Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Nick Huggett, Tom Imbo |
Indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Compendium of Quantum Physics ![In: Compendium of Quantum Physics, pp. 311-317, 2009, Springer, 978-3-540-70622-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Peter Gazi, Ueli Maurer |
Free-Start Distinguishing: Combining Two Types of Indistinguishability Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITS ![In: Information Theoretic Security, 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers, pp. 28-44, 2009, Springer, 978-3-642-14495-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Zongyang Zhang, Zhenfu Cao, Rong Ma |
An Observation on Non-Malleable Witness-Indistinguishability and Non-Malleable Zero-Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAMC ![In: Theory and Applications of Models of Computation, 6th Annual Conference, TAMC 2009, Changsha, China, May 18-22, 2009. Proceedings, pp. 470-479, 2009, Springer, 978-3-642-02016-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ileana Buhan, Jeroen Breebaart, Jorge Guajardo, Koen de Groot, Emile Kelkboom, Anton H. M. Akkermans |
A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DPM/SETOP ![In: Data Privacy Management and Autonomous Spontaneous Security, 4th International Workshop, DPM 2009 and Second International Workshop, SETOP 2009, St. Malo, France, September 24-25, 2009, Revised Selected Papers, pp. 78-92, 2009, Springer, 978-3-642-11206-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Ali Bagherzandi, Javad Mohajeri, Mahmoud Salmasizadeh |
Comparison Based Semantic Security is Probabilistic Polynomial Time Equivalent to Indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 6(3), pp. 354-360, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
17 | Jordi Recasens |
The structure of decomposable indistinguishability operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 178(21), pp. 4094-4104, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jordi Recasens, Dionís Boixader |
A Map Characterizing the Fuzzy Points and Columns of a T-Indistinguishability Operator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Uncertain. Fuzziness Knowl. Based Syst. ![In: Int. J. Uncertain. Fuzziness Knowl. Based Syst. 16(2), pp. 129-145, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Yu Zhang |
The computational SLR: a logic for reasoning about computational indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 434, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
17 | Adem Orsdemir, Oktay Altun, Gaurav Sharma 0001, Mark F. Bocko |
Steganalysis aware steganography: statistical indistinguishability despite high distortion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security, Forensics, Steganography, and Watermarking of Multimedia Contents ![In: Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, January 27, 2008, pp. 681915, 2008, SPIE, 978-0-8194-6991-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Luis Garmendia, Jordi Recasens |
Finding Close T-indistinguishability Operators to a Given Proximity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSFLAT Conf. (2) ![In: New Dimensions in Fuzzy Logic and Related Technologies. Proceedings of the 5th EUSFLAT Conference, Ostrava, Czech Republic, September 11-14, 2007, Volume 2: Regular Sessions, pp. 351-357, 2007, Universitas Ostraviensis, 978-80-7368-387-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
17 | Ueli M. Maurer, Krzysztof Pietrzak, Renato Renner |
Indistinguishability Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 130-149, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Enric Hernández |
Uncertainty and indistinguishability. Application to modelling with words. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2007 |
RDF |
|
17 | Joan Jacas, Jordi Recasens |
Aggregation operators based on indistinguishability operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 21(8), pp. 857-873, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Rafail Ostrovsky, Giuseppe Persiano, Ivan Visconti |
Concurrent Non-Malleable Witness Indistinguishability and its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR06, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Mihir Bellare, Amit Sahai |
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 228, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami |
Computational Indistinguishability between Quantum States and Its Cryptographic Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 148, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Gergei Bana, Payman Mohassel, Till Stegers |
Computational Soundness of Formal Indistinguishability and Static Equivalence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 323, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Ueli Maurer, Krzysztof Pietrzak, Renato Renner |
Indistinguishability Amplification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 456, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
17 | Krzysztof Pietrzak |
Indistinguishability and composition of random systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2006 |
RDF |
|
17 | Ali Bagherzandi, Kooshiar Azimian, Javad Mohajeri, Mahmoud Salmasizadeh |
Relations between semantic security and indistinguishability against cpa, non-adaptive cca and adaptive cca in comparison based framework ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0508110, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock |
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 270, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Zhaohui Cheng, Manos Nistazakis, Richard Comley, Luminita Vasiu |
On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 129, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Ariel Cohen 0004, Michael Kaminski, Johann A. Makowsky |
Indistinguishability by Default. ![Search on Bibsonomy](Pics/bibsonomy.png) |
We Will Show Them! (1) ![In: We Will Show Them! Essays in Honour of Dov Gabbay, Volume One, pp. 415-428, 2005, College Publications, 1-904987-25-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami |
Computational Indistinguishability Between Quantum States and Its Cryptographic Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 268-284, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Adolfo R. de Soto |
Multiresolution Analysis and Fuzzy Indistinguishability Operators: a first approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSFLAT Conf. ![In: Proceedings of the Joint 4th Conference of the European Society for Fuzzy Logic and Technology and the 11th Rencontres Francophones sur la Logique Floue et ses Applications, Barcelona, Spain, September 7-9, 2005, pp. 751-756, 2005, Universidad Polytecnica de Catalunya, 84-7653-872-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Claudi Alsina, Enric Trillas |
Stability, Indistinguishability and Small Numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSFLAT Conf. ![In: Proceedings of the Joint 4th Conference of the European Society for Fuzzy Logic and Technology and the 11th Rencontres Francophones sur la Logique Floue et ses Applications, Barcelona, Spain, September 7-9, 2005, pp. 291-296, 2005, Universidad Polytecnica de Catalunya, 84-7653-872-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Joan Jacas, Jordi Recasens |
Aggregating with Indistinguishability Operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSFLAT Conf. ![In: Proceedings of the Joint 4th Conference of the European Society for Fuzzy Logic and Technology and the 11th Rencontres Francophones sur la Logique Floue et ses Applications, Barcelona, Spain, September 7-9, 2005, pp. 303-306, 2005, Universidad Polytecnica de Catalunya, 84-7653-872-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Indistinguishability in cooperative games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSFLAT Conf. ![In: Proceedings of the Joint 4th Conference of the European Society for Fuzzy Logic and Technology and the 11th Rencontres Francophones sur la Logique Floue et ses Applications, Barcelona, Spain, September 7-9, 2005, pp. 739-744, 2005, Universidad Polytecnica de Catalunya, 84-7653-872-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Thomas Santen |
Probabilistic Confidentiality Properties based on Indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2005: Sicherheit - Schutz und Zuverlässigkeit, Beiträge der 2. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.v. (GI), 5.-8. April 2005 in Regensburg, pp. 113-124, 2005, GI, 3-88579-391-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Indistinguishability relations in Dempster-Shafer theory of evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Approx. Reason. ![In: Int. J. Approx. Reason. 37(3), pp. 145-187, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Neil D. Evans, Michael J. Chappell, Michael J. Chapman, Keith R. Godfrey |
Structural indistinguishability between uncontrolled (autonomous) nonlinear analytic systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 40(11), pp. 1947-1953, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Mustafa Demirci |
Topological properties of the class of generators of an indistinguishability operator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fuzzy Sets Syst. ![In: Fuzzy Sets Syst. 143(3), pp. 413-426, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joan Jacas, Jordi Recasens |
The group of isometries of an indistinguishability operator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fuzzy Sets Syst. ![In: Fuzzy Sets Syst. 146(1), pp. 27-41, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Joan Jacas, Jordi Recasens |
Indistinguishability operators generated by fuzzy numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUZZ-IEEE ![In: IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2004, Budapest, Hungary, July 25-29, 2004., pp. 1567-1571, 2004, IEEE, 0-7803-8353-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Konstantinos Georgatos |
On Indistinguishability and Prototypes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Log. J. IGPL ![In: Log. J. IGPL 11(5), pp. 531-545, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Generating indistinguishability operators from prototypes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 17(12), pp. 1131-1142, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Frank Höppner, Frank Klawonn, Patrik Eklund |
Learning indistinguishability from data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 6(1), pp. 6-13, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Equality relations, Alternating optimisation, Fuzzy systems, Function approximation |
17 | Enric Hernández, Jordi Recasens |
