|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai |
Efficient disk encryption and verification through trusted nonce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 304-309, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Shubo Liu, Zhengquan Xu, Wei Li, Jin Liu, Zhiyong Yuan |
A Novel Format-Compliant Video Encryption Scheme for H.264/AVC Stream Based on Residual Block Scrambling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 1087-1094, 2008, Springer, 978-3-540-87440-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
format-compliant, residual block scrambling, chaotic cryptosystem, H.264/AVC |
21 | Sascha Müller 0003, Stefan Katzenbeisser 0001, Claudia Eckert 0001 |
Distributed Attribute-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 20-36, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere |
Towards Tamper Resistant Code Encryption: Practice and Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 86-100, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Zhang Dinghui, Gu Qiujie, Pan Yonghua, Zhang Xinghua |
Discrete Chaotic Encryption and Decryption of Digital Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 849-852, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao |
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 426-436, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Threshold Multi Authority ABE, Without a central authority |
21 | Jun Furukawa 0001, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka |
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 116-129, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
low error rate, biometrics, Fuzzy, identity-based |
21 | Anil Yekkala, C. E. Veni Madhavan |
Bit Domain Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 10th International Conference, ACIVS 2008, Juan-les-Pins, France, October 20-24, 2008. Proceedings, pp. 45-56, 2008, Springer, 978-3-540-88457-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Benoît Chevallier-Mames, David Naccache, Jacques Stern |
Linear Bandwidth Naccache-Stern Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings, pp. 327-339, 2008, Springer, 978-3-540-85854-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ns cryptosystem, multiplicative knapsack, efficiency, Public key cryptography |
21 | Alexander W. Dent |
A Brief History of Provably-Secure Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 357-370, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Cécile Delerablée, David Pointcheval |
Dynamic Threshold Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 317-334, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Abbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt |
Securing information content using new encryption method and Steganography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: Third IEEE International Conference on Digital Information Management (ICDIM), November 13-16, 2008, London, UK, Proceedings, pp. 563-568, 2008, IEEE, 978-1-4244-2917-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht |
New approaches to encryption and steganography for digital videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 13(3), pp. 191-204, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Melissa Chase |
Multi-authority Attribute Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 515-534, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Dan Boneh, Craig Gentry, Michael Hamburg |
Space-Efficient Identity Based Encryption Without Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 647-657, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Shigenori Yamakawa, Yang Cui 0001, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai |
On the Key-Privacy Issue of McEliece Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings, pp. 168-177, 2007, Springer, 978-3-540-77223-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Sang Su Lee, Ku-Young Chang, Deokgyu Lee, Dowon Hong |
A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 114-118, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Kwang Moon Cho |
Management of Access Control for Content Packages by Using XML Subject-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 453-457, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Grigorios Chrysos 0001, Apostolos Dollas, Nikolaos G. Bourbakis, J. Sukarno Mertoguno |
An Integrated Video Compression, Encryption and Information Hiding Architecture based on the SCAN Algorithm and the Stretch Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCCM ![In: IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2007, 23-25 April 2007, Napa, California, USA, pp. 327-330, 2007, IEEE Computer Society, 0-7695-2940-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Qiong Huang 0001, Duncan S. Wong |
Generic Certificateless Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings, pp. 278-291, 2007, Springer, 978-3-540-75650-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Antonio Izquierdo, Joaquín Torres Márquez, José María Sierra, Mildrey Carbonell |
Using Adaptative Encryption for Ubiquitous Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 540-548, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Michel Abdalla, Eike Kiltz, Gregory Neven |
Generalized Key Delegation for Hierarchical Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 139-154, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Alexandra Boldyreva, Virendra Kumar |
Extended Abstract: Provable-Security Analysis of Authenticated Encryption in Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 92-100, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Aslan Askarov, Andrei Sabelfeld |
Gradual Release: Unifying Declassification, Encryption and Key Release Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 207-221, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Eun-Kyung Ryu, Tsuyoshi Takagi |
Efficient Conjunctive Keyword-Searchable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 409-414, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Judicaël Courant, Cristian Ene, Yassine Lakhnech |
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSTTCS ![In: FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science, 27th International Conference, New Delhi, India, December 12-14, 2007, Proceedings, pp. 364-375, 2007, Springer, 978-3-540-77049-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jonathan Katz, Moti Yung |
