The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52) 2019 (41) 2020 (37) 2021 (36) 2022 (26) 2023 (28)
Publication types (Num. hits)
inproceedings(904) proceedings(26)
Venues (Conferences, Journals, ...)
ACISP(930)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Stefan Brands, Liesje Demuynck, Bart De Decker A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Suvasini Panigrahi, Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Dempster-Shafer theory, fraud detection, Bayesian learning, Mobile communication networks
1Akihiro Yamamura, Takashi Kurokawa 0001, Junji Nakazato Threshold Anonymous Group Identification and Zero-Knowledge Proof. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF t-out-of-m Anonymous Group Identification, Non-singular Matrix, Zero-Knowledge Proof
1Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim 0001 Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Eagle-64, Eagle-128, Related-key Amplified Boomerang Attack, Block Ciphers, Data-Dependent Operations
1Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Preimage Attack on the Parallel FFT-Hashing Function. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF the Parallel FFT-Hashing function, Cryptographic Hash Function, Preimage Attack
1Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions
1Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann Analysis of the SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF UFN, cryptanalysis, block ciphers, algebraic structure
1Sylvain Pasini, Serge Vaudenay Hash-and-Sign with Weak Hashing Made Secure. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kan Yasuda "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function
1Erik Dahmen, Katsuyuki Okeya, Daniel Schepers Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF affine coordinates, elliptic curve cryptosystem, scalar multiplication, precomputation
1Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yin Yin, Bao Li 0001 Secure Cross-Realm C2C-PAKE Protocol. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu API Monitoring System for Defeating Worms and Exploits in MS-Windows System. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Worm Protection, API Hooking, System Security
1John W. Holford, William J. Caelli The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Isaac Agudo, Javier López 0001, José A. Montenegro Graphical Representation of Authorization Policies for Weighted Credentials. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård construction, MBCA, 3C, 3C+
1André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shanshan Duan, Zhenfu Cao Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Raphael Overbeck Statistical Decoding Revisited. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF general decoding, public key cryptography, coding theory, McEliece Cryptosystem, code based cryptography
1Eike Kiltz, David Galindo Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Jacob C. N. Schuldt Efficient Identity-Based Signatures Secure in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shidi Xu, Yi Mu 0001, Willy Susilo Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online/offline, Routing, MANET, signature, Multisignature
1Man Ho Au, Willy Susilo, Siu-Ming Yiu Event-Oriented k-Times Revocable-iff-Linked Group Signatures. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joo Yeon Cho, Josef Pieprzyk Distinguishing Attack on SOBER-128 with Linear Masking. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Linear masking, SOBER-128, Stream ciphers, Distinguishing attack, Modular addition
1An Braeken, Joseph Lano, Bart Preneel Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Feng Bao 0001 More on Stand-Alone and Setup-Free Verifiably Committed Signatures. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shaoquan Jiang Efficient Primitives from Exponentiation in Zp. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Yang Cui 0001, Hideki Imai, Kaoru Kurosawa Tag-KEM from Set Partial Domain One-Way Permutations. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ebaa Fayyoumi, B. John Oommen On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Blandine Debraize, Eric Garrido On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto A Novel Range Test. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF interval range, range test, specialized zero test, correctness, soundness
1Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong Algebraic Attacks on Clock-Controlled Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF irregular clocking, stream cipher, linear feedback shift register, algebraic attack, clock control
1Ryotaro Hayashi 0001, Keisuke Tanaka PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Feng Bao 0001 Oblivious Scalar-Product Protocols. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Oblivious scalar-product protocol, homomorphic commitment scheme, homomorphic public key encryption
1Leonie Ruth Simpson, Matthew Henricksen Improved Cryptanalysis of MAG. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery
1Anantharaman Lakshminarayanan, Tong-Lee Lim Augmented Certificate Revocation Lists. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks
1Anh-Quynh Nguyen, Yoshiyasu Takefuji Towards an Invisible Honeypot Monitoring System. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lynn Margaret Batten, Reihaneh Safavi-Naini (eds.) Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Tri Van Le, Breno de Medeiros Towards Provable Security for Ubiquitous Applications. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng Key Replacement Attack Against a Generic Construction of Certificateless Signature. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Matthew Henricksen, Ed Dawson Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4
1Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar Hiding Circuit Topology from Unbounded Reverse Engineers. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
