The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52) 2019 (41) 2020 (37) 2021 (36) 2022 (26) 2023 (28)
Publication types (Num. hits)
inproceedings(904) proceedings(26)
Venues (Conferences, Journals, ...)
ACISP(930)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Ryoma Ito 0001, Atsuko Miyaji New Iterated RC4 Key Correlations. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Thomas Haines Forward-Secure Linkable Ring Signatures. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuecheng Ma, Xin Wang, Dongdai Lin Anonymous Identity-Based Encryption with Identity Recovery. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yali Zeng, Xu Li, Xu Yang 0002, Qikui Xu, Dongcheng Wang A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Deqing Zou, Zhijun Deng, Zhen Li 0027, Hai Jin 0001 Automatically Identifying Security Bug Reports via Multitype Features Analysis. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Scott R. Fluhrer, Saraswathy RV Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hyung Tae Lee, Huaxiong Wang, Kai Zhang 0016 Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001 Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi CRT-KPS: A Key Predistribution Schemes Using CRT. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Terry Shue Chien Lau, Chik How Tan A New Encryption Scheme Based on Rank Metric Codes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yan Xu 0007, Ran Ding, Jie Cui 0004, Hong Zhong 0001 Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Kai Zhang 0016, Bao Li 0001, Xianhui Lu, Haiyang Xue, Jie Li Lattice-Based Dual Receiver Encryption and More. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bernardo David, Rafael Dowsley, Mario Larangeira 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim 0003, Jongchan Lee A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chi Liu, Rongmao Chen, Yi Wang 0055, Yongjun Wang Asymmetric Subversion Attacks on Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nicolas Marrière, Valérie Nachef, Emmanuel Volte Differential Attacks on Reduced Round LILLIPUT. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu 0001 Revisiting the Incentive Mechanism of Bitcoin-NG. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xingye Lu, Zhenfei Zhang, Man Ho Au Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shimin Li, Bei Liang, Rui Xue 0001 Private Functional Signatures: Definition and Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Benjamin Dowling, Douglas Stebila Modelling Ciphersuite and Version Negotiation in the TLS Protocol. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yiteng Feng, Yi Mu 0001, Guomin Yang, Joseph K. Liu A New Public Remote Integrity Checking Scheme with User Privacy. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nilanjan Datta, Kan Yasuda Generalizing PMAC Under Weaker Assumptions. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Megha Agrawal, Donghoon Chang, Somitra Sanadhya sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim BP-XACML an Authorisation Policy Language for Business Processes. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yusuke Sakai 0001, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christophe Nègre, Guilherme Perin Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Daniel J. Bernstein, Andreas Hülsing, Tanja Lange 0001, Ruben Niederhagen Bad Directions in Cryptographic Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Le Trieu Phong IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryoma Ito 0001, Atsuko Miyaji How TKIP Induces Biases of Internal States of Generic RC4. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Felix Günther 0001, Bertram Poettering Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuyu Wang 0001, Keisuke Tanaka Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qiang Tang 0001 Towards Forward Security Properties for PEKS and IBE. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ernest Foo, Douglas Stebila (eds.) Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rongmao Chen, Yi Mu 0001, Guomin Yang, Fuchun Guo, Xiaofen Wang A New General Framework for Secure Public Key Encryption with Keyword Search. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Adrien Bourgeois, Xavier Carpent Analysis of Rainbow Tables with Fingerprints. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jianchang Lai, Yi Mu 0001, Fuchun Guo, Willy Susilo Improved Identity-Based Online/Offline Encryption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tingting Zhang, Hongda Li 0001, Guifang Huang Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuu Ishida, Yohei Watanabe 0001, Junji Shikata Constructions of CCA-Secure Revocable Identity-Based Encryption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li Cryptanalysis of Reduced-Round Whirlwind. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Priyanka Bose, Dipanjan Das 0002, Chandrasekaran Pandu Rangan Constant Size Ring Signature Without Random Oracle. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Biaoshuai Tao, Hongjun Wu 0001 Improving the Biclique Cryptanalysis of AES. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Leliel Trethowen, Craig Anslow, Stuart Marshall, Ian Welch VisRAID: Visualizing Remote Access for Intrusion Detection. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhelei Sun, Peng Wang 0009, Liting Zhang Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Qiong Huang 0001, Zongyang Zhang Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nilanjan Datta, Mridul Nandi ELmE: A Misuse Resistant Parallel Authenticated Encryption. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammed Shafiul Alam Khan, Chris J. Mitchell Another Look at Privacy Threats in 3G Mobile Telephony. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu ExBLACR: Extending BLACR System. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mingwu Zhang New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Liang Liu, Xiaofeng Chen 0001, Wenjing Lou A Secure Three-Party Computational Protocol for Triangle Area. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shi Bai 0001, Steven D. Galbraith Lattice Decoding Attacks on Binary LWE. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa Incrementally Executable Signcryptions. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Petr Susil, Pouyan Sepehrdad, Serge Vaudenay On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zheli Liu, Jin Li 0002, Xiaofeng Chen 0001, Jun Yang 0032, Chunfu Jia TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik Some Insights into Differential Cryptanalysis of Grain v1. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yanfeng Wang, Wenling Wu Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Yi Mu 0001 (eds.) Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy A Semantics-Aware Classification Approach for Data Leakage Prevention. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Philip S. Vejre, Andrey Bogdanov Route 66: Passively Breaking All GSM Channels. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhaojing Ding, Wei Guo 0005, Liangjian Su, Jizeng Wei, Haihua Gu Further Research on N-1 Attack against Exponentiation Algorithms. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuyu Wang 0001, Keisuke Tanaka Strongly Simulation-Extractable Leakage-Resilient NIZK. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yanbin Pan, Yingpu Deng A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Long Wen, Meiqin Wang Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Janaka Alawatugoda 0001, Colin Boyd, Douglas Stebila Continuous After-the-Fact Leakage-Resilient Key Exchange. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhijiao Zhang, Lei Zhang, Yu Chen 0004, Yuanchun Shi Running Multiple Androids on One ARM Platform. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Atsushi Takayasu, Noboru Kunihiro Cryptanalysis of RSA with Multiple Small Secret Exponents. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Y. Sreenivasa Rao, Ratna Dutta Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weiran Liu, Jianwei Liu 0001, Qianhong Wu, Bo Qin Hierarchical Identity-Based Broadcast Encryption. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bungo Taga, Shiho Moriai, Kazumaro Aoki Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1. Search on Bibsonomy ACISP The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Essam Ghadafi Formalizing Group Blind Signatures and Practical Constructions without Random Oracles. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Margus Niitsoo Black-Box Separations and Their Adaptability to the Non-uniform Model. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhenqing Shi, Bin Zhang 0003, Dengguo Feng Cryptanalysis of Helix and Phelix Revisited. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Leah F. South, Douglas Stebila Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Byoung-Il Kim, Jin Hong 0001 Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yoshinori Aono Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to RSA. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Baodong Qin, Shengli Liu 0001, Zhengan Huang Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Risto Laanoja Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Yi Mu 0001, Willy Susilo, Vijay Varadharajan Membership Encryption and Its Applications. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yosuke Todo Upper Bounds for the Security of Several Feistel Networks. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kristian Gjøsteen, George Petrides, Asgeir Steine Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get? Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Seyit Ahmet Çamtepe Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xavier Boyen Expressive Cryptography: Lattice Perspectives. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Leonie Simpson (eds.) Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Man Ho Au, Yang Wang 0074, Duncan S. Wong Fairness in Concurrent Signatures Revisited. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Takanori Isobe 0001, Yu Sasaki, Jiageng Chen Related-Key Boomerang Attacks on KATAN32/48/64. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi Injective Encodings to Elliptic Curves. Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yang Wang 0074, Mark Manulis, Man Ho Au, Willy Susilo Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". Search on Bibsonomy ACISP The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 930 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license