The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Keys with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1975 (17) 1976-1978 (26) 1979-1980 (17) 1981-1982 (15) 1983-1984 (27) 1985 (23) 1986-1987 (32) 1988 (19) 1989 (41) 1990 (27) 1991 (18) 1992 (24) 1993 (32) 1994 (40) 1995 (29) 1996 (35) 1997 (53) 1998 (75) 1999 (94) 2000 (97) 2001 (128) 2002 (178) 2003 (221) 2004 (282) 2005 (363) 2006 (408) 2007 (433) 2008 (417) 2009 (339) 2010 (125) 2011 (75) 2012 (87) 2013 (75) 2014 (83) 2015 (94) 2016 (93) 2017 (94) 2018 (116) 2019 (92) 2020 (110) 2021 (104) 2022 (104) 2023 (136) 2024 (21)
Publication types (Num. hits)
article(1345) book(1) data(1) incollection(18) inproceedings(3540) phdthesis(11) proceedings(3)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(199) CoRR(146) CRYPTO(122) EUROCRYPT(103) ACISP(53) CCS(46) ASIACRYPT(40) Public Key Cryptography(39) CT-RSA(38) FSE(37) SIGMOD Conference(35) INDOCRYPT(33) KEYS(32) CHES(31) ACNS(30) RFC(30) More (+10 of total 1458)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3849 occurrences of 1722 keywords

Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Nadia Heninger, Hovav Shacham Reconstructing RSA Private Keys from Random Key Bits. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Scott Yilek, Eric Rescorla, Hovav Shacham, Brandon Enright, Stefan Savage When private keys are public: results from the 2008 Debian OpenSSL vulnerability. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF debian, openssl, entropy, survey, attacks, prng
18Dimitar Jetchev, Ramarathnam Venkatesan Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Colin D. Walter Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hidden Markov Models, simple power analysis, SPA, Viterbi Algorithm, Forward-Backward Algorithm, Side channel leakage
18Ivana Podnar, Martin Rajman, Toan Luu, Fabius Klemm, Karl Aberer Scalable Peer-to-Peer Web Retrieval with Highly Discriminative Keys. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Rene Mayrhofer The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF context authentication, cryptographic hash, sensor data
18Mohammad Alhammouri, Sead Muftic Management of Groups and Group Keys in Multi-level Security Environments. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access Control, Key Management, Key Agreement Protocols, Group Management
18Elvis Papalilo, Bernd Freisleben Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Cécile Delerablée Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Jovan Dj. Golic, Madalina Baltatu Soft Generation of Secure Biometric Keys. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Biometric key, Reed-Solomon codes, biometric authentication, Shannon entropy, template protection, Euclidean metric
18Bartosz Oler, Imed El Fray Deniable File System--Application of Deniable Storage to Protection of Private Keys. Search on Bibsonomy CISIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18David Jao, Dimitar Jetchev, Ramarathnam Venkatesan On the Bits of Elliptic Curve Diffie-Hellman Keys. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Abhishek Gupta, Pavan Nuggehalli, Joy Kuri An Efficient Scheme for Establishing Pairwise Keys for Wireless Sensor Networks. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Abhishek Gupta, Joy Kuri, Pavan Nuggehalli A New Scheme for Establishing Pairwise Keys for Wireless Sensor Networks. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18David Toman 0001, Grant E. Weddell On Keys and Functional Dependencies as First-Class Citizens in Description Logics. Search on Bibsonomy IJCAR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Mehdi Essid, Omar Boucelma, Stéphane Bressan Answering Queries in the Presence of XML Keys. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Eun-Jun Yoon, Kee-Young Yoo An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. Search on Bibsonomy SOFSEM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery
18Yukio Itakura, Shigeo Tsujii Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biological information, Authentication security, Biometrics-cryptographic key, Public-key cryptography, Personal identification
18Jens-Matthias Bohli, Rainer Steinwandt, María Isabel González Vasco, Consuelo Martínez Weak Keys in MST1. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF 20B40, AMS classification 94A60
18Yi-Hwa Chen, Jinn-ke Jan Enhancement of digital signature with message recovery using self-certified public keys and its variants. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-certified public key, authenticated encryption, forward secrecy
18Adil Alsaid, Chris J. Mitchell Installing Fake Root Keys in a PC. Search on Bibsonomy EuroPKI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Arno Wacker, Mirko Knoll, Timo Heiber, Kurt Rothermel A new approach for establishing pairwise keys for securing wireless sensor networks. Search on Bibsonomy SenSys The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key establishment, wireless sensor network security
