. Soliman, Mohammed Omari |
Application of synchronous dynamic encryption system (SDES) in wireless sensor networks. |
PE-WASUN |
2005 |
DBLP DOI BibTeX RDF |
deployment knowledge, encryption permutation vectors, power balancing, sensors security primitives, stream ciphers |
21 | Hui Qin, Tsutomu Sasao, Yukihiro Iguchi |
An FPGA design of AES encryption circuit with 128-bit keys. |
ACM Great Lakes Symposium on VLSI |
2005 |
DBLP DOI BibTeX RDF |
AES encryption, FPGA, pipeline |
21 | Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater |
Efficient and Non-interactive Timed-Release Encryption. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
provable security, formal models, timed-release encryption |
21 | Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung |
A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
(t, n) threshold signature, Authenticated Encryption Scheme, Message Linkage, Elliptic Curve Cryptosystem, Division of labor |
21 | Nicolas T. Courtois |
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations |
21 | Joonsang Baek, Yuliang Zheng 0001 |
Zheng and Seberry's public key encryption scheme revisited. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Zheng-Seberry scheme, Public key encryption, Chosen ciphertext security |
21 | Christopher Kachris, Nikolaos G. Bourbakis, Apostolos Dollas |
A Reconfigurable Logic-Based Processor for the SCAN Image and Video Encryption Algorithm. |
Int. J. Parallel Program. |
2003 |
DBLP DOI BibTeX RDF |
cryptography, block cipher, reconfigurable logic, image encryption |
21 | Nikolaos G. Bourbakis, Apostolos Dollas |
SCAN-Based Compression-Encryption-Hiding for Video on Demand. |
IEEE Multim. |
2003 |
DBLP DOI BibTeX RDF |
Image Video Compression, Multimedia on demand, FPGA, encryption, information hiding |
21 | Koutarou Suzuki, Makoto Yokoo |
Secure Generalized Vickrey Auction Using Homomorphic Encryption. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Generalized Vickrey Auction, game-theory, mechanism design, combinatorial auction, homomorphic encryption |
21 | Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai |
Broadcast encryption with short keys and transmissions. |
Digital Rights Management Workshop |
2003 |
DBLP DOI BibTeX RDF |
constant transmission rate, one-way accumulators, revocation scheme, copyright protection, broadcast encryption |
21 | Miodrag J. Mihaljevic |
Broadcast Encryption Schemes Based on the Sectioned Key Tree. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
stateless receivers, key management, Broadcast encryption |
21 | Anh Duc Duong, Hoang Kiem, Minh-Triet Tran, Luong Han Co |
The Advanced Encryption Standard and its Application in the Examination Security in Vietnam. |
ITCC |
2002 |
DBLP DOI BibTeX RDF |
Examination Security, Conventional cryptography, Rijndael Block Cipher, Advanced Encryption Standard, Public key cryptography |
21 | Yevgeniy Dodis, Moti Yung |
Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. |
IEEE Security in Storage Workshop |
2002 |
DBLP DOI BibTeX RDF |
cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman |
21 | Jakob Jonsson, Burton S. Kaliski Jr. |
On the Security of RSA Encryption in TLS. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
key encapsulation, RSA encryption, TLS |
21 | Makoto Yokoo, Koutarou Suzuki |
Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions. |
AAMAS |
2002 |
DBLP DOI BibTeX RDF |
security and agents, privacy, dynamic programming, electronic commerce, auction, public key encryption |
21 | Siguna Müller |
On the Security of Williams Based Public Key Encryption Scheme. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
(Weak)- Sole-Samplability, Factorization Intractability, Oracle Hashing, Williams' Encryption Scheme, Chosen Ciphertext Security, Plaintext Awareness |
21 | Jian-Zhu Lu, Huo Yan Chen |
Improvement of authenticated encryption scheme with (t, n) shared verification. |
COMPSAC |
2000 |
DBLP DOI BibTeX RDF |
Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery |
21 | Alejandro Hevia, Marcos A. Kiwi |
Strength of two data encryption standard implementations under timing attacks. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
cryptography, cryptanalysis, data encryption standard, timing attack |
21 | Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan |
Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. |
ISCC |
1999 |
DBLP DOI BibTeX RDF |
Authentication, Performance Analysis, Key Distribution, Hybrid Encryption |
21 | Mihir Bellare, Phillip Rogaway |
On the Construction of Variable-Input-Length Ciphers. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
Provable Security, Modes of Operation, Symmetric Encryption, Ciphers |
20 | Alexandros Bakas, Antonis Michalas |
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
20 | Alexandros Bakas, Antonis Michalas |
Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. |
SecureComm (2) |
2019 |
DBLP DOI BibTeX RDF |
|
20 | Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa |
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
20 | Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa |
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. |
Public Key Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
20 | Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters |
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters |
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. |
EUROCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti |
POTSHARDS - a secure, recoverable, long-term archival storage system. |
ACM Trans. Storage |
2009 |
