|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 240 occurrences of 182 keywords
|
|
|
Results
Found 518 publication records. Showing 518 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.) |
Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peng Zhang, Bing Sun 0001, Chao Li 0002 |
Saturation Attack on the Block Cipher HIGHT. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
HIGHT, Saturation attack, Block cipher, Distinguisher |
1 | Benoît Libert, Damien Vergnaud |
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
verifier-local revocation, backward unlinkability, Group signatures, standard model, bilinear maps |
1 | Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang |
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
linear hulls, algebraic analysis, systems of sparse polynomial equations of low degree, RFID, block ciphers |
1 | G. Sathya Narayanan, T. Aishwarya, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Privacy preserving Set operations, Multiparty Computation |
1 | Lin Yang, Meiqin Wang, Siyuan Qiao |
Side Channel Cube Attack on PRESENT. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Cube attack, Cryptanalysis, Side channel attack, PRESENT |
1 | Xavier Boyen |
HPAKE : Password Authentication Secure against Cross-Site User Impersonation. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, Hossein Arabnezhad Khanooki |
MIBS: A New Lightweight Block Cipher. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Low-cost RFID Tags, Block Cipher, Lightweight, Resource-Constrained Devices |
1 | Jiali Choy, Huihui Yap, Khoongming Khoo |
An Analysis of the Compact XSL Attack on BES and Embedded SMS4. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Compact XSL Attack, ESMS4, BES |
1 | Chong Hee Kim, Gildas Avoine |
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
distance bounding protocol, authentication, RFID, relay attack |
1 | Jean-Luc Beuchat, Emmanuel López-Trejo, Luis Martínez-Ramos, Shigeo Mitsunari, Francisco Rodríguez-Henríquez |
Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
supersingular curve, multi-core, Tate pairing, finite field arithmetic, ? T pairing |
1 | Liming Fang 0001, Willy Susilo, Chunpeng Ge, Jiandong Wang |
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
public key encryption with keyword search, without random oracle, searchable encryption |
1 | Wenting Jin, Jing Xu 0002 |
An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm |
1 | Shaojing Fu, Chao Li 0002, Kanta Matsuura, Longjiang Qu |
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Boolean Function, Nonlinearity, Algebraic Immunity, Rotation Symmetry |
1 | Xiangxi Li, Yu Zhang, Yuxin Deng |
Verifying Anonymous Credential Systems in Applied Pi Calculus. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry |
Computing on Encrypted Data. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
Anonymizer-Enabled Security and Privacy for RFID. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda |
Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kannan Srinathan, Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
Unconditionally Reliable Message Transmission in Directed Hypergraphs. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Unbounded Computing Power, Unconditional Reliability |
1 | Robert H. Deng, Jian Weng 0001, Shengli Liu 0001, Kefei Chen |
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
bilinear pairing, chosen-ciphertext security, Proxy re-encryption |
1 | Michel Abdalla, Malika Izabachène, David Pointcheval |
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marc Joye |
An Efficient On-Line/Off-Line Signature Scheme without Random Oracles. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
on-line/off-line signing, Cryptography, digital signature, standard model |
1 | Koichi Shimizu, Daisuke Suzuki, Toyohiro Tsurumaru |
High-Speed Search System for PGP Passphrases. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Youming Qiao, Christophe Tartary |
Counting Method for Multi-party Computation over Non-abelian Groups. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Neighbor-Avoiding Walk, Random Walk, Graph Coloring, Multiparty Computation, Non-Abelian Groups, Passive Adversary |
1 | Bogdan Carbunar, Mahesh V. Tripunitara |
Conditional Payments for Computing Markets. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo 0001, Huaxiong Wang |
Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
LSBS-RSA, short exponent attack, lattice reduction technique, the Boneh-Durfee attack, RSA, least significant bits (LSBs) |
1 | Tiancheng Lou, Christophe Tartary |
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate |
1 | Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor, Hossein Ghodosi |
Cryptanalysis of MV3 Stream Cipher. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
MV3 Algorithm, Cryptanalysis, Stream Ciphers, Distinguishing Attack |
1 | David Galindo, Rodrigo Roman, Javier López 0001 |
A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
identity-based key agreement, key distribution, pairings, underwater wireless sensor networks |
1 | Huafei Zhu |
Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols |
1 | Chao Li 0002, Shaojing Fu, Bing Sun 0001 |
Construction of Resilient Functions with Multiple Cryptographic Criteria. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Nonlinearity, Linear Code, Resilient function, Linear structure |
1 | Julien Bringer, Hervé Chabanne, Thomas Icart |
Cryptanalysis of EC-RAC, a RFID Identification Protocol. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Cryptanalysis, Identification, Zero-Knowledge |
1 | Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong (eds.) |
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger |
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation |
1 | Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan |
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
CCA1-security, Damgård’s cryptosystem, DDH, hybrid cryptosystems |
