The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for indistinguishability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1997 (18) 1998-1999 (17) 2000-2001 (15) 2002 (20) 2003 (17) 2004 (15) 2005 (27) 2006 (28) 2007 (26) 2008 (29) 2009 (30) 2010-2011 (20) 2012 (15) 2013 (21) 2014 (33) 2015 (45) 2016 (40) 2017 (42) 2018 (29) 2019 (27) 2020 (36) 2021 (33) 2022 (36) 2023 (38) 2024 (15)
Publication types (Num. hits)
article(301) book(1) incollection(2) inproceedings(358) phdthesis(10)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 209 occurrences of 141 keywords

Results
Found 672 publication records. Showing 672 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Luis Garmendia, Ronald R. Yager, Enric Trillas, Adela Salvador Measures of specificity of fuzzy sets under T-indistinguishabilities. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos 0001 Controlled elements for designing ciphers suitable to efficient VLSI implementation. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Block ciphers, Hardware implementation, Data-dependent operations
12Walid Bagga, Refik Molva, Stefano Crosta Policy-based encryption schemes from bilinear pairings. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Michael Backes 0001, Birgit Pfitzmann On the Cryptographic Key Secrecy of the Strengthened Yahalom Protocol. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Danny Harnik, Moni Naor On Everlasting Security in the Hybrid Bounded Storage Model. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Donghoon Chang, Sangjin Lee 0002, Mridul Nandi, Moti Yung Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Shoichi Hirose Some Plausible Constructions of Double-Block-Length Hash Functions. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Ian F. Blake, Aldar C.-F. Chan Conditionally Verifiable Signature. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Zengchang Qin, Jonathan Lawry High Level Fuzzy Labels for Vague Concepts. Search on Bibsonomy SMPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Yuen-Yan Chan, Jin Li 0002 BGN Authentication and Its Extension to Convey Message Commitments. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Qianhong Wu, Willy Susilo, Yi Mu 0001, Fangguo Zhang Efficient Partially Blind Signatures with Provable Security. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Lotfi A. Zadeh Granular Computing - The Concept of Generalized Constraint-Based Computation. Search on Bibsonomy RSCTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi An Efficient and Secure RFID Security Method with Ownership Transfer. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Marion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security Games, Computational Soundness of Formal Methods, Provable Security, Probabilistic Encryption
12Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability
12Raja K. K. R. Sandireddy, Vishwani D. Agrawal Diagnostic and Detection Fault Collapsing for Multiple Output Circuits. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Pedro Adão, Gergei Bana, Andre Scedrov Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Martín Abadi, Véronique Cortier Deciding Knowledge in Security Protocols under (Many More) Equational Theories. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Yang Bo He, Zhi Geng, Xun Liang 0001 Learning Causal Structures Based on Markov Equivalence Class. Search on Bibsonomy ALT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Causal structure, Constrained essential graph, Randomization experiments, Bayesian networks, Directed acyclic graphs
12Guomin Yang, Duncan S. Wong, Xiaotie Deng Efficient Anonymous Roaming and Its Security Analysis. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Anonymous Roaming, Authenticated Key Exchange
12Luis Garmendia, Adela Salvador A New Algorithm to Compute Low T-Transitive Approximation of a Fuzzy Relation Preserving Symmetry. Comparisons with the T-Transitive Closure. Search on Bibsonomy ECSQARU The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Peng Wang 0009, Dengguo Feng, Wenling Wu On the Security of Tweakable Modes of Operation: TBC and TAE. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher
12Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade Towards a Theory of Intrusion Detection. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Fangguo Zhang, Yi Mu 0001, Willy Susilo Reducing Security Overhead for Mobile Networks. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Sujing Zhou, Dongdai Lin On Anonymity of Group Signatures. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Lech Polkowski Formal granular calculi based on rough inclusions. Search on Bibsonomy GrC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai On the Security of Cryptosystems with All-or-Nothing Transform. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Joseph K. Liu, Victor K. Wei, Duncan S. Wong Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Levente Buttyán, István Vajda Towards provable security for ad hoc routing protocols. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF on-demand source routing, ad hoc networks, routing protocols, provable security, simulatability
12Duong Hieu Phan, David Pointcheval On the Security Notions for Public-Key Encryption Schemes. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Andrei Sabelfeld Confidentiality for Multithreaded Programs via Bisimulation. Search on Bibsonomy Ershov Memorial Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Matthieu Gaud, Jacques Traoré On the Anonymity of Fair Offline E-cash Systems. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Bogdan Warinschi A Computational Analysis of the Needham-Schröeder-(Lowe) Protocol. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar A Practical Public Key Cryptosystem from Paillier and Rabin Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF public-key cryptography, factoring, standard model, semantic security
