|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3849 occurrences of 1722 keywords
|
|
|
Results
Found 4942 publication records. Showing 4919 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Sung Jin Choi, Hee Yong Youn |
An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
security, mutual authentication, key pre-distribution, LU decomposition, distributed sensor network |
15 | Alessandro Cilardo, Antonino Mazzeo, Luigi Romano |
An FPGA-based Key-Store for Improving the Dependability of Security Services. |
WORDS |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Ruby B. Lee, Peter C. S. Kwan, John Patrick McGregor, Jeffrey S. Dwoskin, Zhenghong Wang |
Architecture for Protecting Critical Secrets in Microprocessors. |
ISCA |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Hung-Yu Chien |
Efficient Time-Bound Hierarchical Key Assignment Scheme. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Dipti Prasad Mukherjee, Subhamoy Maitra, Scott T. Acton |
Spatial domain digital watermarking of multimedia objects for buyer authentication. |
IEEE Trans. Multim. |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Subramanian Lakshmanan, Deepak J. Manohar, Mustaque Ahamad, H. Venkateswaran |
Collective Endorsement and the Dissemination Problem in Malicious Environments. |
DSN |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya |
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
ID-Based encryption, broadcast encryption, forward security |
15 | Ernest F. Brickell, Jan Camenisch, Liqun Chen 0002 |
Direct anonymous attestation. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
integrity based computing, privacy, cryptographic protocols, trusted computing, anonymous credential systems |
15 | Kevin C. Zatloukal, Nicholas J. A. Harvey |
Family trees: an ordered dictionary with optimal congestion, locality, degree, and search time. |
SODA |
2004 |
DBLP BibTeX RDF |
|
15 | Robert Harper 0001 |
Self-Adjusting Computation. |
LICS |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Robert Harper 0001 |
Self-Adjusting Computation. |
ICALP |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Rafail Ostrovsky, Charles Rackoff, Adam D. Smith |
Efficient Consistency Proofs for Generalized Queries on a Committed Database. |
ICALP |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Yongwei Zhu, Mohan S. Kankanhalli |
Key-Based Melody Segmentation for Popular Songs. |
ICPR (3) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian |
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. |
COMPSAC |
2004 |
DBLP DOI BibTeX RDF |
Cryptographic Key Assignment and User Hierarchy, Access Control, One-Way Hash Function |
15 | François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations |
15 | Supakorn Kungpisdan, Phu Dung Le, Bala Srinivasan 0002 |
A Limited-Used Key Generation Scheme for Internet Transactions. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
credit-card payment, key generation, electronic payment systems |
15 | Jorge Nakahara Jr., Daniel Santana de Freitas |
Cryptanalysis of Ake98. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6 |
15 | Hyun Gon Kim, Doo-Ho Choi |
Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Hando. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Deok-Gyu Lee, Im-Yeong Lee |
A Study on Efficient Key Distribution and Renewal in Broadcast Encryption. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Lars R. Knudsen, John Erik Mathiassen |
On the Role of Key Schedules in Attacks on Iterated Ciphers. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Krister Lindén |
Finding Cross-Lingual Spelling Variants. |
SPIRE |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Kerttu Pollari-Malmi, Eljas Soisalon-Soininen |
Concurrency Control and I/O-Optimality in Bulk Insertion.. |
SPIRE |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Andris Ambainis, Adam D. Smith |
Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption. |
APPROX-RANDOM |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Javier Herranz, Germán Sáez |
New Identity-Based Ring Signature Schemes. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Robert T. Schweller, Ashish Gupta 0003, Elliot Parsons, Yan Chen 0004 |
Reversible sketches for efficient and accurate change detection over network data streams. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
