|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 391 occurrences of 265 keywords
|
|
|
Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Stefan Brands, Liesje Demuynck, Bart De Decker |
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Suvasini Panigrahi, Amlan Kundu 0002, Shamik Sural, Arun K. Majumdar |
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Dempster-Shafer theory, fraud detection, Bayesian learning, Mobile communication networks |
1 | Akihiro Yamamura, Takashi Kurokawa 0001, Junji Nakazato |
Threshold Anonymous Group Identification and Zero-Knowledge Proof. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
t-out-of-m Anonymous Group Identification, Non-singular Matrix, Zero-Knowledge Proof |
1 | Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim 0001 |
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Eagle-64, Eagle-128, Related-key Amplified Boomerang Attack, Block Ciphers, Data-Dependent Operations |
1 | Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Preimage Attack on the Parallel FFT-Hashing Function. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
the Parallel FFT-Hashing function, Cryptographic Hash Function, Preimage Attack |
1 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
1 | Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann |
Analysis of the SMS4 Block Cipher. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
UFN, cryptanalysis, block ciphers, algebraic structure |
1 | Sylvain Pasini, Serge Vaudenay |
Hash-and-Sign with Weak Hashing Made Secure. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt |
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kan Yasuda |
"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, Envelope MAC, RFC1828, MAC, Hash Function, Message Authentication Code, HMAC, Compression Function |
1 | Erik Dahmen, Katsuyuki Okeya, Daniel Schepers |
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
affine coordinates, elliptic curve cryptosystem, scalar multiplication, precomputation |
1 | Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai |
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yin Yin, Bao Li 0001 |
Secure Cross-Realm C2C-PAKE Protocol. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu |
API Monitoring System for Defeating Worms and Exploits in MS-Windows System. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Worm Protection, API Hooking, System Security |
1 | John W. Holford, William J. Caelli |
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Isaac Agudo, Javier López 0001, José A. Montenegro |
Graphical Representation of Authorization Policies for Weighted Credentials. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan |
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Merkle-Damgård construction, MBCA, 3C, 3C+ |
1 | André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi |
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shanshan Duan, Zhenfu Cao |
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Overbeck |
Statistical Decoding Revisited. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
general decoding, public key cryptography, coding theory, McEliece Cryptosystem, code based cryptography |
1 | Eike Kiltz, David Galindo |
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson, Jacob C. N. Schuldt |
Efficient Identity-Based Signatures Secure in the Standard Model. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shidi Xu, Yi Mu 0001, Willy Susilo |
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Online/offline, Routing, MANET, signature, Multisignature |
1 | Man Ho Au, Willy Susilo, Siu-Ming Yiu |
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joo Yeon Cho, Josef Pieprzyk |
Distinguishing Attack on SOBER-128 with Linear Masking. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Linear masking, SOBER-128, Stream ciphers, Distinguishing attack, Modular addition |
1 | An Braeken, Joseph Lano, Bart Preneel |
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Feng Bao 0001 |
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shaoquan Jiang |
Efficient Primitives from Exponentiation in Zp. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Yang Cui 0001, Hideki Imai, Kaoru Kurosawa |
Tag-KEM from Set Partial Domain One-Way Permutations. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ebaa Fayyoumi, B. John Oommen |
On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas T. Courtois, Blandine Debraize, Eric Garrido |
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto |
A Novel Range Test. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
interval range, range test, specialized zero test, correctness, soundness |
1 | Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong |
Algebraic Attacks on Clock-Controlled Stream Ciphers. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
irregular clocking, stream cipher, linear feedback shift register, algebraic attack, clock control |
1 | Ryotaro Hayashi 0001, Keisuke Tanaka |
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Feng Bao 0001 |
Oblivious Scalar-Product Protocols. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Oblivious scalar-product protocol, homomorphic commitment scheme, homomorphic public key encryption |
1 | Leonie Ruth Simpson, Matthew Henricksen |
Improved Cryptanalysis of MAG. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery |
1 | Anantharaman Lakshminarayanan, Tong-Lee Lim |
Augmented Certificate Revocation Lists. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria |
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks |
1 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
Towards an Invisible Honeypot Monitoring System. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Lynn Margaret Batten, Reihaneh Safavi-Naini (eds.) |
Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mike Burmester, Tri Van Le, Breno de Medeiros |
Towards Provable Security for Ubiquitous Applications. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai |
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng |
Key Replacement Attack Against a Generic Construction of Certificateless Signature. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Henricksen, Ed Dawson |
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4 |
1 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
Hiding Circuit Topology from Unbounded Reverse Engineers. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Okeya |
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
(keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC |
1 | Jacques J. A. Fournier, Michael Tunstall |
Cache Based Power Analysis Attacks on AES. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Celia Li, Cungang Yang, Richard Cheung |
