Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Johannes Buchmann 0001, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume |
Merkle Signatures with Virtually Unlimited Signature Capacity. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
SSL, post-quantum cryptography, Merkle signatures |
1 | Guomin Yang, Jing Chen 0001, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang 0002 |
A More Natural Way to Construct Identity-Based Identification Schemes. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
Concurrent attacks, Identity-based cryptography, Identification schemes |
1 | Rui Zhang 0002 |
Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Jiangtao Li 0001, Ninghui Li, Rui Xue 0001 |
Universal Accumulators with Efficient Nonmembership Proofs. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Laila El Aimani, Damien Vergnaud |
Gradually Convertible Undeniable Signatures. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Fagen Li, Yupu Hu, Chuanrong Zhang |
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
identity-based signcryption, Ad hoc networks, provable security, bilinear pairings |
1 | Stefan Tillich, Christoph Herbst, Stefan Mangard |
Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
software countermeasures, implementation security, Advanced Encryption Standard, side-channel attacks, DPA, power analysis, instruction set extensions |
1 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi |
Security Mediated Certificateless Signatures. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
security mediated, SMC cryptography, certificateless |
1 | Ahren Studer, Chenxi Wang |
Adaptive Detection of Local Scanners. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Scan Detection, Security, Internet Worms |
1 | Nitesh Saxena |
Public Key Cryptography Sans Certificates in Ad Hoc Networks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Authentication for Paranoids: Multi-party Secret Handshakes. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dayin Wang, Dongdai Lin, Wenling Wu |
An Improved Poly1305 MAC. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Xinghua Li 0001, Sang-Jae Moon, Jianfeng Ma 0001 |
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Camille Vuillaume, Katsuyuki Okeya |
Flexible Exponentiation with Resistance to Side Channel Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
fractional width, RSA, side channel attacks, simple power analysis |
1 | Pinhui Ke, Jie Zhang 0004, Qiaoyan Wen |
Results on Almost Resilient Functions. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Almost resilient Function, Almost correlation immune function, Resilient function |
1 | Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough |
DSO: Dependable Signing Overlay. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
P2P overlay, digital signing service, fault-tolerance, dependable, intrusion-tolerance |
1 | Sébastien Canard, Aline Gouget, Emeline Hufschmitt |
A Handy Multi-coupon System. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Electronic coupons, security model, proof of knowledge |
1 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy |
1 | Ahto Buldas, Sven Laur |
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi |
Physical Security Bounds Against Tampering. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Tamper-Proof Hardware, Fault Prevention, Fault Detection, Error Detection, Fault Analysis, Physical Security, Adversarial Model, Implementation Attack |
1 | Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm |
Stateful Subset Cover. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka |
Improving the Randomized Initial Point Countermeasure Against DPA. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
RPA, ZVA, Smart card, DPA, Elliptic Curve Cryptosystems (ECC), countermeasure, RIP |
1 | Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal |
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Herbst, Elisabeth Oswald, Stefan Mangard |
An AES Smart Card Implementation Resistant to Power Analysis Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
DPA resistance, smart card, AES |
1 | Aggelos Kiayias, Antonina Mitrofanova |
Syntax-Driven Private Evaluation of Quantified Membership Queries. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sujata Doshi, Fabian Monrose, Aviel D. Rubin |
Efficient Memory Bound Puzzles Using Pattern Databases. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Tang 0001, Kim-Kwang Raymond Choo |
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
provable security, key agreement, P2P network, CAPTCHA |
1 | Dibyendu Chakrabarti, Jennifer Seberry |
Combinatorial Structures for Design of Wireless Sensor Networks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Transversal Design, Sensor Network, Key Pre- distribution, Combinatorial Design, Projective Plane |
1 | Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam |
Effect of Malicious Synchronization. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity |
1 | Dongvu Tonien, Reihaneh Safavi-Naini |
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi |
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code |
1 | Khoongming Khoo, Guang Gong, Hian-Kiat Lee |
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Time-memory-data trade-off attack, Rainbow attack, Maiorana-McFarland functions |
1 | Jianhua Yang, Yongzhong Zhang |
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
TCP packet-matching, intrusion detection, Network security, round-trip time, stepping-stone |
1 | Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis |
W3Bcrypt: Encryption as a Stylesheet. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Moti Yung, Feng Bao 0001 (eds.) |
Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding |
Breaking a New Instance of TTM Cryptosystems. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | JongHyup Lee, Taekyoung Kwon 0002, JooSeok Song |
Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen |
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Visual secret sharing scheme, ideal contrast, secret sharing scheme |
1 | Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd |
Password Based Server Aided Key Exchange . |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
three-party, Key agreement, password authentication |
1 | Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos |
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi |
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Opportunistic, Security, Optimization, Wireless, Encryption, Tradeoff |
1 | Zhenfeng Zhang, Duncan S. Wong, Jing Xu 0002, Dengguo Feng |
Certificateless Public-Key Signature: Security Model and Efficient Construction. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 |
Model Generalization and Its Implications on Intrusion Detection. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
Security, Machine Learning, Intrusion Detection, Generalization, Intrusion, Security Infrastructure |
1 | Boris Skoric, Pim Tuyls, W. Ophey |
Robust Key Extraction from Physical Uncloneable Functions. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
speckle pattern, Challenge-Response Pair, authentication, noise, error correction, Physical Uncloneable Function |
1 | Hsiao-Ying Lin, Wen-Guey Tzeng |
An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
the greater than problem, the socialist millionaires problem homomorphic encryption, secure computation |
1 | John Ioannidis, Angelos D. Keromytis, Moti Yung (eds.) |
Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Non-interactive Zero-Knowledge Arguments for Voting. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yan-Cheng Chang, Michael Mitzenmacher |
