|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 336 occurrences of 251 keywords
|
|
|
Results
Found 649 publication records. Showing 649 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Baudoin Collard, François-Xavier Standaert |
Multi-trail Statistical Saturation Attacks. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing |
How to Construct Interval Encryption from Binary Tree Encryption. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Julien Bringer, Hervé Chabanne, Thomas Icart |
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang 0003 |
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen |
Efficient Implementation of the Orlandi Protocol. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Veyrat-Charvillon, François-Xavier Standaert |
Adaptive Chosen-Message Side-Channel Attacks. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann |
On RFID Privacy with Mutual Authentication and Tag Corruption. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Markus Rückert, Michael Schneider 0002, Dominique Schröder |
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wei Xu, Sencun Zhu, Heng Xu |
COP: A Step toward Children Online Privacy. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yuechuan Wei, Ping Li, Bing Sun 0001, Chao Li 0002 |
Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Atefeh Mashatan, Serge Vaudenay |
A Message Recognition Protocol Based on Standard Assumptions. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Moti Yung (eds.) |
Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Laurie Genelle, Emmanuel Prouff, Michaël Quisquater |
Secure Multiplicative Masking of Power Functions. |
ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo |
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
algorithmic tamper proof (ATP), counter unit, PIN authentication |
1 | Michael Hutter, Marcel Medwed, Daniel M. Hein, Johannes Wolkerstorfer |
Attacking ECDSA-Enabled RFID Devices. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Implementation Security, Radio-Frequency Identification, RFID, Elliptic Curve Cryptography, Side-Channel Analysis, ECDSA |
1 | Patrick Longa, Catherine H. Gebotys |
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
multiple scalar multiplication, precomputation scheme, conjugate addition, Elliptic curve cryptosystem, scalar multiplication |
1 | Shweta Agrawal, Dan Boneh |
Homomorphic MACs: MAC-Based Integrity for Network Coding. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Christian Cachin, Martin Geisler 0001 |
Integrity Protection for Revision Control. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Hash trees, memory checking, fork linearizability, storage security, applied cryptography |
1 | Jörg Lenhard, Karsten Loesing, Guido Wirtz |
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nuttapong Attrapadung, Hideki Imai |
Dual-Policy Attribute Based Encryption. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Key policy, Attribute-based encryption, Ciphertext policy |
1 | Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianying Zhou 0001 |
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jean Monnerat, Sylvain Pasini, Serge Vaudenay |
Efficient Deniable Authentication for Signatures. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Seiko Arita, Koji Tsurudome |
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption |
1 | Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howgrave-Graham, William Whyte |
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yvonne Cliff, Colin Boyd, Juan Manuel González Nieto |
How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
randomness expansion, pseudorandom function (PRF), leftover hash lemma (LHL), key agreement, universal hash function, randomness extraction, key exchange protocols |
1 | Thomas Plantard, Willy Susilo |
Broadcast Attacks against Lattice-Based Cryptosystems. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Broadcast attack, lattice-based cryptosystem, knapsack cryptosystem, intersecting lattice |
1 | Annika Paus, Ahmad-Reza Sadeghi, Thomas Schneider 0003 |
Practical Secure Evaluation of Semi-private Functions. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
SFE of semi-private functions, Yao’s protocol, optimization, privacy, compiler, topology |
1 | Nitesh Saxena, Md. Borhan Uddin |
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Evil Twin Attacks, Security, Usability, Authentication, Wireless Communication, Device Pairing |
1 | Martin Eian |
Fragility of the Robust Security Network: 802.11 Denial of Service. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
802.11w, Security, Wireless, Denial of Service, 802.11, 802.11i |
1 | Florian Mendel, Tomislav Nad, Martin Schläffer |
Collision Attack on Boole. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lei Liu 0021, Songqing Chen |
Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud (eds.) |
Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Cas J. F. Cremers |
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Session- state reveal, Ephemeral Key reveal, Provably-secure, Authenticated Key Exchange |
1 | Joseph K. Liu, Jianying Zhou 0001 |
An Efficient Identity-Based Online/Offline Encryption Scheme. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Serdar Pehlivanoglu |
Tracing and Revoking Pirate Rebroadcasts. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ayman Jarrous, Benny Pinkas |
Secure Hamming Distance Based Computation and Its Applications. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
1 | Eric Brier, Thomas Peyrin |
Cryptanalysis of CubeHash. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
CubeHash, hash functions, collision |
1 | Mark Manulis |
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Christian Rechberger, Martin Schläffer |
Cryptanalysis of Twister. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Twister, hash function, collision-, preimage attack, SHA-3, second-preimage- |
1 | MoonShik Lee, Daegun Ma, MinJae Seo |
Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
public-key traitor tracing, black-box tracing, self-defensive pirates, linear attack, cryptanalysis |
1 | Alok Tongaonkar, R. Sekar 0001, Sreenaath Vasudevan |
Fast Packet Classification Using Condition Factorization. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Prouff, Matthieu Rivain |
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | François-Xavier Standaert, François Koeune, Werner Schindler |
How to Compare Profiled Side-Channel Attacks?. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson |
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Self-Recoverability, Ad Hoc Networks, Authentication, Recognition, Cryptographic Protocols, Pervasive Networks |
1 | Dana Dachman-Soled, Tal Malkin, Mariana Raykova 0001, Moti Yung |
Efficient Robust Private Set Intersection. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Cryptographic Protocols, Privacy Preserving Data Mining, Secure Two-party Computation, Set Intersection |
1 | Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong |
Generic Security-Amplifying Methods of Ordinary Digital Signatures. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability |
1 | Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang |
Traceable and Retrievable Identity-Based Encryption. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
PKG, Trust, Retrievability, Traceability, Identity-based Encryption |
1 | Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger |
Replay Attack in a Fair Exchange Protocol. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Aline Gouget |
Anonymity in Transferable E-cash. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Nikita Borisov, Soumyadeb Mitra |
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Ouafi, Raphael C.-W. Phan |
Traceable Privacy of Recent Provably-Secure RFID Protocols. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Authentication protocols, Untraceability |
1 | Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer |
On the Security of the CCM Encryption Mode and of a Slight Variant. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
CCM, CBC-MAC, Counter mode |
1 | Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis |
Pushback for Overlay Networks: Protecting Against Malicious Insiders. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David Canright, Lejla Batina |
A Very Compact "Perfectly Masked" S-Box for AES. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
composite Galois field, AES, DPA, S-box, masking |
1 | Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng |
New Differential-Algebraic Attacks and Reparametrization of Rainbow. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
oil-and-vinegar, rank, algebraic attack, differential attack |
1 | David Pointcheval, Sébastien Zimmer |
Multi-factor Authenticated Key Exchange. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Sébastien Canard, Fabien Laguillaumie, Michel Milhau |
TrapdoorSanitizable Signatures and Their Application to Content Protection. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen |
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos |
Peeking Through the Cloud: DNS-Based Estimation and Its Applications. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Client Density Estimation, Web-metering, Network Security, Botnets |
1 | Ghaith Hammouri, Berk Sunar |
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
HB+, tamper resilience, provable security, PUF |
1 | Joonsang Baek, Jianying Zhou 0001, Feng Bao 0001 |
Generic Constructions of Stateful Public Key Encryption and Their Applications. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Attacking Reduced Round SHA-256. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung (eds.) |
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Patrick P. Tsang, Sean W. Smith |
PPAA: Peer-to-Peer Anonymous Authentication. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
privacy, VANets, reputation systems, credentials, anonymous authentication, secret handshakes |
1 | Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen |
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Liang Xie 0002, Hui Song, Sencun Zhu |
On the Effectiveness of Internal Patching Against File-Sharing Worms. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Shpilrain, Alexander Ushakov |
An Authentication Scheme Based on the Twisted Conjugacy Problem. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Marina Blanton |
Improved Conditional E-Payments. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yevgeniy Dodis, Prashant Puniya |
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Mike Burmester, Breno de Medeiros |
The Security of EPC Gen2 Compliant RFID Protocols. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
EPCGen2 compliance, security, anonymity, unlinkability, forward secrecy |
1 | John C. Mitchell, Arnab Roy 0001, Paul D. Rowe, Andre Scedrov |
Analysis of EAP-GPSK Authentication Protocol. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ramnath Prasad, Nitesh Saxena |
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Brian King |
wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Frank Stajano, Daniel Cvrcek, Matt Lewis |
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta |
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
Recipient Anonymity, Access Control on Encrypted Data, Attribute-Based Encryption, Ciphertext Policy |
1 | Marek Klonowski, Miroslaw Kutylowski, Anna Lauks |
Repelling Detour Attack Against Onions with Re-encryption. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ronghua Li, Chuankun Wu |
An Unconditionally Secure Protocol for Multi-Party Set Intersection. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
privacy-preserving set ntersection, Secure multi-party computation, unconditional security |
1 | Diana von Bidder, David A. Basin, Germano Caronni |
Midpoints Versus Endpoints: From Protocols to Firewalls. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Zhengqin Luo, Xiaojuan Cai, Jun Pang 0001, Yuxin Deng |
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Keith B. Frikken |
Privacy-Preserving Set Union. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner |
Cryptanalysis of the TRMC-4 Public Key Cryptosystem. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
TRMC, linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
1 | Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim 0001, Tsuyoshi Takagi |
Compressed XTR. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
On-line/off-line signatures, Key exposure, Chameleon hashing |
1 | Qiong Huang 0001, Duncan S. Wong, Yiming Zhao |
Generic Transformation to Strongly Unforgeable Signatures. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Tamassia, Nikos Triandopoulos |
Efficient Content Authentication in Peer-to-Peer Networks. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen |
Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
the Wiener attack, most significant bit, RSA, exhaustive-searching, continued fraction |
1 | Philip Zigoris, Hongxia Jin |
Bayesian Methods for Practical Traitor Tracing. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Chunxiang Gu, Yuefei Zhu, Yonghui Zheng |
Certified E-Mail Protocol in the ID-Based Setting. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
certified e-mail protocols, bilinear pairings, ID-based cryptography, verifiably encrypted signatures |
1 | Jonathan Katz, Moti Yung (eds.) |
Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park |
Sliding Window Method for NTRU. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won |
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
nonce-chained authentication, scalability, Cryptography, provable security, binary tree, group key exchange |
1 | Stanislaw Jarecki, Xiaomin Liu |
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Green 0001, Giuseppe Ateniese |
Identity-Based Proxy Re-encryption. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
identity-based encryption, bilinear maps, proxy re-encryption |
1 | Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Efficient Certificateless Signature Schemes. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Bahador Bakhshi, Babak Sadeghiyan |
A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Blakley’s algorithm, modular multiplication, timing attack, DSA |
1 | Sven Laur, Helger Lipmaa |
A New Protocol for Conditional Disclosure of Secrets and Its Applications. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption |
1 | Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay |
Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
session key distribution, sensor network, computational security, self-healing, revocation |
1 | Patrick Schaller, Srdjan Capkun, David A. Basin |
BAP: Broadcast Authentication Using Cryptographic Puzzles. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 |
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 649 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|