Characterization of Security Notions for Probabilistic Private-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(1), pp. 67-95, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Private-key encryptions, Definitions |
21 | Marco Grangetto, Enrico Magli, Gabriella Olmo |
Multimedia Selective Encryption by Means of Randomized Arithmetic Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 8(5), pp. 905-917, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar |
Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Information Processing ![In: Intelligent Information Processing III, IFIP TC12 International Conference on Intelligent Information Processing (IIP 2006), September 20-23, Adelaide, Australia, pp. 171-178, 2006, Springer, 978-0-387-44639-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES |
21 | Goo-Rak Kwon, Kwan-Hee Lee, Sang-Jae Nam, Sung-Jea Ko |
Intellectual Property Rights Management Using Combination Encryption in MPEG-4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 188-196, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Christian Veigner, Chunming Rong |
On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 521-530, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Mihir Bellare, Phillip Rogaway |
The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 409-426, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Kevin S. McCurley |
Language Modeling and Encryption on Packet Switched Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 359-372, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Weihai Li, Yuan Yuan 0001 |
Visual Information Encryption in Frequency Domain: Risk and Enhancement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWICPAS ![In: Advances in Machine Vision, Image Processing, and Pattern Analysis, International Workshop on Intelligent Computing in Pattern Analysis/Synthesis, IWICPAS 2006, Xi'an, China, August 26-27, 2006, Proceedings, pp. 225-234, 2006, Springer, 3-540-37597-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Razib Iqbal, Shervin Shirmohammadi, Abdulmotaleb El-Saddik |
Compressed-Domain Encryption of Adapted H.264 Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Eigth IEEE International Symposium on Multimedia (ISM 2006), 11-13 December 2006, San Diego, CA, USA, pp. 979-984, 2006, IEEE Computer Society, 0-7695-2746-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Anand Pramod Kulkarni, Thomas J. Grebinski |
Partial Selective Encryption: An Improved System for Protecting VLSI Design Data in the OASIS format. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 7th International Symposium on Quality of Electronic Design (ISQED 2006), 27-29 March 2006, San Jose, CA, USA, pp. 676-681, 2006, IEEE Computer Society, 0-7695-2523-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Feng Huang, Yong Feng 0001 |
An Image Encryption Approach Based on a New Two-Dimensional Map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), Pasadena, California, USA, December 18-20, 2006, Proceedings, pp. 125-130, 2006, IEEE Computer Society, 0-7695-2745-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Misung Cho, Seokryul Kim, Maenghee Sung, Giwon On |
3D Fingerprinting and Encryption Principle for Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AXMEDIS ![In: Proceedings of the Second International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, AXMEDIS 2006, Leeds, UK, December 13-15, 2006, pp. 121-127, 2006, IEEE Computer Society, 0-7695-2625-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Zulfikar Ramzan, David P. Woodruff |
Fast Algorithms for the Free Riders Problem in Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 308-325, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Niansheng Liu, Donghui Guo |
Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 443-450, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Socek, Hari Kalva, Spyros S. Magliveras, Oge Marques, Dubravko Culibrk, Borko Furht |
A Permutation-Based Correlation-Preserving Encryption Method for Digital Videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAR (1) ![In: Image Analysis and Recognition, Third International Conference, ICIAR 2006, Póvoa de Varzim, Portugal, September 18-20, 2006, Proceedings, Part I, pp. 547-558, 2006, Springer, 3-540-44891-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Tetsu Iwata |
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 310-327, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Klimis S. Ntalianis, Stefanos D. Kollias |
Chaotic video objects encryption based on mixed feedback, multiresolution decomposition and time-variant S-boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (2) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 1110-1113, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jianjun Duan, Joe Hurd, Guodong Li, Scott Owens, Konrad Slind, Junxing Zhang |
Functional Correctness Proofs of Encryption Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPAR ![In: Logic for Programming, Artificial Intelligence, and Reasoning, 12th International Conference, LPAR 2005, Montego Bay, Jamaica, December 2-6, 2005, Proceedings, pp. 519-533, 2005, Springer, 3-540-30553-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong |
Efficient Verifiable Ring Encryption for Ad Hoc Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAS ![In: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers, pp. 1-13, 2005, Springer, 3-540-30912-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval |
Optimal Asymmetric Encryption and Signature Paddings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005, Proceedings, pp. 254-268, 2005, 3-540-26223-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Shaojiang Deng, Linhua Zhang, Di Xiao 0001 |
Image Encryption Scheme Based on Chaotic Neural System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30 - June 1, 2005, Proceedings, Part II, pp. 868-872, 2005, Springer, 3-540-25913-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Roman Pfarrhofer, Andreas Uhl |
Selective Image Encryption Using JBIG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 98-107, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Chris J. Mitchell |
