|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3849 occurrences of 1722 keywords
|
|
|
Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Nadia Heninger, Hovav Shacham |
Reconstructing RSA Private Keys from Random Key Bits. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage |
When private keys are public: results from the 2008 Debian OpenSSL vulnerability. |
Internet Measurement Conference |
2009 |
DBLP DOI BibTeX RDF |
debian, openssl, entropy, survey, attacks, prng |
18 | Dimitar Jetchev, Ramarathnam Venkatesan |
Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Colin D. Walter |
Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Hidden Markov Models, simple power analysis, SPA, Viterbi Algorithm, Forward-Backward Algorithm, Side channel leakage |
18 | Ivana Podnar, Martin Rajman, Toan Luu, Fabius Klemm, Karl Aberer |
Scalable Peer-to-Peer Web Retrieval with Highly Discriminative Keys. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Rene Mayrhofer |
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. |
ESAS |
2007 |
DBLP DOI BibTeX RDF |
context authentication, cryptographic hash, sensor data |
18 | Mohammad Alhammouri, Sead Muftic |
Management of Groups and Group Keys in Multi-level Security Environments. |
SAFECOMP |
2007 |
DBLP DOI BibTeX RDF |
Access Control, Key Management, Key Agreement Protocols, Group Management |
18 | Elvis Papalilo, Bernd Freisleben |
Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Cécile Delerablée |
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Jovan Dj. Golic, Madalina Baltatu |
Soft Generation of Secure Biometric Keys. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Biometric key, Reed-Solomon codes, biometric authentication, Shannon entropy, template protection, Euclidean metric |
18 | Bartosz Oler, Imed El Fray |
Deniable File System--Application of Deniable Storage to Protection of Private Keys. |
CISIM |
2007 |
DBLP DOI BibTeX RDF |
|
18 | David Jao, Dimitar Jetchev, Ramarathnam Venkatesan |
On the Bits of Elliptic Curve Diffie-Hellman Keys. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Abhishek Gupta, Pavan Nuggehalli, Joy Kuri |
An Efficient Scheme for Establishing Pairwise Keys for Wireless Sensor Networks. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Abhishek Gupta, Joy Kuri, Pavan Nuggehalli |
A New Scheme for Establishing Pairwise Keys for Wireless Sensor Networks. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
|
18 | David Toman 0001, Grant E. Weddell |
On Keys and Functional Dependencies as First-Class Citizens in Description Logics. |
IJCAR |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Mehdi Essid, Omar Boucelma, Stéphane Bressan |
Answering Queries in the Presence of XML Keys. |
DEXA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria |
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. |
SOFSEM |
2006 |
DBLP DOI BibTeX RDF |
Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery |
18 | Yukio Itakura, Shigeo Tsujii |
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification |
18 | Jens-Matthias Bohli, Rainer Steinwandt, María Isabel González Vasco, Consuelo Martínez |
Weak Keys in MST1. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
20B40, AMS classification 94A60 |
18 | Yi-Hwa Chen, Jinn-ke Jan |
Enhancement of digital signature with message recovery using self-certified public keys and its variants. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
self-certified public key, authenticated encryption, forward secrecy |
18 | Adil Alsaid, Chris J. Mitchell |
Installing Fake Root Keys in a PC. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rothermel |
A new approach for establishing pairwise keys for securing wireless sensor networks. |
SenSys |
2005 |
DBLP DOI BibTeX RDF |
key establishment, wireless sensor network security |
18 | Wenliang Du, Ronghua Wang, Peng Ning |
An efficient scheme for authenticating public keys in sensor networks. |
MobiHoc |
2005 |
DBLP DOI BibTeX RDF |
deployment knowledge, wireless sensor networks, public key, merkle tree |
18 | Daniel K. Blandford, Guy E. Blelloch |
Dictionaries using variable-length keys and data, with applications. |
SODA |
2005 |
DBLP BibTeX RDF |
|
18 | Wai Kuan Yip, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin |
Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability. |
AutoID |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz |
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Christopher Wolf, Bart Preneel |
Equivalent Keys in HFE, C*, and Variations. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Eberhard Stickel |
