Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Luis Garmendia, Ronald R. Yager, Enric Trillas, Adela Salvador |
Measures of specificity of fuzzy sets under T-indistinguishabilities. |
IEEE Trans. Fuzzy Syst. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos 0001 |
Controlled elements for designing ciphers suitable to efficient VLSI implementation. |
Telecommun. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Security, Block ciphers, Hardware implementation, Data-dependent operations |
12 | Walid Bagga, Refik Molva, Stefano Crosta |
Policy-based encryption schemes from bilinear pairings. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Michael Backes 0001, Birgit Pfitzmann |
On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Danny Harnik, Moni Naor |
On Everlasting Security in the Hybrid Bounded Storage Model. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung |
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Shoichi Hirose |
Some Plausible Constructions of Double-Block-Length Hash Functions. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Ian F. Blake, Aldar C.-F. Chan |
Conditionally Verifiable Signature. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Zengchang Qin, Jonathan Lawry |
High Level Fuzzy Labels for Vague Concepts. |
SMPS |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Yuen-Yan Chan, Jin Li 0002 |
BGN Authentication and Its Extension to Convey Message Commitments. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Qianhong Wu, Willy Susilo, Yi Mu 0001, Fangguo Zhang |
Efficient Partially Blind Signatures with Provable Security. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Lotfi A. Zadeh |
Granular Computing - The Concept of Generalized Constraint-Based Computation. |
RSCTC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi |
An Efficient and Secure RFID Security Method with Ownership Transfer. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Marion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré |
Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. |
Formal Aspects in Security and Trust |
2006 |
DBLP DOI BibTeX RDF |
Security Games, Computational Soundness of Formal Methods, Provable Security, Probabilistic Encryption |
12 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability |
12 | Raja K. K. R. Sandireddy, Vishwani D. Agrawal |
Diagnostic and Detection Fault Collapsing for Multiple Output Circuits. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Pedro Adão, Gergei Bana, Andre Scedrov |
Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Martín Abadi, Véronique Cortier |
Deciding Knowledge in Security Protocols under (Many More) Equational Theories. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Yang Bo He, Zhi Geng, Xun Liang 0001 |
Learning Causal Structures Based on Markov Equivalence Class. |
ALT |
2005 |
DBLP DOI BibTeX RDF |
Causal structure, Constrained essential graph, Randomization experiments, Bayesian networks, Directed acyclic graphs |
12 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Efficient Anonymous Roaming and Its Security Analysis. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
Anonymous Roaming, Authenticated Key Exchange |
12 | Luis Garmendia, Adela Salvador |
A New Algorithm to Compute Low T-Transitive Approximation of a Fuzzy Relation Preserving Symmetry. Comparisons with the T-Transitive Closure. |
ECSQARU |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
On the Security of Tweakable Modes of Operation: TBC and TAE. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher |
12 | Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade |
Towards a Theory of Intrusion Detection. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Fangguo Zhang, Yi Mu 0001, Willy Susilo |
Reducing Security Overhead for Mobile Networks. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Sujing Zhou, Dongdai Lin |
On Anonymity of Group Signatures. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Lech Polkowski |
Formal granular calculi based on rough inclusions. |
GrC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai |
On the Security of Cryptosystems with All-or-Nothing Transform. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Levente Buttyán, István Vajda |
Towards provable security for ad hoc routing protocols. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
on-demand source routing, ad hoc networks, routing protocols, provable security, simulatability |
12 | Duong Hieu Phan, David Pointcheval |
On the Security Notions for Public-Key Encryption Schemes. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Andrei Sabelfeld |
Confidentiality for Multithreaded Programs via Bisimulation. |
Ershov Memorial Conference |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Matthieu Gaud, Jacques Traoré |
On the Anonymity of Fair Offline E-cash Systems. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Bogdan Warinschi |
A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
12 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
public-key cryptography, factoring, standard model, semantic security |
12 | Yevgeniy Dodis |
Efficient Construction of (Distributed) Verifiable Random Functions. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Josef Pieprzyk, David Pointcheval |