DBLP DOI BibTeX RDF |
approximate pointers, secret splitting, Archival storage |
19 | Xiaojun Ruan, Adam Manzanares, Shu Yin, Mais Nijim, Xiao Qin 0001 |
Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms? |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi |
Foundations of Non-malleable Hash and One-Way Functions. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt |
Efficient Constructions of Signcryption Schemes and Signcryption Composability. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
multi-user security, signcryption, generic construction |
19 | Ralf Küsters, Tomasz Truderung, Andreas Vogt 0001 |
Improving and Simplifying a Variant of Prêt à Voter. |
VoteID |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Emilia Käsper, Peter Schwabe |
Faster and Timing-Attack Resistant AES-GCM. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Galois/Counter mode, cache-timing attacks, AES, fast implementations |
19 | Luther Martin |
Key-Management Infrastructure for Protecting Stored Data. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Brett Hemenway, Rafail Ostrovsky |
Public-Key Locally-Decodable Codes. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
Bounded Channel Model, Error Correcting Codes, Public Key Cryptography, Chinese Remainder Theorem, Private Information Retrieval, Locally Decodable Codes |
19 | Sean O'Melia, Adam J. Elbirt |
Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Phillip Rogaway, Mihir Bellare |
Robust computational secret sharing and a unified account of classical secret-sharing goals. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage |
19 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
Orthogonality between Key Privacy and Data Privacy, Revisited. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jamie Levy, Bilal Khan 0002 |
Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Yeongyun Kim, Sung Ho Jin, Yong Man Ro |
Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Chen Xiao, Shilong Ma, Ke Xu 0001, Lifeng Wang, Weifeng Lv |
A Dynamic Optimal Selective Control Mechanism for Multi-Datastream Security in Video Conference System. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Kun Peng, Ed Dawson |
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Palash Sarkar 0001, Sanjit Chatterjee |
Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Russell, Hong Wang 0002 |
How to fool an unbounded adversary with a short key. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona |
Recovering DC Coefficients in Block-Based DCT. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Wassim Itani, Ayman I. Kayssi, Ali Chehab |
An enterprise policy-based security protocol for protecting relational database network objects. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
customizable security, policy-driven security, security, relational databases |
19 | Yang Cui 0001, Kazukuni Kobara, Hideki Imai |
On Achieving Chosen Ciphertext Security with Decryption Errors. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier |
Using Image Steganography for Decryptor Distribution. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, Anthony Tomasic |
Simultaneous scalability and security for data-intensive web applications. |
SIGMOD Conference |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Huizhang Shen, Jidi Zhao, Huanchen Wang |
Illegal Intrusion Detection Based on Hidden Information Database. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Ventzislav Nikov, Svetla Nikova, Bart Preneel |
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
Homomorphic Semantically Secure Cryptosystems, Paillier’s Public-Key Cryptosystem, Non-Interactive Zero-Knowledge Arguments, Oblivious Transfer |
19 | Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar |
Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. |
MRCS |
2006 |
DBLP DOI BibTeX RDF |
|
19 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Aggelos Kiayias, Antonina Mitrofanova |
Testing Disjointness of Private Datasets. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto |
A Universally Composable Secure Channel Based on the KEM-DEM Framework. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara |
A Timed-Release Key Management Scheme for Backward Recovery. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Willy Susilo, Fangguo Zhang, Yi Mu 0001 |
Privacy-Enhanced Internet Storage. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Aggelos Kiayias, Yona Raekow, Alexander Russell |
Efficient Steganography with Provable Security Guarantees. |
Information Hiding |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Marko Hassinen, Petteri Mussalo |
Client controlled security for web applications. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan |
Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
Biometrics, Embedded Processors, Fingerprint Verification |
19 | Philippe Golle, Ari Juels |
Parallel mixing. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
mixnet, privacy, anonymity, permutation, parallel execution |
19 | Markku-Juhani Olavi Saarinen |
Encrypted Watermarks and Linux Laptop Security. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Jonathan Katz |
Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Alexander W. Dent |
A Designer's Guide to KEMs. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Yevgeniy Dodis, Joel Spencer |
On the (non)Universality of the One-Time Pad. |
FOCS |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Jonathan Katz, Moti Yung |
Threshold Cryptosystems Based on Factoring. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
|
|