A New Method for Exchanging Secret Keys. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Kyungsan Cho, Soo-Young Lee, JongEun Kim |
Two-Step Hierarchical Protocols for Establishing Session Keys in Wireless Sensor Networks. |
ICESS |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Greeshma Neglur, Robert L. Grossman, Bing Liu 0001 |
Assigning Unique Keys to Chemical Compounds for Data Integration: Some Interesting Counter Examples. |
DILS |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Yevgeniy Dodis, Aleksandr Yampolskiy |
A Verifiable Random Function with Short Proofs and Keys. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Taekyun Kim, Sangjin Kim, Heekuck Oh |
A Space-Efficient Algorithm for Pre-distributing Pairwise Keys in Sensor Networks. |
International Conference on Computational Science (3) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Peng Zhang, Chengqing Ye, Xin Li, Xuying Ma |
An Efficient Keys Agreement for Multi-party's Communication. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Javier Lafuente-Martinez, Isabel Garcia-Muñoz, Julián Fernández-Navajas |
QoS estimators for client-side dynamic server selection: limitations and keys. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Frode Eika Sandnes, Haavard W. Thorkildssen, Alexander Arvei, Johannes O. Buverud |
Techniques for Fast and Easy Mobile Text-Entry with Three-Keys. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Qingshui Xue, Zhenfu Cao |
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. |
ISPA |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Laurent Mazaré |
Decidability of Opacity with Non-Atomic Keys. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
Dolev-Yao Constraints, Security, Formal Verification, Decidability, Rewriting Systems, Opacity |
18 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia |
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. |
ICNP |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Lucas C. Ferreira, Ricardo Dahab |
Blinded-key signatures: securing private keys embedded in mobile agents. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
security, cryptography, mobile agents, digital signatures |
18 | Indrakshi Ray, Indrajit Ray |
Using Compatible Keys for Secure Multicasting in E-Commerce. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
security, e-commerce, multicasting |
18 | Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan 0001 |
A Multi-user Based Watermarking System with Two-Security-Level Keys. |
IWDW |
2002 |
DBLP DOI BibTeX RDF |
|
18 | Taekyoung Kwon 0002 |
On the Difficulty of Protecting Private Keys in Software. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
18 | I. Scott MacKenzie |
Mobile text entry using three keys. |
NordiCHI |
2002 |
DBLP DOI BibTeX RDF |
linguistically enhanced text entry, text entry performance evaluations, typamatic keying, mobile text entry |
18 | Richard Clayton 0001, Mike Bond |
Experience Using a Low-Cost FPGA Design to Crack DES Keys. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
18 | David Wheeler |
Protocols Using Keys from Faulty Data. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Gideon Samid |
Re-dividing Complexity between Algorithms and Keys. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Paul Onions |
On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas |
Government Access to Keys - Panel Discussion. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Dan Boneh, Nagendra Modadugu, Michael Kim |
Generating RSA Keys on a Handheld Using an Untrusted Server. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
18 | Reto Kohlas, Ueli M. Maurer |
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
18 | Andrew Berman, Linda G. Shapiro |
Selecting Good Keys for Triangle-Inequality-Based Pruning Algorithms. |
CAIVD |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Guillaume Poupard, Jacques Stern |
Generation of Shared RSA Keys by Two Parties. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Dominique Dieng |
The keys of success of a health card project: the lessons learned from 9 health cards project. |
CBMS |
1997 |
DBLP DOI BibTeX RDF |
health card project, computer based medical system, Canadian health card projects, large scale projects, local projects, computerized medical record, health care, telematics, Europe |
18 | Dan Boneh, Ramarathnam Venkatesan |
Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
|
18 | Lars R. Knudsen |
New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
18 | Jacques Stern |
