|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3717 occurrences of 1502 keywords
|
|
|
Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | James R. Bell 0001, Charles H. Kaman |
The linear quotient hash code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 13(11), pp. 675-676, 1970. The full citation details ...](Pics/full.jpeg) |
1970 |
DBLP DOI BibTeX RDF |
calculated address, search, hashing, table, keys, hash code, lookup, scatter storage, symbol table |
25 | Shumeet Baluja, Michele Covell |
Learning to hash: forgiving hash functions and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Min. Knowl. Discov. ![In: Data Min. Knowl. Discov. 17(3), pp. 402-430, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Audio matching, Machine learning, Hashing, Locality sensitive hashing |
25 | Rasmus Pagh |
Hash and Displace: Efficient Evaluation of Minimal Perfect Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WADS ![In: Algorithms and Data Structures, 6th International Workshop, WADS '99, Vancouver, British Columbia, Canada, August 11-14, 1999, Proceedings, pp. 49-54, 1999, Springer, 3-540-66279-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Junfeng He, Wei Liu 0005, Shih-Fu Chang |
Scalable similarity search with optimized kernel hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, July 25-28, 2010, pp. 1129-1138, 2010, ACM, 978-1-4503-0055-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
scalable, search, indexing, kernel method, nearest neighbor, hashing, structure data |
22 | Jung Yeon Hwang, Ji Young Chun, Dong Hoon Lee 0001 |
A note on leakage-resilient authenticated key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 8(5), pp. 2274-2279, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | V. Kumar Murty, Nikolajs Volkovs |
ERINDALE: A Polynomial Based Hashing Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCC ![In: Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings, pp. 157-170, 2009, Springer, 978-3-642-01813-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Sebastiano Vigna |
Monotone minimal perfect hashing: searching a sorted table with O(1) accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2009, New York, NY, USA, January 4-6, 2009, pp. 785-794, 2009, SIAM, 978-0-89871-680-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Ely Porat |
An Optimal Bloom Filter Replacement Based on Matrix Solving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: Computer Science - Theory and Applications, Fourth International Computer Science Symposium in Russia, CSR 2009, Novosibirsk, Russia, August 18-23, 2009. Proceedings, pp. 263-273, 2009, Springer, 978-3-642-03350-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Sven Schäge |
Twin Signature Schemes, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 104-117, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Florian Mendel |
Two Passes of Tiger Are Not One-Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 29-40, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Kazumaro Aoki, Yu Sasaki |
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 70-89, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-1, preimage, one-way, meet-in-the-middle, SHA-0 |
22 | Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer |
HMAC is a randomness extractor and applications to TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 21-32, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
key extraction, TLS, HMAC, randomness extraction |
22 | Hans Vandierendonck, Koen De Bosschere |
Constructing Optimal XOR-Functions to Minimize Cache Conflict Misses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARCS ![In: Architecture of Computing Systems - ARCS 2008, 21st International Conference, Dresden, Germany, February 25-28, 2008, Proceedings, pp. 261-272, 2008, Springer, 978-3-540-78152-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Michael Backes 0001, Dominique Unruh |
Limits of Constructive Security Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 290-307, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy |
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 2297-2305, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Cheng Zhong, Zeng Fan, Defu Su |
Parallel Approximate Multi-Pattern Matching on Heterogeneous Cluster Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2008, Dunedin, Otago, New Zealand, 1-4 December 2008, pp. 74-79, 2008, IEEE Computer Society, 978-0-7695-3443-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Christian Rechberger, Vincent Rijmen |
On Authentication with HMAC and Non-random Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 119-133, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Stefano Chessa, Roberto Di Pietro, Erina Ferro, Gaetano Giunta, Gabriele Oligeri |
Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 634-638, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Yasuhiro Kiuchi, Tomonobu Ozaki, Takenao Ohkawa |
Partial Geometric Hashing for Retrieving Similar Interaction Protein Using Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 589-596, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Angelo Spognardi |
RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, USA, pp. 229-234, 2007, IEEE Computer Society, 978-0-7695-2788-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Florian Mendel, Vincent Rijmen |
Colliding Message Pair for 53-Step HAS-160. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 324-334, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Anna Pagh, Rasmus Pagh, Milan Ruzic |
Linear probing with constant independence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 39th Annual ACM Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007, pp. 318-327, 2007, ACM, 978-1-59593-631-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hashing, linear probing |
22 | Ashwin Swaminathan, Yinian Mao, Min Wu 0001 |
