|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 93 occurrences of 83 keywords
|
|
|
Results
Found 335 publication records. Showing 335 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ari Juels |
Minimalist Cryptography for Low-Cost RFID Tags. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 149-164, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Gonzalo R. Arce, Renwei Ge |
Threshold Cryptography for Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 91-104, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel |
Non-randomness of the Full 4 and 5-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 324-336, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Siamak Fayyaz Shahandashti, Mahmoud Salmasizadeh, Javad Mohajeri |
A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 60-76, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Libert, Jean-Jacques Quisquater |
Improved Signcryption from q-Diffie-Hellman Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 220-234, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
provable security, bilinear maps, signcryption |
1 | Ventzislav Nikov, Svetla Nikova, Bart Preneel |
On the Size of Monotone Span Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 249-262, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Joseph H. Silverman, Nigel P. Smart, Frederik Vercauteren |
An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 278-293, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Duong Hieu Phan, David Pointcheval |
On the Security Notions for Public-Key Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 33-46, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Stelvio Cimato, Clemente Galdi, Giuseppe Persiano (eds.) |
Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![Springer, 3-540-00420-3 The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Gene Itkis |
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 102-118, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ali Aydin Selçuk, Ali Biçak |
On Probability of Success in Linear and Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 174-185, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Leonid Reyzin |
On the Power of Claw-Free Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 55-73, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Paulo S. L. M. Barreto, Ben Lynn, Michael Scott |
Constructing Elliptic Curves with Prescribed Embedding Degrees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 257-267, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Luigi Catuogno, Ivan Visconti |
A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 219-233, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Yuri L. Borissov, Svetla Nikova, Bart Preneel, Joos Vandewalle |
On a Resynchronization Weakness in a Class of Combiners with Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 164-173, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Louis Granboulan |
How to Repair ESIGN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 234-240, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu 0004 |
Reduction Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 303-317, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
zap, zero-knowledge, bit commitment, non-interactive zero-knowledge, witness indistinguishability |
1 | Ueli M. Maurer |
Secure Multi-party Computation Made Simple. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 14-28, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing |
1 | Jan Camenisch, Anna Lysyanskaya |
A Signature Scheme with Efficient Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 268-289, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | B. Prabhu, K. Srinathan, C. Pandu Rangan |
Trading Players for Efficiency in Unconditional Multiparty Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 342-353, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
generalized adversaries, secure multiparty computation |
1 | Nenad Dedic, Leonid Reyzin, Salil P. Vadhan |
An Improved Pseudorandom Generator Based on Hardness of Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 88-101, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Yongge Wang |
Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 290-302, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
complexity, graph theory, secret sharing, Zero-knowledge, key-escrow |
1 | Giovanni Di Crescenzo |
Equivocable and Extractable Commitment Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 74-87, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jaume Martí-Farré, Carles Padró |
Secret Sharing Schemes on Access Structures with Intersection Number Equal to One. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 354-363, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
ideal schemes, Cryptography, secret sharing schemes, information rate |
1 | Hitoshi Yanami, Takeshi Shimoyama |
Differential Cryptanalysis of a Reduced-Round SEED. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 186-198, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
symmetric block cipher, probability, differential attack, characteristic, SEED |
1 | Jonathan Katz, Rafail Ostrovsky, Moti Yung |
Forward Secrecy in Password-Only Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 29-44, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Eyal Kushilevitz |
Some Applications of Polynomials for the Design of Cryptographic Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 1-13, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Shirley H. C. Cheung, Xiaotie Deng, Chan H. Lee, Yunlei Zhao |
A New Notion of Soundness in Bare Public-Key Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 318-325, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Anton Kozlov, Leonid Reyzin |
Forward-Secure Signatures with Fast Key Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 241-256, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Di Crescenzo, Olga Kornievskaia |
Efficient Re-keying Protocols for Multicast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 119-132, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang |
A Group Key Distribution Scheme with Decentralised User Join. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 146-163, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Key distribution schemes, group key distribution schemes, user join, traceability, secure multicast, user revocation |
1 | Gene Tsudik |
Weak Forward Security in Mediated RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 45-54, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Frank Niedermeyer, Werner Schindler |
On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 133-145, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
unconditional security, Key agreement protocol, CHIMERA |
1 | Amos Beimel, Yoav Stahl |
Robust Information-Theoretic Private Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 326-341, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis |
Medical Information Privacy Assurance: Cryptographic and System Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 199-218, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #335 of 335 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4] |
|