The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for indistinguishability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1997 (18) 1998-1999 (17) 2000-2001 (15) 2002 (20) 2003 (17) 2004 (15) 2005 (27) 2006 (28) 2007 (26) 2008 (29) 2009 (30) 2010-2011 (20) 2012 (15) 2013 (21) 2014 (33) 2015 (45) 2016 (40) 2017 (42) 2018 (29) 2019 (27) 2020 (36) 2021 (33) 2022 (36) 2023 (38) 2024 (15)
Publication types (Num. hits)
article(301) book(1) incollection(2) inproceedings(358) phdthesis(10)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 209 occurrences of 141 keywords

Results
Found 672 publication records. Showing 672 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Nick Huggett, Tom Imbo Indistinguishability. Search on Bibsonomy Compendium of Quantum Physics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Peter Gazi, Ueli Maurer Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification. Search on Bibsonomy ICITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Zongyang Zhang, Zhenfu Cao, Rong Ma An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge. Search on Bibsonomy TAMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Koen de Groot, Emile Kelkboom, Anton H. M. Akkermans A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem. Search on Bibsonomy DPM/SETOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasizadeh Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2008 DBLP  BibTeX  RDF
17Jordi Recasens The structure of decomposable indistinguishability operators. Search on Bibsonomy Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Jordi Recasens, Dionís Boixader A Map Characterizing the Fuzzy Points and Columns of a T-Indistinguishability Operator. Search on Bibsonomy Int. J. Uncertain. Fuzziness Knowl. Based Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Yu Zhang The computational SLR: a logic for reasoning about computational indistinguishability. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
17Adem Orsdemir, Oktay Altun, Gaurav Sharma 0001, Mark F. Bocko Steganalysis aware steganography: statistical indistinguishability despite high distortion. Search on Bibsonomy Security, Forensics, Steganography, and Watermarking of Multimedia Contents The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Luis Garmendia, Jordi Recasens Finding Close T-indistinguishability Operators to a Given Proximity. Search on Bibsonomy EUSFLAT Conf. (2) The full citation details ... 2007 DBLP  BibTeX  RDF
17Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner Indistinguishability Amplification. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Enric Hernández Uncertainty and indistinguishability. Application to modelling with words. Search on Bibsonomy 2007   RDF
17Joan Jacas, Jordi Recasens Aggregation operators based on indistinguishability operators. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti Concurrent Non-Malleable Witness Indistinguishability and its Applications. Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 2006 DBLP  BibTeX  RDF
17Mihir Bellare, Amit Sahai Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
17Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami Computational Indistinguishability between Quantum States and Its Cryptographic Application. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
17Gergei Bana, Payman Mohassel, Till Stegers Computational Soundness of Formal Indistinguishability and Static Equivalence. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
17Ueli Maurer, Krzysztof Pietrzak, Renato Renner Indistinguishability Amplification. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
17Krzysztof Pietrzak Indistinguishability and composition of random systems. Search on Bibsonomy 2006   RDF
17Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework Search on Bibsonomy CoRR The full citation details ... 2005 DBLP  BibTeX  RDF
17Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
17Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
17Ariel Cohen 0004, Michael Kaminski, Johann A. Makowsky Indistinguishability by Default. Search on Bibsonomy We Will Show Them! (1) The full citation details ... 2005 DBLP  BibTeX  RDF
17Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami Computational Indistinguishability Between Quantum States and Its Cryptographic Application. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Adolfo R. de Soto Multiresolution Analysis and Fuzzy Indistinguishability Operators: a first approach. Search on Bibsonomy EUSFLAT Conf. The full citation details ... 2005 DBLP  BibTeX  RDF
17Claudi Alsina, Enric Trillas Stability, Indistinguishability and Small Numbers. Search on Bibsonomy EUSFLAT Conf. The full citation details ... 2005 DBLP  BibTeX  RDF
17Joan Jacas, Jordi Recasens Aggregating with Indistinguishability Operators. Search on Bibsonomy EUSFLAT Conf. The full citation details ... 2005 DBLP  BibTeX  RDF
17Enric Hernández, Jordi Recasens Indistinguishability in cooperative games. Search on Bibsonomy EUSFLAT Conf. The full citation details ... 2005 DBLP  BibTeX  RDF
17Thomas Santen Probabilistic Confidentiality Properties based on Indistinguishability. Search on Bibsonomy Sicherheit The full citation details ... 2005 DBLP  BibTeX  RDF
