The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SECRYPT"( http://dblp.L3S.de/Venues/SECRYPT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/secrypt

Publication years (Num. hits)
2006 (73) 2007 (67) 2008 (83) 2009 (62) 2010 (71) 2011 (68) 2012 (67) 2013 (71) 2014 (64) 2015 (53) 2016 (52) 2017 (67) 2021 (96) 2022 (85) 2023 (100)
Publication types (Num. hits)
inproceedings(1064) proceedings(15)
Venues (Conferences, Journals, ...)
SECRYPT(1079)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1079 publication records. Showing 1079 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Adriana-Cristina Enache, Valentin Sgarciu Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mai Dahshan, Sherif Elkassas Framework for Securing Data in Cloud Storage Services. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kaoutar Elkhiyaoui, Melek Önen, Refik Molva Privacy Preserving Delegated Word Search in the Cloud. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas, Víctor Acín QR Steganography - A Threat to New Generation Electronic Voting Systems. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Libor Polcak, Barbora Franková On Reliability of Clock-skew-based Remote Computer Identification. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lil María Rodríguez-Henríquez, Debrup Chakraborty Using Bitmaps for Executing Range Queries in Encrypted Databases. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jinyong Chang, Rui Xue 0001 KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dijana Vukovic, Danilo Gligoroski, Zoran Djuric On Privacy Protection in the Internet Surveillance Era. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alessandro Barenghi, Gerardo Pelosi On the Security of Partially Masked Software Implementations. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Byoungcheon Lee Hybrid-Style Personal Key Management in Ubiquitous Computing. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andreas Wagner, Johannes Sametinger Using the Juliet Test Suite to Compare Static Security Scanners. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Juan Camilo Corena, Anirban Basu 0001, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ufuk Celikkan, Can Gelis NFC Based Mobile Single Sign-On Solution as a Chrome Extension. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amir I. Sulimov, Arkadij V. Karpov Secure Key Distribution based on Meteor Burst Communications. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fabio Marfia Using Abductive and Inductive Inference to Generate Policy Explanations. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Borja Sanz 0001, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas Instance-based Anomaly Method for Android Malware Detection. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Hassan Noura 0001, Steven Martin 0001, Khaldoun Al Agha E3SN - Efficient Security Scheme for Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Jonny Milliken, Valerio Selis, Kian Meng Yap, Alan Marshall 0001 Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack HoneydV6: A Low-interaction IPv6 Honeypot. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Ravi Jhawar, Vincenzo Piuri Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada 0001, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Kazuki Yoneyama Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Yevhen Zolotavkin, Martti Juhola SVD-based Digital Image Watermarking on approximated Orthogonal Matrix. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Bo Lang, Runhua Xu, Yawei Duan Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Boaz Catane, Amir Herzberg Massive Group Message Authentication with Revocable Anonymity. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Vinay S. Iyengar Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Boaz Catane, Amir Herzberg Secure Second Price Auctions with a Rational Auctioneer. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, Stefano Paraboschi A Model-driven Approach for Securing Software Architectures. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Bernd Zwattendorfer, Daniel Slamanig Privacy-preserving Realization of the STORK Framework in the Public Cloud. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Peter Teufl, Thomas Zefferer, Christof Stromberger, Christoph Hechenblaikner iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Patrick Lacharme, Estelle Cherrier, Christophe Rosenberger Preimage Attack on BioHashing. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Stefan Rass Dynamic Proofs of Retrievability from Chameleon-Hashes. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng An Efficient and Provably Secure Certificateless Identification Scheme. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Gerardo Reynaga, Sonia Chiasson The Usability of CAPTCHAs on Smartphones. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Hasan Kadhem MINHO - A Novel Authentication Scheme based on Pre-Authentication Service. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Michael Clear, Ciaran McGoldrick Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Rolf Haynberg, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Dustin van der Haar, Basie von Solms Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Mickaël Cazorla, Kevin Marquet, Marine Minier Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Daniele Codetta Raiteri A Preliminary Application of Generalized Fault Trees to Security. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1George Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis Approaching Encryption through Complex Number Logarithms. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Saradha Ravi, N. Balakrishnan 0001, Bharath Venkatesh Behavior-based Malware Analysis using Profile Hidden Markov Models. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Florian Legendre, Gilles Dequen, Michaël Krajecki From a Logical Approach to Internal States of Hash Functions - How SAT Problem Can Help to Understand SHA-* and MD*. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Matthias Trojahn, Christian Schadewald, Frank Ortmeier Keystroke Authentication with a Capacitive Display using Different Mobile Devices. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake A Key-revocable Attribute-based Encryption for Mobile Cloud Environments. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Josep Domingo-Ferrer On the Connection between t-Closeness and Differential Privacy for Data Releases. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake LMM - A Common Component for Software License Management on Cloud. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Mehrdad Aliasgari, Marina Blanton Secure Computation of Hidden Markov Models. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Thomas Zefferer, Peter Teufl Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang 0001 An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Jacques M. Bahi, Nicolas Friot, Christophe Guyeux Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Sébastien Salva, Stassia R. Zafimiharisoa, Patrice Laurençot Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal Enhanced Truncated Differential Cryptanalysis of GOST. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Mehdi Khalfaoui, Refik Molva, Laurent Gomez Secure Alert Tracking in Supply Chain. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Nirali R. Nanavati, Devesh C. Jinwala A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data Mining. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Pierangela Samarati (eds.) SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013 Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Clémentine Maurice, Stéphane Onno, Christoph Neumann 0001, Olivier Heen, Aurélien Francillon Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Ruth Ng Ii-Yung, Khoongming Khoo, Raphael C.-W. Phan On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed Ali Kâafar On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Jan Hajny, Lukas Malina, Zdenek Martinasek, Vaclav Zeman Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Lucjan Hanzlik, Wojciech Wodo Identity Security in Biometric Systems based on Keystroking. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Christian Hanser, Daniel Slamanig Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Constantinos Patsakis Recovering RSA Private Keys on Implementations with Tampered LSBs. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Hervé Chabanne, Gérard D. Cohen, Alain Patey Public-key Cryptography from Different Assumptions - A Multi-bit Version. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone Database Anomalous Activities - Detection and Quantification. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Ester Ciancamerla, Michele Minichino, S. Palmieri Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Simone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Luis Campo-Giralte, Cristina Conde, Isaac Martín de Diego, Enrique Cabello InCC: Hiding Information by Mimicking Traffic In Network Flows. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Heiko Knospe Privacy-enhanced Perceptual Hashing of Audio Data. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Alberto Ferrante, Jelena Milosevic, Marija Janjusevic A Security-enhanced Design Methodology for Embedded Systems. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis Which Side Are You On? - A New Panopticon vs. Privacy. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Lukas Malina, Jan Hajny, Zdenek Martinasek Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Lan Zhou, Vijay Varadharajan, Michael Hitchens Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Shoichi Hirose, Hidenori Kuwakado Redactable Signature Scheme for Tree-structured Data based on Merkle Tree. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Maider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías, Juan J. Igarza A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Petr Svenda, Martin Ukrop, Vashek Matyas Towards Cryptographic Function Distinguishers with Evolutionary Circuits. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Daniel Santana de Freitas, Jorge Nakahara Jr. Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Liran Lerman, Jorge Nakahara Jr., Nikita Veshchikov Improving Block Cipher Design by Rearranging Internal Operations. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Slim Trabelsi, Hana Bouafif Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Saeed Rostami, Sadegh Bamohabbat Chafjiri, Seyed Amir Hossein Tabatabaei Related-key Impossible Differential Cryptanalysis of Full-round HIGHT. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Matt Henricksen, Shinsaku Kiyomoto AVON - A Fast Hash Function for Intel SIMD Architectures. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Z. Cliffe Schreuders, Adil M. Bhat Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
1Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Mikhail J. Atallah, Keith B. Frikken, Shumiao Wang Private Outsourcing of Matrix Multiplication over Closed Semi-rings. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Ahmed Al-Khazzar, Nick Savage 0001 Biometric Identification in Virtual Worlds using Biometric Fusion Techniques. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Sufian Hameed, Tobias Kloht, Xiaoming Fu 0001 iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Mikko Kiviharju Towards Pervasive Cryptographic Access Control Models. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Chenguang Yang, Ghaith Hammouri, Berk Sunar Voice Passwords Revisited. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Nicolas T. Courtois, Theodosis Mourouzis, Pho V. Le Extension of de Weger's Attack on RSA with Large Public Keys. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Hanane Houmani, Mourad Debbabi Formal Analysis of the TLS Handshake Protocol. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Lin You, Jie Lu A Novel Fuzzy Vault Scheme for Secret Key Exchange. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
1Julien Bringer, Hervé Chabanne, Alain Patey An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management. Search on Bibsonomy SECRYPT The full citation details ... 2012 DBLP  BibTeX  RDF
Displaying result #501 - #600 of 1079 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license