The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CANS"( http://dblp.L3S.de/Venues/CANS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cans

Publication years (Num. hits)
2005 (28) 2006 (27) 2007 (18) 2008 (28) 2009 (36) 2010 (24) 2011 (21) 2012 (23) 2013 (19) 2014 (26) 2015 (19) 2016 (57) 2017 (28) 2018 (27) 2019 (30) 2020 (31) 2021 (29) 2022 (21) 2023 (26)
Publication types (Num. hits)
inproceedings(499) proceedings(19)
Venues (Conferences, Journals, ...)
CANS(518)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 240 occurrences of 182 keywords

Results
Found 518 publication records. Showing 518 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kaoru Kurosawa, Yasuhiro Ohtaki How to Update Documents Verifiably in Searchable Symmetric Encryption. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sareh Emami, Cameron McDonald, Josef Pieprzyk, Ron Steinfeld Truncated Differential Analysis of Reduced-Round LBlock. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Babins Shrestha, Nitesh Saxena, Justin Harrison Wave-to-Access: Protecting Sensitive Mobile Device Services via a Hand Waving Gesture. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab (eds.) Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bo Zhu 0007, Yin Tan, Guang Gong Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Liang Feng Zhang, Reihaneh Safavi-Naini Private Outsourcing of Polynomial Evaluation and Matrix Multiplication Using Multilinear Maps. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Haiyang Xue, Bao Li 0001, Xianhui Lu, Dingding Jia, Yamin Liu Efficient Lossy Trapdoor Functions Based on Subgroup Membership Assumptions. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nizar Kheir, Chirine Wolley BotSuer: Suing Stealthy P2P Bots in Network Traffic through Netflow Analysis. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Valérie Nachef, Emmanuel Volte, Jacques Patarin Differential Attacks on Generalized Feistel Schemes. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang Efficient Modular NIZK Arguments from Shift and Product. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Mark Manulis Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Emmanuel Volte, Jacques Patarin, Valérie Nachef Zero Knowledge with Rubik's Cubes and Non-abelian Groups. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mihir Bellare, Adam O'Neill Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Szongott, Benjamin Henne, Matthew Smith 0001 Mobile Evil Twin Malnets - The Worst of Both Worlds. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jun Xu 0022, Lei Hu, Siwei Sun, Ping Wang Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Khaled Ouafi, Serge Vaudenay Strong Privacy for RFID Systems from Plaintext-Aware Encryption. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jorge Nakahara Jr. Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys). Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Taiichi Saito, Keita Xagawa Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Omer Berkman, Benny Pinkas, Moti Yung Firm Grip Handshakes: A Tool for Bidirectional Vouching. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yi Lu 0002, Liping Ding, Yongji Wang 0002 Improved Linear Analysis on Block Cipher MULTI2. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik Fast and Private Computation of Cardinality of Set Intersection and Union. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Orestis Tsigkas, Dimitrios Tzovaras Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser A Simple Key-Recovery Attack on McOE-X. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Falko Strenzke Fast and Secure Root Finding for Code-Based Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Orhun Kara, Ferhat Karakoç Fixed Points of Special Type and Cryptanalysis of Full GOST. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores Some Representations of the S-Box of Camellia in GF(((22)2)2). Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Atsuko Miyaji, Yiren Mo How to Enhance the Security on the Least Significant Bit. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis (eds.) Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo Attacking Animated CAPTCHAs via Character Extraction. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Lehmann, Willi Meier Conditional Differential Cryptanalysis of Grain-128a. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mustafa Çoban, Ferhat Karakoç, Özkan Boztas Biclique Cryptanalysis of TWINE. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bogdan Groza, Pal-Stefan Murvay, Anthony Van Herrewege, Ingrid Verbauwhede LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mansoor Ahmed Khan, Ferruh Özbudak Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions. Search on Bibsonomy CANS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xavier Boyen Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture). Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo AniCAP: An Animated 3D CAPTCHA Scheme Based on Motion Parallax. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shingo Yanagihara, Tetsu Iwata On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dongdai Lin, Gene Tsudik, Xiaoyun Wang 0001 (eds.) Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xuyun Nie, Zhaohu Xu, Li Lu 0001, Yongjian Liao Security Analysis of an Improved MFE Public Key Cryptosystem. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jing Xu 0002, Dengguo Feng Comments on the SM2 Key Exchange Protocol. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Huihui Yap, Khoongming Khoo, Axel Poschmann, Matt Henricksen EPCBC - A Block Cipher Suitable for Electronic Product Code Encryption. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chun-I Fan, Ruei-Hau Hsu, Mark Manulis Group Signature with Constant Revocation Costs for Signers and Verifiers. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pengpian Wang, Dengguo Feng, Liwu Zhang Towards Attribute Revocation in Key-Policy Attribute Based Encryption. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stanislav Bulygin, Johannes Buchmann 0001 Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tatsuaki Okamoto, Katsuyuki Takashima Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Leibo Li, Jiazhe Chen, Keting Jia New Impossible Differential Cryptanalysis of Reduced-Round Camellia. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Payman Mohassel Fast Computation on Encrypted Polynomials and Applications. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Roch Lescuyer, Jacques Traoré Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shaohui Wang, Weiwei Zhang Passive Attack on RFID LMAP++ Authentication Protocol. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Siwei Sun, Lei Hu, Yonghong Xie, Xiangyong Zeng Cube Cryptanalysis of Hitag2 Stream Cipher. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Phong Q. Nguyen Breaking Fully-Homomorphic-Encryption Challenges. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ning Ding 0001, Dawu Gu A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chunfang Zhou, Xiutao Feng, Dongdai Lin The Initialization Stage Analysis of ZUC v1.5. Search on Bibsonomy CANS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk). Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jorge Guajardo, Bart Mennink, Berry Schoenmakers Anonymous Credential Schemes with Encrypted Attributes. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chenghang Du, Jiazhe Chen Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Guomin Yang, Chik How Tan Dynamic Group Key Exchange Revisited. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Predicate Encryption with Partial Public Keys. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bozhan Su, Wenling Wu, Shuang Wu 0004, Le Dong Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Johann Großschädl, Ilya Kizhvatov Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marine Minier, Raphael C.-W. Phan, Benjamin Pousse Integral Distinguishers of Some SHA-3 Candidates. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Martin Eian A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Haifeng Fang, Hui Wang, Yiqiang Zhao, Yuzhong Sun, Zhiyong Liu 0002 TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski Analysis of the MQQ Public Key Cryptosystem. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chang N. Zhang, Qian Yu, Xiao Wei Liu An Algorithm Based Concurrent Error Detection Scheme for AES. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Johannes Buchmann 0001, Stanislav Bulygin, Jintai Ding, Wael Said Abd Elmageed Mohamed, Fabian Werner Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk). Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tomoko Yonemura, Yoshikazu Hanatani, Taichi Isogai, Kenji Ohkuma, Hirofumi Muratani Generating Parameters for Algebraic Torus-Based Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tsz Hon Yuen, Willy Susilo, Yi Mu 0001 Towards a Cryptographic Treatment of Publish/Subscribe Systems. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Yang-Wai Chow, Hua-Yu Zhou STE3D-CAP: Stereoscopic 3D CAPTCHA. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Roberto Araújo 0001, Narjes Ben Rajeb, Riadh Robbana, Jacques Traoré, Souheib Yousfi Towards Practical and Secure Coercion-Resistant Electronic Elections. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Günther Lackner, Peter Teufl, Roman Weinberger User Tracking Based on Behavioral Fingerprints. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aymen Abed, Sébastien Canard One Time Anonymous Certificate: X.509 Supporting Anonymity. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aslí Bay, Jorge Nakahara Jr., Serge Vaudenay Cryptanalysis of Reduced-Round MIBS Block Cipher. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (eds.) Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Roghaie Mahdavi, Abolghasem Saiadian Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi Relinkable Ring Signature. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, pairing, ring signature
1Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Schneider 0003 Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Garbled Circuit, Millionaires Problem, Auctions, Secure Computation, Minimum Distance
1Mario Cagalj, Nitesh Saxena, Ersin Uzun On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Networks, Authentication, Usable Security, Distance Bounding
1Christophe Tartary Ensuring Authentication of Digital Information Using Cryptographic Accumulators. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversarial Channel, Cryptographic Accumulator, Stream Authentication, Polynomial Reconstruction, Erasure Channel
1Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC, MAC, Distinguishing attack, Second preimage attack
1Timo Brecher, Emmanuel Bresson, Mark Manulis Fully Robust Tree-Diffie-Hellman Group Key Exchange. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shuji Isobe, Eisuke Koizumi, Yuji Nishigaki, Hiroki Shizuya On the Complexity of Computing Discrete Logarithms over Algebraic Tori. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF algebraic tori, order certified discrete logarithms, Turing reduction
1Martin Ågren, Thomas Johansson 0001, Martin Hell Improving the Rainbow Attack by Reusing Colours. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei 0001, Josef Pieprzyk Extensions of the Cube Attack Based on Low Degree Annihilators. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cube Attack, Low-Degree Annihilators, Algebraic Attack
1Marc Joye On Cryptographic Schemes Based on Discrete Logarithms and Factoring. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Torus-based cryptography, ring ? N, factoring problem, ACJT group signatures, compression, discrete logarithm problem
1Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Panos Papadimitratos Privacy-Preserving Relationship Path Discovery in Social Networks. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Erik Dahmen, Christoph Krauß Short Hash-Based Signatures for Wireless Sensor Networks. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hash-based signature scheme, Winternitz one-time signature scheme, wireless sensor network, hash chain
1Adam D. Smith Asymptotically Optimal and Private Statistical Estimation. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Adrian Perrig Building Secure Networked Systems with Code Attestation. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann 0001, Fabian Werner Algebraic Attack on the MQQ Public Key Cryptosystem. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MQQ public key cryptosystem, MutantXL algorithm, F4 algorithm, Algebraic Cryptanalysis
1Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
1Nitesh Saxena, Md. Borhan Uddin Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Key Distribution
1Georg Fuchsbauer, David Pointcheval, Damien Vergnaud Transferable Constant-Size Fair E-Cash. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin DepenDNS: Dependable Mechanism against DNS Cache Poisoning. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 518 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license