The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISPEC"( http://dblp.L3S.de/Venues/ISPEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ispec

Publication years (Num. hits)
2005 (36) 2006 (36) 2007 (27) 2008 (30) 2009 (35) 2010 (29) 2011 (33) 2012 (28) 2013 (28) 2014 (42) 2015 (39) 2016 (26) 2017 (58) 2018 (40) 2019 (29) 2021 (25) 2022 (36) 2023 (324)
Publication types (Num. hits)
inproceedings(882) proceedings(19)
Venues (Conferences, Journals, ...)
ISPEC(901)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 123 occurrences of 109 keywords

Results
Found 901 publication records. Showing 901 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Zhongyuan Yao, Yi Mu 0001, Guomin Yang Group-Based Source-Destination Verifiable Encryption with Blacklist Checking. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tianxiang Huang, Jianying Zhou 0001, Yi Wang 0016, Anyu Cheng On the Security of In-Vehicle Hybrid Network: Status and Challenges. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bo Lv, Zhiniang Peng, Shaohua Tang A Secure Variant of the SRP Encryption Scheme with Shorter Private Key. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hang Jiang, Rui Chang, Lu Ren, Weiyu Dong, Liehui Jiang, Shuiqiao Yang An Effective Authentication for Client Application Using ARM TrustZone. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Rongmao Chen, Willy Susilo, Thomas Plantard Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xuan Han, Yamin Liu, Haixia Xu 0002 A User-Friendly Centrally Banked Cryptocurrency. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jun Cai 0002, Jian-Zhen Luo, Jianliang Ruan, Yan Liu 0042 Toward Fuzz Test Based on Protocol Reverse Engineering. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Na Li, Qianhong Wu, Jingwen Liu, Wei Hu, Bo Qin, Wei Wu EyeSec: A Practical Shoulder-Surfing Resistant Gaze-Based Authentication System. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bo-Yeon Sim, Dong-Guk Han Key Bit-Dependent Attack on Protected PKC Using a Single Trace. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yanjun Shen, Peng Zhang 0029 Ranked Searchable Symmetric Encryption Supporting Conjunctive Queries. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Haibo Tian, Jiejie He, Liqing Fu Contract Coin: Toward Practical Contract Signing on Blockchain. Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hooman Alavizadeh, Dong Seong Kim 0001, Jin B. Hong, Julian Jang-Jaccard Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper). Search on Bibsonomy ISPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhiniang Peng, Shaohua Tang, Ju Chen, Chen Wu, Xinglin Zhang Fast Implementation of Simple Matrix Encryption Scheme on Modern x64 CPU. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daichi Adachi, Kazumasa Omote A Host-Based Detection Method of Remote Access Trojan in the Early Stage. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhan Chen, Huaifeng Chen, Xiaoyun Wang 0001 Cryptanalysis of Midori128 Using Impossible Differential Techniques. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia 0001 Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hadrien Barral, Houda Ferradi, Rémi Géraud, Georges-Axel Jaloyan, David Naccache ARMv8 Shellcodes from 'A' to 'Z'. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hongbing Wang, Yingjiu Li, Zongyang Zhang, Yunlei Zhao Efficient Tag Path Authentication Protocol with Less Tag Memory. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhongyuan Yao, Yi Mu 0001, Guomin Yang A Privacy Preserving Source Verifiable Encryption Scheme. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kamil Kluczniak, Lucjan Hanzlik, Miroslaw Kutylowski A Formal Concept of Domain Pseudonymous Signatures. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jian Zhang, Wenling Wu, Yafei Zheng Collision Attacks on CAESAR Second-Round Candidate: ELmD. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ge Wu 0001, Yi Mu 0001, Willy Susilo, Fuchun Guo Privacy-Preserving Cloud Auditing with Multiple Uploaders. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hong Wei Siew, Saw Chin Tan, Ching Kwang Lee Masking Algorithm for Multiple Crosstalk Attack Source Identification Under Greedy Sparse Monitoring. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chen Xu, Jingwei Chen, Wenyuan Wu, Yong Feng Homomorphically Encrypted Arithmetic Operations Over the Integer Ring. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhuo Wei, Yanjiang Yang, Tieyan Li Authenticated CAN Communications Using Standardized Cryptographic Techniques. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shifeng Sun 0001, Xinyi Huang 0001 Anonymizing Bitcoin Transaction. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Przemyslaw Blaskiewicz, Lukasz Krzywiecki, Piotr Syga RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Huiling Zhang, Wenling Wu Structural Evaluation for Simon-Like Designs Against Integral Attack. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Henning Kopp, Christoph Bösch, Frank Kargl KopperCoin - A Distributed File Storage with Financial Incentives. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jian Zhang, Wenling Wu, Yafei Zheng Security of SM4 Against (Related-Key) Differential Cryptanalysis. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhoujun Ma, Li Yang, Yunlei Zhao Practical Signature Scheme from \varGamma Γ -Protocol. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jian Zhang, Yawei Zhang, Pin Liu, Jianbiao He A Spark-Based DDoS Attack Detection Model in Cloud Services. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jingguo Bi, Jiayang Liu Cryptanalysis of a Privacy Preserving Auditing for Data Integrity Protocol from TrustCom 2013. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Liqun Chen, Robert H. Deng, Guojun Wang (eds.) Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenlun Pan, Zhenzhen Bao, Dongdai Lin, Feng Liu 0001 The Distribution of 2^n 2 n -Periodic Binary Sequences with Fixed k-Error Linear Complexity. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Guozhu Zhang, Luning Xia, Shijie Jia 0001, Yafei Ji Physical-Layer Identification of HF RFID Cards Based on RF Fingerprinting. Search on Bibsonomy ISPEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Craig Sanders, Ayush Shah, Shengzhi Zhang Comprehensive Analysis of the Android Google Play's Auto-update Policy. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jannik Dreier, Rosario Giustolisi, Ali Kassem 0001, Pascal Lafourcade 0001, Gabriele Lenzini A Framework for Analyzing Verifiability in Traditional and Electronic Exams. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shaoyu Du, Bin Zhang 0003, Zhenqi Li, Dongdai Lin Fault Attacks on Stream Cipher Scream. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wei Zhang, Yu Zhang 0086 Lightweight Function Pointer Analysis. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Clémentine Gritti, Willy Susilo, Thomas Plantard Efficient File Sharing in Electronic Health Records. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Michael Velten, Peter Schneider 0002, Sascha Wessel, Claudia Eckert 0001 User Identity Verification Based on Touchscreen Interaction Analysis in Web Contexts. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Guangjun Fan, Yongbin Zhou, François-Xavier Standaert, Dengguo Feng On the Impacts of Mathematical Realization over Practical Security of Leakage Resilient Cryptographic Schemes. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Liang Cheng, Shaoyin Cheng, Fan Jiang 0005 ADKAM: A-Diversity K-Anonymity Model via Microaggregation. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaochao Sun, Bao Li 0001, Xianhui Lu Cramer-Shoup Like Chosen Ciphertext Security from LPN. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Song Tian, Wei Yu 0008, Bao Li 0001, Kunpeng Wang Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shantian Cheng, Juanyang Zhang Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhejun Fang, Qixu Liu, Yuqing Zhang 0001, Kai Wang, Zhiqiang Wang 0006 IVDroid: Static Detection for Input Validation Vulnerability in Android Inter-component Communication. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yunya Zhou, Jianwei Liu 0001, Hua Deng, Bo Qin, Lei Zhang 0009 Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Liqiang Peng, Lei Hu, Zhangjie Huang, Jun Xu 0022 Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fariba Haddadi, Duc Le Cong, Laura Porter, Nur Zincir-Heywood On the Effectiveness of Different Botnet Detection Approaches. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sibei Jiao, Yao Cheng, Lingyun Ying, Purui Su, Dengguo Feng A Rapid and Scalable Method for Android Application Repackaging Detection. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shaoyu Du, Zhenqi Li, Bin Zhang 0003, Dongdai Lin Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Baoping Tian, Fushan Wei, Chuangui Ma Strongly Secure Key Exchange Protocol with Minimal KEM. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jina Kang, Hyoungshick Kim, Yun-Gyung Cheong, Jun Ho Huh Visualizing Privacy Risks of Mobile Applications through a Privacy Meter. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Riham AlTawy, Amr M. Youssef Differential Fault Analysis of Streebog. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shijun Zhao, Qianying Zhang sHMQV: An Efficient Key Exchange Protocol for Power-Limited Devices. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dibyendu Roy 0001, Ankita Chaturvedi, Sourav Mukhopadhyay New Constructions of T-function. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lucjan Hanzlik, Miroslaw Kutylowski, Moti Yung Hard Invalidation of Electronic Signatures. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay Fully Secure Online/Offline Predicate and Attribute-Based Encryption. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qihua Niu, Hongda Li 0001, Guifang Huang, Bei Liang, Fei Tang One-Round Witness Indistinguishability from Indistinguishability Obfuscation. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yutaka Kawai Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Javier López 0001, Yongdong Wu (eds.) Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yang Yang, Zhi Guan, Huiping Sun, Zhong Chen 0001 Accelerating RSA with Fine-Grained Parallelism Using GPU. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chun Guo 0002, Hailong Zhang 0001, Dongdai Lin Estimating Differential-Linear Distinguishers and Applications to CTC2. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Song Tian, Wei Yu 0008, Bao Li 0001, Kunpeng Wang Models of Curves from GHS Attack in Odd Characteristic. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qingbin Wang, Shaozhen Chen, Aijun Ge 0001 A New Lattice-Based Threshold Attribute-Based Signature Scheme. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weixuan Li, Wei Yu 0008, Kunpeng Wang Analysis of Fractional ωmbNAF for Scalar Multiplication. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhihui Han, Liang Cheng 0004, Yang Zhang 0021, Dengguo Feng Operating System Security Policy Hardening via Capability Dependency Graphs. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lin Ding 0001, Chenhui Jin, Jie Guan, Shaowu Zhang, Ting Cui, Wei Zhao New Related Key Attacks on the RAKAPOSHI Stream Cipher. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Qianqian Yang 0003, Lei Hu, Siwei Sun, Kexin Qiao, Ling Song 0001, Jinyong Shan, Xiaoshuang Ma Improved Differential Analysis of Block Cipher PRIDE. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jianghong Wei, Xinyi Huang 0001, Xuexian Hu, Wenfen Liu Revocable Threshold Attribute-Based Signature against Signing Key Exposure. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chenglong Wei, Wenchang Shi, Bo Qin, Bin Liang 0002 Expanding an Operating System's Working Space with a New Mode to Support Trust Measurement. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yang Sun, Qianhong Wu, Bo Qin, Yujue Wang, Jianwei Liu 0001 Batch Blind Signatures on Elliptic Curves. Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Erick Bauman, Yafeng Lu, Zhiqiang Lin Half a Century of Practice: Who Is Still Storing Plaintext Passwords? Search on Bibsonomy ISPEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tao Jiang 0017, Xiaofeng Chen 0001, Jin Li 0002, Duncan S. Wong, Jianfeng Ma 0001, Joseph K. Liu TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jing Wang, Le Guan, Limin Liu, Daren Zha Implementing a Covert Timing Channel Based on Mimic Function. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jun Xu 0022, Lei Hu, Zhangjie Huang, Liqiang Peng Modular Inversion Hidden Number Problem Revisited. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weijin Wang, Yu Qin, Dengguo Feng Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Atsuko Miyaji, Chunhua Su Distributed Pseudo-Random Number Generation and Its Application to Cloud Database. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jun Zhang 0031, Xinran Li, Fang-Wei Fu 0001 Multi-receiver Authentication Scheme for Multiple Messages Based on Linear Codes. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mingwu Zhang ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yi Tang, Piaoping Lin, Zhaokai Luo Obfuscating Encrypted Web Traffic with Combined Objects. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dieter Gollmann Access Control in and Around the Browser. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shujie Cui, Johann Großschädl, Zhe Liu 0001, Qiuliang Xu High-Speed Elliptic Curve Cryptography on the NVIDIA GT200 Graphics Processing Unit. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mehari Msgna, Konstantinos Markantonakis, Keith Mayes Precise Instruction-Level Side Channel Profiling of Embedded Processors. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Puwen Wei, Yuliang Zheng 0001, Wei Wang Multi-recipient Encryption in Heterogeneous Setting. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wulu Li New Variants of Lattice Problems and Their NP-Hardness. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ronglin Hao, Bao Li 0001, Bingke Ma, Xiaoqian Li Improved Preimage Attacks against Reduced HAS-160. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei A Website Credibility Assessment Scheme Based on Page Association. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yong Yu 0002, Jianbing Ni, Jian Ren 0001, Wei Wu, Lanxiang Chen, Qi Xia Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fei Tang, Hongda Li 0001, Qihua Niu, Bei Liang Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shaohua Tang, Bo Lv, Guomin Chen, Zhiniang Peng Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Willy Susilo Two-Party (Blind) Ring Signatures and Their Applications. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pierangela Samarati Data Security and Privacy in the Cloud. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hongmei Liu, Songtao Li, Shan Bian Detecting Frame Deletion in H.264 Video. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mehrdad Nojoumian, Douglas R. Stinson Efficient Sealed-Bid Auction Protocols Using Verifiable Secret Sharing. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 901 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license