A reformulation of entropy in the presence of indistinguishability operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fuzzy Sets Syst. ![In: Fuzzy Sets Syst. 128(2), pp. 185-196, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Yodai Watanabe, Junji Shikata, Hideki Imai |
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2002, pp. 33, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
17 | Jaap Kamps, Maarten Marx |
Notions of Indistinguishability for Semantic Web Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2002, First International Semantic Web Conference, Sardinia, Italy, June 9-12, 2002, Proceedings, pp. 30-38, 2002, Springer, 3-540-43760-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Adolfo R. de Soto, Jordi Recasens |
Modelling a linguistic variable as a hierarchical family of partitions induced by an indistinguishability operator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fuzzy Sets Syst. ![In: Fuzzy Sets Syst. 121(3), pp. 427-437, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Growing decision trees in the presence of indistinguishability: observational decision trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSFLAT Conf. ![In: Proceedings of the 2nd International Conference in Fuzzy Logic and Technology, Leicester, United Kingdom, September 5-7, 2001, pp. 75-78, 2001, De Montfort University, Leicester, UK. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
17 | Joan Jacas, Jordi Recasens |
One-dimensional indistinguishability operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fuzzy Sets Syst. ![In: Fuzzy Sets Syst. 109(3), pp. 447-451, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Dionís Boixader, Joan Jacas, Jordi Recasens |
The Length and Betweenness Relations of Indistinguishability Operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Uncertain. Fuzziness Knowl. Based Syst. ![In: Int. J. Uncertain. Fuzziness Knowl. Based Syst. 7(3), pp. 203-212, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Madhu Sudan 0001 |
Computational Indistinguishability: A Sample Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Syst. Sci. ![In: J. Comput. Syst. Sci. 59(2), pp. 253-269, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Mihir Bellare, Amit Sahai |
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 1999, pp. 18, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
17 | Enric Hernández, Jordi Recasens |
Observational entropy: entropy in the context of indistinguishability operators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUSFLAT-ESTYLF Joint Conf. ![In: Proceedings of the EUSFLAT-ESTYLF Joint Conference, Palma de Mallorca, Spain, September 22-25, 1999, pp. 203-206, 1999, Universitat de les Illes Balears, Palma de Mallorca, Spain. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
17 | Oded Goldreich 0001, Bernd Meyer 0005 |
Computational Indistinguishability: Algorithms vs. Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 191(1-2), pp. 215-218, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Madhu Sudan 0001 |
Computational Indistinguishability: A Sample Hierarchy ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR98, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP BibTeX RDF |
|
17 | Michael J. Horowitz, David L. Neuhoff |
Image coding by perceptual pruning with a cortical snapshot indistinguishability criterion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Human Vision and Electronic Imaging ![In: Human Vision and Electronic Imaging III, San Jose, CA, USA, January 24, 1998, pp. 330-339, 1998, SPIE, 978-0-8194-2739-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Moni Naor, Omer Reingold |
From Unpredictability to Indistinguishability: A Simple Construction of Pseudo-Random Functions from MACs (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 267-282, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Madhu Sudan 0001 |
Computational Indistinguishability: A Sample Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCC ![In: Proceedings of the 13th Annual IEEE Conference on Computational Complexity, Buffalo, New York, USA, June 15-18, 1998, pp. 24-33, 1998, IEEE Computer Society, 0-8186-8395-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Bernard De Baets, Milan Mares, Radko Mesiar |
Fuzzy Zeroes and Indistinguishability of Real Numbers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fuzzy Days ![In: Computational Intelligence, Theory and Applications, International Conference, 5th Fuzzy Days, Dortmund, Germany, April 28-30, 1997, Proceedings, pp. 299-303, 1997, Springer, 3-540-62868-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
17 | Michael J. Chapman, Keith R. Godfrey |
Nonlinear compartmental model indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 32(3), pp. 419-422, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001, Bernd Meyer 0005 |
Computational Indistinguishability - Algorithms vs. Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Colloquium Comput. Complex. ![In: Electron. Colloquium Comput. Complex. TR96, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
17 | Gilles Bernot, Michel Bidoit, Teodor Knapik |
Observational Specifications and the Indistinguishability Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 139(1&2), pp. 275-314, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Oded Goldreich 0001 |
A Note on Computational Indistinguishability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 34(6), pp. 277-281, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
