The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Inscrypt"( http://dblp.L3S.de/Venues/Inscrypt )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cisc

Publication years (Num. hits)
2006 (24) 2007 (41) 2008 (32) 2009 (33) 2010 (35) 2011 (28) 2012 (24) 2013 (26) 2014 (30) 2015 (28) 2016 (33) 2017 (31) 2018 (38) 2019 (34) 2020 (33) 2021 (30) 2022 (26) 2023 (1)
Publication types (Num. hits)
inproceedings(510) proceedings(17)
Venues (Conferences, Journals, ...)
Inscrypt(527)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 197 occurrences of 155 keywords

Results
Found 527 publication records. Showing 527 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Xin Jiang, Jintai Ding, Lei Hu Kipnis-Shamir Attack on HFE Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MinRank, relinearization, Gröbner basis, multivariate public key cryptosystem, XL algorithm, HFE
1Junfeng Tian, Ning Li A New Proactive Defense Model Based on Intrusion Deception and Traceback. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion deception, Trap environment, Honeypot, Traceback
1Zhan Wang, Yoshiaki Hori, Kouichi Sakurai Application and Evaluation of Bayesian Filter for Chinese Spam. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Chinese email, spam, Bayesian filtering
1Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Verification, Formal Specification, RBAC, Separation of Duty
1Dayin Wang, Dongdai Lin, Wenling Wu OPMAC: One-Key Poly1305 MAC. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Carter-Wegman MAC, Universal Hash Family, Block cipher, Message Authentication Code, Pseudorandom Function, Pseudorandom Permutation
1SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han Design and Implementation of Fast Access Control That Supports the Separation of Duty. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Flask, Access control, RBAC, SELinux, DAC
1Gaeil An, Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack
1Lukasz Krzywiecki, Przemyslaw Kubiak 0001, Miroslaw Kutylowski A Revocation Scheme Preserving Privacy. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key broadcasting, exclusion protocol, anonymity
1Yi Shi, Xinyu Yang, Ning Li, Yong Qi Deterministic Packet Marking with Link Signatures for IP Traceback. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xin Tong, Jie Zhang 0004, Qiao-Yan Wen New Constructions of Large Binary Sequences Family with Low Correlation. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF large family size, linear span, correlation, binary sequences
1Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon, Jin Gi Choe, Yu Kang An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Changshe Ma Efficient Short Signcryption Scheme with Public Verifiability. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF provable security, Signcryption, tight reduction
1Christophe Tartary, Huaxiong Wang Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear pairing, group signature, ID-based cryptography, verifiably encrypted signature
1Benoît Libert, Jean-Jacques Quisquater, Moti Yung Efficient Intrusion-Resilient Signatures Without Random Oracles. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion-resilience, signatures, standard model, pairings
1Debrup Chakraborty, Palash Sarkar 0001 A General Construction of Tweakable Block Ciphers and Different Modes of Operations. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tweakable block cipher, AEAD, MAC, modes of operations, AE
1Jian Weng 0001, Shengli Liu 0001, Kefei Chen, Xiangxue Li Identity-Based Key-Insulated Signature with Secure Key-Updates. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-Insulated, Bilinear Pairings, Identity-Based Signature, Key-Exposure
1Liuying Tang, Sihan Qing A Practical Alternative to Domain and Type Enforcement Integrity Formal Models. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security goal, integrity, information flow, formal model, Security label
1Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao A Network Security Policy Model and Its Realization Mechanism. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, Security policy, domain, rule engine
1Yuan-man Tong, Zhiying Wang 0003, Kui Dai, Hongyi Lu Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF WDDL, power analysis resistant, block cipher, design flow, Wave-pipelining
1Deok Jin Kim, Tae-Hyung Kim, Jong Kim 0001, Sung Je Hong Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Return Address, return-into-libc Attack, Data Injection Buffer Overflow Attack, Security, Randomization, Buffer Overflow, Instruction Set
1Xuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li On the Rate of Coincidence of Two Clock-Controlled Combiners. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Rate of Coincidence, Probabilistic Model, Combiner, Clock-Controlled
1Marcel Fernandez, Josep Cotrina Navau Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1You Chen, Yang Li 0002, Xueqi Cheng, Li Guo 0001 Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF feature selection, intrusion detection, filter, hybrid, wrapper
1Helger Lipmaa, Moti Yung, Dongdai Lin (eds.) Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yongdong Wu, Feng Bao 0001 Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #527 of 527 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license