The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Inscrypt"( http://dblp.L3S.de/Venues/Inscrypt )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cisc

Publication years (Num. hits)
2006 (24) 2007 (41) 2008 (32) 2009 (33) 2010 (35) 2011 (28) 2012 (24) 2013 (26) 2014 (30) 2015 (28) 2016 (33) 2017 (31) 2018 (38) 2019 (34) 2020 (33) 2021 (30) 2022 (26) 2023 (1)
Publication types (Num. hits)
inproceedings(510) proceedings(17)
Venues (Conferences, Journals, ...)
Inscrypt(527)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 197 occurrences of 155 keywords

Results
Found 527 publication records. Showing 527 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Liqun Chen 0002 A DAA Scheme Requiring Less TPM Resources. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xiaofeng Nie, Jiwu Jing, Yuewu Wang A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhigang Gao, Dengguo Feng An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Jian Weng 0001, Jianying Zhou 0001, Ying Qiu Optionally Identifiable Private Handshakes. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xuexian Hu, Wenfen Liu Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa, Bingsheng Zhang Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Deian Stefan Hardware Framework for the Rabbit Stream Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ping Li, Bing Sun 0001, Chao Li 0002 Integral Cryptanalysis of ARIA. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Arpita Patra, Ashish Choudhary, C. Pandu Rangan Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Feng Cheng 0002, Sebastian Roschke, Robert Schuppenies, Christoph Meinel Remodeling Vulnerability Information. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Takeo Mizuno, Hiroshi Doi Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mathieu Renauld, François-Xavier Standaert Algebraic Side-Channel Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, Shilpi Nayak, C. Pandu Rangan Breaking and Building of Threshold Signcryption Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fengjiao Wang, Yuqing Zhang Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Muhammad Reza Z'aba, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong Linearity within the SMS4 Block Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sean Policarpio, Yan Zhang 0003 A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson, Thomas Peyrin, Søren S. Thomsen, Meltem Sönmez Turan, Bart Preneel Cryptanalysis of the ESSENCE Family of Hash Functions. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shivank Agrawal, Swarun Kumar, Amjed Shareef, C. Pandu Rangan Sanitizable Signatures with Strong Transparency in the Standard Model. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Rui Zhang 0002, Hideki Imai Constructing Better KEMs with Partial Message Recovery. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0012, Wenling Wu, Liting Zhang Proposition of Two Cipher Structures. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Moti Yung, Peng Liu 0005, Dongdai Lin (eds.) Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Johann Großschädl Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wei Zhao, Dingfeng Ye Pairing-Based Nominative Signatures with Selective and Universal Convertibility. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu Differential Attack on Five Rounds of the SC2000 Block Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xianmeng Meng, Jingguo Bi Weak Keys in RSA with Primes Sharing Least Significant Bits. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean-Charles Faugère, Ludovic Perret Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Saba Jalal, Brian King An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Elie Bursztein, John C. Mitchell Using Strategy Objectives for Network Security Analysis. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ruming Yin, Jian Yuan, Qiuhua Yang, Xiuming Shan, Xiqin Wang Gemstone: A New Stream Cipher Using Coupled Map Lattice. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing. Search on Bibsonomy Inscrypt The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kun Peng, Feng Bao 0001 Batch ZK Proof and Verification of OR Logic. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Batch proof and verification, knowledge statements linked with OR logic
1Zonghua Zhang, Ruo Ando, Youki Kadobayashi Hardening Botnet by a Rational Botmaster. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, Network security, malware, botnet
1Peng Wang 0009, Dengguo Feng, Changlu Lin, Wenling Wu Security of Truncated MACs. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robust unforgeability, Message authentication code, Universal hash function, Unforgeability, Unpredictability
1Qianhong Wu, Bo Qin, Yi Mu 0001, Willy Susilo Privacy for Private Key in Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymous identity, Key indistinguishability, Key leakage, Pairing groups, Key privacy, Chosen message attack
1Mahabir Prasad Jhanwar, Rana Barua A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Quadratic Residuosity Assumption, Pairing Map, IND-ID-CPA, Identity Based Encryption