18Wenliang Du, Ronghua Wang, Peng Ning An efficient scheme for authenticating public keys in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deployment knowledge, wireless sensor networks, public key, merkle tree
18Daniel K. Blandford, Guy E. Blelloch Dictionaries using variable-length keys and data, with applications. Search on Bibsonomy SODA The full citation details ... 2005 DBLP  BibTeX  RDF
18Wai Kuan Yip, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability. Search on Bibsonomy AutoID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Jacek Cichon, Lukasz Krzywiecki, Miroslaw Kutylowski, Pawel Wlaz Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Christopher Wolf, Bart Preneel Equivalent Keys in HFE, C*, and Variations. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Eberhard Stickel A New Method for Exchanging Secret Keys. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Kyungsan Cho, Soo-Young Lee, JongEun Kim Two-Step Hierarchical Protocols for Establishing Session Keys in Wireless Sensor Networks. Search on Bibsonomy ICESS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Greeshma Neglur, Robert L. Grossman, Bing Liu 0001 Assigning Unique Keys to Chemical Compounds for Data Integration: Some Interesting Counter Examples. Search on Bibsonomy DILS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Yevgeniy Dodis, Aleksandr Yampolskiy A Verifiable Random Function with Short Proofs and Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Taekyun Kim, Sangjin Kim, Heekuck Oh A Space-Efficient Algorithm for Pre-distributing Pairwise Keys in Sensor Networks. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Peng Zhang, Chengqing Ye, Xin Li, Xuying Ma An Efficient Keys Agreement for Multi-party's Communication. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Javier Lafuente-Martinez, Isabel Garcia-Muñoz, Julián Fernández-Navajas QoS estimators for client-side dynamic server selection: limitations and keys. Search on Bibsonomy ISCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Frode Eika Sandnes, Haavard W. Thorkildssen, Alexander Arvei, Johannes O. Buverud Techniques for Fast and Easy Mobile Text-Entry with Three-Keys. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Qingshui Xue, Zhenfu Cao A Threshold Proxy Signature Scheme Using Self-Certified Public Keys. Search on Bibsonomy ISPA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Laurent Mazaré Decidability of Opacity with Non-Atomic Keys. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Dolev-Yao Constraints, Security, Formal Verification, Decidability, Rewriting Systems, Opacity
18Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. Search on Bibsonomy ICNP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Lucas C. Ferreira, Ricardo Dahab Blinded-key signatures: securing private keys embedded in mobile agents. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, cryptography, mobile agents, digital signatures
18Indrakshi Ray, Indrajit Ray Using Compatible Keys for Secure Multicasting in E-Commerce. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, e-commerce, multicasting
18Feng-Hsing Wang, Lakhmi C. Jain, Jeng-Shyang Pan 0001 A Multi-user Based Watermarking System with Two-Security-Level Keys. Search on Bibsonomy IWDW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18Taekyoung Kwon 0002 On the Difficulty of Protecting Private Keys in Software. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18I. Scott MacKenzie Mobile text entry using three keys. Search on Bibsonomy NordiCHI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linguistically enhanced text entry, text entry performance evaluations, typamatic keying, mobile text entry
18Richard Clayton 0001, Mike Bond Experience Using a Low-Cost FPGA Design to Crack DES Keys. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18David Wheeler Protocols Using Keys from Faulty Data. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Gideon Samid Re-dividing Complexity between Algorithms and Keys. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Paul Onions On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas Government Access to Keys - Panel Discussion. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Dan Boneh, Nagendra Modadugu, Michael Kim Generating RSA Keys on a Handheld Using an Untrusted Server. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
18Reto Kohlas, Ueli M. Maurer Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Andrew Berman, Linda G. Shapiro Selecting Good Keys for Triangle-Inequality-Based Pruning Algorithms. Search on Bibsonomy CAIVD The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Guillaume Poupard, Jacques Stern Generation of Shared RSA Keys by Two Parties. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Dominique Dieng The keys of success of a health card project: the lessons learned from 9 health cards project. Search on Bibsonomy CBMS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF health card project, computer based medical system, Canadian health card projects, large scale projects, local projects, computerized medical record, health care, telematics, Europe
