The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IWSEC"( http://dblp.L3S.de/Venues/IWSEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iwsec

Publication years (Num. hits)
2006 (31) 2007 (31) 2008 (20) 2009 (15) 2010 (25) 2011 (15) 2012 (17) 2013 (21) 2014 (22) 2015 (22) 2016 (20) 2017 (15) 2018 (21) 2019 (24) 2020 (17) 2021 (15) 2022-2023 (28)
Publication types (Num. hits)
inproceedings(341) proceedings(18)
Venues (Conferences, Journals, ...)
IWSEC(359)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 107 occurrences of 90 keywords

Results
Found 359 publication records. Showing 359 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Takato Hirano, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka Attacks to the Proxy Re-Encryption Schemes from IWSEC2011. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Takuma Ueda How to Factor N 1 and N 2 When $p_1=p_2 \bmod 2^t$. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Masaya Sato, Toshihiro Yamauchi Secure Log Transfer by Replacing a Library in a Virtual Machine. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rui Xu 0006, Kirill Morozov, Tsuyoshi Takagi On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary. Search on Bibsonomy IWSEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Itsuki Suzuki, Maki Yoshida, Toru Fujiwara Generic Construction of GUC Secure Commitment in the KRK Model. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takanori Isobe 0001, Toshihiro Ohigashi, Masakatu Morii Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jingjing Wang, Kefei Chen, Shixiong Zhu Annihilators of Fast Discrete Fourier Spectra Attacks. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang Efficient Secure Primitive for Privacy Preserving Distributed Computations. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan Compact Stateful Encryption Schemes with Ciphertext Verifiability. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chien-Ning Chen, Nisha Jacob, Sebastian Kutzner, San Ling, Axel Poschmann, Sirote Saetang Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Akinori Kawachi, Hirotoshi Takebe, Keisuke Tanaka Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Geong Sen Poh, Moesfa Soeheila Mohamad, Muhammad Reza Z'aba Structured Encryption for Conceptual Graphs. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Toshihiro Yamauchi (eds.) Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yiming Jing, Gail-Joon Ahn, Hongxin Hu Model-Based Conformance Testing for Android. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kenta Nekado, Yasuyuki Nogami, Kengo Iokibe Very Short Critical Path Implementation of AES with Direct Logic Gates. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Lei Wang 0031, Yasuhiro Takasaki, Kazuo Sakiyama, Kazuo Ohta Boomerang Distinguishers for Full HAS-160 Compression Function. Search on Bibsonomy IWSEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Masakatsu Nishigaki (eds.) Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonas Pfoh, Christian A. Schneider, Claudia Eckert 0001 Nitro: Hardware-Based System Call Tracing for Virtual Machines. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Minoru Kuribayashi A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yusuke Sakai 0001, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote Towards Restricting Plaintext Space in Public Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, Kazuo Ohta Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto Cryptographic Pairings Based on Elliptic Nets. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Identity-Based Deterministic Signature Scheme without Forking-Lemma. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Maryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Goutam Paul 0001, Subhamoy Maitra, Shashwat Raizada A Theoretical Analysis of the Structure of HC-128. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Georgios Portokalidis, Angelos D. Keromytis REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ryotaro Hayashi 0001, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lena Wiese Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thanh-Ha Le, Maël Berthier Mutual Information Analysis under the View of Higher-Order Statistics. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lasse Harjumaa, Ilkka Tervonen Introducing Mitigation Use Cases to Enhance the Scope of Test Cases. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Carlos Miguel Tavares Calafate, Javier Campos, Marga Nácher, Pietro Manzoni, Juan-Carlos Cano A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Margus Niitsoo Optimal Adversary Behavior for the Serial Model of Financial Attack Trees. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska Practical Universal Random Sampling. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yusuke Sakai 0001, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Minoru Kuribayashi Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi Efficient Implementation of Pairing on BREW Mobile Phones. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mansoor Alicherry, Angelos D. Keromytis Securing MANET Multicast Using DIPLOMA. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kimmo Halunen, Juha Röning Preimage Attacks against Variants of Very Smooth Hash. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tomonori Izumida, Kokichi Futatsugi, Akira Mori A Generic Binary Analysis Method for Malware. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jaideep Vaidya Automating Security Configuration and Administration: An Access Control Perspective. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Keita Emura, Goichiro Hanaoka, Yusuke Sakai 0001 Group Signature Implies PKE with Non-interactive Opening and Threshold PKE. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yu Sasaki Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yamin Liu, Bao Li 0001, Xianhui Lu, Yazhe Zhang PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rainer Böhme Security Metrics and Security Investment Models. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Santanu Sarkar 0001, Sourav Sen Gupta 0001 Publishing Upper Half of RSA Decryption Exponent. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Benjamin Justus, Daniel Loebenberger Differential Addition in Generalized Edwards Coordinates. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Fumiko Satoh, Naohiko Uramoto Validating Security Policy Conformance with WS-Security Requirements. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jun Yajima, Takeshi Shimoyama Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki (eds.) Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bart Preneel The Future of Cryptographic Algorithms. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 Universal Designated Verifier Signatures with Threshold-Signers. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yasumasa Nakai, Takahiro Matsuda 0002, Wataru Kitada, Kanta Matsuura A Generic Construction of Timed-Release Encryption with Pre-open Capability. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pre-open capability, public key encryption, identity-based encryption, timed-release encryption, generic construction
1Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki A Proposal of Efficient Remote Biometric Authentication Protocol. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF zero knowledge interactive proof, secret computing, authentication, biometrics
1Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu Strongly Secure Authenticated Key Exchange without NAXOS' Approach. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AKE, eCK model, NAXOS’ approach, trapdoor test
1S. Sharmila Deva Selvi, S. Sree Vivek, Rahul Srinivasan, Chandrasekaran Pandu Rangan An Efficient Identity-Based Signcryption Scheme for Multiple Receivers. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multiple Receivers, Provable Security, Signcryption, Identity-Based Cryptography
1Gautham Sekar, Bart Preneel Improved Distinguishing Attacks on HC-256. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Koji Nuida An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 2-secure code, digital rights management, error-tolerance, collusion-attack, Digital fingerprint
1Tsuyoshi Takagi, Masahiro Mambo (eds.) Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan Tamper-Tolerant Software: Modeling and Implementation. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
1Xun Yi, Raylin Tso, Eiji Okamoto ID-Based Group Password-Authenticated Key Exchange. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF protocol compiler, common reference model, group key agreement, Password-authenticated key exchange
1Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren Efficient Intrusion Detection Based on Static Analysis and Stack Walks. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kai-Yuen Cheong, Takeshi Koshiba Reducing Complexity Assumptions for Oblivious Transfer. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trapdoor one-way functions, oblivious transfer
1Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Bit-Free Collision: Application to APOP Attack. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit-free collision, APOP, hash function, MD5, MD4
1Maciej Grzeskowiak On Generating Elements of Orders Dividing p2k±pk+1. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF The Gong-Harn Public Key System, The XTR Public Key System, primes of a special form, solving polynomial equations modulo p
1Takuya Yoshida, Koji Okada Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan The Superdiversifier: Peephole Individualization for Software Protection. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Alfred Menezes The Elliptic Curve Discrete Logarithm Problem: State of the Art. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Biometric Data, Privacy, Group Signature
1Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis Online Network Forensics for Automatic Repair Validation. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software self-healing, automatic repair validation
1Naoki Ogura, Shigenori Uchiyama Remarks on the Attack of Fouque et al. against the lIC Scheme. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Koji Chida, Katsumi Takahashi Privacy Preserving Computations without Public Key Cryptographic Operation. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen Involuntary Information Leakage in Social Network Services. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo Return Value Predictability Profiles for Self-healing. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonamly detection, self-healing, behavior profiling
1Dong Chan An, So Mi Park, Seog Park Efficient Secure Labeling Method under Dynamic XML Data Streams. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Labeling Method, Dynamic XML, Access Control, Query Processing, Data streams
1Kanta Matsuura, Eiichiro Fujisaki (eds.) Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chik How Tan Signcryption Scheme in Multi-user Setting without Random Oracles. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF decisional bilinear Diffie-Hellman assumption, Signcryption
1Fuchun Guo, Yi Mu 0001, Zhide Chen Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF short signature, Batch verification
1Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han Detecting Java Theft Based on Static API Trace Birthmark. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Anongporn Salaiwarakul, Mark Ryan 0001 Analysis of a Biometric Authentication Protocol for Signature Creation Application. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan The Long-Short-Key Primitive and Its Applications to Key Security. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Cyril Bazin, Jean-Marie Le Bars, Jacques Madelaine A Novel Framework for Watermarking: The Data-Abstracted Approach. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Koji Chida, Osamu Shionoiri, Atsushi Kanai Secure Anonymous Communications with Practical Anonymity Revocation Scheme. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mohamed Layouni Accredited Symmetrically Private Information Retrieval. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Symmetrically private information retrieval, policy enforcement, anonymous credentials
1Pino Caballero-Gil, Cándido Caballero-Gil A Global Authentication Scheme for Mobile Ad-Hoc Networks. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MANETs, Authentication, Access Control
Displaying result #201 - #300 of 359 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license