17 | Kenneth Mark Colby, Franklin Dennis Hilf, Sylvia Weber 0001, Helena C. Kraemer |
Turing-like Indistinguishability Tests for the Calidation of a Computer Simulation of Paranoid Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. ![In: Artif. Intell. 3(1-3), pp. 199-221, 1972. The full citation details ...](Pics/full.jpeg) |
1972 |
DBLP DOI BibTeX RDF |
|
12 | Nicholas J. Hopper, Luis von Ahn, John Langford 0001 |
Provably Secure Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 58(5), pp. 662-676, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 |
Using IND-CVA for constructing secure communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(10), pp. 1801-1811, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
integrity, authenticated encryption, semantic security, universally composable security, secure channel |
12 | Changshe Ma, Yingjiu Li, Robert H. Deng, Tieyan Li |
RFID privacy: relation between two notions, minimal condition, and efficient construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 54-65, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, rfid, pseudorandom function |
12 | Jens-Matthias Bohli, Andreas Pashalidis |
Relations Among Privacy Notions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 362-380, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Mehdi Talbi, Valérie Viet Triem Tong, Adel Bouhoula |
Specification of Anonymity as a Secrecy Property in the ADM Logic - Homomorphic-Based Voting Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 281-288, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Vibhor Rastogi, Michael Hay, Gerome Miklau, Dan Suciu |
Relationship privacy: output perturbation for queries with joins. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODS ![In: Proceedings of the Twenty-Eigth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, PODS 2009, June 19 - July 1, 2009, Providence, Rhode Island, USA, pp. 107-116, 2009, ACM, 978-1-60558-553-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
output perturbation, social networks, sensitivity, privacy preserving data mining, join queries, private data analysis |
12 | Stefan Ciobaca, Stéphanie Delaune, Steve Kremer |
Computing Knowledge in Security Protocols under Convergent Equational Theories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CADE ![In: Automated Deduction - CADE-22, 22nd International Conference on Automated Deduction, Montreal, Canada, August 2-7, 2009. Proceedings, pp. 355-370, 2009, Springer, 978-3-642-02958-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Sherman S. M. Chow |
Removing Escrow from Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 256-276, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Vipul Goyal, Amit Sahai |
Resettably Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 54-71, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill |
Order-Preserving Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 224-241, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Alexander W. Dent |
A Brief History of Security Models for Confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 1, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Hsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen |
Enhancement of the RFID security method with ownership transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2009, Suwon, Korea, January 15-16, 2009, pp. 251-254, 2009, ACM, 978-1-60558-405-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
integrity, efficiency, RFID system, ownership transfer |
12 | Ilya Mironov, Omkant Pandey, Omer Reingold, Salil P. Vadhan |
Computational Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 126-142, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo |
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(11), pp. 5155-5171, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Tsau Young Lin, Lotfi A. Zadeh |
Foreword to the Special Section on Granular Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Fuzzy Syst. ![In: IEEE Trans. Fuzzy Syst. 16(2), pp. 282-284, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Xu An Wang 0001, Xinyi Huang 0001, Xiaoyuan Yang 0002 |
Further Observations on Certificateless Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 217-239, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Carmit Hazay, Yehuda Lindell |
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 155-175, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Omer Reingold, Luca Trevisan, Madhur Tulsiani, Salil P. Vadhan |
Dense Subsets of Pseudorandom Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, October 25-28, 2008, Philadelphia, PA, USA, pp. 76-85, 2008, IEEE Computer Society, 978-0-7695-3436-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Henri Gilbert, Matthew J. B. Robshaw, Yannick Seurin |
How to Encrypt with the LPN Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 35th International Colloquium, ICALP 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part II - Track B: Logic, Semantics, and Theory of Programming & Track C: Security and Cryptography Foundations, pp. 679-690, 2008, Springer, 978-3-540-70582-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
LPN, error-correcting code, symmetric encryption |
12 | David Galindo, Flavio D. Garcia, Peter van Rossum |
Computational Soundness of Non-Malleable Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 361-376, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nancy A. Lynch, Olivier Pereira |