1Jacques J. A. Fournier, Michael Tunstall Cache Based Power Analysis Attacks on AES. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Celia Li, Cungang Yang, Richard Cheung Key Management for Role Hierarchy in Distributed Systems. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Rohit Tripathy 0002 An Efficient Solution to the ARP Cache Poisoning Problem. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tim McComb, Luke Wildman SIFA: A Tool for Evaluation of High-Grade Security Devices. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, John Hynd An Improved Execution Integrity Solution for Mobile Agents. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Juan Manuel González Nieto (eds.) Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1William Millan New Cryptographic Applications of Boolean Function Equivalence Classes. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu Role Activation Management in Role Based Access Control. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Role Activation, Dynamic Separation of Duty, Role Based Access Control, Security Management
1Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001, In Seog Seo ID-based Authenticated Key Agreement for Low-Power Mobile Devices. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Russell Ang, Reihaneh Safavi-Naini, Luke McAven Cancelable Key-Based Fingerprint Templates. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Régis Bevan Improved Zero Value Attack on XTR. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MRPA, smart cards, Power Analysis, DFA, XTR
1Atsuko Miyaji, Yuuki Takano On the Success Probability of chi2-attack on RC6. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Steven D. Galbraith, Chris Heneghan, James F. McKee Tunable Balancing of RSA. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Guomin Yang, Duncan S. Wong, Xiaotie Deng Deposit-Case Attack Against Secure Roaming. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves
1Ratna Dutta, Rana Barua Dynamic Group Key Agreement in Tree-Based Setting. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ming Yao, Kun Peng, Ed Dawson Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Christophe Doche Redundant Trinomials for Finite Fields of Characteristic 2. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Shujing Wang 0001, Yan Zhang 0003 A Formalization of Distributed Authorization with Delegation. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Access control, knowledge representation, authorization, trust management, delegation, nonmonotonic reasoning, answer set programming
1Toru Nakanishi 0001, Fumiaki Kubooka, Naoto Hamada, Nobuo Funabiki Group Signature Schemes with Membership Revocation for Large Groups. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Chris J. Mitchell Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1C. K. Wong, Agnes Chan Immediate Data Authentication for Multicast in Resource Constrained Network. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Brian King An Efficient Implementation of a Threshold RSA Signature Scheme. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Phillip Pudney, Jill Slay An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Souradyuti Paul, Bart Preneel Solving Systems of Differential Equations of Addition. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Feng Bao 0001, Robert H. Deng Security Analysis and Fix of an Anonymous Credential System. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tomoyuki Asano, Kazuya Kamio A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hai Jin 0001, Weizhong Qiang, Xuanhua Shi, Deqing Zou VO-Sec: An Access Control Framework for Dynamic Virtual Organization. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kim-Kwang Raymond Choo, Yvonne Hitchcock Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tuomas Aura, Aarthi Nagarajan, Andrei V. Gurtov Analysis of the HIP Base Exchange Protocol. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jiqiang Lv, Yongfei Han Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bob Blakley 0001, G. R. Blakley All Sail, No Anchor III: Risk Aggregation and Time's Arrow. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Adrian McCullagh, William J. Caelli Who Goes There? Internet Banking: A Matter of Risk and Reward. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Scott Contini, Igor E. Shparlinski On Stern's Attack Against Secret Truncated Linear Congruential Generators. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Bo-Yin Yang, Jiun-Ming Chen Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Soonhak Kwon Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF supersingular elliptic curve, divisor, Tate pairing, automorphism, roots of unity
1Yvo Desmedt Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Toshiyuki Isshiki, Keisuke Tanaka An (n-t)-out-of-n Threshold Ring Signature Scheme. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jun Furukawa 0001, Hideki Imai An Efficient Group Signature Scheme from Bilinear Maps. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Arjen K. Lenstra, Benne de Weger On the Possibility of Constructing Meaningful Hash Collisions for Public Keys. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Alexander W. Dent Hybrid Signcryption Schemes with Insider Security. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xingyang Guo, Quan Zhang, Chaojing Tang On the Security of Two Key-Updating Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum Counting Abuses Using Flexible Off-line Credentials. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Yi Mu 0001 On the Security of Nominative Signatures. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow Two Improved Partially Blind Signature Schemes from Bilinear Pairings. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF threshold partially blind signature, identity-based partially blind signature, bilinear pairings
1Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague GBD Threshold Cryptography with an Application to RSA Key Recovery. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hannes Tschofenig, Andrei V. Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam Traversing Middleboxes with the Host Identity Protocol. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem
1Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.) Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum Symmetric Key Authentication Services Revisited. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 930 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license