1Peng Liu 0005 Secure and Privacy-Preserving Information Brokering. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rui Zhang 0002, Hideki Imai Strong Anonymous Signatures. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymity, digital signatures
1Duo Liu, Zhiyong Tan, Yiqi Dai New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF identity-based signcryption, multi-PKG, Ad hoc networks, provable security, bilinear pairings
1Mooseop Kim, Jaecheol Ryou 0001, Sungik Jun Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Huaqun Wang, Hong Yu Cryptanalysis of Two Ring Signcryption Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography
1Bo-Chao Cheng, Huan Chen 0002, Guo-Tan Liao A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF DoS/DDoS, WSN, Traceback, PPM, Convergence time
1Ziyao Xu, Yeping He, Lingli Deng An Integrity Assurance Mechanism for Run-Time Programs. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Integrity Assurance, Virtual Trusted Platform Module, Trusted Computing, Virtual Machine Monitor
1Sushmita Ruj, Bimal K. Roy Key Predistribution Schemes Using Codes in Wireless Sensor Networks. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Scalability, Codes, Reed Solomon code
1Kun Peng, Feng Bao 0001 Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PBD shuffling, AAAP attack, optimisation, correction
1Wenying Zhang, Jing Han Impossible Differential Analysis of Reduced Round CLEFIA. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Block cipher, Data complexity, Impossible differential cryptanalysis, CLEFIA
1Debra L. Cook, Moti Yung, Angelos D. Keromytis Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (strong) pseudorandom permutations, variable-length PRPs, block ciphers
1Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu (eds.) Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Benoît Libert, Jean-Jacques Quisquater, Moti Yung Key Evolution Systems in Untrusted Update Environments. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Piyi Yang, Zhenfu Cao, Xiaolei Dong Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack
1Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu 0001 Publicly Verifiable Privacy-Preserving Group Decryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Group decryption, Anonymity, Bilinear pairing, Group-oriented cryptography
1Mengjun Li, Ti Zhou, Zhoujun Li 0001 SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF non-termination characterization and prediction, abstract and refinement, security protocol
1Tong-Lee Lim, Tieyan Li, Yingjiu Li A Security and Performance Evaluation of Hash-Based RFID Protocols. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID Security and Privacy, Authentication Protocols
1Qiang Tang 0001, Pieter H. Hartel, Willem Jonker Inter-domain Identity-Based Proxy Re-encryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Guang Zeng, Yang Yang, Wenbao Han, Shuqin Fan Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stickelberger-Swan Theorem, ??LFSR, Finite Field, Linear Feedback Shift Register(LFSR), Irreducible Polynomial
1Wei Zhao, Changlu Lin, Dingfeng Ye Provably Secure Convertible Nominative Signature Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Nominative signature, Digital signature, Selectively, Universally, Convertible
1Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Efficient Signcryption Key Encapsulation without Random Oracles. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hybrid signcryption, KEM, tag-KEM, standard model
1Ningbo Mu, Yupu Hu, Leyou Zhang On the Computational Efficiency of XTR+. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lingli Deng, Yeping He, Ziyao Xu Separation of Duty in Trust-Based Collaboration. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Collaboration, Statically Mutual Exclusive Roles, Role-Based Access Control, Separation of Duty
1Bart Preneel The State of Hash Functions and the NIST SHA-3 Competition. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 Further Observations on Certificateless Public Key Encryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Luk Bettale, Jean-Charles Faugère, Ludovic Perret Security Analysis of Multivariate Polynomials for Hashing. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shiwei Chen, Chenhui Jin An Improved Collision Attack on MD5 Algorithm. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Chuangui Ma, Rui Cheng Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hierarchical secret sharing, ad-hoc network, key management, verifiable secret sharing
1Christophe Tartary, Josef Pieprzyk, Huaxiong Wang Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme
1Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai Orthogonality between Key Privacy and Data Privacy, Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Daoshun Wang, Xiaobo Li 0001, Feng Yi Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Probabilistic schemes, Pixel expansion, Visual secret sharing
1Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filter functions, linearized polynomials, stream ciphers, linear feedback shift registers, linear complexity, Binary sequences
1Bin Zhao, Lanjun Dang, Weidong Kou, Jun Zhang 0010, Zan Li, Kai Fan 0001 A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, algebraic attacks, clock-control