Robust and secure image hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(2), pp. 215-230, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Marcin Zukowski, Sándor Héman, Peter A. Boncz |
Architecture-conscious hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaMoN ![In: Workshop on Data Management on New Hardware, DaMoN 2006, Chicago, Illinois, USA, June 25, 2006, pp. 6, 2006, ACM, 1-59593-466-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Debrup Chakraborty, Palash Sarkar 0001 |
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 293-309, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
tweakable encryption, strong pseudo-random permutation, mode of operation |
22 | Yanbing Peng, Jian Gong, Wang Yang, Weijiang Liu |
Disclosing the Element Distribution of Bloom Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part I, pp. 1022-1025, 2006, Springer, 3-540-34379-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Fangyong Hou, Hongjun He, Zhiying Wang 0003, Kui Dai |
An Efficient Way to Build Secure Disk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 290-301, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Rina Panigrahy |
Efficient hashing with lookups in two memory accesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SODA ![In: Proceedings of the Sixteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2005, Vancouver, British Columbia, Canada, January 23-25, 2005, pp. 830-839, 2005, SIAM, 0-89871-585-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
22 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Exploiting Traffic Localities for Efficient Flow State Lookup. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 1133-1145, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Akashi Satoh |
Hardware Architecture and Cost Estimates for Breaking SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 259-273, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Sumit Ganguly, Minos N. Garofalakis, Rajeev Rastogi |
Tracking set-expression cardinalities over continuous update streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 13(4), pp. 354-369, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Set expressions, Data streams, Randomized algorithms, Approximate query processing, Data synopses |
22 | Matthias Kuntz, Kai Lampka |
Probabilistic Methods in State Space Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Validation of Stochastic Systems ![In: Validation of Stochastic Systems - A Guide to Current Research, pp. 339-383, 2004, Springer, 3-540-22265-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Michael Lifshits, Ilya Blayvas, Roman Goldenberg, Ehud Rivlin, Michael Rudzsky |
Rehashing for Bayesian Geometric Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (3) ![In: 17th International Conference on Pattern Recognition, ICPR 2004, Cambridge, UK, August 23-26, 2004., pp. 99-102, 2004, IEEE Computer Society, 0-7695-2128-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo |
An Efficient Signature Scheme from Bilinear Pairings and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 277-290, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Peter C. Dillinger, Panagiotis Manolios |
Bloom Filters in Probabilistic Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMCAD ![In: Formal Methods in Computer-Aided Design, 5th International Conference, FMCAD 2004, Austin, Texas, USA, November 15-17, 2004, Proceedings, pp. 367-381, 2004, Springer, 3-540-23738-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Dahlia Malkhi |
Dynamic Lookup Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Directions in Distributed Computing ![In: Future Directions in Distributed Computing, Research and Position Papers, pp. 93-96, 2003, Springer, 3-540-00912-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Aldar C.-F. Chan |
A graph-theoretical analysis of multicast authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA, pp. 155-162, 2003, IEEE Computer Society, 0-7695-1920-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Anindya Datta, Debra E. VanderMeer, Krithi Ramamritham |
Parallel Star Join + DataIndexes: Efficient Query Processing in Data Warehouses and OLAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 14(6), pp. 1299-1316, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Parallel star join, dataindexes, query processing, OLAP |
22 | Pi-Chung Wang, Wei-Chun Tseng, Chia-Tai Chan, Yaw-Chung Chen |
Gigabit Packet Classification by Using Lookahead Caching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 117-124, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Horst H. von Brand |
On the Distribution of Keys by Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCCC ![In: 22nd International Conference of the Chilean Computer Science Society (SCCC 2002), 6-8 November 2002, Copiapo, Chile, pp. 3-6, 2002, IEEE Computer Society, 0-7695-1867-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | S. H. Supangkat, T. Eric, A. S. Pamuji |
A public key signature for authentication in telephone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APCCAS (2) ![In: IEEE Asia Pacific Conference on Circuits and Systems 2002, APCCAS 2002, Singapore, 16-18 December 2002, pp. 495-498, 2002, IEEE, 0-7803-7690-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Jia Wang 0002, Wendy Chang, Raj Acharya |
Efficient and Effective Similar Shape Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 1 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume I, pp. 875-879, 1999, IEEE Computer Society, 0-7695-0253-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Similar Shape Retrieval, Majority Voting Algorithm, Content-based Retrieval, Geometric Hashing |
22 | Marcel Waldvogel, George Varghese, Jonathan S. Turner, Bernhard Plattner |
Scalable High Speed IP Routing Lookups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 1997 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, September 14-18, 1997, Cannes, France., pp. 25-36, 1997, ACM, 0-89791-905-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
