|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 336 occurrences of 251 keywords
|
|
|
Results
Found 649 publication records. Showing 649 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Weiming Zhang, Shiqu Li |
Security Measurements of Steganographic Systems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Inkyoung Jeun, Jongwook Park, TaeKyu Choi, Sang Wan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin |
A Best Practice for Root CA Key Update in PKI. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee |
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Proof of equality of discrete logarithms (PEQDL), Threshold decryption, Threshold ElGamal, Threshold RSA, Batch verification |
1 | Michael E. Locasto, Angelos D. Keromytis |
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | BaiJie Kuang, Yuefei Zhu, YaJuan Zhang |
An Improved Algorithm for uP + vQ Using JSF13. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang 0005 |
Private Keyword-Based Push and Pull with Applications to Anonymous Communication. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Palash Sarkar 0001, Pradeep Kumar Mishra, Rana Barua |
New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn). |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
elliptic curves, Scalar multiplication, hyperelliptic curves, normal basis, look-up table, window methods, Frobenius map |
1 | Stephen W. Boyd, Angelos D. Keromytis |
SQLrand: Preventing SQL Injection Attacks. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu 0004 |
Some Observations on Zap and Its Applications. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Zap, public-coin honest verifier zero-knowledge, deniable authentication, timed commitment, witness indistinguishability |
1 | Katsuyuki Okeya, Tsuyoshi Takagi |
Security Analysis of CRT-Based Cryptosystems. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem |
1 | Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao 0001, Robert H. Deng, M. U. Siddiqi |
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Anonymity, Watermarking, Fingerprinting, Copyright Protection, Traitor Tracing |
1 | Ali Kanso |
More Generalized Clock-Controlled Alternating Step Generator. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Clock-Controlled Registers, Alternating Step Generator and Clock-Controlled Alernating Step Generator, Stream Ciphers |
1 | Willy Susilo, Yi Mu 0001 |
Deniable Ring Authentication Revisited. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Inoue, Masahiro Kuroda |
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dong-Guk Han, Katsuyuki Okeya, Tae Hyun Kim 0003, Yoon Sung Hwang, Young-Ho Park 0001, Souhwan Jung |
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
BSD Representation, Ha-Moons Countermeasure, Ebeid-Hasans Countermeasure, Agagliates Countermeasure, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
1 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Limited Verifier Signature from Bilinear Pairings. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Chunyan Bai, Gui Liang Feng |
Improved Algebraic Traitor Tracing Scheme. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
broadcast, Reed-Solomon code, traitor tracing, algebraic-geometric code |
1 | Gene Itkis, Peng Xie |
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Johann Großschädl, Guy-Armand Kamendje |
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu |
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
TGDH, Bilinear Diffie-Hellman, Pairings, Bilinear map, Group key agreement |
1 | Kwong H. Yung |
Using Feedback to Improve Masquerade Detection. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
feedback-on-alarm, feedback policy, sequential classifier, online classifier, adaptive classifier, masquerading session, masquerading user, intrusion detection, naive-Bayes classifier, masquerade detection |
1 | Ching Lin, Vijay Varadharajan |
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Security, Trust, Mobile Agent System |
1 | Chun Ruan, Vijay Varadharajan |
An Authorization Model for E-consent Requirement in a Health Care Application. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
e-consent, access control, Authorization, security management |
1 | Ventzislav Nikov, Svetla Nikova, Bart Preneel |
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sandeepan Chowdhury, Subhamoy Maitra |
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Block Oriented Software Implementation, Boolean Function, Linear Feedback Shift Register, Resiliency, Nonlinearity, Algebraic Degree |
1 | Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park |
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji |
Optimized Chi2-Attack against RC6. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
2-attack, Cryptanalysis, Block Cipher, RC6 |
1 | Pierre Dusart, Gilles Letourneux, Olivier Vivolo |
Differential Fault Analysis on A.E.S. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Taenam Cho, Sang-Ho Lee |
A Key Recovery Mechanism for Reliable Group Key Management. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Roman Novak |
Side-Channel Attack on Substitution Blocks. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Dong Jin Kwak, Sang-Jae Moon |
Efficient Distributed Signcryption Scheme as Group Signcryption. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Public-key Cryptography, Group signature, Signcryption |
1 | Fan Min 0001, Jun-yan Zhang, Guo-wie Yang |
An IP Traceback Scheme Integrating DPM and PPM. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Deterministic Packet Marking, Denial of Service, IP traceback, IP spoofing, Probabilistic Packet Marking |
1 | Mohamed Al-Ibrahim, Anton Cerný |
Proxy and Threshold One-Time Signatures. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature |
1 | Yuko Tamura, Atsuko Miyaji |
Anonymity-Enhanced Pseudonym System. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Chong-zhi Gao, Zheng-an Yao, Lei Li 0022 |
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhang 0002, Hideki Imai |
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng |
A Threshold GQ Signature Scheme. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
threshold signature scheme, GQ signature scheme |
1 | Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang |
Common Vulnerability Markup Language. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano |
Using OCSP to Secure Certificate-Using Transactions in M-commerce. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
certificate status checking, certification, m-commerce, broker, OCSP |
1 | Luciano Rila, Chris J. Mitchell |
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, smartcards |
1 | Jianying Zhou 0001, Moti Yung, Yongfei Han (eds.) |
Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sung-Ryul Kim |
Improved Scalable Hash Chain Traversal. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
efficient hash chain traversal, secure hash, pebbles |
1 | Tieyan Li, Yongdong Wu |
Trust on Web Browser: Attack vs. Defense. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sarbani Palit, Bimal K. Roy, Arindom De |
A Fast Correlation Attack for LFSR-Based Stream Ciphers. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
LFSR polynomial, Correlation immune function, Stream cipher, Correlation attack |
1 | Gang Yao, Kui Ren 0001, Feng Bao 0001, Robert H. Deng, Dengguo Feng |
Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
security, Mobile ad hoc networks, key agreement, hierarchical |
1 | Guilin Wang, Xiaoxi Han, Bo Zhu |
On the Security of Two Threshold Signature Schemes with Traceable Signers. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, threshold signature |
1 | Yasuyuki Sakai, Kouichi Sakurai |
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Parallel modular exponentiation, Side channel attack, Montgomery multiplication, Timing attack, RSA cryptosystems |
1 | Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, Network security, Data visualization, Multivariate data analysis |
1 | Guofei Gu, Bin B. Zhu, Shipeng Li 0001, Shiyong Zhang |
PLI: A New Framework to Protect Digital Content for P2P Networks. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
digital content protection, Public License Infrastructure (PLI), License Authority (LA), proactive shares update, distributed trust model, secret sharing, intrusion tolerance, Peer-to-Peer (P2P), Digital Rights Management (DRM) |
Displaying result #601 - #649 of 649 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7] |
|