12Yevgeniy Dodis Efficient Construction of (Distributed) Verifiable Random Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Josef Pieprzyk, David Pointcheval Josef Pieprzyk, David Pointcheval. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy, authentication, parallelization, Signcryption
12Noam Gordon, Israel A. Wagner, Alfred M. Bruckstein Discrete Bee Dance Algorithms for Pattern Formation on a Grid. Search on Bibsonomy IAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong Secret Handshakes from Pairing-Based Key Agreements. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Xavier Boyen Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography). Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen Relaxing Chosen-Ciphertext Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Soichi Furuya, Kouichi Sakurai Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF real-or-random security, Stream cipher, provable security, message authentication, mode of operation
12Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky Approximate Non-Interference. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Kazukuni Kobara, Hideki Imai New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Ran Canetti, Hugo Krawczyk Universally Composable Notions of Key Exchange and Secure Channels. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Composition of protocols, Cryptographic Protocols, Key Exchange, Proofs of Security
12Alessandro Aldini, Mario Bravetti, Alessandra Di Pierro, Roberto Gorrieri, Chris Hankin, Herbert Wiklicky Two Formal Approaches for Approximating Noninterference Properties. Search on Bibsonomy FOSAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Anna Lysyanskaya Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Unique signatures, verifiable random functions, application of groups with DH-DDH separation
12Nicholas J. Hopper, John Langford 0001, Luis von Ahn Provably Secure Steganography. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Lotfi A. Zadeh A New Direction in AI - Toward a Computational Theory of Perceptions. Search on Bibsonomy Fuzzy Days The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Peeter Laud Semantics and Program Analysis of Computationally Secure Information Flow. Search on Bibsonomy ESOP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Takeshi Koshiba A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima IND-CCA Public Key Schemes Equivalent to Factoring n=pq. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Adam L. Young, Moti Yung Bandwidth-Optimal Kleptographic Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory
12Olivier Baudron, David Pointcheval, Jacques Stern Extended Notions of Security for Multicast Public Key Cryptosystems. Search on Bibsonomy ICALP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Multicast encryption, semantic security, non-malleability
12Miyako Ohkubo, Masayuki Abe A Length-Invariant Hybrid Mix. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Jonathan Katz, Moti Yung Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Mihir Bellare, Alexandra Boldyreva, Silvio Micali Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Helmut Thiele On Algebraic Foundations of Information Granulation III Investigating the HATA-MUKAIDONO Approach. Search on Bibsonomy ISMVL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Fuzzy Information Granulations, KLEENE, LUKASIEWICZ and REICHENBACH Granulations
12Slawomir Lasota 0001 Finitary Observations in Regular Algebras. Search on Bibsonomy SOFSEM The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Yutaka Hata, Masao Mukaidono On Some Classes of Fuzzy Information Granularity and Their Representations. Search on Bibsonomy ISMVL The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Michel Bidoit, Rolf Hennicker Modular Correctness Proofs of Behavioural Implementations. Search on Bibsonomy Acta Informatica The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12Rolf Hennicker, Michel Bidoit Observational Logic. Search on Bibsonomy AMAST The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12Slawomir Lasota 0001 Partial-Congruence Factorization of Bisimilarity Induced by Open Maps. Search on Bibsonomy ICALP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
12Srikanth Venkataraman, W. Kent Fuchs, Janak H. Patel Diagnostic Simulation of Sequential Circuits Using Fault Sampling. Search on Bibsonomy VLSI Design The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Diagnostic fault simulation, Sampling, Diagnosis, Sequential circuits
12Shung-Chih Chen, Jer-Min Jou Diagnostic fault simulation for synchronous sequential circuits. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
12Michael J. Horowitz, David L. Neuhoff Image Coding By Perceptural Pursuit. Search on Bibsonomy ICIP (3) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
12Xinxin Liu 0008, David Walker 0008 Confluence of Processes and Systems of Objects. Search on Bibsonomy TAPSOFT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
12Serge Abiteboul, Jan Van den Bussche Deep Equality Revisited. Search on Bibsonomy DOOD The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
12David Janin Some Results About Logical Descriptions of Non-Deterministic Behaviours. Search on Bibsonomy FSTTCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
12Gilles Bernot, Michel Bidoit, Teodor Knapik Towards an Adequate Notion of Observation. Search on Bibsonomy ESOP The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
12Einar Smith Comparability Orders and Measurement. Search on Bibsonomy Applications and Theory of Petri Nets The full citation details ... 1991 DBLP  DOI  BibTeX  RDF Intransitive indifference, Ordinal scales, Interval orders, Concurrency-theory
12C. A. Petri 0001, Einar Smith Concurrency and continuity. Search on Bibsonomy European Workshop on Applications and Theory of Petri Nets The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #672 of 672 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license