18Dan Boneh, Ramarathnam Venkatesan Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
18Lars R. Knudsen New Potentially 'Weak' Keys for DES and LOKI (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
18Jacques Stern Designing Identification Schemes with Keys of Short Size. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
18Bogdan S. Chlebus Duplicating keys to streamline sorting on a mesh-connected computer. Search on Bibsonomy SPDP The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
18Judy H. Moore, Gustavus J. Simmons Cycle Structures of the DES with Weak and Semi-Weak Keys. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
18Pierre Lescanne, Jean-Marc Steyaert On the Study Data Structures: Binary Tournaments with Repeated Keys. Search on Bibsonomy ICALP The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
18L. R. Johnson An indirect chaining method for addressing on secondary keys. Search on Bibsonomy Commun. ACM The full citation details ... 1961 DBLP  DOI  BibTeX  RDF
17Jef Wijsen On the first-order expressibility of computing certain answers to conjunctive queries over uncertain databases. Search on Bibsonomy PODS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF first-order expressibility, primary keys, conjunctive queries, consistent query answering
17Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Bala Srinivasan 0002 An Authentication Model for Wireless Network Services. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless network services, dynamic keys, group authentication, authentication
17Najah Chridi, Mathieu Turuani, Michaël Rusinowitch Decidable Analysis for a Class of Cryptographic Group Protocols with Unbounded Lists. Search on Bibsonomy CSF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF group protocol, well-tagged, autonomous keys, cryptographic protocol, decision procedure, lists
17Niall McGrath, Pavel Gladyshev, M. Tahar Kechadi, Joe Carthy Investigating Encrypted Material. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Public & Private Keys, Encryption, RSA, OpenPGP, Ciphertext
17Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
17Jinglong Zuo, Delong Cui A Novel Retrieval Oriented Robust Image Hashing Based on Fractional Fourier Transform. Search on Bibsonomy ESIAT (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF FRFT, LDO, normalized Hamming distance, encryption keys, CBIR, image hashing
17Benoît Martin, Poika Isokoski, Fabrice Jayet, Thierry Schang Performance of finger-operated soft keyboard with and without offset zoom on the pressed key. Search on Bibsonomy Mobility Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF finger interaction, zoomable keys, text entry
17Denvil Smith, Nian-Feng Tzeng, Milad M. Ghantous FaSReD: Fast and Scalable Resource Discovery in Support of Multiple Resource Range Requirements for Computational Grids. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF peer-to-peer (P2P) structures, prefix hash trees (PHTs), search keys, distributed hash tables (DHTs), performance measures, resource discovery, Computational Grids, range queries
17Benjamin Laxton, Kai Wang 0059, Stefan Savage Reconsidering physical key secrecy: teleduplication via optical decoding. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF teleduplication, keys, physical security
17Santanu Sarkar 0001, Subhamoy Maitra Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
17Jon Heggland Foreign Superkeys and Constant References. Search on Bibsonomy IDEAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Relational theory, entity subclassing, foreign keys, integrity constraints
17Liqun Chen 0002, Hoon Wei Lim, Wenbo Mao User-Friendly Grid Security Architecture and Protocols. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Grid Security Infrastructure, Public-key Authentication Framework, Dynamic Public Keys, Security Protocols, Grid Security
17Peter Buneman, Sanjeev Khanna, Keishi Tajima, Wang Chiew Tan Archiving scientific data. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Keys for XML
17Anindo Mukherjee, Hongmei Deng, Dharma P. Agrawal Distributed Pairwise Key Generation Using Shared Polynomials for Wireless Ad Hoc Networks. Search on Bibsonomy MWCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Bivariate Polynomials, Security, Ad Hoc Networks, Symmetric Keys, Threshold Secret Sharing
17Frédéric Vella, Nadine Vigouroux, Philippe Truillet Environnement de conception de clavier virtuel: SOKEYTO (SOftware KEYboard TOolkit). Search on Bibsonomy IHM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF keys layout, neurophysiologic models, design environment, soft keyboards
17Dimitrios Gunopulos, Roni Khardon, Heikki Mannila, Sanjeev Saluja, Hannu Toivonen, Ram Sewak Sharm Discovering all most specific sentences. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF learning with membership queries, maximal frequent sets, minimal keys, Data mining, association rules
17Wenfei Fan, Gabriel M. Kuper, Jérôme Siméon A unified constraint model for XML. Search on Bibsonomy WWW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF XML, XML, XML schema, integrity constraints, subtyping, keys, constraint reasoning, object identity