Modeling Computational Security in Long-Lived Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONCUR ![In: CONCUR 2008 - Concurrency Theory, 19th International Conference, CONCUR 2008, Toronto, Canada, August 19-22, 2008. Proceedings, pp. 114-130, 2008, Springer, 978-3-540-85360-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Michel Abdalla, Dario Catalano, Céline Chevalier, David Pointcheval |
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 335-351, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | JungHoon Ha, Sang-Jae Moon, Jianying Zhou 0001, JaeCheol Ha |
A New Formal Proof Model for RFID Location Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 267-281, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
formal proof model, location privacy, RFID security |
12 | Mihir Bellare, Marc Fischlin, Adam O'Neill, Thomas Ristenpart |
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 360-378, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Alexandra Boldyreva, Serge Fehr, Adam O'Neill |
On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 335-359, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Simon Kramer 0001 |
Logical concepts in cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGACT News ![In: SIGACT News 38(4), pp. 65-66, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
applied formal logic, information security |
12 | Phillip Rogaway, Mihir Bellare |
Robust computational secret sharing and a unified account of classical secret-sharing goals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 172-184, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage |
12 | Joan Jacas, Jordi Recasens |
Aggregation Operators and the Lipschitzian Condition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUZZ-IEEE ![In: FUZZ-IEEE 2007, IEEE International Conference on Fuzzy Systems, Imperial College, London, UK, 23-26 July, 2007, Proceedings, pp. 1-6, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Angelo Montanari, Gabriele Puppis |
A Contraction Method to Decide MSO Theories of Deterministic Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LICS ![In: 22nd IEEE Symposium on Logic in Computer Science (LICS 2007), 10-12 July 2007, Wroclaw, Poland, Proceedings, pp. 141-150, 2007, IEEE Computer Society, 0-7695-2908-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Bounded CCA2-Secure Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 502-518, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan |
Relations Among Notions of Non-malleability for Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 519-535, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Public-key Encryption, Non-malleability |
12 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
New constructions for provably-secure time-bound hierarchical key assignment schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 133-138, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, provable security, key assignment |
12 | Sherman S. M. Chow, Kim-Kwang Raymond Choo |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 203-220, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reveal query, anonymity, provable security, Key agreement, identity-based cryptography |
12 | Chun-Yuan Hsiao, Chi-Jen Lu, Leonid Reyzin |
Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 169-186, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Rajeev Alur, Pavol Cerný, Swarat Chaudhuri |
Model Checking on Trees with Path Equivalences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TACAS ![In: Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, TACAS 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007 Braga, Portugal, March 24 - April 1, 2007, Proceedings, pp. 664-678, 2007, Springer, 978-3-540-71208-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Emmanuel Bresson, Mark Manulis, Jörg Schwenk |
On Security Models and Compilers for Group Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 292-307, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Qianhong Wu, Willy Susilo, Yi Mu 0001, Fangguo Zhang |
Efficient Partially Blind Signatures with Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings. Part III, pp. 1096-1105, 2007, Springer, 978-3-540-74482-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Lotfi A. Zadeh |
Granular Computing and Rough Set Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSEISP ![In: Rough Sets and Intelligent Systems Paradigms, International Conference, RSEISP 2007, Warsaw, Poland, June 28-30, 2007, Proceedings, pp. 1-4, 2007, Springer, 978-3-540-73450-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Wei Li 0013, Dawu Gu |
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 178-187, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Aldar C.-F. Chan, Claude Castelluccia |
On the Privacy of Concealed Data Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 390-405, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
A Graph Game Model for Software Tamper Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 80-95, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Jonathan Katz, Moti Yung |
Characterization of Security Notions for Probabilistic Private-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(1), pp. 67-95, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Private-key encryptions, Definitions |