IP mangling, data stream computation, modular hashing, reverse hashing, sketch, change detection, network anomaly detection |
15 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia |
LEAP - efficient security mechanisms for large-scale distributed sensor networks. |
SenSys |
2003 |
DBLP DOI BibTeX RDF |
sensor networks, key management, in-network processing, security mechanism |
15 | Catherine H. Gebotys, Robert J. Gebotys |
A Framework for Security on NoC Technologies. |
ISVLSI |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Marco Casassa Mont, Keith Harrison, Martin Sadler |
The HP time vault service: exploiting IBE for timed release of confidential information. |
WWW |
2003 |
DBLP DOI BibTeX RDF |
disclosure policies, identifier-based encryption, timed-release, security, web service, privacy |
15 | Chong-zhi Gao, Zheng-an Yao, Lei Li 0022 |
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Kyung-Tae Lee, Inbum Jung, Changyeol Choi, Wan Choi, Sang-Wook Kim |
Design and Implementation of a Cache-Conscious Index Manager for the Tachyon, a Main Memory DBMS. |
COMPSAC |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Pär-Anders Albinsson, Shumin Zhai |
High precision touch screen interaction. |
CHI |
2003 |
DBLP DOI BibTeX RDF |
touch screens |
15 | Gianni Franceschini, Roberto Grossi |
Optimal Worst-Case Operations for Implicit Cache-Oblivious Search Trees. |
WADS |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Lars R. Knudsen, Tadayoshi Kohno |
Analysis of RMAC. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 |
Key Recovery Attacks on the RMAC, TMAC, and IACBC. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC |
15 | Joseph K. Liu, Victor K. Wei, Duncan S. Wong |
A Separable Threshold Ring Signature Scheme. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Hyun Gon Kim, Doo-Ho Choi, Dae Young Kim 0001 |
Secure Session Key Exchange for Mobile IP Low Latency Handoffs. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Haowen Chan, Adrian Perrig, Dawn Xiaodong Song |
Random Key Predistribution Schemes for Sensor Networks. |
S&P |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Ramesh Karri, Grigori Kuznetsov, Michael Gössel |
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers. |
ITC |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Vishal Kher, Yongdae Kim |
Decentralized Authentication Mechanisms for Object-based Storage Devices. |
IEEE Security in Storage Workshop |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Adi Shamir, Eran Tromer |
Factoring Large Number with the TWIRL Device. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Ohad Rodeh, Kenneth P. Birman, Danny Dolev |
Using AVL trees for fault-tolerant group key management. |
Int. J. Inf. Sec. |
2002 |
DBLP DOI BibTeX RDF |
Logical key hierarchy, Security, Group communication |
15 | Elisa Bertino, Elena Ferrari |
Secure and selective dissemination of XML documents. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
secure distribution, XML, Access control |
15 | Elisa Bertino, Barbara Carminati, Elena Ferrari |
A temporal key management scheme for secure broadcasting of XML documents. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
secure broadcasting, temporal key management, XML |
15 | Oskar Scheikl, Jonathan Lane, Robert Boyer, Mohamed Eltoweissy |
Multi-level Secure Multicast: The Rethinking of Secure Locks. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Baldwin, Simon Shiu |
Encryption and Key management in a SAN. |
IEEE Security in Storage Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Håvard Raddum, Lars R. Knudsen |
A Differential Attack on Reduced-Round SC2000. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen |
Differential Cryptanalysis of Q. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
15 | David P. Jablon |
Password Authentication Using Multiple Servers. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Mike Bond |
Attacks on Cryptoprocessor Transaction Sets. |
CHES |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Bernard Chazelle |
The soft heap: an approximate priority queue with optimal error rate. |
J. ACM |
2000 |
DBLP DOI BibTeX RDF |
amoritization, soft heap, priority queue, heap |
