The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Keys with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1975 (17) 1976-1978 (26) 1979-1980 (17) 1981-1982 (15) 1983-1984 (27) 1985 (23) 1986-1987 (32) 1988 (19) 1989 (41) 1990 (27) 1991 (18) 1992 (24) 1993 (32) 1994 (40) 1995 (29) 1996 (35) 1997 (53) 1998 (75) 1999 (94) 2000 (97) 2001 (128) 2002 (178) 2003 (221) 2004 (282) 2005 (363) 2006 (408) 2007 (433) 2008 (417) 2009 (339) 2010 (125) 2011 (75) 2012 (87) 2013 (75) 2014 (83) 2015 (94) 2016 (93) 2017 (94) 2018 (116) 2019 (92) 2020 (110) 2021 (104) 2022 (104) 2023 (136) 2024 (21)
Publication types (Num. hits)
article(1345) book(1) data(1) incollection(18) inproceedings(3540) phdthesis(11) proceedings(3)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(199) CoRR(146) CRYPTO(122) EUROCRYPT(103) ACISP(53) CCS(46) ASIACRYPT(40) Public Key Cryptography(39) CT-RSA(38) FSE(37) SIGMOD Conference(35) INDOCRYPT(33) KEYS(32) CHES(31) ACNS(30) RFC(30) More (+10 of total 1458)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3849 occurrences of 1722 keywords

Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Lucas Ballard, Seny Kamara, Fabian Monrose, Michael K. Reiter Towards practical biometric key generation with randomized biometric templates. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF biometrics, cryptographic keys
27Qi Dong 0001, Donggang Liu Using Auxiliary Sensors for Pairwise Key Establishment in WSN. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sensor networks, Key management, pairwise keys
27Wen-Shenq Juang A Simple and Efficient Conference Scheme for Mobile Communications. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys
27Matt Blaze, Joan Feigenbaum, Moni Naor A Formal Treatment of Remotely Keyed Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Remotely Keyed Encryption, Smart-cards, Block Ciphers, Pseudorandomness, Session Keys
27Lawrence C. Paulson Mechanized proofs for a recursive authentication protocol. Search on Bibsonomy CSFW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF mechanized proofs, recursive authentication protocol, inductive approach, message nesting, basic security theorem, adjacent pairs, honest agents, protocol complexity, agents, protocols, specification, symmetry, mutual authentication, Isabelle/HOL, session keys
27Lars R. Knudsen, Willi Meier Improved Differential Attacks on RC5. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys
27Jae-dong Lee, Kenneth E. Batcher A bitonic sorting network with simpler flip interconnections. Search on Bibsonomy ISPAN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF flip interconnections, bitonic sorting network, inter-level wiring, parity technique, Construct-BSMF, N/2 even-parity keys, interconnection scheme, perfect-shuffle interconnection, parallel algorithms, parallel architectures, multiprocessor interconnection networks, sorting
27Jean-Loup Baer, Yi-Bing Lin Improving Quicksort Performance with a Codewort Data Structure. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF codeword data structure, long, alphanumeric sequences, bytes, codeword generator, character count, first nonequal byte, quicksort algorithm, architecture-dependent parameters, in-line expansion, data structures, caches, sorting, compiler optimizations, register allocation, performance improvement, ordering, pointer, records, keys, swaps, write policies
27Tom Tedrick Fair Exchange of Secrets. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF Exchange of Secret Keys, Exchange of Secrets, Fractions of a Bit, Cryptographic Protocols, Oblivious Transfer, Contract Signing
26DongSheng Cai, S. Goto, T. Shinohara, Noriko Nagata, Jun Kurumisawa, Asako Fukumoto Synesthetic color scheme in Fantasia. Search on Bibsonomy SIGGRAPH Talks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Yongzhuang Wei, YuPu Hu New related-key rectangle attacks on reduced AES-192 and AES-256. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack
26Georg Gottlob, Stephanie Tien Lee, Gregory Valiant Size and treewidth bounds for conjunctive queries. Search on Bibsonomy PODS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF size bounds, database theory, conjunctive queries, treewidth
26Luis Carlos Coronado García, Carlos Hernández-López, Carlos Pérez Leguízamo Autonomous Decentralized Root Certification Authority System. Search on Bibsonomy ICDCS Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Brent Waters Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Youn Joo Lee, Kang Ryoung Park, Sung Joo Lee, Kwanghyuk Bae, Jaihie Kim A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Haina Zhang, Lin Li, Xiaoyun Wang 0001 Fast correlation attack on stream cipher ABC v3. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ABC v3, cryptanalysis, stream cipher, fast correlation attack
