The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CANS"( http://dblp.L3S.de/Venues/CANS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cans

Publication years (Num. hits)
2005 (28) 2006 (27) 2007 (18) 2008 (28) 2009 (36) 2010 (24) 2011 (21) 2012 (23) 2013 (19) 2014 (26) 2015 (19) 2016 (57) 2017 (28) 2018 (27) 2019 (30) 2020 (31) 2021 (29) 2022 (21) 2023 (26)
Publication types (Num. hits)
inproceedings(499) proceedings(19)
Venues (Conferences, Journals, ...)
CANS(518)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 240 occurrences of 182 keywords

Results
Found 518 publication records. Showing 518 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Satoshi Obana, Maki Yoshida An Efficient Construction of Non-Interactive Secure Multiparty Computation. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Thalia M. Laing, Keith M. Martin Efficient, XOR-Based, Ideal (t, n)- threshold Schemes. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Noor R. Al-Kazaz, Sean A. Irvine, William John Teahan An Automatic Cryptanalysis of Transposition Ciphers Using Compression. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera Range Query Integrity in Cloud Data Streams with Efficient Insertion. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tassos Dimitriou, Naser Al-Ibrahim Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Khoa Nguyen 0002, Huaxiong Wang, Juanyang Zhang Server-Aided Revocable Identity-Based Encryption from Lattices. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joash W. J. Tan, Roland H. C. Yap Detecting Malware Through Anti-analysis Signals - A Preliminary Study. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Si Gao, Hua Chen 0011, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk Breaking PPTP VPNs via RADIUS Encryption. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Filipe Beato, Kimmo Halunen, Bart Mennink Improving the Sphinx Mix Network. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Luca Ferretti, Michele Colajanni, Mirco Marchetti Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, Mohammed Hasanuzzaman User Authentication from Mouse Movement Data Using SVM Classifier. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giuseppe Aceto, Antonio Montieri, Antonio Pescapè Internet Censorship in Italy: A First Look at 3G/4G Networks. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jean-Claude Royer, Anderson Santana de Oliveira AAL and Static Conflict Detection in Policy. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eunkyung Kim 0002, Mehdi Tibouchi FHE Over the Integers and Modular Arithmetic Circuits. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Enrico Budianto, Richard Chow, Jonathan Ding, Michael McCool Language-Based Hypervisors. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rachid El Bansarkhani, Jan Sturm An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, Mayank Varia Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gérald Gavin An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Felix Brezo Implementation State of HSTS and HPKP in Both Browsers and Servers. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li 0003, Yuqing Zhang 0001 SecReach: Secure Reachability Computation on Encrypted Location Check-in Data. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mathilde Igier, Serge Vaudenay Distance Bounding Based on PUF. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001, Keisuke Tanaka Group Signature with Deniability: How to Disavow a Signature. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jian Zhang, Wen-Ling Wu Security of Online AE Schemes in RUP Setting. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan LEAP: A Next-Generation Client VPN and Encrypted Email Provider. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Takaaki Mizuki Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Valérie Nachef, Nicolas Marrière, Emmanuel Volte Improved Attacks on Extended Generalized Feistel Networks. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel A Privacy-Preserving Model for Biometric Fusion. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Faustin Mbol, Jean-Marc Robert 0001, Alireza Sadighian An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aysajan Abidin, Enrique Argones-Rúa, Bart Preneel An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama Evaluation on Malware Classification by Session Sequence of Common Protocols. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kirill Belyaev, Indrakshi Ray Component-Oriented Access Control for Deployment of Application Services in Containerized Environments. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vincenzo Iovino, Qiang Tang 0001, Karol Zebrowski On the Power of Public-key Function-Private Functional Encryption. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tianxiang Dai, Haya Schulmann, Michael Waidner DNSSEC Misconfigurations in Popular Domains. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine Verifiable Message-Locked Encryption. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Vicenç Torra, Guillermo Navarro-Arribas Integral Privacy. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001 Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yu Pu, Jens Grossklags Sharing Is Caring, or Callous? Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kalikinkar Mandal, Basel Alomair, Radha Poovendran Secure Error-Tolerant Graph Matching Protocols. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kai Simon Vulnerability Analysis Using Google and Shodan. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sara Foresti, Giuseppe Persiano (eds.) Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Derler, Stephan Krenn, Daniel Slamanig Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing. Search on Bibsonomy CANS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fatih Kiliç, Claudia Eckert 0001 iDeFEND: Intrusion Detection Framework for Encrypted Network Data. