The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISC"( http://dblp.L3S.de/Venues/ICISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icisc

Publication years (Num. hits)
1998 (19) 1999 (21) 2000 (21) 2001 (34) 2002 (37) 2003 (34) 2004 (36) 2005 (35) 2006 (30) 2007 (29) 2008 (26) 2009 (26) 2010 (29) 2011 (33) 2012 (37) 2013 (32) 2014 (27) 2015 (24) 2016 (19) 2017 (21) 2018 (23) 2019 (19) 2020 (16) 2021 (24) 2022 (25) 2023 (1)
Publication types (Num. hits)
inproceedings(653) proceedings(25)
Venues (Conferences, Journals, ...)
ICISC(678)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 441 occurrences of 289 keywords

Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gildas Avoine, Xavier Carpent Optimal Storage for Rainbow Tables. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammad Etemad, Alptekin Küpçü Database Outsourcing with Hierarchical Authenticated Data Structures. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaoqian Li, Bao Li 0001, Wenling Wu, Xiaoli Yu, Ronglin Hao, Bingke Ma First Multidimensional Cryptanalysis on Reduced-Round \mathrmPRINCE _core. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Janis Danisevskis, Marta Piekarska, Jean-Pierre Seifert Dark Side of the Shader: Mobile GPU-Aided Malware Delivery. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Tomoya Nomura, Nobuo Funabiki An Anonymous Reputation System with Reputation Secrecy for Manager. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dennis Y. W. Liu, Duncan S. Wong, Qiong Huang 0001 Ambiguous One-Move Nominative Signature Without Random Oracles. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yongdae Kim, Haengseok Ko Using Principal Component Analysis for Practical Biasing of Power Traces to Improve Power Analysis Attacks. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xuexin Zheng, Keting Jia Impossible Differential Attack on Reduced-Round TWINE. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Nobuo Funabiki Revocable Group Signatures with Compact Revocation List Using Accumulators. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Li Lin 0003, Wenling Wu, Yanfeng Wang, Lei Zhang 0012 General Model of the Single-Key Meet-in-the-Middle Distinguisher on the Word-Oriented Block Cipher. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tomas Toft A Secure Priority Queue; Or: On Secure Datastructures from Multiparty Computation. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Qichun Wang, Chik How Tan, Timothy Foo A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan A Provably Secure Signature and Signcryption Scheme Using the Hardness Assumptions in Coding Theory. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Kutzner, Phuong Ha Nguyen, Axel Poschmann Enabling 3-Share Threshold Implementations for all 4-Bit S-Boxes. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kim T. Le, Parmesh Ramanathan, Kewal K. Saluja Privacy Assurances in Multiple Data-Aggregation Transactions. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1K. Preetha Mathew, Sachin Vasant, C. Pandu Rangan Efficient Code Based Hybrid and Deterministic Encryptions in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Julien Devigne Combined Proxy Re-encryption. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Robert Fitzpatrick, Florian Göpfert On the Efficacy of Solving LWE by Reduction to Unique-SVP. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Riham AlTawy, Aleksandar Kircanski, Amr M. Youssef Rebound Attacks on Stribog. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shogo Hajime, Yohei Watanabe 0001, Junji Shikata Information-Theoretically Secure Entity Authentication in the Multi-user Setting. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031 Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Nabil Hossain Semantic Feature Selection for Text with Application to Phishing Email Detection. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shohreh Sharif Mansouri, Elena Dubrova Protecting Ring Oscillator Physical Unclonable Functions Against Modeling Attacks. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiyoung Woo, Hyun-Jae Kang, Ah Reum Kang, Hyukmin Kwon, Huy Kang Kim Who Is Sending a Spam Email: Clustering and Characterizing Spamming Hosts. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stephen Bono, Jacob Thompson Industry-Wide Misunderstandings of HTTPS. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hervé Chabanne, Gérard D. Cohen, Alain Patey Towards Secure Two-Party Computation from the Wire-Tap Channel. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Taekyoung Kwon 0002, Mun-Kyu Lee, Daesung Kwon (eds.) Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hua Chen 0011, Limin Fan Integral Based Fault Attack on LBlock. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kang Yang 0002, Jing Xu 0002, Zhenfeng Zhang Certificateless Proxy Re-Encryption Without Pairings. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hwajeong Seo, Zhe Liu 0001, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim 0001 Parallel Implementations of LEA. Search on Bibsonomy ICISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im Balanced Indexing Method for Efficient Intrusion Detection Systems. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Howon Kim 0001 (eds.) Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ayesha Khalid, Deblin Bagchi, Goutam Paul 0001, Anupam Chattopadhyay Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Barbara Kordy, Sjouke Mauw, Patrick Schweitzer Quantitative Questions on Attack-Defense Trees. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nasima Begum, Toru Nakanishi 0001, Nobuo Funabiki Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christopher Meyer, Florian Feldmann, Jörg Schwenk Sometimes It's Better to Be STUCK! SAML Transportation Unit for Cryptographic Keys. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Thore Graepel, Kristin E. Lauter, Michael Naehrig ML Confidential: Machine Learning on Encrypted Data. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Duc-Phong Le, Chik How Tan Speeding Up Ate Pairing Computation in Affine Coordinates. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christian Rechberger On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhenqi Li, Bin Zhang 0003, Yuan Yao, Dongdai Lin Cube Cryptanalysis of LBlock with Noisy Leakage. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Velten, Frederic Stumpf Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Qingju Wang 0001, Dawu Gu, Vincent Rijmen, Ya Liu 0001, Jiazhe Chen, Andrey Bogdanov Improved Impossible Differential Attacks on Large-Block Rijndael. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1 Erratum: An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mohamed Ahmed Abdelraheem Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiang Ming 0002, Meng Pan, Debin Gao iBinHunt: Binary Hunting with Inter-procedural Control Flow. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nicolae Paladi, Christian Gehrmann, Mudassar Aslam, Fredric Morenius Trusted Launch of Virtual Machine Instances in Public IaaS Environments. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim Private Over-Threshold Aggregation Protocols. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christian L. F. Corniaux, Hossein Ghodosi An Information-Theoretically Secure Threshold Distributed Oblivious Transfer Protocol. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1 An Enhanced Anonymous Authentication and Key Exchange Scheme Using Smartcard. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031 Comprehensive Study of Integral Analysis on 22-Round LBlock. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kohei Kasamatsu, Takahiro Matsuda 0002, Goichiro Hanaoka, Hideki Imai Ciphertext Policy Multi-dimensional Range Encryption. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi Another Look at Affine-Padding RSA Signatures. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0009 Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lingguang Lei, Yuewu Wang, Jiwu Jing, Zhongwen Zhang, Xingjie Yu MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Laila El Aimani, Olivier Sanders Efficient Group Signatures in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yongdae Kim, Naofumi Homma, Takafumi Aoki, Heebong Choi Security Evaluation of Cryptographic Modules against Profiling Attacks. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Albrecht Petzoldt, Stanislav Bulygin Linear Recurring Sequences for the UOV Key Generation Revisited. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daan Raman, Bjorn De Sutter, Bart Coppens 0001, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux, Erik Van Buggenhout DNS Tunneling for Network Penetration. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhenqing Shi, Bin Zhang 0003, Dengguo Feng, Wenling Wu Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Toshiki Nakasone, Yang Li 0001, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takuma Koyama, Yu Sasaki, Noboru Kunihiro Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaitai Liang, Zhen Liu 0008, Xiao Tan 0003, Duncan S. Wong, Chunming Tang 0003 A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Chethan Kamath, Vikas Kumar Galindo-Garcia Identity-Based Signature Revisited. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shohreh Sharif Mansouri, Elena Dubrova An Improved Hardware Implementation of the Grain-128a Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jingyuan Zhao, Meiqin Wang, Jiazhe Chen, Yuliang Zheng 0001 New Impossible Differential Attack on SAFER + and SAFER + +. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fangming Zhao, Takashi Nishide, Kouichi Sakurai Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yusong Du, Fangguo Zhang, Meicheng Liu On the Resistance of Boolean Functions against Fast Algebraic Attacks. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kai Chen 0012, Yifeng Lian, Yingjun Zhang AutoDunt: Dynamic Latent Dependence Analysis for Detection of Zero Day Vulnerability. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kyung Chul Jeong, Dong Hoon Lee 0002, Daewan Han An Improved Known Plaintext Attack on PKZIP Encryption Algorithm. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Laila El Aimani Generic Constructions for Verifiable Signcryption. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Koutarou Suzuki Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jian Zou, Wenling Wu, Shuang Wu 0004, Bozhan Su, Le Dong Preimage Attacks on Step-Reduced SM3 Hash Function. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Teruya Minamoto, Ryuji Ohura A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto Efficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Liqun Chen 0002, Zongyang Zhang CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ashish Choudhury, Arpita Patra On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Kazumaro Aoki Improved Integral Analysis on Tweaked Lesamnta. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thorsten Ernst Schilling, Håvard Raddum Analysis of Trivium Using Compressed Right Hand Side Equations. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hailong Zhang 0001, Yongbin Zhou, Dengguo Feng An Efficient Leakage Characterization Method for Profiled Power Analysis Attacks. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Song Luo, Qingni Shen, Zhong Chen 0001 Fully Secure Unidirectional Identity-Based Proxy Re-encryption. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito Strong Security Notions for Timed-Release Public-Key Encryption Revisited. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon Correcting Errors in Private Keys Obtained from Cold Boot Attacks. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yi Lu 0002, Serge Vaudenay, Willi Meier, Liping Ding, Jianchun Jiang Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Haibo Tian, Xiaofeng Chen 0001, Zhengtao Jiang, Yusong Du Non-delegatable Strong Designated Verifier Signature on Elliptic Curves. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yong Qiao, Yuexiang Yang, Jie He 0002, Bo Liu 0014, Yingzhi Zeng Detecting Parasite P2P Botnet in eMule-like Networks through Quasi-periodicity Recognition. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shuguo Yang, Yongbin Zhou, Jiye Liu, Danyang Chen Back Propagation Neural Network Based Leakage Characterization for Practical Security Analysis of Cryptographic Implementations. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Deukjo Hong, Bonwook Koo, Daesung Kwon Biclique Attack on the Full HIGHT. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Daehyun Strobel, Christof Paar An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paolo Palmieri 0001, Olivier Pereira Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhenfei Zhang, Thomas Plantard, Willy Susilo Reaction Attack on Outsourced Computing with Fully Homomorphic Encryption Schemes. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Juliane Krämer, Dmitry Nedospasov, Jean-Pierre Seifert Weaknesses in Current RSA Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marko Wolf, Timo Gendrullis Design, Implementation, and Evaluation of a Vehicular Hardware Security Module. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Tomislav Nad, Martin Schläffer Cryptanalysis of Round-Reduced HAS-160. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Keita Emura, Atsuko Miyaji, Kazumasa Omote A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo Breaking a 3D-Based CAPTCHA Scheme. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 678 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license