Josef Pieprzyk, David Pointcheval. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
privacy, authentication, parallelization, Signcryption |
12 | Noam Gordon, Israel A. Wagner, Alfred M. Bruckstein |
Discrete Bee Dance Algorithms for Pattern Formation on a Grid. |
IAT |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong |
Secret Handshakes from Pairing-Based Key Agreements. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Xavier Boyen |
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen |
Relaxing Chosen-Ciphertext Security. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Soichi Furuya, Kouichi Sakurai |
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
real-or-random security, Stream cipher, provable security, message authentication, mode of operation |
12 | Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky |
Approximate Non-Interference. |
CSFW |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Kazukuni Kobara, Hideki Imai |
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. |
Public Key Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Ran Canetti, Hugo Krawczyk |
Universally Composable Notions of Key Exchange and Secure Channels. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security |
12 | Alessandro Aldini, Mario Bravetti, Alessandra Di Pierro, Roberto Gorrieri, Chris Hankin, Herbert Wiklicky |
Two Formal Approaches for Approximating Noninterference Properties. |
FOSAD |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Anna Lysyanskaya |
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Unique signatures, verifiable random functions, application of groups with DH-DDH separation |
12 | Nicholas J. Hopper, John Langford 0001, Luis von Ahn |
Provably Secure Steganography. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Lotfi A. Zadeh |
A New Direction in AI - Toward a Computational Theory of Perceptions. |
Fuzzy Days |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Peeter Laud |
Semantics and Program Analysis of Computationally Secure Information Flow. |
ESOP |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Takeshi Koshiba |
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima |
IND-CCA Public Key Schemes Equivalent to Factoring n=pq. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Adam L. Young, Moti Yung |
Bandwidth-Optimal Kleptographic Attacks. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory |
12 | Olivier Baudron, David Pointcheval, Jacques Stern |
Extended Notions of Security for Multicast Public Key Cryptosystems. |
ICALP |
2000 |
DBLP DOI BibTeX RDF |
Multicast encryption, semantic security, non-malleability |
12 | Miyako Ohkubo, Masayuki Abe |
A Length-Invariant Hybrid Mix. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Jonathan Katz, Moti Yung |
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Mihir Bellare, Alexandra Boldyreva, Silvio Micali |
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Helmut Thiele |
On Algebraic Foundations of Information Granulation III Investigating the HATA-MUKAIDONO Approach. |
ISMVL |
2000 |
DBLP DOI BibTeX RDF |
Fuzzy Information Granulations, KLEENE, LUKASIEWICZ and REICHENBACH Granulations |
12 | Slawomir Lasota 0001 |
Finitary Observations in Regular Algebras. |
SOFSEM |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Yutaka Hata, Masao Mukaidono |
On Some Classes of Fuzzy Information Granularity and Their Representations. |
ISMVL |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Michel Bidoit, Rolf Hennicker |
Modular Correctness Proofs of Behavioural Implementations. |
Acta Informatica |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Rolf Hennicker, Michel Bidoit |
Observational Logic. |
AMAST |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Slawomir Lasota 0001 |
Partial-Congruence Factorization of Bisimilarity Induced by Open Maps. |
ICALP |
1998 |
DBLP DOI BibTeX RDF |
|
12 | Srikanth Venkataraman, W. Kent Fuchs, Janak H. Patel |
Diagnostic Simulation of Sequential Circuits Using Fault Sampling. |
VLSI Design |
1998 |
DBLP DOI BibTeX RDF |
Diagnostic fault simulation, Sampling, Diagnosis, Sequential circuits |
12 | Shung-Chih Chen, Jer-Min Jou |
Diagnostic fault simulation for synchronous sequential circuits. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
1997 |
DBLP DOI BibTeX RDF |
|
12 | Michael J. Horowitz, David L. Neuhoff |
Image Coding By Perceptural Pursuit. |
ICIP (3) |
1997 |
DBLP DOI BibTeX RDF |
|
12 | Xinxin Liu 0008, David Walker 0008 |
Confluence of Processes and Systems of Objects. |
TAPSOFT |
1995 |
DBLP DOI BibTeX RDF |
|
12 | Serge Abiteboul, Jan Van den Bussche |
Deep Equality Revisited. |
DOOD |
1995 |
DBLP DOI BibTeX RDF |
|
12 | David Janin |
Some Results About Logical Descriptions of Non-Deterministic Behaviours. |
FSTTCS |
1993 |
DBLP DOI BibTeX RDF |
|
12 | Gilles Bernot, Michel Bidoit, Teodor Knapik |
Towards an Adequate Notion of Observation. |
ESOP |
1992 |
DBLP DOI BibTeX RDF |
|
12 | Einar Smith |
Comparability Orders and Measurement. |
Applications and Theory of Petri Nets |
1991 |
DBLP DOI BibTeX RDF |
Intransitive indifference, Ordinal scales, Interval orders, Concurrency-theory |
12 | C. A. Petri 0001, Einar Smith |
Concurrency and continuity. |
European Workshop on Applications and Theory of Petri Nets |
1986 |
DBLP DOI BibTeX RDF |
|