The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52) 2019 (41) 2020 (37) 2021 (36) 2022 (26) 2023 (28)
Publication types (Num. hits)
inproceedings(904) proceedings(26)
Venues (Conferences, Journals, ...)
ACISP(930)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
1Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA
1Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis
1Michael J. Jacobson Jr. The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Chae Hoon Lim A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Kaoru Kurosawa How to Re-use Round Function in Super-Pseudorandom Permutation. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto Protocols with Security Proofs for Mobile Applications. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure key exchange, authenticator, Provable security, mobile security
1Chun Ruan, Vijay Varadharajan A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Luke McAven, Reihaneh Safavi-Naini, Moti Yung Unconditionally Secure Encryption Under Strong Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dae Hyun Yum, Pil Joong Lee Generic Construction of Certificateless Signature. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF public-key signature, identity-based signature, Certificateless signature
1Zhiguo Wan, Shuhong Wang 0001 Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001 Analysis of a Conference Scheme Under Active and Passive Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee 0002 Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CIKS-1, Related Key differential attack, Data-dependent rotation, SPECTR-H64
1Vu Dong Tô, Reihaneh Safavi-Naini Linear Code Implies Public-Key Traitor Tracing with Revocation. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tomoyuki Asano Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Wonil Lee, Mridul Nandi, Palash Sarkar 0001, Donghoon Chang, Sangjin Lee 0002, Kouichi Sakurai Pseudorandomness of SPN-Type Transformations. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson A Mobile Agent System Providing Offer Privacy. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1SungJun Min, Go Yamamoto, Kwangjo Kim Weak Property of Malleability in NTRUSign. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF NTRUSign, Strong Existential Forgery, Centered Norm, Digital Signature Scheme, Malleability
1Willy Susilo, Fangguo Zhang, Yi Mu 0001 Identity-Based Strong Designated Verifier Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Shaoquan Jiang, Guang Gong Multi-service Oriented Broadcast Encryption. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski Secure Bilinear Diffie-Hellman Bits. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Christophe Giraud 0001, Erik Woodward Knudsen Fault Attacks on Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature
1Brian King, Ben Rubin Improvements to the Point Halving Algorithm. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Yuji Sugiyama A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Membership revocation, Zero-knowledge proof of integer relations, Strong RSA assumption, Group signature scheme
1Arjen K. Lenstra, Tim Voss Information Security Risk Assessment, Aggregation, and Mitigation. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF risk aggregation, risk mitigation, Basel 2, multiple-choice knapsack problem, Risk management, risk assessment
1Gildas Avoine, Serge Vaudenay Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli NGSCB: A Trusted Open System. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Bo-Yin Yang, Jiun-Ming Chen Theoretical Analysis of XL over Small Fields. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002 Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Differential-Linear Type Attacks, SHACAL-2, Block Cipher
1Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas J. Winter 0002 Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yan-Cheng Chang Single Database Private Information Retrieval with Logarithmic Communication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Victor K. Wei, Duncan S. Wong Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee TTS without Revocation Capability Secure Against CCA2. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kaoru Kurosawa, Toshihiko Matsuo How to Remove MAC from DHIES. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DHIES, hybrid encryption scheme
1Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002, Dowon Hong The Related-Key Rectangle Attack - Application to SHACAL-1. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack, SHACAL-1, Block Ciphers
1Zhenjie Huang, Yumin Wang Convertible Nominative Signatures. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF nominative signature, untransferable, Digital signature, convertible
1Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Secure commercial applications, Access Control, Authorization, Distributed system security
1Feng Bao 0001, Guilin Wang, Jianying Zhou 0001, Huafei Zhu Analysis and Improvement of Micali's Fair Contract Signing Protocol. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kei Kawauchi, Mitsuru Tada On the Extract Security of Multi-signature Schemes Based on RSA. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Seigo Arita An Addition Algorithm in Jacobian of C34 Curve. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos Malicious ICMP Tunneling: Defense against the Vulnerability. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Chik How Tan, Xun Yi, Chee Kheong Siew A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adaptive chosen-ciphertext attack, Public key cryptosystem, shift registers
1Toshihiko Matsuo, Kaoru Kurosawa On Parallel Hash Functions Based on Block-Cipher. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher, hash function
1Sung-Ming Yen Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Li Gong Is Cross-Platform Security Possible? Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Andrew M. Odlyzko The Unsolvable Privacy Problem and Its Implications for Security Technologies. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001 Cryptanalysis of a New Cellular Automata Cryptosystem. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Daewan Han, Jin Hong 0001, Jae Woo Han, Daesung Kwon Key Recovery Attacks on NTRU without Ciphertext Validation Routine. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Pino Persiano, Ivan Visconti An Anonymous Credential System and a Privacy-Aware PKI. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Swee-Huay Heng, Kaoru Kurosawa Square Hash with a Small Key Size. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF square hash, Message authentication codes, universal hash