1Shaoquan Jiang Deniable Authentication on the Internet. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Protocol, Key Exchange, Deniability
1Andrey Bogdanov Linear Slide Attacks on the KeeLoq Block Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks
1Adam L. Young, Moti Yung A Timing-Resistant Elliptic Curve Backdoor in RSA. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Twisted elliptic curves, RSA, subliminal channel, kleptography
1Jin-Song Wang, Wen-Feng Qi 0001 Linear Equation on Polynomial Single Cycle T-Functions. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF single cycle, pseudorandom generator, polynomial function
1Yi Deng 0002, Dongdai Lin Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Resettable Zero Knowledge, Concurrent Soundness, the Bare Public-Key Model, Resettably sound Zero Knowledge
1Marc Mouffron, Frederic Rousseau 0002, Huafei Zhu Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Squared Euclidean Distance, Stand-alone and simulation-based model, Secure two-party computation
1Weijia Wang, Lei Hu, Yong Li 0002 Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
1Feng Cheng 0002, Christian Wolter, Christoph Meinel A Simple, Smart and Extensible Framework for Network Security Measurement. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Longjiang Qu, Chao Li 0002 Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Weight Support, Algebraic Attack, Algebraic Immunity, Symmetric Boolean Function
1Fouz Sattar, Muid Mufti On Modeling Post Decryption Error Processes in UMTS Air Interface. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 3G Security, Wireless Confidentiality, UMTS Encryption, Markov Modeling, Error probability
1Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern Cryptanalysis of the SFLASH Signature Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF signature, differential cryptanalysis, multivariate cryptography, SFLASH
1Yang Xiang, Qiang Li 0008 Online Tracing Scanning Worm with Sliding Window. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Propagation path, Online tracing, Detection window, Worm
1Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent
1Jun-Wu Dong, Dingyi Pei, Xueli Wang A Key Predistribution Scheme Based on 3-Designs. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key predistribution schemes, 3-designs, Möbius planes, sensor networks, combinatorial designs
1Jin-Song Wang, Wen-Feng Qi 0001 Four Families of Binary Sequences with Low Correlation and Large Linear Complexity. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gold sequence family, Gold-like sequence family, low correlation
1Sujing Zhou, Dongdai Lin Unlinkable Randomizable Signature and Its Application in Group Signature. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Randomizable Signature, Sigma-protocol, Digital Signature, Group Signature
1Fuchun Guo, Yi Mu 0001, Zhide Chen, Li Xu 0002 Multi-Identity Single-Key Decryption without Random Oracles. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ID-based Systems, Encryption, Pairing
1Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Undeniable Signatures, Identity-based, Convertible
1Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis A Provably Secure One-Pass Two-Party Key Establishment Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation
1Chunxiang Gu, Yuefei Zhu An Efficient ID-Based Proxy Signature Scheme from Pairings. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bilinear pairings, proxy signatures, ID-based cryptography
1Jacek Cichon, Miroslaw Kutylowski Anonymity and k-Choice Identities. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymity set, two-choice paradigm, identifier, birthday paradox
1Raylin Tso, Takeshi Okamoto, Eiji Okamoto ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ECDL problem, GDH problem, signcryption, ECDSA
1Moti Yung On the Evolution of User Authentication: Non-bilateral Factors. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai Cryptanalysis of General Lu-Lee Type Systems. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Lu-Lee type systems, cryptanalysis, lattice reduction
1Ning Ding 0001, Dawu Gu A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Zhixiong Chen 0002, Ning Zhang, Guozhen Xiao Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic curves, discrete logarithm, discrepancy, linear complexity, pseudo-random sequences, character sums
1Chin-Chen Chang 0001, Yi-Fang Cheng, Iuon-Chang Lin Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Chunxiang Gu, Yuefei Zhu, Heng Pan Efficient Public Key Encryption with Keyword Search Schemes from Pairings. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF provable secure, keyword search, public key encryption, pairings
1Jintai Ding, Bo-Yin Yang Multivariates Polynomials for Hashing. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, multivariate polynomials, sparse
1Jing Zhan, Huanguo Zhang, Fei Yan Building Trusted Sub-domain for the Grid with Trusted Computing. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trusted Sub-Domain, Trusted Computing (TC), Trusted Attestation, Trusted Migration, Grid Security
Displaying result #401 - #500 of 527 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license