15 | Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong |
Root Finding Interpolation Attack. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Marcin Kik |
Periodic Correction Networks. |
Euro-Par |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Wenfei Fan, Jérôme Siméon |
Integrity Constraints for XML. |
PODS |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Sabine Hanke, Eljas Soisalon-Soininen |
Group Updates for Red-Black Trees. |
CIAC |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Michael Walker 0001 |
On the Security of 3GPP Networks. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
15 | John Kelsey, Bruce Schneier |
Key-Schedule Cryptanalysis of DEAL. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
15 | Hidema Tanaka, Kazuyuki Hisamatsu, Toshinobu Kaneko |
Strenght of MISTY1 without FL Function for Higher Order Differential Attack. |
AAECC |
1999 |
DBLP DOI BibTeX RDF |
|
15 | Stephen M. Matyas, Allen Roginsky |
An Effective Defense Against First Party Attacks in Public-Key Algorithms. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
Encryption, Hash function, Public key |
15 | Kazumaro Aoki |
On Maximum Non-averaged Differential Probability. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
maximum average of differential probability, linear hull, maximum average of linear probability, maximum non-averaged differential probability, maximum non-averaged linear probability, DES-like cipher, Differential cryptanalysis, differential, linear cryptanalysis |
15 | Bernard Chazelle |
Car-Pooling as a Data Structuring Device: The Soft Heap. |
ESA |
1998 |
DBLP DOI BibTeX RDF |
|
15 | Michael Shneier, Mohamed Abdel-Mottaleb |
Exploiting the JPEG Compression Scheme for Image Retrieval. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1996 |
DBLP DOI BibTeX RDF |
Image retrieval, DCT, image databases, JPEG, compressed domain processing |
15 | Danny Z. Chen, Xiaobo Hu 0001 |
Fast and Efficient Operations on Parallel Priority Queues. |
ISAAC |
1994 |
DBLP DOI BibTeX RDF |
|
15 | Warwick Ford, Michael J. Wiener |
A Key Distribution Method for Object-Based Protection. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
15 | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen |
Robust and Secure Password and Key Change Method. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
15 | Mark Shand, Jean Vuillemin |
Fast implementations of RSA cryptography. |
IEEE Symposium on Computer Arithmetic |
1993 |
DBLP DOI BibTeX RDF |
|
15 | Ishai Ben-Aroya, Eli Biham |
Differential Cryptanalysis of Lucifer. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
15 | Ricardo A. Baeza-Yates |
An Adaptive Overflow Technique for B-trees. |
EDBT |
1990 |
DBLP DOI BibTeX RDF |
|
15 | Dik Lun Lee, Chun-Wu Roger Leng |
Partitioned Signature Files: Design Issues and Performance Evaluation. |
ACM Trans. Inf. Syst. |
1989 |
DBLP DOI BibTeX RDF |
|
15 | Yair Frankel |
A Practical Protocol for Large Group Oriented Networks. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
15 | Chi-Sung Laih, Lein Harn, Jau-Yien Lee, Tzonelih Hwang |
Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimentional Linear Space. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
15 | Albrecht Beutelspacher |
Perfect and Essentially Perfect Authentication Schemes. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
15 | Eiji Okamoto |
Key Distribution Systems Based on Identification Information. |
CRYPTO |
1987 |
DBLP DOI BibTeX RDF |
|
15 | Jürg Nievergelt, Hans Hinterberger, Kenneth C. Sevcik |
The Grid File: An Adaptable, Symmetric Multikey File Structure. |
ACM Trans. Database Syst. |
1984 |
DBLP DOI BibTeX RDF |
|
15 | Arnold L. Rosenberg, Lawrence Snyder |
Time- and Space-Optimality in B-Trees. |
ACM Trans. Database Syst. |
1981 |
DBLP DOI BibTeX RDF |
2, 3-tree, bushy B-tree, compact B-tree, node-visit cost, B-tree, space utilization |
15 | C. Leung |
Some Open Problems In Cryptography. |
ACM Annual Conference (1) |
1978 |
DBLP DOI BibTeX RDF |
Security, Complexity, Cryptography, Key distribution |
15 | Jürgen Seehusen |
Virtuelle Z-Baum-Technik. |
Computing |
1976 |
DBLP DOI BibTeX RDF |
|
12 | Wolfgang Killmann |
On security aspects of the ciphers T-310 and SKS with approved long-term keys. |