Key Management for Role Hierarchy in Distributed Systems. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vipul Goyal, Rohit Tripathy 0002 |
An Efficient Solution to the ARP Cache Poisoning Problem. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tim McComb, Luke Wildman |
SIFA: A Tool for Evaluation of High-Grade Security Devices. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michelangelo Giansiracusa, Selwyn Russell, Andrew J. Clark, John Hynd |
An Improved Execution Integrity Solution for Mobile Agents. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Juan Manuel González Nieto (eds.) |
Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenbaum |
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | William Millan |
New Cryptographic Applications of Boolean Function Equivalence Classes. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Role Activation Management in Role Based Access Control. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Dynamic Separation of Duty, Role Based Access Control, Security Management |
1 | Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001, In Seog Seo |
ID-based Authenticated Key Agreement for Low-Power Mobile Devices. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Russell Ang, Reihaneh Safavi-Naini, Luke McAven |
Cancelable Key-Based Fingerprint Templates. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Régis Bevan |
Improved Zero Value Attack on XTR. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
MRPA, smart cards, Power Analysis, DFA, XTR |
1 | Atsuko Miyaji, Yuuki Takano |
On the Success Probability of chi2-attack on RC6. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Steven D. Galbraith, Chris Heneghan, James F. McKee |
Tunable Balancing of RSA. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Deposit-Case Attack Against Secure Roaming. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves |
1 | Ratna Dutta, Rana Barua |
Dynamic Group Key Agreement in Tree-Based Setting. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ming Yao, Kun Peng, Ed Dawson |
Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Doche |
Redundant Trinomials for Finite Fields of Characteristic 2. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Shujing Wang 0001, Yan Zhang 0003 |
A Formalization of Distributed Authorization with Delegation. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
Access control, knowledge representation, authorization, trust management, delegation, nonmonotonic reasoning, answer set programming |
1 | Toru Nakanishi 0001, Fumiaki Kubooka, Naoto Hamada, Nobuo Funabiki |
Group Signature Schemes with Membership Revocation for Large Groups. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Chris J. Mitchell |
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | C. K. Wong, Agnes Chan |
Immediate Data Authentication for Multicast in Resource Constrained Network. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Brian King |
An Efficient Implementation of a Threshold RSA Signature Scheme. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Phillip Pudney, Jill Slay |
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Souradyuti Paul, Bart Preneel |
Solving Systems of Differential Equations of Addition. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Feng Bao 0001, Robert H. Deng |
Security Analysis and Fix of an Anonymous Credential System. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tomoyuki Asano, Kazuya Kamio |
A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hai Jin 0001, Weizhong Qiang, Xuanhua Shi, Deqing Zou |
VO-Sec: An Access Control Framework for Dynamic Virtual Organization. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kim-Kwang Raymond Choo, Yvonne Hitchcock |
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Aura, Aarthi Nagarajan, Andrei V. Gurtov |
Analysis of the HIP Base Exchange Protocol. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jiqiang Lv, Yongfei Han |
Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bob Blakley 0001, G. R. Blakley |
All Sail, No Anchor III: Risk Aggregation and Time's Arrow. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Adrian McCullagh, William J. Caelli |
Who Goes There? Internet Banking: A Matter of Risk and Reward. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Scott Contini, Igor E. Shparlinski |
On Stern's Attack Against Secret Truncated Linear Congruential Generators. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bo-Yin Yang, Jiun-Ming Chen |
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Soonhak Kwon |
Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
supersingular elliptic curve, divisor, Tate pairing, automorphism, roots of unity |
1 | Yvo Desmedt |
Potential Impacts of a Growing Gap Between Theory and Practice in Information Security. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Toshiyuki Isshiki, Keisuke Tanaka |
An (n-t)-out-of-n Threshold Ring Signature Scheme. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jun Furukawa 0001, Hideki Imai |
An Efficient Group Signature Scheme from Bilinear Maps. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Arjen K. Lenstra, Benne de Weger |
On the Possibility of Constructing Meaningful Hash Collisions for Public Keys. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Alexander W. Dent |
Hybrid Signcryption Schemes with Insider Security. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang |
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xingyang Guo, Quan Zhang, Chaojing Tang |
On the Security of Two Key-Updating Signature Schemes. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kemal Bicakci, Bruno Crispo, Andrew S. Tanenbaum |
Counting Abuses Using Flexible Off-line Credentials. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Yi Mu 0001 |
On the Security of Nominative Signatures. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
threshold partially blind signature, identity-based partially blind signature, bilinear pairings |
1 | Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague |
GBD Threshold Cryptography with an Application to RSA Key Recovery. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hannes Tschofenig, Andrei V. Gurtov, Jukka Ylitalo, Aarthi Nagarajan, Murugaraj Shanmugam |
Traversing Middleboxes with the Host Identity Protocol. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi |
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem |
1 | Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.) |
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum |
Symmetric Key Authentication Services Revisited. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 930 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|