22 | Chris Charnes, Josef Pieprzyk |
Attacking the SL2 Hashing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 322-330, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai |
Duality between Two Cryptographic Primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 8th International Symposium, AAECC-8, Tokyo, Japan, August 20-24, 1990, Proceedings, pp. 379-390, 1990, Springer, 3-540-54195-0. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
22 | Donovan A. Schneider, David J. DeWitt |
A Performance Evaluation of Four Parallel Join Algorithms in a Shared-Nothing Multiprocessor Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1989 ACM SIGMOD International Conference on Management of Data, Portland, Oregon, USA, May 31 - June 2, 1989., pp. 110-121, 1989, ACM Press, 978-0-89791-317-1. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
22 | Hans-Peter Kriegel, Michael Schiwietz |
Performance Comparison of Point and Spatial Access Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSD ![In: Design and Implementation of Large Spatial Databases, First Symposium SSD'89, Santa Barbara, California, USA, July 17/18, 1989, Proceedings, pp. 89-114, 1989, Springer, 3-540-52208-5. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
spatial database systems, access methods, performance comparison |
22 | James P. Richardson, Hongjun Lu, Krishna P. Mikkilineni |
Design and Evaluation of Parallel Pipelined Join Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the Association for Computing Machinery Special Interest Group on Management of Data 1987 Annual Conference, San Francisco, CA, USA, May 27-29, 1987, pp. 399-409, 1987, ACM Press, 978-0-89791-236-5. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
22 | Matti O. Jokinen |
The Effect of Parameter Passing and Other Implementation Dependent Mechanisms is Undecedable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 17(9), pp. 16-17, 1982. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
22 | Gebhard Greiter |
Remarks on Language Concepts for specifying Process Synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 17(9), pp. 58-61, 1982. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
21 | Sami Evangelista, Michael Westergaard, Lars Michael Kristensen |
The ComBack Method Revisited: Caching Strategies and Extension with Delayed Duplicate Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Petri Nets Other Model. Concurr. ![In: Transactions on Petri Nets and Other Models of Concurrency III, pp. 189-215, 2009, Springer, 978-3-642-04854-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
explicit state model checking, hash compaction, delayed duplicate detection, state space reduction, state explosion problem |
21 | Florian Mendel, Christian Rechberger, Martin Schläffer |
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 144-161, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, combiner, differential, MD5 |
21 | Tetsu Iwata, Kan Yasuda |
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 394-415, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SIV, Universal hash function, security proof, counter mode |
21 | Sebastiaan Indesteege, Bart Preneel |
Practical Collisions for EnRUPT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 246-259, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
EnRUPT, hash function, collision attack, SHA-3 candidate |
21 | Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung |
A New Randomness Extraction Paradigm for Hybrid Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 590-609, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hash proof systems, Chosen-ciphertext security, ElGamal, hybrid encryption, randomness extraction |
21 | Dmitrij Lagutin, Sasu Tarkoma |
Public Key Signatures and Lightweight Security Solutions in a Wireless Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NEW2AN ![In: Smart Spaces and Next Generation Wired/Wireless Networking, 9th International Conference, NEW2AN 2009 and Second Conference on Smart Spaces, ruSMART 2009, St. Petersburg, Russia, September 15-18, 2009. Proceedings, pp. 253-265, 2009, Springer, 978-3-642-04188-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wireless networks, Network security, public key cryptography, hash chains |
21 | Gábor Horváth 0001, Kristóf Gáti |
Kernel CMAC with Reduced Memory Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (1) ![In: Artificial Neural Networks - ICANN 2009, 19th International Conference, Limassol, Cyprus, September 14-17, 2009, Proceedings, Part I, pp. 698-707, 2009, Springer, 978-3-642-04273-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
smoothing regularization, memory complexity reduction, CMAC, kernel machines, hash-coding |
21 | João Pedro Barreto 0002, Paulo Ferreira 0001 |
Efficient Locally Trackable Deduplication in Replicated Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30 - December 4, 2009. Proceedings, pp. 103-122, 2009, Springer, 978-3-642-10444-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
compare-by-hash, data replication, distributed file systems, delta encoding, Data deduplication |
21 | Xuewang Zhang, Linlin Wang |
Key Technologies for Security Enhancing of Payment Gateway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 743-748, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
payment gateway, security enhancing, fusion-based solution for SSL and SET protocols, secure hash algorithm, AES |
21 | Peng Wang 0009, Dengguo Feng, Changlu Lin, Wenling Wu |
Security of Truncated MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 96-114, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Robust unforgeability, Message authentication code, Universal hash function, Unforgeability, Unpredictability |
21 | Jiali Choy, Khoongming Khoo |
New Applications of Differential Bounds of the SDS Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 367-384, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SPN, branch number, {0, 1}-matrices, differential, universal hash functions |