17Enric Hernández, Jordi Recasens Indistinguishability relations in Dempster-Shafer theory of evidence. Search on Bibsonomy Int. J. Approx. Reason. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Neil D. Evans, Michael J. Chappell, Michael J. Chapman, Keith R. Godfrey Structural indistinguishability between uncontrolled (autonomous) nonlinear analytic systems. Search on Bibsonomy Autom. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Mustafa Demirci Topological properties of the class of generators of an indistinguishability operator. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Joan Jacas, Jordi Recasens The group of isometries of an indistinguishability operator. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Joan Jacas, Jordi Recasens Indistinguishability operators generated by fuzzy numbers. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Konstantinos Georgatos On Indistinguishability and Prototypes. Search on Bibsonomy Log. J. IGPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Enric Hernández, Jordi Recasens Generating indistinguishability operators from prototypes. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Frank Höppner, Frank Klawonn, Patrik Eklund Learning indistinguishability from data. Search on Bibsonomy Soft Comput. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Equality relations, Alternating optimisation, Fuzzy systems, Function approximation
17Enric Hernández, Jordi Recasens A reformulation of entropy in the presence of indistinguishability operators. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Yodai Watanabe, Junji Shikata, Hideki Imai Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
17Jaap Kamps, Maarten Marx Notions of Indistinguishability for Semantic Web Languages. Search on Bibsonomy ISWC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Adolfo R. de Soto, Jordi Recasens Modelling a linguistic variable as a hierarchical family of partitions induced by an indistinguishability operator. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Enric Hernández, Jordi Recasens Growing decision trees in the presence of indistinguishability: observational decision trees. Search on Bibsonomy EUSFLAT Conf. The full citation details ... 2001 DBLP  BibTeX  RDF
17Joan Jacas, Jordi Recasens One-dimensional indistinguishability operators. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Dionís Boixader, Joan Jacas, Jordi Recasens The Length and Betweenness Relations of Indistinguishability Operators. Search on Bibsonomy Int. J. Uncertain. Fuzziness Knowl. Based Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Oded Goldreich 0001, Madhu Sudan 0001 Computational Indistinguishability: A Sample Hierarchy. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Mihir Bellare, Amit Sahai Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 1999 DBLP  BibTeX  RDF
17Enric Hernández, Jordi Recasens Observational entropy: entropy in the context of indistinguishability operators. Search on Bibsonomy EUSFLAT-ESTYLF Joint Conf. The full citation details ... 1999 DBLP  BibTeX  RDF
17Oded Goldreich 0001, Bernd Meyer 0005 Computational Indistinguishability: Algorithms vs. Circuits. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Oded Goldreich 0001, Madhu Sudan 0001 Computational Indistinguishability: A Sample Hierarchy Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 1998 DBLP  BibTeX  RDF
17Michael J. Horowitz, David L. Neuhoff Image coding by perceptual pruning with a cortical snapshot indistinguishability criterion. Search on Bibsonomy Human Vision and Electronic Imaging The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Moni Naor, Omer Reingold From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Oded Goldreich 0001, Madhu Sudan 0001 Computational Indistinguishability: A Sample Hierarchy. Search on Bibsonomy CCC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Bernard De Baets, Milan Mares, Radko Mesiar Fuzzy Zeroes and Indistinguishability of Real Numbers. Search on Bibsonomy Fuzzy Days The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17Michael J. Chapman, Keith R. Godfrey Nonlinear compartmental model indistinguishability. Search on Bibsonomy Autom. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
17Oded Goldreich 0001, Bernd Meyer 0005 Computational Indistinguishability - Algorithms vs. Circuits. Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 1996 DBLP  BibTeX  RDF
17Gilles Bernot, Michel Bidoit, Teodor Knapik Observational Specifications and the Indistinguishability Assumption. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Oded Goldreich 0001 A Note on Computational Indistinguishability. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
17Kenneth Mark Colby, Franklin Dennis Hilf, Sylvia Weber 0001, Helena C. Kraemer Turing-like Indistinguishability Tests for the Calidation of a Computer Simulation of Paranoid Processes. Search on Bibsonomy Artif. Intell. The full citation details ... 1972 DBLP  DOI  BibTeX  RDF
12Nicholas J. Hopper, Luis von Ahn, John Langford 0001 Provably Secure Steganography. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 Using IND-CVA for constructing secure communication. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, authenticated encryption, semantic security, universally composable security, secure channel
12Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li RFID privacy: relation between two notions, minimal condition, and efficient construction. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, rfid, pseudorandom function
12Jens-Matthias Bohli, Andreas Pashalidis Relations Among Privacy Notions. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu Relationship privacy: output perturbation for queries with joins. Search on Bibsonomy PODS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis
12Stefan Ciobaca, Stéphanie Delaune, Steve Kremer Computing Knowledge in Security Protocols under Convergent Equational Theories. Search on Bibsonomy CADE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Sherman S. M. Chow Removing Escrow from Identity-Based Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Vipul Goyal, Amit Sahai Resettably Secure Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill Order-Preserving Symmetric Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Alexander W. Dent A Brief History of Security Models for Confidentiality. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen Enhancement of the RFID security method with ownership transfer. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, efficiency, RFID system, ownership transfer
12Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan Computational Differential Privacy. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Tsau Young Lin, Lotfi A. Zadeh Foreword to the Special Section on Granular Computing. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 Further Observations on Certificateless Public Key Encryption. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Carmit Hazay, Yehuda Lindell Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Omer Reingold, Luca Trevisan, Madhur Tulsiani, Salil P. Vadhan Dense Subsets of Pseudorandom Sets. Search on Bibsonomy FOCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin How to Encrypt with the LPN Problem. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LPN, error-correcting code, symmetric encryption
12David Galindo, Flavio D. Garcia, Peter van Rossum Computational Soundness of Non-Malleable Commitments. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira Modeling Computational Security in Long-Lived Systems. Search on Bibsonomy CONCUR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha A New Formal Proof Model for RFID Location Privacy. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF formal proof model, location privacy, RFID security
12Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Alexandra Boldyreva, Serge Fehr, Adam O'Neill On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Simon Kramer 0001 Logical concepts in cryptography. Search on Bibsonomy SIGACT News The full citation details ... 2007 DBLP  DOI  BibTeX  RDF applied formal logic, information security
12Phillip Rogaway, Mihir Bellare Robust computational secret sharing and a unified account of classical secret-sharing goals. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage
12Joan Jacas, Jordi Recasens Aggregation Operators and the Lipschitzian Condition. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Angelo Montanari, Gabriele Puppis A Contraction Method to Decide MSO Theories of Deterministic Trees. Search on Bibsonomy LICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Relations Among Notions of Non-malleability for Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public-key Encryption, Non-malleability
12Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci New constructions for provably-secure time-bound hierarchical key assignment schemes. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, provable security, key assignment
12Sherman S. M. Chow, Kim-Kwang Raymond Choo Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reveal query, anonymity, provable security, Key agreement, identity-based cryptography
12Chun-Yuan Hsiao, Chi-Jen Lu, Leonid Reyzin Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Rajeev Alur, Pavol Cerný, Swarat Chaudhuri Model Checking on Trees with Path Equivalences. Search on Bibsonomy TACAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Emmanuel Bresson, Mark Manulis, Jörg Schwenk On Security Models and Compilers for Group Key Exchange Protocols. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Qianhong Wu, Willy Susilo, Yi Mu 0001, Fangguo Zhang Efficient Partially Blind Signatures with Provable Security. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Lotfi A. Zadeh Granular Computing and Rough Set Theory. Search on Bibsonomy RSEISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Wei Li 0013, Dawu Gu An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Aldar C.-F. Chan, Claude Castelluccia On the Privacy of Concealed Data Aggregation. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Venkatesan A Graph Game Model for Software Tamper Protection. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Jonathan Katz, Moti Yung Characterization of Security Notions for Probabilistic Private-Key Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Private-key encryptions, Definitions
Displaying result #501 - #600 of 672 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license