The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for secret with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1982 (16) 1983-1984 (17) 1985-1986 (19) 1987 (16) 1988 (18) 1989 (27) 1990 (21) 1991 (27) 1992 (26) 1993 (36) 1994 (42) 1995 (35) 1996 (49) 1997 (59) 1998 (70) 1999 (81) 2000 (98) 2001 (122) 2002 (174) 2003 (194) 2004 (312) 2005 (434) 2006 (458) 2007 (429) 2008 (506) 2009 (390) 2010 (243) 2011 (236) 2012 (248) 2013 (257) 2014 (312) 2015 (314) 2016 (321) 2017 (330) 2018 (370) 2019 (417) 2020 (390) 2021 (379) 2022 (371) 2023 (386) 2024 (96)
Publication types (Num. hits)
article(3585) book(5) data(1) incollection(39) inproceedings(4669) phdthesis(45) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3563 occurrences of 1284 keywords

Results
Found 8349 publication records. Showing 8346 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Yuanju Gan, Lihua Wang 0001, Licheng Wang, Ping Pan, Yixian Yang Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Mahabir Prasad Jhanwar, Reihaneh Safavi-Naini On the Share Efficiency of Robust Secret Sharing and Secret Sharing with Cheating Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Aziz Mouzali Codes Convolutifs et Partage de Secret Quantiques. (Convolutional Codes and Quantum Secret Sharing). Search on Bibsonomy 2013   RDF
19Shlomi Dolev, Limor Lahiani, Moti Yung Secret swarm unit: Reactive k-secret sharing. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Mustafa Atici Secret Sharing Scheme: Vector Space Secret Sharing and F Function. Search on Bibsonomy ASONAM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Tarik Kaced Secret Sharing and Algorithmic Information Theory. (Partage de secret et the'orie algorithmique de l'information). Search on Bibsonomy 2012   RDF
19Lorrie Willey, Janet C. Ford, Barbara Jo White, Danial L. Clapper Trade Secret Law and Information Systems: Can your Students Keep a Secret? Search on Bibsonomy J. Inf. Syst. Educ. The full citation details ... 2011 DBLP  BibTeX  RDF
19Chin-Chen Chang 0001, Kuo-Nan Chen, Ying-Hsuan Huang Low Computational Color Secret Sharing Schemes with High Shares Quality Color Secret Sharing. Search on Bibsonomy IIH-MSP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Shih-Chieh Shie, Ji-Han Jiang, Long-Tai Chen, Zeng-Hui Huang Secret Image Transmission Scheme Using Secret Codebook. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Daoshun Wang, Feng Yi On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme. Search on Bibsonomy EURASIP J. Adv. Signal Process. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Chun-Yu Wang, Ni-Shan Shiao, Hong-Hao Chen, Chwei-Shyong Tsai Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing. Search on Bibsonomy ICUIMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Stuart E. Schechter, A. J. Bernheim Brush, Serge Egelman It's no secret: measuring the security and reliability of authentication via 'secret' questions. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Stuart E. Schechter, A. J. Bernheim Brush, Serge Egelman It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Guangliang Liu, Lingyun Li, Shengxian Xie, Junqing Li 0001 Secret Sharing System and Secret Sharing Matrix. Search on Bibsonomy CIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Vinod M. Prabhakaran, Krishnan Eswaran, Kannan Ramchandran Secrecy via Sources and Channels -- A Secret Key - Secret Message Rate Trade-off Region Search on Bibsonomy CoRR The full citation details ... 2008 DBLP  BibTeX  RDF
19Vinod M. Prabhakaran, Krishnan Eswaran, Kannan Ramchandran Secrecy via sources and channels - A secret key - Secret message rate tradeoff region. Search on Bibsonomy ISIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Chin-Chen Chang 0001, Tzu-Chuen Lu, Yi-Hsuan Fan A Bit-Level Visual Secret Sharing Scheme for Multi-Secret Images Using Rotation and Reversion Operatations. Search on Bibsonomy Intelligent Multimedia Data Hiding: New Directions The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mitsugu Iwamoto, Lei Wang 0031, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Mihir Bellare, Phillip Rogaway Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
19Pei-Fang Tsai, Ming-Shi Wang An (3, 3)-Visual Secret Sharing Scheme for Hiding Three Secret Data. Search on Bibsonomy JCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19David R. Hannah Should I Keep a Secret? The Effects of Trade Secret Protection Procedures on Employees' Obligations to Protect Trade Secrets. Search on Bibsonomy Organ. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Liao-Jun Pang, Yu-Min Wang A new (t, n) multi-secret sharing scheme based on Shamir's secret sharing. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Hassan Jameel, Sungyoung Lee A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
19Mitsugu Iwamoto, Hirosuke Yamamoto A Construction Method of Visual Secret Sharing Schemes for Plural Secret Images. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2003 DBLP  BibTeX  RDF
17Hoi Ting Poon, Ali Miri, Jiying Zhao An improved watermarking technique for multi-user, multi-right environments. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Joint ownership, Watermarking, Secret sharing, Digital rights management
17Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti POTSHARDS - a secure, recoverable, long-term archival storage system. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2009 DBLP  DOI  BibTeX  RDF approximate pointers, secret splitting, Archival storage
17Sahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal MPLS security: an approach for unicast and multicast environments. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Threshold secret sharing scheme, Security, Confidentiality, MPLS