Designing Identification Schemes with Keys of Short Size. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
18 | Bogdan S. Chlebus |
Duplicating keys to streamline sorting on a mesh-connected computer. |
SPDP |
1991 |
DBLP DOI BibTeX RDF |
|
18 | Judy H. Moore, Gustavus J. Simmons |
Cycle Structures of the DES with Weak and Semi-Weak Keys. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
18 | Pierre Lescanne, Jean-Marc Steyaert |
On the Study Data Structures: Binary Tournaments with Repeated Keys. |
ICALP |
1983 |
DBLP DOI BibTeX RDF |
|
18 | L. R. Johnson |
An indirect chaining method for addressing on secondary keys. |
Commun. ACM |
1961 |
DBLP DOI BibTeX RDF |
|
17 | Jef Wijsen |
On the first-order expressibility of computing certain answers to conjunctive queries over uncertain databases. |
PODS |
2010 |
DBLP DOI BibTeX RDF |
first-order expressibility, primary keys, conjunctive queries, consistent query answering |
17 | Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan 0002 |
An Authentication Model for Wireless Network Services. |
AINA |
2010 |
DBLP DOI BibTeX RDF |
wireless network services, dynamic keys, group authentication, authentication |
17 | Najah Chridi, Mathieu Turuani, Michaël Rusinowitch |
Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists. |
CSF |
2009 |
DBLP DOI BibTeX RDF |
group protocol, well-tagged, autonomous keys, cryptographic protocol, decision procedure, lists |
17 | Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy |
Investigating Encrypted Material. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
Public & Private Keys, Encryption, RSA, OpenPGP, Ciphertext |
17 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
17 | Jinglong Zuo, Delong Cui |
A Novel Retrieval Oriented Robust Image Hashing Based on Fractional Fourier Transform. |
ESIAT (1) |
2009 |
DBLP DOI BibTeX RDF |
FRFT, LDO, normalized Hamming distance, encryption keys, CBIR, image hashing |
17 | Benoît Martin, Poika Isokoski, Fabrice Jayet, Thierry Schang |
Performance of finger-operated soft keyboard with and without offset zoom on the pressed key. |
Mobility Conference |
2009 |
DBLP DOI BibTeX RDF |
finger interaction, zoomable keys, text entry |
17 | Denvil Smith, Nian-Feng Tzeng, Milad M. Ghantous |
FaSReD: Fast and Scalable Resource Discovery in Support of Multiple Resource Range Requirements for Computational Grids. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
peer-to-peer (P2P) structures, prefix hash trees (PHTs), search keys, distributed hash tables (DHTs), performance measures, resource discovery, Computational Grids, range queries |
17 | Benjamin Laxton, Kai Wang 0059, Stefan Savage |
Reconsidering physical key secrecy: teleduplication via optical decoding. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
teleduplication, keys, physical security |
17 | Santanu Sarkar 0001, Subhamoy Maitra |
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
17 | Jon Heggland |
Foreign Superkeys and Constant References. |
IDEAS |
2007 |
DBLP DOI BibTeX RDF |
Relational theory, entity subclassing, foreign keys, integrity constraints |
17 | Liqun Chen 0002, Hoon Wei Lim, Wenbo Mao |
User-Friendly Grid Security Architecture and Protocols. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
Grid Security Infrastructure, Public-key Authentication Framework, Dynamic Public Keys, Security Protocols, Grid Security |
17 | Peter Buneman, Sanjeev Khanna, Keishi Tajima, Wang Chiew Tan |
Archiving scientific data. |
ACM Trans. Database Syst. |
2004 |
DBLP DOI BibTeX RDF |
Keys for XML |
17 | Anindo Mukherjee, Hongmei Deng, Dharma P. Agrawal |
Distributed Pairwise Key Generation Using Shared Polynomials for Wireless Ad Hoc Networks. |
MWCN |
2004 |
DBLP DOI BibTeX RDF |
Bivariate Polynomials, Security, Ad Hoc Networks, Symmetric Keys, Threshold Secret Sharing |
17 | Frédéric Vella, Nadine Vigouroux, Philippe Truillet |
Environnement de conception de clavier virtuel: SOKEYTO (SOftware KEYboard TOolkit). |
IHM |
2004 |
DBLP DOI BibTeX RDF |
keys layout, neurophysiologic models, design environment, soft keyboards |
17 | Dimitrios Gunopulos, Roni Khardon, Heikki Mannila, Sanjeev Saluja, Hannu Toivonen, Ram Sewak Sharm |
Discovering all most specific sentences. |
ACM Trans. Database Syst. |
2003 |
DBLP DOI BibTeX RDF |
learning with membership queries, maximal frequent sets, minimal keys, Data mining, association rules |
17 | Wenfei Fan, Gabriel M. Kuper, Jérôme Siméon |
A unified constraint model for XML. |
WWW |
2001 |
DBLP DOI BibTeX RDF |
XML, XML, XML schema, integrity constraints, subtyping, keys, constraint reasoning, object identity |