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 244-258, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Scott C.-H. Huang, Ding-Zhu Du |
New constructions on broadcast encryption key pre-distribution schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 515-523, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Dan Boneh, Xavier Boyen, Eu-Jin Goh |
Hierarchical Identity Based Encryption with Constant Size Ciphertext. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 440-456, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu |
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 389-409, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Rong-Jian Chen, Yi-Te Lai, Jui-Lin Lai |
Architecture design of the re-configurable 2-D von Neumann cellular automata for image encryption application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 3059-3062, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu |
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 11-13 2005, Lisbon, Portugal, pp. 12-22, 2005, ACM, 1-59593-090-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
resolution strategies, verification, cryptographic protocols, horn clauses |
21 | Liqun Chen 0002, Zhaohui Cheng |
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 442-459, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Zhenchuan Chai, Zhenfu Cao, Yuan Zhou |
Encryption Based on Reversible Second-Order Cellular Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 350-358, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi |
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings, pp. 205-222, 2005, Springer, 3-540-28114-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Shiguo Lian, Zhongxuan Liu, Zhen Ren, Zhiquan Wang |
Selective Video Encryption Based on Advanced Video Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (2) ![In: Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part II, pp. 281-290, 2005, Springer, 3-540-30040-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Michael Backes 0001, Birgit Pfitzmann |
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 204-218, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Shiguo Lian, Jinsheng Sun, Zhiquan Wang |
A Novel Image Encryption Scheme Based-on JPEG Encoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 8th International Conference on Information Visualisation, IV 2004, 14-16 July 2004, London, UK, pp. 217-220, 2004, IEEE Computer Society, 0-7695-2177-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Shiguo Lian, Jinsheng Sun, Zhiquan Wang, Yuewei Dai |
A fast video encryption scheme based-on chaos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARCV ![In: 8th International Conference on Control, Automation, Robotics and Vision, ICARCV 2004, Kunming, China, 6-9 December 2004, Proceedings, pp. 126-131, 2004, IEEE, 0-7803-8653-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik |
Secret Handshakes from CA-Oblivious Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 293-307, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Mihir Bellare, Alexandra Boldyreva, Adriana Palacio |
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 171-188, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Sangjin Kim, Heekuck Oh |
Fair Offline Payment Using Verifiable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 286-301, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Dong Jin Park, Kihyun Kim, Pil Joong Lee |
Public Key Encryption with Conjunctive Field Keyword Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 73-86, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
pairing-based cryptography, Conjunctive keyword search |
21 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung |
Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 148-161, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Gunhee Kim, Dongkyoo Shin, Dongil Shin |
An Effective Adaptation of Encryption on MPEG-4 Video Streams for Digital Rights Management in an Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings, pp. 642-651, 2004, Springer, 3-540-22906-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Alexandra Boldyreva, Nut Taesombut |
Online Encryption Schemes: New Security Notions and Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 1-14, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung |
A Generic Construction for Intrusion-Resilient Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 81-98, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Tomoyuki Nagase, Masaya Komata, Takashi Araki |
Secure Signals Transmission Based on Quaternion Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 35-38, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Kaijie Wu 0001, Ramesh Karri, Grigori Kuznetsov, Michael Gössel |
Low Cost Concurrent Error Detection for the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Proceedings 2004 International Test Conference (ITC 2004), October 26-28, 2004, Charlotte, NC, USA, pp. 1242-1248, 2004, IEEE Computer Society, 0-7803-8581-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen |
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (3) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part III, pp. 418-425, 2004, Springer, 3-540-23985-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Min-Sung Koh, Esteban Rodriguez-Marek |
A Novel Data Encryption Algorithm Based on Wavelet Filter Banks and the Singular Value Decomposition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 16-18 November 2004, Tampa, FL, USA, Proceedings, pp. 320-326, 2004, IEEE Computer Society, 0-7695-2260-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Denning, Neil Harold, Malachy Devlin, James Irvine 0001 |
Using System Generator to Design a Reconfigurable Video Encryption System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 13th International Conference, FPL 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings, pp. 980-983, 2003, Springer, 3-540-40822-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Máire McLoone, John V. McCanny |
Very High Speed 17 Gbps SHACAL Encryption Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 13th International Conference, FPL 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings, pp. 111-120, 2003, Springer, 3-540-40822-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SHACAL, NESSIE |
21 | Michael O. Rabin |