1Vanesa Daza, Javier Herranz, Germán Sáez Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Libin Wang, Kefei Chen A Typed Theory for Access Control and Information Flow Control in Mobile Systems. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim Practical Pay TV Schemes. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Set-top terminal, Cracker Identification, Broadcast Encryption, Pay TV
1Khoongming Khoo, Guang Gong New Constructions for Resilient and Highly Nonlinear Boolean Functions. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ivan Damgård, Mads Jurik A Length-Flexible Threshold Cryptosystem with Applications. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF length-flexible, length-invariant, group decryption, self-tallying, perfect ballot secrecy, election, mix-net
1Taekyoung Kwon 0002 Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith 0001 A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Hideki Imai Flaws in Some Robust Optimistic Mix-Nets. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ha Yoon Song, Han-gyoo Kim Cooperative Routers against DoS Attacks. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa On the Pseudorandomness of KASUMI Type Permutations. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Jennifer Seberry (eds.) Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Jacques Traoré On Fair E-cash Systems Based on Group Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng 0001 Grouping Verifiable Content for Selective Disclosure. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Selective content disclosure, content extraction signatures, privacy-enhancing signatures, fragment grouping
1Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai Separating Encryption and Key Issuance in Digital Rights Management Systems. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz Generic GF(2) Arithmetic in Software and Its Application to ECC. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Dense Field Polynomials, Field Multiplication, Field Reduction, Elliptic Curves, Koblitz Curves, Binary Fields
1Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park 0001, Chang Han Kim, Heuisu Ryu Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SPA attack, Randomized addition-subtraction chains countermeasure, Side-channel attack, Elliptic curve cryptosystems
1Fangguo Zhang, Kwangjo Kim Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bilinear pairings, Proxy signature, Blind signature, ID-based cryptography
1Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Permanent Fault Attack on the Parameters of RSA with CRT. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
1Chien-Ning Chen, Sung-Ming Yen Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Differential fault analysis (DFA), Smart cards, AES, Rijndael, Physical cryptanalysis
1Hwankoo Kim, Sang-Jae Moon Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba Theoretical Analysis of chi2 Attack on RC6. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF $chi^2$ attack, RC6, Transition Matrix
1Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 Key Recovery Attacks on the RMAC, TMAC, and IACBC. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC
1Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson The Security of Fixed versus Random Elliptic Curves in Cryptography. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, David Pointcheval Josef Pieprzyk, David Pointcheval. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy, authentication, parallelization, Signcryption
1Andreas Pashalidis, Chris J. Mitchell A Taxonomy of Single Sign-On Systems. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
1Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 Digital Signature Schemes with Restriction on Signing Capability. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji Evaluation of Anonymity of Practical Anonymous Communication Networks. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Ali Kanso Clock-Controlled Shrinking Generator of Feedback Shift Registers. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Fangguo Zhang, Shengli Liu 0001, Kwangjo Kim Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Hyperelliptic curve cryptosystems(HCC), Domain parameters, Jacobian
1Jianying Zhou 0001 Maintaining the Validity of Digital Signatures in B2B Applications. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hongjun Wu 0001, Feng Bao 0001 Cryptanalysis of Stream Cipher COS(2, 128) Mode I. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Biljana Cubaleska, Weidong Qiu, Markus Schneider 0002 How to Play Sherlock Holmes in the World of Mobile Agents. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ingrid Biehl, Tsuyoshi Takagi A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Distributed RSA, quadratic fields, parallel computation, primality test
1Brian King Requirements for Group Independent Linear Threshold Secret Sharing Schemes. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography
1Matthew J. Warren, Lynn Margaret Batten Security Management: An Information Systems Setting. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson Strengthening the Key Schedule of the AES. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Yi Mu 0001, Junqi Zhang, Vijay Varadharajan m out of n Oblivious Transfer. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu Efficient Sharing of Encrypted Data. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Michael Hitchens, Vijay Varadharajan, Gregory Saunders Policy Administration Domains. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hyun-Jeong Kim, Dong Hoon Lee 0001, Moti Yung Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Dong-Guk Han, Hye-Young Park, Young-Ho Park 0001, Sangjin Lee 0002, Dong Hoon Lee 0001, Hyungjin Yang A Practical Approach Defeating Blackmailing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1James P. Hughes 0001 A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1YoungJu Choie, D. Yun Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 930 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license