Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani |
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 88-103, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Obana, Maki Yoshida |
An Efficient Construction of Non-Interactive Secure Multiparty Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 604-614, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Thalia M. Laing, Keith M. Martin |
Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 467-483, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Noor R. Al-Kazaz, Sean A. Irvine, William John Teahan |
An Automatic Cryptanalysis of Transposition Ciphers Using Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 36-52, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
Range Query Integrity in Cloud Data Streams with Efficient Insertion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 719-724, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tassos Dimitriou, Naser Al-Ibrahim |
Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 713-718, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Khoa Nguyen 0002, Huaxiong Wang, Juanyang Zhang |
Server-Aided Revocable Identity-Based Encryption from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 107-123, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang |
Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 637-647, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Joash W. J. Tan, Roland H. C. Yap |
Detecting Malware Through Anti-analysis Signals - A Preliminary Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 542-551, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Si Gao, Hua Chen 0011, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma |
Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 3-18, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk |
Breaking PPTP VPNs via RADIUS Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 159-175, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Filipe Beato, Kimmo Halunen, Bart Mennink |
Improving the Sphinx Mix Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 681-691, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Luca Ferretti, Michele Colajanni, Mirco Marchetti |
Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 626-636, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, Mohammed Hasanuzzaman |
User Authentication from Mouse Movement Data Using SVM Classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 692-700, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Aceto, Antonio Montieri, Antonio Pescapè |
Internet Censorship in Italy: A First Look at 3G/4G Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 737-742, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Claude Royer, Anderson Santana de Oliveira |
AAL and Static Conflict Detection in Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 367-382, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas |
When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 573-582, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Eunkyung Kim 0002, Mehdi Tibouchi |
FHE Over the Integers and Modular Arithmetic Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 435-450, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Budianto, Richard Chow, Jonathan Ding, Michael McCool |
Language-Based Hypervisors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 731-736, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Rachid El Bansarkhani, Jan Sturm |
An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 140-155, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, Mayank Varia |
Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 755-760, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Gérald Gavin |
An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 451-464, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Felix Brezo |
Implementation State of HSTS and HPKP in Both Browsers and Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 192-207, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li 0003, Yuqing Zhang 0001 |
SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 419-434, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Mathilde Igier, Serge Vaudenay |
Distance Bounding Based on PUF. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 701-710, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001, Keisuke Tanaka |
Group Signature with Deniability: How to Disavow a Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 228-244, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta |
Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 500-517, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jian Zhang, Wen-Ling Wu |
Security of Online AE Schemes in RUP Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 319-334, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa |
An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 615-625, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan |
LEAP: A Next-Generation Client VPN and Encrypted Email Provider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 176-191, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Takaaki Mizuki |
Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 484-499, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Valérie Nachef, Nicolas Marrière, Emmanuel Volte |
Improved Attacks on Extended Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 562-572, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel |
A Privacy-Preserving Model for Biometric Fusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 743-748, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Faustin Mbol, Jean-Marc Robert 0001, Alireza Sadighian |
An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 532-541, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Enrique Argones-Rúa, Bart Preneel |
An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 335-349, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama |
Evaluation on Malware Classification by Session Sequence of Common Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 521-531, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kirill Belyaev, Indrakshi Ray |
Component-Oriented Access Control for Deployment of Application Services in Containerized Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 383-399, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vincenzo Iovino, Qiang Tang 0001, Karol Zebrowski |
On the Power of Public-key Function-Private Functional Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 585-593, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Tianxiang Dai, Haya Schulmann, Michael Waidner |
DNSSEC Misconfigurations in Popular Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 651-660, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine |
Verifiable Message-Locked Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 299-315, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 55-70, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Vicenç Torra, Guillermo Navarro-Arribas |
Integral Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 661-669, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001 |
Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 245-261, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Yu Pu, Jens Grossklags |
Sharing Is Caring, or Callous? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 670-680, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kalikinkar Mandal, Basel Alomair, Radha Poovendran |
Secure Error-Tolerant Graph Matching Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 265-283, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto |
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 350-364, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Kai Simon |
Vulnerability Analysis Using Google and Shodan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 725-730, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Sara Foresti, Giuseppe Persiano (eds.) |
Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![, 978-3-319-48964-3 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | David Derler, Stephan Krenn, Daniel Slamanig |
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings, pp. 211-227, 2016, 978-3-319-48964-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Fatih Kiliç, Claudia Eckert 0001 |
iDeFEND: Intrusion Detection Framework for Encrypted Network Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 111-118, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci |
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 43-58, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò |
On the Weaknesses of PBKDF2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 119-126, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Simone Bossi, Andrea Visconti |
What Users Should Know About Full Disk Encryption Based on LUKS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 225-237, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue |
Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 238-247, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle |
Bandwidth-Optimized Secure Two-Party Computation of Minima. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 197-213, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Imane Bouij-Pasquier, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort |
A Security Framework for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 19-31, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bei Liang, Hongda Li 0001, Jinyong Chang |
Verifiable Random Functions from (Leveled) Multilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 129-143, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa, Kateryna Pavlyk |
Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 160-175, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Changyu Dong, Franziskus Kiefer |
Secure Set-Based Policy Checking and Its Application to Password Registration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 59-74, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada |
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 179-196, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Michael K. Reiter, David Naccache (eds.) |
Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![Springer, 978-3-319-26822-4 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena |
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 95-110, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yutaka Kawai, Takato Hirano, Yoshihiro Koseki, Tatsuji Munaka |
SEPM: Efficient Partial Keyword Search on Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 75-91, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler |
Outsourcing Secure Two-Party Computation as a Black Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 214-222, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva |
PUDA - Privacy and Unforgeability for Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 3-18, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer |
Privacy-Aware Authentication in the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 32-39, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi |
A Formal Environment for MANET Organization and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 144-159, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maroua Gharam, Meriem Salhi, Noureddine Boudriga |
An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings, pp. 248-256, 2015, Springer, 978-3-319-26822-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yosuke Todo, Kazumaro Aoki |
FFT Key Recovery for Integral Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 64-81, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Kelbert, Alexander Pretschner |
Decentralized Distributed Data Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 353-369, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Florian Böhl, Simon Greiner, Patrik Scheidecker |
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 175-190, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Felix Günther 0001, Mark Manulis, Andreas Peter |
Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 321-336, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré |
Direct Anonymous Attestations with Dependent Basename Opening. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 206-221, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Fotiadis, Elisavet Konstantinou |
More Sparse Families of Pairing-Friendly Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 384-399, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa |
Security of a Privacy-Preserving Biometric Authentication Protocol Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 290-304, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ali El Kaafarani, Liqun Chen 0002, Essam Ghadafi, James H. Davenport |
Attribute-Based Signatures with User-Controlled Linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 256-269, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Kortelainen, Juha Kortelainen |
New Second Preimage Attack Variants against the MD-Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 98-110, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Lei Wang 0031 |
Message Extension Attack against Authenticated Encryptions: Application to PANDA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 82-97, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sourya Joyee De, Sushmita Ruj, Asim K. Pal |
Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 240-255, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Akanksha Sharma, Subrat Kumar Dash |
Mining API Calls and Permissions for Android Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 191-205, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva |
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 305-320, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers |
Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 270-289, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento |
Universally Composable Oblivious Transfer Based on a Variant of LPN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 143-158, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dimitris Gritzalis, Aggelos Kiayias, Ioannis G. Askoxylakis (eds.) |
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![Springer, 978-3-319-12279-3 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa |
A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 222-239, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hui Guo, Zhenfeng Zhang, Jiang Zhang 0001 |
Proxy Re-encryption with Unforgeable Re-encryption Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 20-33, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Koutarou Suzuki, Kazuki Yoneyama |
Converting PKI-Based Authenticated Key Exchange to Identity-Based. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 159-174, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jun Furukawa 0001 |
Short Comparable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 337-352, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Haiyang Xue, Bao Li 0001, Xianhui Lu, Kunpeng Wang, Yamin Liu |
On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 34-49, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bart Mennink, Bart Preneel |
Breaking and Fixing Cryptophia's Short Combiner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 50-63, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Bader |
Efficient Signatures with Tight Real World Security in the Random-Oracle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 370-383, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Clear, Ciaran McGoldrick |
Bootstrappable Identity-Based Fully Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 1-19, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Wachs, Martin Schanzenbach, Christian Grothoff |
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 127-142, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann |
Negotiating DNSSEC Algorithms over Legacy Proxies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings, pp. 111-126, 2014, Springer, 978-3-319-12279-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Si Gao, Hua Chen 0011, Limin Fan |
Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 39-56, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yong Li 0021, Zheng Yang 0005 |
Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 122-138, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Tomer Ashur, Orr Dunkelman |
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 271-290, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Xie, Rui Xue 0001, Minqian Wang |
Zero Knowledge Proofs from Ring-LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 57-73, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sourya Joyee De, Asim K. Pal |
Achieving Correctness in Fair Rational Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 139-161, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Konstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias |
Resource Access Control in the Facebook Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security - 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22. 2013. Proceedings, pp. 179-198, 2013, Springer, 978-3-319-02936-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|