Hyper Encryption and Everlasting Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIAC ![In: Algorithms and Complexity, 5th Italian Conference, CIAC 2003, Rome, Italy, May 28-30, 2003, Proceedings, pp. 7-10, 2003, Springer, 3-540-40176-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Ozgur Sinanoglu, Alex Orailoglu |
Partial Core Encryption for Performance-Efficient Test of SOCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: 2003 International Conference on Computer-Aided Design, ICCAD 2003, San Jose, CA, USA, November 9-13, 2003, pp. 91-94, 2003, IEEE Computer Society / ACM, 1-58113-762-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Augot, Matthieu Finiasz |
A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 229-240, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Mazleena bt. Salleh, Subariah bt. Ibrahim, I. F. Isnin |
Enhanced chaotic image encryption algorithm based on Baker's map. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (2) ![In: Proceedings of the 2003 International Symposium on Circuits and Systems, ISCAS 2003, Bangkok, Thailand, May 25-28, 2003, pp. 508-511, 2003, IEEE, 0-7803-7761-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung |
Intrusion-Resilient Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 19-32, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Jan Camenisch, Victor Shoup |
Practical Verifiable Encryption and Decryption of Discrete Logarithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 126-144, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 |
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 241-256, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Vasyl Ustimenko |
CRYPTIM: Graphs as Tools for Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 14th International Symposium, AAECC-14, Melbourne, Australia November 26-30, 2001, Proceedings, pp. 278-286, 2001, Springer, 3-540-42911-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
constructive combinatorics, security, privacy, cryptography, networks, e-commerce, data communication, virtual campus |
21 | Dan Boneh, Antoine Joux, Phong Q. Nguyen |
Why Textbook ElGamal and RSA Encryption Are Insecure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 30-43, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Guillaume Poupard, Jacques Stern |
Fair Encryption of RSA Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding, pp. 172-189, 2000, Springer, 3-540-67517-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Toru Ohira |
Neural Network Model with Delay toward Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN (5) ![In: Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, IJCNN 2000, Neural Computing: New Challenges and Perspectives for the New Millennium, Como, Italy, July 24-27, 2000, Volume 5, pp. 417-424, 2000, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Eiichiro Fujisaki, Tatsuaki Okamoto |
How to Enhance the Security of Public-Key Encryption at Minimum Cost. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 53-68, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Adnan M. Alattar, Ghassan Al-Regib |
Evaluation of selective encryption techniques for secure transmission of MPEG-compressed bit-streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30 - June 2, 1999, pp. 340-343, 1999, IEEE, 0-7803-5471-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Lars R. Knudsen |
Advanced Encryption Standard (AES) - An Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 7th IMA International Conference, Cirencester, UK, December 20-22, 1999, Proceedings, pp. 185, 1999, Springer, 3-540-66887-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Eli Gafni, Jessica Staddon, Yiqun Lisa Yin |
Efficient Methods for Integrating Traceability and Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, pp. 372-387, 1999, Springer, 3-540-66347-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Markus Jakobsson, Julien P. Stern, Moti Yung |
Scramble All, Encrypt Small. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 95-111, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Yair Frankel, Moti Yung |
On Characterization of Escrow Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 24th International Colloquium, ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings, pp. 705-715, 1997, Springer, 3-540-63165-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Thilo Zieschang |
Combinatorial Properties of Basic Encryption Operations (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 14-26, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Yair Frankel, Moti Yung |
Escrow Encryption Systems Visited: Attacks, Analysis and Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 222-235, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
21 | Carlo Blundo, Antonella Cresti |
Space Requirements for Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 287-298, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
21 | Johan van Tilburg |
Two Chosen Plaintext Attacks on the Li-Wang Joint Authentication and Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 10th International Symposium, AAECC-10, San Juan de Puerto Rico, Puerto Rico, May 10-14, 1993, Proceedings, pp. 332-343, 1993, Springer, 3-540-56686-4. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
21 | Ralph C. Merkle |
A Digital Signature Based on a Conventional Encryption Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '87, A Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings, pp. 369-378, 1987, Springer, 3-540-18796-0. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
21 | Glenn A. Orton, M. P. Roy, P. Andrew Scott, Lloyd E. Peppard, Stafford E. Tavares |
VLSI Implementation of Public-Key Encryption Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 277-301, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
21 | Zvi Galil, Stuart Haber, Moti Yung |
Symmetric Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 128-137, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
21 | Robert C. Fairfield, Alex Matusevich, Joseph Plany |
An LSI Digital Encryption Processor (DEP). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings, pp. 115-143, 1984, Springer, 3-540-15658-5. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 21739 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|