1 | Atefeh Mashatan, Douglas R. Stinson |
A New Message Recognition Protocol for Ad Hoc Pervasive Networks. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Ad Hoc Networks, Authentication, Recognition, Cryptographic Protocols, Pervasive Networks |
1 | Peishun Wang, Huaxiong Wang, Josef Pieprzyk |
Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Keyword field, dynamic group, conjunctive keyword search |
1 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Online/offline signature, Mobile ad hoc networks, identity-based cryptography, multisignature, forgery attack |
1 | Raylin Tso, Xun Yi, Xinyi Huang 0001 |
Efficient and Short Certificateless Signature. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Bilinear pairing, random oracle, short signature, certificateless signature |
1 | Yu Zhang |
An Open Framework for Remote Electronic Elections. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Tsz Hon Yuen, Willy Susilo, Joseph K. Liu, Yi Mu 0001 |
Sanitizable Signatures Revisited. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
sanitizable signatures, standard model, pairings |
1 | Shaojing Fu, Chao Li 0002, Bing Sun 0001 |
Enumeration of Homogeneous Rotation Symmetric Functions over Fp. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Minimal function, Monic monomial, Algebraic degree, Rotation symmetry |
1 | Yumi Sakemi, Yasuyuki Nogami, Katsuyuki Okeya, Hidehiro Katou, Yoshitaka Morikawa |
Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Nakahara Jr. |
3D: A Three-Dimensional Block Cipher. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
block cipher design, 3-dimensional state |
1 | Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Authenticated Directed Diffusion. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Directed Diffusion |
1 | Vicente Benjumea, Seung Geol Choi, Javier López 0001, Moti Yung |
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
group signatures, ring signatures, Anonymous authentication, X.509 certificates, traceable signatures |
1 | Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu |
How to Secure Your Email Address Book and Beyond. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
self-spreading malicious emails, self-replicating malicious emails, email address book, encryption |
1 | Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk |
Forward-Secure Key Evolution in Wireless Sensor Networks. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
communication in sensor networks, directed random graphs, key management, key distribution, forward security |
1 | Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini |
Achieving Mobility and Anonymity in IP-Based Networks. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
mobility, anonymity, Mobile IP, location privacy, IP networks, Tor |
1 | Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang 0001 |
Extended Private Information Retrieval and Its Application in Biometrics Authentications. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, San Ling, Tatsuaki Okamoto, Huaxiong Wang, Chaoping Xing (eds.) |
Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings |
CANS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhang 0002, Hideki Imai |
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yinxia Sun, Futai Zhang, Joonsang Baek |
Strongly Secure Certificateless Public Key Encryption Without Pairing. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
certificateless public key encryption, public key encryption, Computational Diffie-Hellman problem |
1 | Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin |
An Intelligent Network-Warning Model with Strong Survivability. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Strong Survivability, Network-Warning, Intelligence, Equality |
1 | Jihwan Lim, Sangjin Kim, Heekuck Oh |
A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
secure location service, ad hoc network, position-based routing |
1 | Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan |
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Reliable and Secure Communication, Information Theoretic Security, Directed Networks, Communication Efficiency |
1 | Solahuddin B. Shamsuddin, Michael E. Woodward |
Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Data base, Anomaly, Network Intrusion Detection System |
1 | Loránd Szöllösi, Tamás Marosits, Gábor Fehér, András Recski |
Fast Digital Signature Algorithm Based on Subgraph Isomorphism. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto |
Toward Non-parallelizable Client Puzzles. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Non-Parallelizable Cryptographic Puzzles, Client Puzzles, Denial of Service Attacks |
1 | Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto |
Efficient ID-Based Digital Signatures with Message Recovery. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
k-BDHI problem, pairing, short signature, ID-based signature, message recovery |
1 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 |
A Generic Construction for Universally-Convertible Undeniable Signatures. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Universally-Convertible, Provable Security, Undeniable Signature, Generic Construction |
1 | Fuchun Guo, Yi Mu 0001, Zhide Chen |
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Mutative Identity, ID-based Signature |
1 | Sherman S. M. Chow |
Running on Karma - P2P Reputation and Currency Systems. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
peer-to-peer, reputation, Byzantine agreement, free riding, micropayments, Decentralized systems, currency |
1 | Rongxing Lu, Zhenfu Cao, Xiaolei Dong |
Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jianqin Zhou, Qiang Zheng |
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3). |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, linear complexity, periodic sequence, minimal polynomial |
1 | Xiyong Zhang, Hua Guo, Jinjiang Yuan |