Privacy Preserving Keyword Searches on Remote Encrypted Data. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Efficient Anonymous Roaming and Its Security Analysis. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
Anonymous Roaming, Authenticated Key Exchange |
1 | Rui Zhang 0002, Jun Furukawa 0001, Hideki Imai |
Short Signature and Universal Designated Verifier Signature Without Random Oracles. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Gene Itkis, Robert McNerney, Scott Russell |
Intrusion-Resilient Secure Channels. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jiangtao Li 0001, Ninghui Li |
OACerts: Oblivious Attribute Certificates. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yih-Chun Hu, Markus Jakobsson, Adrian Perrig |
Efficient Constructions for One-Way Hash Chains. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Wenliang Du, Michael T. Goodrich |
Searching for High-Value Rare Events with Uncheatable Grid Computing. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
security, Grid computing, obfuscation, cheating, cryptographic hash functions |
1 | Michael K. Reiter, XiaoFeng Wang 0001, Matthew K. Wright |
Building Reliable Mix Networks with Fair Exchange. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji |
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
network denial of service, flash worms, network security, diversity, traffic shaping |
1 | Flavio D. Garcia, Jaap-Henk Hoepman |
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
Decentralised systems, security, peer-to-peer, grid, free-riding, micropayments |
1 | Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval |
Optimal Asymmetric Encryption and Signature Paddings. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Markus Jakobsson, Liu Yang |
Quantifying Security in Hybrid Cellular Networks. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Abdulrahman Alharby, Hideki Imai |
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
alarm reduction, Intrusion detection, sequential patterns |
1 | Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette |
SCARE of the DES. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui |
Efficient Identity Based Ring Signature. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor |
Two-Server Password-Only Authenticated Key Exchange. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Lan Nguyen, Reihaneh Safavi-Naini |
Dynamic k-Times Anonymous Authentication. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Virgil Griffith, Markus Jakobsson |
Messin' with Texas Deriving Mother's Maiden Names Using Public Records. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Martin Boesgaard, Thomas Christensen, Erik Zenner |
Badger - A Fast and Provably Secure MAC. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
tree, MAC, universal hash, pseudo-random generator |
1 | Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia |
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon 0002 |
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jin Wook Byun, Dong Hoon Lee 0001 |
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Benoît Libert, Jean-Jacques Quisquater |
Identity Based Encryption Without Redundancy. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
ID-based encryption, redundancies, provable security |
1 | Jintai Ding, Dieter Schmidt |
Rainbow, a New Multivariable Polynomial Signature Scheme. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
Oil and Vinegar, public-key, multivariable, quadratic polynomials |
1 | Vladimir Shpilrain, Alexander Ushakov |
Thompson's Group and Public Key Cryptography. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Pornin, Julien P. Stern |
Digital Signatures Do Not Guarantee Exclusive Ownership. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Chung-Wei Phan, Bok-Min Goi |
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
client-to-client, unknown key-share, cryptanalysis, replay attack, Password-authenticated key exchange |
1 | Benoît Chevallier-Mames |
New Signature Schemes with Coupons and Tight Reduction. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia |
Indexing Information for Data Forensics. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
data forensics, data marking, combinatorial group testing, data structures, data integrity, information hiding, tamper detection |
1 | John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee |
A Traitor Tracing Scheme Based on RSA for Fast Decryption. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen |
Centralized Management of Virtual Security Zones in IP Networks. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai |
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
pre-distributed data, Verifiable secret sharing, multiparty protocols |
1 | Markus Jakobsson, Moti Yung, Jianying Zhou 0001 (eds.) |
Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Andrew K. Wright, John A. Kinast, Joe McCarty |
Low-Latency Cryptographic Protection for SCADA Communications. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa |
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
verifiable shuffles, Paillier public-key system, Privacy, mix-nets, formal security model |
1 | Shuhong Wang 0001, Jie Wang 0038, Maozhi Xu |
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Cross-realm setting, Security, Dictionary attacks, Password-authenticated key exchange |
1 | Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee 0001 |
One-Round Protocols for Two-Party Authenticated Key Exchange. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li |
A Parallel Intrusion Detection System for High-Speed Networks. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Woo Lee |
Advanced Packet Marking Mechanism with Pushback for IP Traceback. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein |
A Pay-per-Use DoS Protection Mechanism for the Web. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tao Wan 0004, Evangelos Kranakis, Paul C. van Oorschot |
S-RIP: A Secure Distance Vector Routing Protocol. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Distance Fraud, Security Analysis, Routing Security, Distance Vector |
1 | Dong Yu 0001, Deborah A. Frincke |
A Novel Framework for Alert Correlation and Understanding. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano |
Success Probability in Chi2-Attacks. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
RC5-64, 2 attack, statistical analysis, RC6 |
1 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 |
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Two-lock cryptosystem, Cryptanalysis, Knapsack problem |
1 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
On the Security of Cryptosystems with All-or-Nothing Transform. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jens Groth |
Evaluating Security of Voting Schemes in the Universal Composability Framework. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Golle, Jessica Staddon, Brent R. Waters |
Secure Conjunctive Keyword Search over Encrypted Data. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo |
X2Rep: Enhanced Trust Semantics for the XRep Protocol. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Muxiang Zhang |
Password Authenticated Key Exchange Using Quadratic Residues. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Wenbo Mao, Kenneth G. Paterson |
Key Agreement Using Statically Keyed Authenticators. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji, Kozue Umeda |
A Fully-Functional Group Signature Scheme over Only Known-Order Group. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|