17Kian-Lee Tan, Beng Chin Ooi, David J. Abel Exploiting Spatial Indexes for Semijoin-Based Join Processing in Distributed Spatial Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF locational keys, distributed spatial database systems, spatial semijoin, query processing, R-tree, Spatial indexes
17Cynthia Dwork, Moni Naor Zaps and Their Applications. Search on Bibsonomy FOCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF zap, witness-indistinguishable protocol, shared random string model, verifiable pseudo-random bit generators, concurrent deniable authentication, computational complexity, cryptography, NP completeness, theorem proving, public keys, zero-knowledge proofs, verifier, concurrent zero knowledge
17Ravin Balakrishnan, Pranay Patel The PadMouse: Facilitating Selection and Spatial Positioning for the Non-Dominant Hand. Search on Bibsonomy CHI The full citation details ... 1998 DBLP  DOI  BibTeX  RDF hot-keys, toolgass, interaction techniques, gestures, input devices, mouse, marking-menus, bimanual input, touchpad
17Chi-Sung Laih, Min-Jea Gau Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1997 DBLP  DOI  BibTeX  RDF knapsack cryptosystem, cryptography, cryptanalysis, Public keys
17Torben Hagerup, Rajeev Raman Waste Makes Haste: Tight Bounds for Loose Parallel Sorting Search on Bibsonomy FOCS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF approximate prefix summation problems, loose parallel sorting, input keys, padded sorting, fast randomised CRCW PRAM algorithms, nonstandard OR PRAM, time complexity, random numbers, integer sorting
17James R. Bell 0001, Charles H. Kaman The linear quotient hash code. Search on Bibsonomy Commun. ACM The full citation details ... 1970 DBLP  DOI  BibTeX  RDF calculated address, search, hashing, table, keys, hash code, lookup, scatter storage, symbol table
15Benoît Libert, Moti Yung Dynamic fully forward-secure group signatures. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF key protection, anonymity, security modeling, group signatures, forward security, key exposure
15Song Han 0004, Biming Tian, Mingxing He, Elizabeth Chang 0001 Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Zhihong Liu, Jianfeng Ma 0001, Qiping Huang, Sang-Jae Moon Asymmetric Key Pre-distribution Scheme for sensor networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Véronique Cortier, Stéphanie Delaune Safely composing security protocols. Search on Bibsonomy Formal Methods Syst. Des. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Verification, Composition, Security protocols
15Gary Grider, James Nunez, John Bent, Steve Poole 0001, Robert B. Ross, Evan Felix Coordinating government funding of file system and I/O research through the high end computing university research activity. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Mingde Zhang, Xuefeng Zheng, Wensheng Yang, Shuwang Lv, Qingguo Zhang Research on Model of Trust Degrees for PKI. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Uma Murthy, Edward A. Fox, Yinlin Chen, Eric Hallerman, Ricardo da Silva Torres, Evandro J. Ramos, Tiago R. C. Falcão Superimposed Image Description and Retrieval for Fish Species Identification. Search on Bibsonomy ECDL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF superimposed information, fish, species identification, user study, image retrieval, image annotation, biodiversity
15Martin Dietzfelbinger, Ulf Schellbach On risks of using cuckoo hashing with simple universal hash classes. Search on Bibsonomy SODA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Aybar C. Acar, Amihai Motro Efficient discovery of join plans in schemaless data. Search on Bibsonomy IDEAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dependency inference, join inference, schema matching
15Damir Kahvedzic, M. Tahar Kechadi On the persistence of deleted windows registry data structures. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Nuttapong Attrapadung, Hideki Imai Conjunctive Broadcast and Attribute-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key policy, Revocable ABE, Disjunctive multi-authority ABE, Broadcast encryption, Attribute-based encryption, Ciphertext policy
15Aggelos Kiayias, Serdar Pehlivanoglu Tracing and Revoking Pirate Rebroadcasts. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Sajid Hussain, Md. Shafayat Rahman, Laurence Tianruo Yang Key Predistribution Scheme using Keyed Hash Chain and Multipath Key Reinforcement for Wireless Sensor Networks. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Ely Porat An Optimal Bloom Filter Replacement Based on Matrix Solving. Search on Bibsonomy CSR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Zhiqian Xu 0001, Hai Jiang 0003 HASS: Highly Available, Scalable and Secure Distributed Data Storage Systems. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Nuttapong Attrapadung, Hideki Imai Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 4919 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license