The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISPEC"( http://dblp.L3S.de/Venues/ISPEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ispec

Publication years (Num. hits)
2005 (36) 2006 (36) 2007 (27) 2008 (30) 2009 (35) 2010 (29) 2011 (33) 2012 (28) 2013 (28) 2014 (42) 2015 (39) 2016 (26) 2017 (58) 2018 (40) 2019 (29) 2021 (25) 2022 (36) 2023 (324)
Publication types (Num. hits)
inproceedings(882) proceedings(19)
Venues (Conferences, Journals, ...)
iSPEC(901)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 123 occurrences of 109 keywords

Results
Found 901 publication records. Showing 901 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Chien-Ming Chen 0001, Mu-En Wu, Bing-Zhe He, Xinying Zheng, Chieh Hsing, Hung-Min Sun A Methodology for Hook-Based Kernel Level Rootkits. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hongwei Zhou, Xin Wu, Wenchang Shi, Jinhui Yuan, Bin Liang 0002 HDROP: Detecting ROP Attacks Using Performance Monitoring Counters. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vandana Guleria, Ratna Dutta Efficient Adaptive Oblivious Transfer in UC Framework. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xinyi Huang, Jianying Zhou 0001 (eds.) Information Security Practice and Experience - 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kishan Chand Gupta, Indranil Ghosh Ray On Constructions of Circulant MDS Matrices for Lightweight Cryptography. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kefeng Wang, Yi Mu 0001, Willy Susilo, Fuchun Guo Attribute-Based Signature with Message Recovery. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yonggan Hou, Jianwei Zhuge, Dan Xin, Wenya Feng SBE - A Precise Shellcode Detection Engine Based on Emulation and Support Vector Machine. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jie Zhang 0030, Futai Zhang Information-Theoretical Secure Verifiable Secret Sharing with Vector Space Access Structures over Bilinear Groups. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0009, Qianhong Wu, Bo Qin, Hua Deng, Jianwei Liu 0001, Wenchang Shi Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu 0002 An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Javier López 0001, Ruben Rios, Jorge Cuéllar Preserving Receiver-Location Privacy in Wireless Sensor Networks. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Danhui Wang, An Wang, Xuexin Zheng Fault-Tolerant Linear Collision Attack: A Combination with Correlation Power Analysis. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shuai Han 0001, Shengli Liu 0001, Kefei Chen, Dawu Gu Proofs of Retrievability Based on MRD Codes. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Huaqun Wang, Qianhong Wu, Bo Qin, Futai Zhang, Josep Domingo-Ferrer A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuede Ji, Yukun He, Dewei Zhu, Qiang Li 0008, Dong Guo 0002 A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo A CAPTCHA Scheme Based on the Identification of Character Locations. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hong Xu 0008, Lin Tan 0010, Xuejia Lai On the Recursive Construction of MDS Matrices for Lightweight Cryptography. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak 0001, Lukasz Krzywiecki Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. Search on Bibsonomy ISPEC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld Security Evaluation of Rakaposhi Stream Cipher. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Guomin Yang, Yi Mu 0001, Willy Susilo, Duncan S. Wong Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dheerendra Mishra, Sourav Mukhopadhyay Secure Content Delivery in DRM System with Consumer Privacy. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan Trusted Identity Management for Overlay Networks. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hao Xiong 0002, Tsz Hon Yuen, Cong Zhang 0001, Yi Jun He, Siu-Ming Yiu Attribute Specified Identity-Based Encryption. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Xuhua Ding, Yongdong Wu Accountable Trapdoor Sanitizable Signatures. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Yu 0008, Kunpeng Wang, Bao Li 0001, Song Tian Joint Triple-Base Number System for Multi-Scalar Multiplication. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ling Song 0001, Lei Hu Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen 0012, Yingjun Zhang Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kefeng Wang, Yi Mu 0001, Willy Susilo Identity-Based Multisignature with Message Recovery. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mixia Liu, Tao Feng, Paul Smith 0001, David Hutchison 0001 Situational Awareness for Improving Network Resilience Management. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dingding Jia, Bao Li 0001, Yamin Liu, Qixiang Mei Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yingjun Zhang, Kai Chen 0012, Yifeng Lian VulLocator: Automatically Locating Vulnerable Code in Binary Programs. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nan Li 0007, Yi Mu 0001, Willy Susilo, Vijay Varadharajan Secure RFID Ownership Transfer Protocols. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Robert H. Deng, Tao Feng (eds.) Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jungin Kang, Sangwook Lee, Heejo Lee A Digital Forensic Framework for Automated User Activity Reconstruction. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiaofan Liu, Natasha Alechina, Brian Logan 0001 Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Peng Wang 0009, Wenling Wu, Liting Zhang Cryptanalysis of the OKH Authenticated Encryption Scheme. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski Simplified PACE|AA Protocol. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jairo Serrano, Eduardo César, Elisa Heymann, Barton P. Miller Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuxin Meng 0001, Lam-for Kwok Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kaitai Liang, Qiong Huang 0001, Roman Schlegel, Duncan S. Wong, Chunming Tang 0003 A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu 0001 Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Yu 0008, Kunpeng Wang, Bao Li 0001, Song Tian About Hash into Montgomery Form Elliptic Curves. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vivek Balachandran, Sabu Emmanuel Software Protection with Obfuscation and Encryption. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang 0001 Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shichao Jin, Okhee Kim, Tieming Chen Efficient Attack Detection Based on a Compressed Model. Search on Bibsonomy ISPEC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nathaniel Wesley Filardo, Giuseppe Ateniese High-Entropy Visual Identification for Touch Screen Devices. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xianhui Lu, Bao Li 0001, Qixiang Mei, Yamin Liu Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yang-Wai Chow, Willy Susilo Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yue Sun, Meiqin Wang Linear Cryptanalysis of Reduced-Round ICEBERG. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shekh Faisal Abdul-Latip, Reza Reyhanitabar, Willy Susilo, Jennifer Seberry Fault Analysis of the KATAN Family of Block Ciphers. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Takuma Koyama, Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta New Truncated Differential Cryptanalysis on 3D Block Cipher. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dongxia Bai, Leibo Li New Impossible Differential Attacks on Camellia. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto 0001, Hideki Sakurada Computational Soundness of Indistinguishability Properties without Computable Parsing. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chuah Chai Wen, Ed Dawson, Juan Manuel González Nieto, Leonie Simpson A Framework for Security Analysis of Key Derivation Functions. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ya Liu 0001, Dawu Gu, Zhiqiang Liu 0001, Wei Li 0013 Impossible Differential Attacks on Reduced-Round LBlock. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhenfei Zhang, Thomas Plantard, Willy Susilo On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fuchun Guo, Yi Mu 0001, Willy Susilo, Vijay Varadharajan A Pre-computable Signature Scheme with Efficient Verification for RFID. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Manuel Liedel Secure Distributed Computation of the Square Root and Applications. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1An Wang 0001, Man Chen, Zongyue Wang, Yaoling Ding Overcoming Significant Noise: Correlation-Template-Induction Attack. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Wang 0135, Ji Xiang, Jiwu Jing, Lingchen Zhang Towards Fine-Grained Access Control on Browser Extensions. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christian L. F. Corniaux, Hossein Ghodosi T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Teng Guo, Feng Liu 0001, Chuan Kun Wu On the Equivalence of Two Definitions of Visual Cryptography Scheme. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chong-zhi Gao, Dongqing Xie, Baodian Wei Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Johannes Braun 0001, Moritz Horsch, Alexander Wiesmaier iPIN and mTAN for Secure eID Applications. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuo Tian, Yeping He, Baozeng Ding Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi 0001, Tsuyoshi Takagi Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yanfeng Wang, Wenling Wu, Xiaoli Yu Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mark Dermot Ryan, Ben Smyth, Guilin Wang (eds.) Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marc Joye, Tancrède Lepoint Partial Key Exposure on RSA with Private Exponents Larger Than N. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benjamin Michéle, Juliane Krämer, Jean-Pierre Seifert Structure-Based RSA Fault Attacks. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer Redactable Signatures for Independent Removal of Structure and Content. Search on Bibsonomy ISPEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Guangdong Yang, Shaohua Tang, Li Yang A Novel Group Signature Scheme Based on MPKC. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fangming Zhao, Takashi Nishide, Kouichi Sakurai Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonghoon Kwon, Jehyun Lee, Heejo Lee Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Jian Weng 0001 (eds.) Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jun-e Liu, Zhiguo Wan, Ming Gu 0001 Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bo Liang, Wenling Wu, Liting Zhang BCBC: A More Efficient MAC Algorithm. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Huafei Zhu Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Song Luo, Yu Chen 0003, Jian-bin Hu, Zhong Chen 0001 New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu 0005 Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Liqun Chen 0002, Zhong Chen 0001 Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Huafei Zhu Public-Key Encryptions Tolerating Adaptive and Composable Adversaries. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Lijun Zhang 0013, Kunpeng Wang, Hong Wang, Dingfeng Ye Another Elliptic Curve Model for Faster Pairing Computation. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jorge Nakahara Jr. New Impossible Differential and Known-Key Distinguishers for the 3D Cipher. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova Privacy Enhanced Access Control by Means of Policy Blinding. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yamin Liu, Bao Li 0001, Xianhui Lu, Xiaoying Jia 0002 Encryption Simulatability Reconsidered. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xuhua Zhou, Xuhua Ding, Kefei Chen Lightweight Delegated Subset Test with Privacy Protection. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xingwen Zhao, Fangguo Zhang Traitor Tracing against Public Collaboration. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yongzhuang Wei, Jiqiang Lu, Yupu Hu Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tristan Allard, Benjamin Nguyen, Philippe Pucheral Sanitizing Microdata without Leak: Combining Preventive and Curative Actions. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mahabir Prasad Jhanwar A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yikai Wang, Yi Mu 0001, Minjie Zhang Policy-Based Authentication for Mobile Agents. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Quan Pham, Jason Reid, Ed Dawson A Model for Constraint and Delegation Management. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Imad M. Abbadi Toward Trustworthy Clouds' Internet Scale Critical Infrastructure. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiaxin Pan, Libin Wang, Changshe Ma Analysis and Improvement of an Authenticated Key Exchange Protocol. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 901 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license