21 | Stéphane Manuel, Thomas Peyrin |
Collisions on SHA-0 in One Hour. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 16-35, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hash functions, SHA-0, boomerang attack |
21 | Gaëtan Leurent |
MD4 is Not One-Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 412-428, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
21 | David Bauer, Douglas M. Blough, David Cash |
Minimal information disclosure with efficiently verifiable credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 15-24, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree |
21 | Junping Xiang, Maolin Hu |
An Efficient Method for Sampling and Computing Molecular Surface. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMEI (1) ![In: Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, BMEI 2008, May 28-30, 2008, Sanya, Hainan, China - Volume 1, pp. 52-56, 2008, IEEE Computer Society, 978-0-7695-3118-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
solvent-accessible surface, solvent-excluded surface, parallel computation, hash function, quantitative analysis |
21 | Ying Liu, Jingbo Xia, Jing Dai |
A Novel Adaptive Proxy Certificates Management Scheme in Military Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC ![In: Network and Parallel Computing, IFIP International Conference, NPC 2007, Dalian, China, September 18-21, 2007, Proceedings, pp. 23-30, 2007, Springer, 978-3-540-74783-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Military Grid, hierarchical one-way chains, proxy certificate, GSI, hash value |
21 | Vishwas Patil, Alessandro Mei, Luigi V. Mancini |
Addressing interoperability issues in access control models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 389-391, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, interoperability, chameleon hash, name spaces |
21 | Marko Hölbl, Christian Rechberger, Tatjana Welzer |
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 28-38, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
differential collision search, hash function, conditions, SHA-256 |
21 | Goce Jakimoski, K. P. Subbalakshmi |
On Efficient Message Authentication Via Block Cipher Design Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 232-248, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions |
21 | John P. Steinberger |
The Collision Intractability of MDC-2 in the Ideal-Cipher Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 34-51, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Collision-resistant hashing, MDC-2, cryptographic hash functions, ideal-cipher model |
21 | Kazuhiro Suzuki, Kaoru Kurosawa |
How to Find Many Collisions of 3-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 428-443, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash function, collision, differential attack, HAVAL |
21 | Markku-Juhani Olavi Saarinen |
Linearization Attacks Against Syndrome Based Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 1-9, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack |
21 | Kan Yasuda |
Multilane HMAC - Security beyond the Birthday Limit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 18-32, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multilane, failure-friendly, hash function, message authentication code, HMAC, NMAC, birthday attack |
21 | Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei |
A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 728-744, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, smart card, hash function, password, key exchange |
21 | Ping Yu 0006, Stephen R. Tate |
An Online/Offline Signature Scheme Based on the Strong RSA Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 601-606, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Online/Offline Signing, Suitable Hash Function, Digital Signature, Random Oracle, Strong RSA Assumption |
21 | Ran Canetti, Ronald L. Rivest, Madhu Sudan 0001, Luca Trevisan, Salil P. Vadhan, Hoeteck Wee |
Amplifying Collision Resistance: A Complexity-Theoretic Treatment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 264-283, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash functions, combiners, collision resistance, hardness amplification |
21 | Kai Chen 0007, Xinglei Zhu, Zhishou Zhang |
A Hybrid Content-Based Image Authentication Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2007, 8th Pacific Rim Conference on Multimedia, Hong Kong, China, December 11-14, 2007, Proceedings, pp. 226-235, 2007, Springer, 978-3-540-77254-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Content hash, Watermarking, Digital Signature, ECC, Image Authentication |
21 | Vassilis Stoumpos, Alex Delis |
GRACE-based joins on active storage devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 20(3), pp. 199-224, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Active storage devices, Join processing on disk architectures, Adaptive hash-join, Intelligent disks, Evaluation of algorithms |
21 | YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won |
A PKI System for Detecting the Exposure of a User's Secret Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 248-250, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
key-insulated signature, one-time hash chain, NOVOMODO |
21 | Michael Furman, Yossi Matias, Ely Porat |
LTS: The List-Traversal Synopses System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NGITS ![In: Next Generation Information Technologies and Systems, 6th International Workshop, NGITS 2006, Kibbutz Shefayim, Israel, July 4-6, 2006, Proceedings, pp. 353-354, 2006, Springer, 3-540-35472-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
program rollback, list traversal, pebbling, hash chain, synopsis |
21 | Matthew Caesar 0001, Miguel Castro 0001, Edmund B. Nightingale, Greg O'Shea, Antony I. T. Rowstron |
Virtual ring routing: network routing inspired by DHTs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, September 11-15, 2006, pp. 351-362, 2006, ACM, 1-59593-308-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