26Weiguo Sheng, Gareth Howells 0001, Michael C. Fairhurst, Farzin Deravi Template-Free Biometric-Key Generation by Means of Fuzzy Genetic Clustering. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Syed Taha Ali, Vijay Sivaraman, Ashay Dhamdhere, Diethelm Ostry A key loss recovery scheme for secure broadcasts in wireless sensor networks. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Ivan Damgård, Michael Østergaard Pedersen RFID Security: Tradeoffs between Security and Efficiency. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Ratna Dutta, Yongdong Wu, Sourav Mukhopadhyay Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Sajid Hussain, Firdous Kausar, Ashraf Masood An efficient key distribution scheme for heterogeneous sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, key distribution, heterogeneous sensor networks, random key pre-distribution
26Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based Encryption, Pairing
26Philip Zigoris, Hongxia Jin Bayesian Methods for Practical Traitor Tracing. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Gwan-Hwan Hwang, Yu-Hsuan Chang, Tao-Ku Chang An Operational Model and Language Support for Securing Web Services. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Seok-Lae Lee, Bo-Sung Hwang, Joo-Seok Song A Secure Communication Scheme for Mobile Wireless Sensor Networks Using Hamming Distance. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sensor Network, Public-Key Cryptography, Hamming Distance, Symmetric cryptography
26Sari Suomela, Jaana Kekäläinen User evaluation of ontology as query construction tool. Search on Bibsonomy Inf. Retr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ontologies, User evaluation, Interactive information retrieval
26Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bhargava Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES
26Konstantinos Chalkias, George Stephanides Timed Release Cryptography from Bilinear Pairings Using Hash Chains. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Timed-Release Cryptography, S/Key, bilinear pairings, hash chains, sealed-bid auctions
26Teng Lv, Ping Yan Mapping Relational Schemas to XML DTDs with Constraints. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Avishai Wool Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. Search on Bibsonomy Wirel. Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, authentication
26Donggang Liu, Peng Ning Improving key predistribution with deployment knowledge in static sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Sensor networks, key management, key predistribution
26Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy Key management in wireless ad hoc networks: collusion analysis and prevention. Search on Bibsonomy IPCCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Teng Lv, Ping Yan, Qiongxiang Huang Relational to XML Schema Conversion with Constraints. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen 0001, Yumin Wang t-Out-of-n String/Bit Oblivious Transfers Revisited. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Pan Wang, Peng Ning, Douglas S. Reeves Network Access Control for Mobile Ad-Hoc Networks. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Massimiliano Listo Design of Self-Healing Key Distribution Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF group communication, key distribution, self-healing
26Pan Wang, Peng Ning, Douglas S. Reeves Storage-Efficient Stateless Group Key Revocation. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Fabius Klemm, Anwitaman Datta, Karl Aberer A Query-Adaptive Partial Distributed Hash Table for Peer-to-Peer Systems. Search on Bibsonomy EDBT Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF partial distributed hash table (PDHT), query-adaptive indexing, metadata, peer-to-peer (P2P)
26Olivier Billet, Henri Gilbert A Traceable Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance
26Donggang Liu, Peng Ning Location-based pairwise key establishments for static sensor networks. Search on Bibsonomy SASN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sensor networks, key management, probabilistic key sharing
26Adrian von Bidder, Nathalie Weiler Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure Synchronisation Protocol, E-Mail Security, OpenPGP, Keyserver
26Scott Lystig Fritchie A study of Erlang ETS table implementations and performance. Search on Bibsonomy Erlang Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Judy array, in-memory database, Erlang, B-tree, hash table, AVL tree
26Dani Halevy, Adi Shamir The LSD Broadcast Encryption Scheme. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Pierangela Samarati, Michael K. Reiter, Sushil Jajodia An authorization model for a public key management service. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authorizations specification and enforcement, Access control, public key infrastructure
