The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISC"( http://dblp.L3S.de/Venues/ISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isw

Publication years (Num. hits)
2001 (38) 2002 (39) 2003 (34) 2004 (37) 2005 (39) 2006 (46) 2007 (30) 2008 (34) 2009 (39) 2010 (36) 2011 (27) 2012 (25) 2013 (65) 2014 (73) 2015 (70) 2016 (53) 2017 (49) 2018 (49) 2019 (42) 2020 (52) 2021 (47) 2022 (49) 2023 (52)
Publication types (Num. hits)
inproceedings(990) proceedings(35)
Venues (Conferences, Journals, ...)
ISC(1025)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 348 occurrences of 264 keywords

Results
Found 1025 publication records. Showing 1025 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Lin Jiao, Bin Zhang, Mingsheng Wang Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited. Search on Bibsonomy ISC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jiangang Wang, Xiaohong Li 0001, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng 0002 An Empirical Study of Dangerous Behaviors in Firefox Extensions. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Noboru Kunihiro On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Oscar Esparza, Juanjo Alins On the Self-similarity Nature of the Revocation Data. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jinwei Hu, Khaled M. Khan, Yun Bai 0001, Yan Zhang 0003 Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Essam Ghadafi, Nigel P. Smart Efficient Two-Move Blind Signatures in the Common Reference String Model. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer Differential Attacks on Reduced RIPEMD-160. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Atsushi Fujioka, Taiichi Saito, Keita Xagawa Secure Hierarchical Identity-Based Identification without Random Oracles. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ciprian-Petrisor Pungila, Viorel Negru A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christoph Bösch, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker Selective Document Retrieval from Encrypted Database. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler Domain-Specific Pseudonymous Signatures for the German Identity Card. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser 0001 Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Zhao, Debin Gao, Lina Wang 0001 Learning Fine-Grained Structured Input for Memory Corruption Detection. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bogdan Groza, Bogdan Warinschi Revisiting Difficulty Notions for Client Puzzles and DoS Resilience. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Peter Drábik, Fabio Martinelli, Charles Morisset A Quantitative Approach for Inexact Enforcement of Security Policies. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nezar Nassr, Nidal Aboudagga, Eric Steegmans OSDM: An Organizational Supervised Delegation Model for RBAC. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Falko Strenzke Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser 0001 Dynamic Anomaly Detection for More Trustworthy Outsourced Computation. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dieter Gollmann, Felix C. Freiling (eds.) Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Manas A. Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso Privacy-Preserving Speaker Authentication. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lisa Rajbhandari, Einar Snekkenes Intended Actions: Risk Is Conflicting Incentives. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Samiran Bag, Aritra Dhar, Pinaki Sarkar 100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sanna Suoranta, André Andrade, Tuomas Aura Strong Authentication with Mobile Phone. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Johannes Gilger, Johannes Barnickel, Ulrike Meyer GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0009, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu 0005, Sencun Zhu, Bing Mao, Li Xie 0001 Replacement Attacks on Behavior Based Software Birthmark. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sha Ma, Bo Yang, Kangshun Li, Feng Xia 0004 A Privacy-Preserving Join on Outsourced Database. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima MASHA - Low Cost Authentication with a New Stream Cipher. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xuejia Lai, Jianying Zhou 0001, Hui Li (eds.) Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sven Laur, Jan Willemson, Bingsheng Zhang Round-Efficient Oblivious Database Manipulation. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jaewoo Lee, Chris Clifton How Much Is Enough? Choosing ε for Differential Privacy. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen Hello rootKitty: A Lightweight Invariance-Enforcing Framework. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Serdar Pehlivanoglu Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qiong Huang 0001, Duncan S. Wong, Willy Susilo, Bo Yang 0003 An Efficient Construction of Time-Selective Convertible Undeniable Signatures. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fanyu Kong, Jia Yu 0003, Lei Wu Security Analysis of an RSA Key Generation Algorithm with a Large Private Key. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang Multi-stage Binary Code Obfuscation Using Improved Virtual Machine. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuan Zhou 0008, Haifeng Qian, Xiangxue Li Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hu Xiong, Qianhong Wu, Zhong Chen 0001 Toward Pairing-Free Certificateless Authenticated Key Exchanges. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Atefeh Mashatan, Khaled Ouafi Efficient Fail-Stop Signatures from the Factoring Assumption. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Moritz Y. Becker, Masoud Koleini Opacity Analysis in Trust Management Systems. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu Detection and Analysis of Cryptographic Data Inside Software. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, Dirk von Suchodoletz Assessing Location Privacy in Mobile Communication Networks. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Marcel Preuß, Lena Wiese On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Atsuko Miyaji How to Find Short RC4 Colliding Key Pairs. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liqun Chen 0002, Yu Chen 0003 The n-Diffie-Hellman Problem and Its Applications. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz RatBot: Anti-enumeration Peer-to-Peer Botnets. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Keita Emura, Atsuko Miyaji, Kazumasa Omote Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete A Formal Approach to Distance-Bounding RFID Protocols. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ge Zhang 0001, Simone Fischer-Hübner Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes. Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic (eds.) Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers Search on Bibsonomy ISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré Double Spending Protection for E-Cash Based on Risk Management. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede Privacy-Preserving ECC-Based Grouping Proofs for RFID. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis Crimeware Swindling without Virtual Machines. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhiwei Li, Weichao Wang Deciding Recognizability under Dolev-Yao Intruder Model. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo CRePE: Context-Related Policy Enforcement for Android. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jorge Guajardo, Bart Mennink On Side-Channel Resistant Block Cipher Usage. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xinyuan Wang 0005, Xuxian Jiang Artificial Malware Immunization Based on Dynamically Assigned Sense of Self. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kun Peng, Feng Bao 0001 Efficient Multiplicative Homomorphic E-Voting. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes Security Implications of Crosstalk in Switching CMOS Gates. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy Privilege Escalation Attacks on Android. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Bart Mennink, Bart Preneel Security Reductions of the Second Round SHA-3 Candidates. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow Implicit Authentication through Learning User Behavior. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian Wachsmann, Liqun Chen 0002, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazuki Yoneyama Indifferentiable Security Reconsidered: Role of Scheduling. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Julien Cathalo, Christophe Petit 0001 One-Time Trapdoor One-Way Functions. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani 0001 Selective Regular Expression Matching. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Georg Neugebauer, Ulrike Meyer, Susanne Wetzel Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yi Lu 0002, Yvo Desmedt Improved Distinguishing Attack on Rabbit. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ping Yu 0005, Rui Xue 0001 A Short Signature Scheme from the RSA Family. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lei Wei 0004, Michael K. Reiter, Ketan Mayer-Patel Summary-Invisible Networking: Techniques and Defenses. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu 0005 Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo Efficient Message Space Extension for Automorphic Signatures. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski Walk the Walk: Attacking Gait Biometrics by Imitation. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nadhem J. AlFardan, Kenneth G. Paterson An Analysis of DepenDNS. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. S. Machado, Charles B. Prado, Luiz F. R. C. Carmo Traceability of Executable Codes Using Neural Networks. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ye Zhu 0001 On Privacy Leakage through Silence Suppression. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho Revisiting the Security of the Alred Design. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kota Ideguchi, Elmar Tischhauser, Bart Preneel Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang Cryptanalysis of the Convex Hull Click Human Identification Protocol. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonathan T. Trostle, Andy Parrish Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Arne Tauber, Thomas Rössler Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie 0001 Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee Video Streaming Forensic - Content Identification with Traffic Snooping. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Özgür Dagdelen, Marc Fischlin Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yu-Yuan Chen, Ruby B. Lee Hardware-Assisted Application-Level Access Control. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux Analysis and Optimization of Cryptographically Generated Addresses. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mirco Marchetti, Michele Messori, Michele Colajanni Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conditional proxy re-encryption, random oracle, chosen-ciphertext security
1Joachim Biskup, Lena Wiese Combining Consistency and Confidentiality Requirements in First-Order Databases. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh A2M: Access-Assured Mobile Desktop Computing. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jens Bender, Marc Fischlin, Dennis Kügler Security Analysis of the PACE Key-Agreement Protocol. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jianfeng Lu, Ruixuan Li 0001, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma Secure Interoperation in Multidomain Environments Employing UCON Policies. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multidomain, cyclic inheritance, interoperation, separation of duty, usage control
1Florian Mendel, Martin Schläffer On Free-Start Collisions and Collisions for TIB3. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-3 competition, TIB3, free-start collision, Hash function, collision attack
1Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater Practical Algebraic Attacks on the Hitag2 Stream Cipher. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis
1Sebastian Gajek, Jörg Schwenk, Michael Steiner 0001, Chen Xuan Risks of the CardSpace Protocol. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF analysis, identity management, CardSpace
Displaying result #601 - #700 of 1025 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license