A Note of Perfect Nonlinear Functions. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jian Kang 0001, Yuan Zhang, Jiu-bin Ju |
Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nathalie Dagorn |
Cooperative Intrusion Detection for Web Applications. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Tae Hyun Kim 0003, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim 0001, Jongin Lim 0001 |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Randomized projective coordinate systems, Eta pairing, Side channel attacks, Differential Power Analysis, Pairing based cryptosystems |
1 | Jinquan Zeng, XiaoJie Liu, Tao Li 0016, Feixian Sun, Lingxi Peng, Caiming Liu |
An Immune-Based Model for Service Survivability. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
service survivability, artificial immune system, risk evaluation |
1 | Xiaomin Wang, Jiashu Zhang, Wenfang Zhang |
Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Nonlinear digital filter, Chaos, Cryptology, Keystream |
1 | Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang |
Smart Architecture for High-Speed Intrusion Detection and Prevention Systems. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Tartary, Huaxiong Wang |
Achieving Multicast Stream Authentication Using MDS Codes. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
erasure codes, stream authentication, polynomial reconstruction |
1 | Hongsong Shi, Mingxing He, Zhiguang Qin |
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Clustering, Ad hoc networks, Bilinear pairings, Group key agreement, Hierarchical routing |
1 | Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 |
A Diffie-Hellman Key Exchange Protocol Without Random Oracles. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation |
1 | Qutaiba Albluwi, Ibrahim Kamel |
Watermarking Essential Data Structures for Copyright Protection. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Liming Wang, Chuan-Kun Wu |
Authenticated Group Key Agreement for Multicast. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Feng Cao, Zhenfu Cao |
Security Model of Proxy-Multi Signature Schemes. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chester Rebeiro, A. David Selvakumar, A. S. L. Devi |
Bitslice Implementation of AES. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Guan Jie, Zhang Zhongya |
Improved Collision Attack on Reduced Round Camellia. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Block cipher, Collision attack, Camellia |
1 | Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski |
Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nuttapong Attrapadung, Jun Furukawa 0001, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002 |
Efficient Identity-Based Encryption with Tight Security Reduction. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jaimee Brown, Juan Manuel González Nieto, Colin Boyd |
Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Cramer-Shoup framework, subgroup membership problems, public key encryption, chosen ciphertext security, hybrid encryption |
1 | Jianhua Yang, Byong Lee, Yongzhong Zhang |
Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, round-trip time, stepping-stone |
1 | Sujing Zhou, Dongdai Lin |
Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
LRSW Assumption, Verifier-Local Revocation, Group Signature, Bilinear Map |
1 | Lan Yu, Willy Susilo, Reihaneh Safavi-Naini |
X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
XRep, X2Rep and X2BTRep, P2P, Reputation System |
1 | David Pointcheval, Yi Mu 0001, Kefei Chen (eds.) |
Cryptology and Network Security, 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan |
Steganalysis Based on Differential Statistics. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
HCF, differentiation, co-occurrence matrix, COM |
1 | Xianxian Li, Lijun Liu |
A Multi-agent Cooperative Model and System for Integrated Security Monitoring. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
Knowledge Management, Network security, Security monitoring, Multi-agent cooperation |
1 | Sven Laur, Kaisa Nyberg |
Efficient Mutual Data Authentication Using Manually Authenticated Strings. |
CANS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Haiyong Bao, Zhenfu Cao, Haifeng Qian |
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier López 0001 |
A Novel Method to Maintain Privacy in Mobile Agent Applications. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
DCSC, privacy, Mobile agent, secure computation |
1 | Yvo Desmedt, Huaxiong Wang, Yi Mu 0001, Yongqing Li (eds.) |
Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
On the Security of Certificateless Signature Schemes from Asiacrypt 2003. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Bilinear Pairing, Attack Model, Certificateless Cryptography, Certificateless Signature |
1 | Fanyu Kong, Daxing Li |
A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
signed window algorithm, elliptic curve cryptosystems, point multiplication, signed-digit number representations |
1 | Zhenfeng Zhang, Jing Xu 0002, Dengguo Feng |
Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
Security protocol, Fair exchange, Identity-based signature, Certified E-mail |
1 | Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco |
Design and Implementation of an Inline Certified E-mail Service. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 |
The Second-Preimage Attack on MD4. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
collision differential path, weak message, Hash function, second-preimage |
1 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
On Securing RTP-Based Streaming Content with Firewalls. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
streaming content, Network security, firewall |
1 | Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese |
On the Performance and Analysis of DNS Security Extensions. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 518 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|