17 | Kian-Lee Tan, Beng Chin Ooi, David J. Abel |
Exploiting Spatial Indexes for Semijoin-Based Join Processing in Distributed Spatial Databases. |
IEEE Trans. Knowl. Data Eng. |
2000 |
DBLP DOI BibTeX RDF |
locational keys, distributed spatial database systems, spatial semijoin, query processing, R-tree, Spatial indexes |
17 | Cynthia Dwork, Moni Naor |
Zaps and Their Applications. |
FOCS |
2000 |
DBLP DOI BibTeX RDF |
zap, witness-indistinguishable protocol, shared random string model, verifiable pseudo-random bit generators, concurrent deniable authentication, computational complexity, cryptography, NP completeness, theorem proving, public keys, zero-knowledge proofs, verifier, concurrent zero knowledge |
17 | Ravin Balakrishnan, Pranay Patel |
The PadMouse: Facilitating Selection and Spatial Positioning for the Non-Dominant Hand. |
CHI |
1998 |
DBLP DOI BibTeX RDF |
hot-keys, toolgass, interaction techniques, gestures, input devices, mouse, marking-menus, bimanual input, touchpad |
17 | Chi-Sung Laih, Min-Jea Gau |
Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. |
IEEE Trans. Computers |
1997 |
DBLP DOI BibTeX RDF |
knapsack cryptosystem, cryptography, cryptanalysis, Public keys |
17 | Torben Hagerup, Rajeev Raman |
Waste Makes Haste: Tight Bounds for Loose Parallel Sorting |
FOCS |
1992 |
DBLP DOI BibTeX RDF |
approximate prefix summation problems, loose parallel sorting, input keys, padded sorting, fast randomised CRCW PRAM algorithms, nonstandard OR PRAM, time complexity, random numbers, integer sorting |
17 | James R. Bell 0001, Charles H. Kaman |
The linear quotient hash code. |
Commun. ACM |
1970 |
DBLP DOI BibTeX RDF |
calculated address, search, hashing, table, keys, hash code, lookup, scatter storage, symbol table |
15 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
15 | Song Han 0004, Biming Tian, Mingxing He, Elizabeth Chang 0001 |
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Zhihong Liu, Jianfeng Ma 0001, Qiping Huang, Sang-Jae Moon |
Asymmetric Key Pre-distribution Scheme for sensor networks. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Véronique Cortier, Stéphanie Delaune |
Safely composing security protocols. |
Formal Methods Syst. Des. |
2009 |
DBLP DOI BibTeX RDF |
Verification, Composition, Security protocols |
15 | Gary Grider, James Nunez, John Bent, Steve Poole 0001, Robert B. Ross, Evan Felix |
Coordinating government funding of file system and I/O research through the high end computing university research activity. |
ACM SIGOPS Oper. Syst. Rev. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Mingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang |
Research on Model of Trust Degrees for PKI. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Uma Murthy, Edward A. Fox, Yinlin Chen, Eric Hallerman, Ricardo da Silva Torres, Evandro J. Ramos, Tiago R. C. Falcão |
Superimposed Image Description and Retrieval for Fish Species Identification. |
ECDL |
2009 |
DBLP DOI BibTeX RDF |
superimposed information, fish, species identification, user study, image retrieval, image annotation, biodiversity |
15 | Martin Dietzfelbinger, Ulf Schellbach |
On risks of using cuckoo hashing with simple universal hash classes. |
SODA |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Aybar C. Acar, Amihai Motro |
Efficient discovery of join plans in schemaless data. |
IDEAS |
2009 |
DBLP DOI BibTeX RDF |
dependency inference, join inference, schema matching |
15 | Damir Kahvedzic, M. Tahar Kechadi |
On the persistence of deleted windows registry data structures. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Nuttapong Attrapadung, Hideki Imai |
Conjunctive Broadcast and Attribute-Based Encryption. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
Key policy, Revocable ABE, Disjunctive multi-authority ABE, Broadcast encryption, Attribute-based encryption, Ciphertext policy |
15 | Aggelos Kiayias, Serdar Pehlivanoglu |
Tracing and Revoking Pirate Rebroadcasts. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Sajid Hussain, Md. Shafayat Rahman, Laurence Tianruo Yang |
Key Predistribution Scheme using Keyed Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ely Porat |
An Optimal Bloom Filter Replacement Based on Matrix Solving. |
CSR |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Zhiqian Xu 0001, Hai Jiang 0003 |
HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Nuttapong Attrapadung, Hideki Imai |
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 4919 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|