The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISPEC"( http://dblp.L3S.de/Venues/ISPEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ispec

Publication years (Num. hits)
2005 (36) 2006 (36) 2007 (27) 2008 (30) 2009 (35) 2010 (29) 2011 (33) 2012 (28) 2013 (28) 2014 (42) 2015 (39) 2016 (26) 2017 (58) 2018 (40) 2019 (29) 2021 (25) 2022 (36) 2023 (324)
Publication types (Num. hits)
inproceedings(882) proceedings(19)
Venues (Conferences, Journals, ...)
iSPEC(901)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 123 occurrences of 109 keywords

Results
Found 901 publication records. Showing 901 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki Evaluation of Software PUF Based on Gyroscope. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Emanuele Petagna, Giuseppe Laurenza, Claudio Ciccotelli, Leonardo Querzoni Peel the Onion: Recognition of Android Apps Behind the Tor Network. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Peter T. Nkomo, Marijke Coetzee Development Activities, Tools and Techniques of Secure Microservices Compositions. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sha Ma, Qiong Huang 0001 Plaintext-Checkable Encryption with Unlink-CCA Security in the Standard Model. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chao Liu 0060, Zhongxiang Zheng, Keting Jia, Qidi You Provably Secure Three-Party Password-Based Authenticated Key Exchange from RLWE. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nasim Maleki, Ali A. Ghorbani 0001 Generating Phishing Emails Using Graph Database. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu 0008, Reza Azarderakhsh Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kamalkumar R. Macwan, Sankita J. Patel Privacy Preserving Approach in Dynamic Social Network Data Publishing. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin Improving Signature Schemes with Tight Security Reductions. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wai-Kong Lee, Sedat Akleylek, Wun-She Yap, Bok-Min Goi Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sherif Saad, Farhan Mahmood, William Briguglio, Haytham Elmiligi JSLess: A Tale of a Fileless Javascript Memory-Resident Malware. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Raounak Benabidallah, Salah Sadou, Brendan Le Trionnaire, Isabelle Borne Designing a Code Vulnerability Meta-scanner. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Andrew Rae, Asma Patel Defining a New Composite Cybersecurity Rating Scheme for SMEs in the U.K. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu, Zhigang Zhao, Huaqun Guo White-Box Implementation of the KMAC Message Authentication Code. Search on Bibsonomy ISPEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Weizhi Meng 0001, Zhe Liu 0001 TMGMap: Designing Touch Movement-Based Geographical Password Authentication on Smartphones. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fucai Luo, Kunpeng Wang, Changlu Lin Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhe Xia, Bo Yang 0003, Mingwu Zhang, Yi Mu 0001 An Efficient and Provably Secure Private Polynomial Evaluation Scheme. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hao Ren, Peng Zhang 0029, Qingchun Shentu, Joseph K. Liu, Tsz Hon Yuen Compact Ring Signature in the Standard Model for Blockchain. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Max Landauer, Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, Peter Filzmoser Time Series Analysis: Unsupervised Anomaly Detection Beyond Outlier Detection. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mingmei Zheng, Shao-Jun Yang, Wei Wu 0001, Jun Shao 0001, Xinyi Huang 0001 A New Design of Online/Offline Signatures Based on Lattice. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jimmy Tekli, Bechara al Bouna, Youssef Bou Issa, Marc Kamradt, Ramzi A. Haraty (k, l)-Clustering for Transactional Data Streams Anonymization. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Venkata Udaya Sameer, Ruchira Naskar Universal Wavelet Relative Distortion: A New Counter-Forensic Attack on Photo Response Non-Uniformity Based Source Camera Identification. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yangguang Tian, Yingjiu Li, Yinghui Zhang 0002, Nan Li 0007, Guomin Yang, Yong Yu 0002 DSH: Deniable Secret Handshake Framework. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pratish Datta Constrained (Verifiable) Pseudorandom Function from Functional Encryption. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wenjuan Li 0001, Weizhi Meng 0001, Yu Wang 0017, Jinguang Han, Jin Li 0002 Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan A Generic Framework for Accountable Optimistic Fair Exchange Protocol. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhaohui Cheng, Liqun Chen 0002 Certificateless Public Key Signature Schemes from Standard Algorithms. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiroya Miura, Mamoru Mimura, Hidema Tanaka Macros Finder: Do You Remember LOVELETTER? Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wayne Chiu, Kuo-Hui Yeh, Akihito Nakamura Seeing Is Believing: Authenticating Users with What They See and Remember. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Maharage Nisansala Sevwandi Perera, Takeshi Koshiba Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Binanda Sengupta, Sushmita Ruj Keyword-Based Delegable Proofs of Storage. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alban Gabillon, Emmanuel Bruno Regulating IoT Messages. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Junji Shikata Non-adaptive Group-Testing Aggregate MAC Scheme. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bo-Yeon Sim, Kyu Young Choi, Dukjae Moon, Hyo Jin Yoon, Jihoon Cho, Dong-Guk Han T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jing Xu, Yuqiang Zhang, Fei Xu, Lei Zhou, Shuanglin Jiang A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sabyasachi Dutta, Nishant Nikam, Sushmita Ruj Secure Computation of Inner Product of Vectors with Distributed Entries and Its Applications to SVM. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Huige Wang, Kefei Chen, Joseph K. Liu, Ziyuan Hu Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chunhua Su, Hiroaki Kikuchi (eds.) Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Zong, Yang-Wai Chow, Willy Susilo A Two-Stage Classifier Approach for Network Intrusion Detection. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Weiwei Liu 0005, Yinghui Zhang 0002, Yi Mu 0001, Guomin Yang, Yangguang Tian Efficient Traceable Oblivious Transfer and Its Applications. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Takato Hirano, Yutaka Kawai, Yoshihiro Koseki Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bagus Santoso, Taiyo Yamaguchi, Tomoyuki Ohkubo Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuntao Wang 0002, Thomas Wunderer Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jingjing Guo, Jianfeng Wang, Zhiwei Zhang, Xiaofeng Chen 0001 An Almost Non-interactive Order Preserving Encryption Scheme. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Karin Sumongkayothin M-ORAM Revisited: Security and Construction Updates. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sergiu Carpov, Oana Stan Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhiwei Yuan, Yang Li 0001, Kazuo Sakiyama, Takeshi Sugawara 0001, Jian Wang 0038 Recovering Memory Access Sequence with Differential Flush+Reload Attack. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Partha Sarathi Roy 0001, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Yin 0004, Qiaoyan Wen, Wenmin Li 0001, Hua Zhang 0001, Zhengping Jin A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Entao Luo, Guojun Wang 0001, Kun Tang, Quanyou Zhao, Chen He, Liyong Guo Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuichi Komano, Zhengfan Xia, Takeshi Kawabata, Hideo Shimizu Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yi-Ning Liu 0002, Yan-Ping Wang, Xiao-Fen Wang, Zhe Xia, Jingfang Xu Privacy-Preserving Data Collection for Mobile Phone Sensing Tasks. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tatsuya Suzuki 0002, Keita Emura, Toshihiro Ohigashi A Generic Construction of Integrated Secure-Channel Free PEKS and PKE. Search on Bibsonomy ISPEC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng 0001, Robert H. Deng IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Song Luo, Lu Yan, Jian Weng 0001, Zheng Yang 0001 New Proof for BKP IBE Scheme and Improvement in the MIMC Setting. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ye Li, Zoe Lin Jiang, Xuan Wang 0002, Siu-Ming Yiu, Jun-bin Fang Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shuangyu He, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Yanan Li 0007 Secure Communications in Unmanned Aerial Vehicle Network. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Toshiya Shimizu, Takeshi Shimoyama Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jinwoo Kim, Kuyju Kim, Junsung Cho, Hyoungshick Kim, Sebastian Schrittwieser Hello, Facebook! Here Is the Stalkers' Paradise!: Design and Analysis of Enumeration Attack Using Phone Numbers on Facebook. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lu Ren, Rui Chang, Qing Yin, Wei Wang Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Leixiao Cheng, Quanshui Wu, Yunlei Zhao Compact Lossy and All-but-One Trapdoor Functions from Lattice. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Haomiao Yang, Yunfan Huang, Yong Yu 0002, Mingxuan Yao, Xiaosong Zhang 0001 Privacy-Preserving Extraction of HOG Features Based on Integer Vector Homomorphic Encryption. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Kan Yasuda Optimizing Online Permutation-Based AE Schemes for Lightweight Applications. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kai He, Xueqiao Liu, Huaqiang Yuan, Wenhong Wei, Kaitai Liang Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xinwei Gao, Lin Li 0041, Jintai Ding, Jiqiang Liu, R. V. Saraswathy, Zhe Liu 0001 Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ting Chen 0002, Xiaoqi Li 0001, Ying Wang, Jiachi Chen, Zihao Li 0001, Xiapu Luo, Man Ho Au, Xiaosong Zhang 0001 An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cheng-Jun Lin, Xinyi Huang 0001, Shitang Li, Wei Wu 0001, Shao-Jun Yang Linearly Homomorphic Signatures with Designated Entities. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tingmin Wu, Derek Wang, Sheng Wen, Yang Xiang 0001 How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hooman Alavizadeh, Hootan Alavizadeh, Kudakwashe Dube, Dong Seong Kim 0001, Julian Jang-Jaccard, Hans W. Guesgen A Secure Server-Based Pseudorandom Number Generator Protocol for Mobile Devices. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yanling Li, Junzuo Lai, Chuansheng Wang, Jianghe Zhang, Jie Xiong Verifiable Range Query Processing for Cloud Computing. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang-Sen Chen, You-Chi Wang, Wen-Yu Kao Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pratish Datta Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jinyong Chang, Honglong Dai, Maozhi Xu The KDM-CCA Security of REACT. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bei Liang, Aikaterini Mitrokotsa Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yanan Li 0007, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang 0008, Meixia Miao Outsourcing Encrypted Excel Files. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Orhio Mark Creado, Phu Dung Le Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yong Tang 0005, Yi Wang 0036, Shuning Wei, Bo Yu 0008, Qiang Yang Matching Function-Call Graph of Binary Codes and Its Applications (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Aaron Hunter 0001 Reasoning About Trust and Belief Change on a Social Network: A Formal Approach. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xuan Shen, Ruilin Li, Bing Sun 0001, Lei Cheng, Chao Li 0002, Maodong Liao Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xinxin Ma, Jun Shao 0001, Cong Zuo, Ru Meng Efficient Certificate-Based Signature and Its Aggregation. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Pierangela Samarati (eds.) Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhi Wang 0014, Meiqi Tian, Junnan Wang, Chunfu Jia An Ensemble Learning System to Mitigate Malware Concept Drift Attacks (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaoqiang Sun, Peng Zhang 0029, Jianping Yu, Weixin Xie An Improved Leveled Fully Homomorphic Encryption Scheme over the Integers. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xu Yang 0002, Xun Yi, Hui Cui 0001, Xuechao Yang, Surya Nepal, Xinyi Huang 0001, YaLi Zeng A Practical Authentication Protocol for Anonymous Web Browsing. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sepehr Minagar, Balasubramaniam Srinivasan 0002, Phu Dung Le A Formal Model for an Ideal CFI. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo, Joonsang Baek Covert QR Codes: How to Hide in the Crowd. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jia Xu 0006, Ee-Chien Chang, Jianying Zhou 0001 A New Functional Encryption for Multidimensional Range Query (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Honglong Dai, Jinyong Chang, Zhenduo Hou, Maozhi Xu The ECCA Security of Hybrid Encryptions. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Trung Dinh, Ron Steinfeld, Nandita Bhattacharjee A Lattice-Based Approach to Privacy-Preserving Biometric Authentication Without Relying on Trusted Third Parties. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Veronika Kuchta, Gaurav Sharma 0006, Rajeev Anand Sahu, Olivier Markowitch Generic Framework for Attribute-Based Group Signature. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wentao Zhang, Qianhong Wu, Bo Qin, Tianxu Han, Yanting Zhang 0002, Xiaofeng Chen 0001, Na Li TTP-free Fair Exchange of Digital Signatures with Bitcoin. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jian Shen 0001, Meng Feng, Dengzhi Liu, Chen Wang 0015, Jiachen Jiang, Xingming Sun Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bo Liu 0001, Wanlei Zhou 0001, Shui Yu 0001, Kun Wang 0005, Yu Wang 0017, Yong Xiang 0001, Jin Li 0002 Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki A Secure and Practical Signature Scheme for Blockchain Based on Biometrics. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jia Wan, Mohammad Zulkernine, Phil Eisen, Clifford Liem Defending Application Cache Integrity of Android Runtime. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 901 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license