Cryptologia |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Beáta Megyesi, Crina Tudor, Benedek Láng, Anna Lehofer, Nils Kopal, Karl de Leeuw, Michelle Waldispühl |
Keys with nomenclatures in the early modern Europe. |
Cryptologia |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Baocang Wang, Yange Chen, Furong Li, Jian Song, Rongxing Lu, Pu Duan, Zhihong Tian |
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys. |
IEEE Trans. Serv. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Sara Ricci, Patrik Dobias, Lukas Malina, Jan Hajny, Petr Jedlicka |
Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Abeer Y. Al-Hyari, Charlie Obimbo, Mua'ad Abu-Faraj, Ismail Al-Taharwa |
Generating Powerful Encryption Keys for Image Cryptography With Chaotic Maps by Incorporating Collatz Conjecture. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Xiaoying Shen, Xue Luo, Feng Yuan, Baocang Wang, Yange Chen, Dianhua Tang, Le Gao |
Verifiable Privacy-Preserving Federated Learning Under Multiple Encrypted Keys. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yunzhen Zhang, Baocang Wang, Zhen Zhao 0005 |
Secure k-NN Query With Multiple Keys Based on Random Projection Forests. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Fabian Tomaschek, Michael Ramscar, Jessie S. Nixon |
The Keys to the Future? An Examination of Statistical Versus Discriminative Accounts of Serial Pattern Learning. |
Cogn. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Augustin Bouquillard, Florent Jacquemard |
Engraving Oriented Joint Estimation of Pitch Spelling and Local and Global Keys. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | David Soler, Carlos Dafonte, Manuel Fernández-Veiga, Ana Fernández Vilas, Francisco Javier Nóvoa |
A Privacy-preserving key transmission protocol to distribute QRNG keys using zk-SNARKs. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Otmar Ertl |
JumpBackHash: Say Goodbye to the Modulo Operation to Distribute Keys Uniformly to Buckets. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Yue Niu, Saurav Prakash, Salman Avestimehr |
ATP: Enabling Fast LLM Serving via Attention on Top Principal Keys. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Zhuangkun Wei, Wenxiu Hu, Weisi Guo |
Explainable Adversarial Learning Framework on Physical Layer Secret Keys Combating Malicious Reconfigurable Intelligent Surface. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Munqath Alatar, Attila Sali |
Approximate Keys and Functional Dependencies in Incomplete Databases With Limited Domains-Algorithmic Perspective. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Zhuoxing Zhang, Sebastian Link |
Mixed Covers of Keys and Functional Dependencies for Maintaining the Integrity of Data under Updates. |
Proc. VLDB Endow. |
2024 |
DBLP BibTeX RDF |
|
12 | Xiaohui Zhang 0009, Meimei Zhao, Bing Yao |
Various matching keys for asymmetric topology encryption. |
Discret. Appl. Math. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau |
Secret and Shared Keys Recovery on Hamming Quasi-Cyclic with SASCA. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Thomas Aulbach, Samed Düzlü, Michael Meyer, Patrick Struck, Maximiliane Weishäupl |
Hash your Keys before Signing: BUFF Security of the Additional NIST PQC Signatures. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
12 | Shuai An, Yang Cao 0012 |
Relative Keys: Putting Feature Explanation into Context. |
Proc. ACM Manag. Data |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Liqun Chen 0002, Nada El Kassem, Christopher J. P. Newton |
How To Bind A TPM's Attestation Keys With Its Endorsement Key. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Qing Ling, Tingting Cui, Hongtao Hu, Sijia Gong, Zijun He, Jiali Huang, Jia Xiao |
Finding Impossible Differentials in ARX Ciphers under Weak Keys. |
IACR Trans. Symmetric Cryptol. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Alar Leibak |
On the number of factorizations of $ t $ mod $ N $ and the probability distribution of Diffie-Hellman secret keys for many users. |
Adv. Math. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
12 | Shuai Shi, Ning Xiao |
Security demonstration for the quantum noise-based physical layer using variable keys. |
Int. J. Sens. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 4919 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|