26Sandro Rafaeli, Laurent Mathy, David Hutchison 0001 EHBT: An Efficient Protocol for Group Key Management. Search on Bibsonomy Networked Group Communication The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Shin-Jae Lee, Minsoo Jeon, Andrew Sohn, Dongseung Kim Partitioned Parallel Radix Sort. Search on Bibsonomy ISHPC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Lars R. Knudsen, Willi Meier Correlations in RC6 with a Reduced Number of Rounds. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6
26David Chaum How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
25Miika Hannula, Jef Wijsen A Dichotomy in Consistent Query Answering for Primary Keys and Unary Foreign Keys. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Miika Hannula, Jef Wijsen A Dichotomy in Consistent Query Answering for Primary Keys and Unary Foreign Keys. Search on Bibsonomy PODS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Eugen Antal, Jakub Mírka Wrong Design of Cipher Keys: Analysis of Historical Cipher Keys From the Hessisches Staatsarchiv Marburg Used in the Thirty Years' War. Search on Bibsonomy HistoCrypt The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Manuel Atencia, Jérôme David, Jérôme Euzenat On the relation between keys and link keys for data interlinking. Search on Bibsonomy Semantic Web The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Renzo Angles, Angela Bonifati, Stefania Dumbrava, George Fletcher 0001, Keith W. Hare, Jan Hidders, Victor E. Lee, Bei Li, Leonid Libkin, Wim Martens, Filip Murlak, Josh Perryman, Ognjen Savkovic, Michael Schmidt, Juan F. Sequeda, Slawek Staworko, Dominik Tomaszuk PG-Keys: Keys for Property Graphs. Search on Bibsonomy SIGMOD Conference The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Heini Bergsson Debes, Thanassis Giannetsos Segregating Keys from noncense: Timely Exfil of Ephemeral Keys from Embedded Systems. Search on Bibsonomy DCOSS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
25Adam Janovsky, Matús Nemec, Petr Svenda, Peter Sekan, Vashek Matyas Biased RSA private keys: Origin attribution of GCD-factorable keys. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
25Arjit Arora, Kalpit Kothari, Priyanka Joshi, Bodhisatwa Mazumdar Revisiting Persistent Fault Analysis: Assessing Weak Keys and Strong Keys in GIFT-64 Lightweight Cipher. Search on Bibsonomy AsianHOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Adam Janovsky, Matús Nemec, Petr Svenda, Peter Sekan, Vashek Matyas Biased RSA Private Keys: Origin Attribution of GCD-Factorable Keys. Search on Bibsonomy ESORICS (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Panos Vassiliadis, Michail-Romanos Kolozoff, Maria Zerva, Apostolos V. Zarras Schema evolution and foreign keys: a study on usage, heartbeat of change and relationship of foreign keys to table activity. Search on Bibsonomy Computing The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Kwangsu Lee, Seunghwan Park Revocable hierarchical identity-based encryption with shorter private keys and update keys. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Kwangsu Lee, Seunghwan Park Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
25Olivier Marchal Locks and keys: How fast can you open several locks with too many keys? Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
25Jos Wetzels Broken keys to the kingdom: Security and privacy aspects of RFID-based car keys. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
25Manuel Atencia, Jérôme David, François Scharffe Keys and Pseudo-Keys Detection for Web Datasets Cleansing and Interlinking. Search on Bibsonomy EKAW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Tetsuaki Baba, Taketoshi Ushiama, Kiyoshi Tomimatsu Emerging keys: interactive electromagnetic levitation keys. Search on Bibsonomy SIGGRAPH Posters The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Ido Bregman Public keys and private keys in quantum cryptography (מפתחות פומביים ומפתחות פרטיים בקריפטוגרפיה קוונטית.). Search on Bibsonomy 2008   RDF
25Hilarie Orman, Paul E. Hoffman Determining Strengths For Public Keys Used For Exchanging Symmetric Keys. Search on Bibsonomy RFC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Qing Wang, Hongwei Wu, Jianchang Xiao, Aoying Zhou, Junmei Zhou Deriving Relation Keys from XML Keys. Search on Bibsonomy ADC The full citation details ... 2003 DBLP  BibTeX  RDF
25Diego Calvanese, Riccardo Rosati 0001 Anwering Recursive Queries under Keys and Foreign Keys is Undecidable. Search on Bibsonomy KRDB The full citation details ... 2003 DBLP  BibTeX  RDF
25Judy H. Moore, Gustavus J. Simmons Cycle Structure of the DES for Keys Having Palindromic (or Antipalindromic) Sequences of Round Keys. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
25Dorothy E. Denning Protecting Public Keys and Signature Keys. Search on Bibsonomy Computer The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