wireless, distributed hash table, network routing |
21 | Kyriacos E. Pavlou, Richard T. Snodgrass |
Forensic analysis of database tampering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Chicago, Illinois, USA, June 27-29, 2006, pp. 109-120, 2006, ACM, 1-59593-256-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
append-only, corruption diagram, forensic strength, cryptographic hash function |
21 | Michel Abdalla, David Pointcheval |
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 332-347, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Smooth Projective Hash Functions, Group Key Exchange, Password-based Authentication |
21 | Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 |
Generic On-Line/Off-Line Threshold Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 58-74, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic |
21 | Hongbo Yu, Xiaoyun Wang 0001, Aaram Yun, Sangwoo Park |
Cryptanalysis of the Full HAVAL with 4 and 5 Passes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 89-110, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
message modification, Hash function, collision, differential path |
21 | Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota |
Birthday Paradox for Multi-collisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 29-40, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multi-collision, hash function, collision resistant, birthday paradox |
21 | Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun |
Collision Search Attack for 53-Step HAS-160. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 286-295, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
collision search attack, HAS-160, cryptanalysis, hash function |
21 | HongKi Lee, DaeHun Nyang, JooSeok Song |
Message and Its Origin Authentication Protocol for Data Aggregation in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 281-290, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
sensor networks, authentication, aggregation, hash chain, Merkle tree |
21 | Guilin Wang, Feng Bao 0001 |
Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 399-409, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart card, hash function, attack, password authentication |
21 | Jun-Cheol Jeon, Kee-Young Yoo |
Authentication Based on Singular Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACRI ![In: Cellular Automata, 7th International Conference on Cellular Automata, for Research and Industry, ACRI 2006, Perpignan, France, September 20-23, 2006, Proceedings, pp. 605-610, 2006, Springer, 3-540-40929-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Singular Operation, Authentication, Cellular Automata, Hash function, One-Time Password |
21 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 7(4-5), pp. 371-389, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
21 | Anne-Marie Bosneag, Monica Brockmeyer |
A Unified Formal Specification for a Multi-Consistency Replication System for DHTs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 4-7 April 2005, Greenbelt, MD, USA, pp. 33-40, 2005, IEEE Computer Society, 0-7695-2308-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
replica consistency, multi-consistency replication, reliability, formal specification, distributed hash table |
21 | Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia |
Secure Biometric Authentication for Weak Computational Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 357-371, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, biometrics, smart cards, cryptographic hash functions |
21 | Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky |
Sufficient Conditions for Collision-Resistant Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 445-456, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
private information-retrieval, homomorphic encryption, Collision-resistant hash functions |
21 | Wen-Shenq Juang |
A Simple and Efficient Conference Scheme for Mobile Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers, pp. 81-95, 2005, Springer, 3-540-31012-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Symmetric cryptosystems, Network security, Mobile communications, One-way hash functions, Conference keys |
21 | Daisuke Takemoto, Shigeaki Tagashira, Satoshi Fujita |
A Fault-Tolerant Content Addressable Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: Parallel and Distributed Processing and Applications, Third International Symposium, ISPA 2005, Nanjing, China, November 2-5, 2005, Proceedings, pp. 792-803, 2005, Springer, 3-540-29769-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
content addressable network, fault-tolerance, distributed hash table, Peer-to-peer system |
21 | Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto |
A Proposal of Short Proxy Signature using Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 631-635, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
general hash function, bilinear pairing, elliptic curve cryptosystem, proxy signature, short signature |
21 | Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 |
The Second-Preimage Attack on MD4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 1-12, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
collision differential path, weak message, Hash function, second-preimage |
21 | Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou 0001 |
Authenticating Query Results in Data Publishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 376-388, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authentication, data publishing, aggregated signature, merkle hash tree |
21 | Markku-Juhani Olavi Saarinen |
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 36-44, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SHACAL, Dedicated hash functions, MDC, MD5, SHA-1, Slide attacks |
Displaying result #501 - #600 of 7013 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|