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci Security of Linear Secret-Sharing Schemes Against Mass Surveillance. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò On the Weaknesses of PBKDF2. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Simone Bossi, Andrea Visconti What Users Should Know About Full Disk Encryption Based on LUKS. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle Bandwidth-Optimized Secure Two-Party Computation of Minima. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Imane Bouij-Pasquier, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort A Security Framework for Internet of Things. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bei Liang, Hongda Li 0001, Jinyong Chang Verifiable Random Functions from (Leveled) Multilinear Maps. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa, Kateryna Pavlyk Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Changyu Dong, Franziskus Kiefer Secure Set-Based Policy Checking and Its Application to Password Registration. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael K. Reiter, David Naccache (eds.) Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yutaka Kawai, Takato Hirano, Yoshihiro Koseki, Tatsuji Munaka SEPM: Efficient Partial Keyword Search on Encrypted Data. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler Outsourcing Secure Two-Party Computation as a Black Box. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva PUDA - Privacy and Unforgeability for Data Aggregation. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer Privacy-Aware Authentication in the Internet of Things. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi A Formal Environment for MANET Organization and Security. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maroua Gharam, Meriem Salhi, Noureddine Boudriga An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yosuke Todo, Kazumaro Aoki FFT Key Recovery for Integral Attack. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Florian Kelbert, Alexander Pretschner Decentralized Distributed Data Usage Control. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Florian Böhl, Simon Greiner, Patrik Scheidecker Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Felix Günther 0001, Mark Manulis, Andreas Peter Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré Direct Anonymous Attestations with Dependent Basename Opening. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Georgios Fotiadis, Elisavet Konstantinou More Sparse Families of Pairing-Friendly Elliptic Curves. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa Security of a Privacy-Preserving Biometric Authentication Protocol Revisited. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali El Kaafarani, Liqun Chen 0002, Essam Ghadafi, James H. Davenport Attribute-Based Signatures with User-Controlled Linkability. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tuomas Kortelainen, Juha Kortelainen New Second Preimage Attack Variants against the MD-Structure. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031 Message Extension Attack against Authenticated Encryptions: Application to PANDA. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sourya Joyee De, Sushmita Ruj, Asim K. Pal Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Akanksha Sharma, Subrat Kumar Dash Mining API Calls and Permissions for Android Malware Detection. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva Private and Dynamic Time-Series Data Aggregation with Trust Relaxation. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento Universally Composable Oblivious Transfer Based on a Variant of LPN. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dimitris Gritzalis, Aggelos Kiayias, Ioannis G. Askoxylakis (eds.) Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hui Guo, Zhenfeng Zhang, Jiang Zhang 0001 Proxy Re-encryption with Unforgeable Re-encryption Keys. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Koutarou Suzuki, Kazuki Yoneyama Converting PKI-Based Authenticated Key Exchange to Identity-Based. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jun Furukawa 0001 Short Comparable Encryption. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Haiyang Xue, Bao Li 0001, Xianhui Lu, Kunpeng Wang, Yamin Liu On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bart Mennink, Bart Preneel Breaking and Fixing Cryptophia's Short Combiner. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christoph Bader Efficient Signatures with Tight Real World Security in the Random-Oracle Model. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Clear, Ciaran McGoldrick Bootstrappable Identity-Based Fully Homomorphic Encryption. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Matthias Wachs, Martin Schanzenbach, Christian Grothoff A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann Negotiating DNSSEC Algorithms over Legacy Proxies. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Si Gao, Hua Chen 0011, Limin Fan Padding Oracle Attack on PKCS#1 v1.5: Can Non-standard Implementation Act as a Shelter? Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yong Li 0021, Zheng Yang 0005 Strongly Secure One-Round Group Authenticated Key Exchange in the Standard Model. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tomer Ashur, Orr Dunkelman A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiang Xie, Rui Xue 0001, Minqian Wang Zero Knowledge Proofs from Ring-LWE. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sourya Joyee De, Asim K. Pal Achieving Correctness in Fair Rational Secret Sharing. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Konstantinos Chronopoulos, Maria Gouseti, Aggelos Kiayias Resource Access Control in the Facebook Model. Search on Bibsonomy CANS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 518 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license