23Matthias Wilhelm 0001, Ivan Martinovic, Jens B. Schmitt Secret keys from entangled sensor motes: implementation and analysis. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wsns, key generation
23Rafael Misoczki, Paulo S. L. M. Barreto Compact McEliece Keys from Goppa Codes. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Benoît Libert, Damien Vergnaud Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficiency, traceability, Identity-based encryption
23Pierre Colomb, Lhouari Nourine About Keys of Formal Context and Conformal Hypergraph. Search on Bibsonomy ICFCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Keith Harrison, Shouhuai Xu Protecting Cryptographic Keys from Memory Disclosure Attacks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptographic key security, memory disclosure
23Youngwoo Yoon, Geehyuk Lee BetweenKeys: Looking for Room Between Keys. Search on Bibsonomy HCI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chord keyboard, key overlap, key stroke timing, Hangul / English toggling, keyboard
23Cécile Delerablée, Pascal Paillier, David Pointcheval Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar E-Passport: Cracking Basic Access Control Keys. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MRTD, Basic Access Control, Key Search Machine, COPACOBANA, DES, SHA-1, E-Passport
23Rami El Sawda, Ayman Alfalou, Habib Hamam RGB Colored Image Encryption Processes Using Several Colored Keys Images. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Yanchao Zhang, Wei Liu 0008, Wenjing Lou, Yuguang Fang Securing Mobile Ad Hoc Networks with Certificateless Public Keys. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Mobile ad hoc networks, key management, secret sharing, ID-based cryptography
23Wontae Hwang, Dongseung Kim Load Balanced Block Lanczos Algorithm over GF(2) for Factorization of Large Keys. Search on Bibsonomy HiPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF parallel/cluster computing, RSA key, load balancing, sparse matrix, cryptology
23Nuttapong Attrapadung, Jun Furukawa 0001, Hideki Imai Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Dan Boneh, Amit Sahai, Brent Waters Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Taisya Krivoruchko, James Diamond, Jeff Hooper Storing RSA Private Keys In Your Head. Search on Bibsonomy PRDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Christopher Wolf, Bart Preneel Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public Key Schemes, Multivariate Quadratic Equations
23Dan Boneh, Craig Gentry, Brent Waters Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Allan Beaufour, Philippe Bonnet Personal Servers as Digital Keys. Search on Bibsonomy PerCom The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Yevgeniy Dodis, Leonid Reyzin, Adam D. Smith Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Arnaud Dury Peer-to-Peer Computing in Distributed Hash Table Models Using a Consistent Hashing Extension for Access-Intensive Keys. Search on Bibsonomy AP2PC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Arnaud Dury Balancing Access To Highly Accessed Keys In Peer-to-Peer Systems. Search on Bibsonomy IEEE SCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Dalit Naor, Moni Naor Protecting Cryptographic Keys: The Trace-and-Revoke Approach. Search on Bibsonomy Computer The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Donggang Liu, Peng Ning Establishing pairwise keys in distributed sensor networks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sensor networks, key management, probabilistic key sharing
23Viet Phan Luong The Closed Keys Base of Frequent Itemsets. Search on Bibsonomy DaWaK The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
23Philip Bohannon, Peter McIlroy, Rajeev Rastogi Main-Memory Index Structures with Fixed-Size Partial Keys. Search on Bibsonomy SIGMOD Conference The full citation details ... 2001 DBLP  DOI  BibTeX  RDF T-tree, main-memory indices, cache coherence, B-trees, key compression
23Guillaume Poupard, Jacques Stern Fair Encryption of RSA Keys. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Roberto Grossi, Giuseppe F. Italiano Efficient Techniques for Maintaining Multidimensional Keys in Linked Data Structures. Search on Bibsonomy ICALP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Joan Daemen Management of Secret Keys: Dynamic Key Handling. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
23Pilar de la Torre, David T. Kao A Uniform Analysis of Trie Structures that Store Prefixing-Keys with Application to Doubly-Chained Prefixing-Tries. Search on Bibsonomy MFCS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
23Mike Burmester On the Risk of Opening Distributed Keys. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 4919 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license