17Wolter Pieters, Qiang Tang 0001 Data Is Key: Introducing the Data-Based Access Control Paradigm. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data-based access control, de-perimeterisation, secret sharing, secure sketches
17Hossein Ghodosi, Josef Pieprzyk Multi-Party Computation with Omnipresent Adversary. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation
17Kai-Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama Strengthening the Security of Distributed Oblivious Transfer. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF oblivious transfer, information theoretic security, secret sharing scheme
17Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki A Proposal of Efficient Remote Biometric Authentication Protocol. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF zero knowledge interactive proof, secret computing, authentication, biometrics
17Paul C. van Oorschot, Julie Thorpe On predictive models and user-drawn graphical passwords. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Draw-a-Secret, graphical dictionary, memorable passwords, modeling user choice, password complexity factors, Graphical passwords, dictionary attack
17Al-Sakib Khan Pathan, Choong Seon Hong SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF One-way hash chain, Shared secret key, Energy, Distance
17Travis R. Beals, Barry C. Sanders Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF QKD, secret sharing, information theoretic security, quantum key distribution
17Mark Hartong, Rajni Goel, Duminda Wijesekera Protection and Recovery of Railroad Event Recorder Data. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Event data recorders, railroad accident investigations, secret shares
17Jun Zhou, Mingxing He An Improved Distributed Key Management Scheme in Wireless Sensor Networks. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed wireless sensor networks, Key management, Secret sharing, Continuity
17Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald A Fully Distributed Proactively Secure Threshold-Multisignature Scheme. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF threshold-multisignature, distributed-key management infrastructure, publicly verifiable distributed-key generation, publicly verifiable distributed-key update, publicly verifiable distributed-key redistribution, distributed systems, secret sharing, Security and protection, group-oriented cryptography
17Jeffrey S. Dwoskin, Ruby B. Lee Hardware-rooted trust for secure key management and transient trust. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hardware policy enforcement, secret protection (sp), transient trust, key management, emergency response, secure processors
17Guojun Wang 0001, Qiong Wang, Jiannong Cao 0001, Minyi Guo An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Trust Transfer, Mobile Ad-Hoc Networks, Authentication, Cryptography, Secret Sharing
17G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha Performance Enhancement of CAST-128 Algorithm by modifying its function. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext
17Ford-Long Wong, Hoon Wei Lim Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inter-domain authentication, secret public key, password, identity-based cryptography
17Sheng Zhong 0002, Yang Richard Yang Verifiable Distributed Oblivious Transfer and Mobile Agent Security. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, mobile agent, oblivious transfer, verifiable secret sharing
17Whitfield Diffie Chattering about SIGINT. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SIGINT, Patrick Radden Keefe, Chatter: Dispatches from the Secret World of Global Eavesdropping, chatter
17Yanchao Zhang, Wei Liu 0008, Wenjing Lou, Yuguang Fang Securing Mobile Ad Hoc Networks with Certificateless Public Keys. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Mobile ad hoc networks, key management, secret sharing, ID-based cryptography
17Paulo Sousa 0001, Nuno Ferreira Neves, Paulo Veríssimo Proactive resilience through architectural hybridization. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secret sharing, intrusion tolerance, proactive recovery
17Hossein Ghodosi, Josef Pieprzyk An Ideal and Robust Threshold RSA. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Threshold RSA, Robust Systems, Ideal Secret Sharing Schemes
17Svetla Nikova, Christian Rechberger, Vincent Rijmen Threshold Implementations Against Side-Channel Attacks and Glitches. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF side-channel attacks, secret sharing, Masking
17Huiping Guo, Nicolas D. Georganas Jointly Verifying Ownership of an Image Using Digital Watermarking. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptography, wavelet transform, digital watermarking, secret sharing
17Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, Ludo M. G. M. Tolhuizen XOR-based Visual Cryptography Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Threshold visual secret sharing schemes, XOR, MDS codes
17Yixin Jiang, Chuang Lin 0002, Xuemin Shen, Minghui Shi Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF roaming service, secret-splitting, self-certified, authentication, anonymity, key exchange
17Michael Szydlo, Burton S. Kaliski Jr. Proofs for Two-Server Password Authentication. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concrete security reduction, secret sharing, password authentication
17Howard B. Rockman, Vladimir Khodosh The software engineer and the development, management and use of intellectual property. Search on Bibsonomy ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF business use of intellectual property, employment agreement, infringement, innovation protection, non-compete, patentable subject matter, proprietary, ethics, intellectual property, copyright, patent, licensing, trade secret
17Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons Concealing complex policies with hidden credentials. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, authentication, secret sharing, identity based encryption, credentials, trust negotiation
17Joonsang Baek, Yuliang Zheng 0001 Identity-Based Threshold Signature Scheme from the Bilinear Pairings. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Identity-based threshold signature, Generalized Bilinear Problem, Bilinear Pairing, Verifiable secret-sharing, Chosen message attack
17Mingyan Li, Radha Poovendran Broadcast Enforced Threshold Schemes with Disenrollment. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF threshold schemes with disenrollment, entropy, secret sharing
17Kamil Kulesza, Zbigniew Kotulski Addressing New Challenges by Building Security Protocols Around Graphs. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF extended capabilities, graph theory, quantum computing, security protocols, secret sharing, data security, graph colouring
17Christian Cachin An asynchronous protocol for distributed computation of RSA inverses and its applications. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF verifiable random functions, Cryptography, Byzantine agreement, threshold signatures, verifiable secret sharing
17Sheng Zhong, Yang Richard Yang Verifiable distributed oblivious transfer and mobile agent security. Search on Bibsonomy DIALM-POMC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF resiliency to corruptions, secure mobile agents and mobile code, oblivious transfer, verifiable secret sharing
17Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee Distributed Certified E-mail System for Mobile Users. Search on Bibsonomy IWDC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mail security, Secret sharing, Certified E-mail
17Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee ROCEM: Robust Certified E-mail System Based on Server-Supported Signature. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mail security, Secret sharing, Certified E-mail
17Huiping Guo, Nicolas D. Georganas Digital image watermarking for joint ownership. Search on Bibsonomy ACM Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptography, wavelet transform, digital watermarking, secret sharing scheme
17Yvo Desmedt, Yongge Wang Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF complexity, graph theory, secret sharing, Zero-knowledge, key-escrow
17Joachim Biskup, Piero A. Bonatti Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation
17Bruno Dutertre, Valentin Crettaz, Victoria Stavridou Intrusion-Tolerant Enclaves. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Groupware, Secret sharing, Intrusion tolerance
17Alexander May 0001 Cryptanalysis of Unbalanced RSA with Small CRT-Exponent. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Coppersmith's method, small secret exponent, RSA, lattice reduction
17Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire Hop Integrity in Computer Networks. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hop integrity, secret exchange protocol, weak integrity protocol, strong integrity protocol, stateless protocol, protocols, network security, Transmission Control Protocol, computer networks, computer networks, TCP/IP, transport protocols, Internet Protocol, network protocol, security of data, router, telecommunication network routing, telecommunication security, message transmission
17Margus Freudenthal, Sven Heiberg, Jan Willemson Personal Security Environment on Palm PDA. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF personal security environment, Palm PDA, secret signing key, mobile computing device, smart-card reader, mobile security applications, device selection, private key handling, mobile computing, personal digital assistant, smart cards, personal computing, message authentication, microcomputer applications, digital signature schemes, design issues, notebook computers
17Tamás Horváth 0002 Arithmetic Design for Permutation Groups. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF permutation multiplier, destination-tag routing, separation network, binary group, secret-key cryptosystem, PGM, switching network, sorting network, compact representation
17Johannes Merkle, Ralph Werchner On the Security of Server-Aided RSA Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF server-aided secret computation, RSA, signature, generic algorithms
17Jan Zöllner 0002, Hannes Federrath, Herbert Klimant, Andreas Pfitzmann, Rudi Piotraschke, Andreas Westfeld, Guntram Wicke, Gritta Wolf Modeling the Security of Steganographic Systems. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Security and modeling of steganography, indeterminism, secret communication, hidden communication, entropy
17Matthias Fitzi, Martin Hirt, Ueli M. Maurer Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing
17Michiharu Niimi, Hideki Noda, Eiji Kawaguchi An Image Embedding in Image by a Complexity Based Region Segmentation Method. Search on Bibsonomy ICIP (3) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF image embedding, complexity based region segmentation, secret data, dummy image, local complexity measure, noise-like region, image conjugate operation, informative region, 512 pixel, 262144 pixel, image segmentation, color images, binary image, complexity measure, data encryption, gray image
17Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung Optimal Resilience Proactive Public-Key Cryptosystems. Search on Bibsonomy FOCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF cryptographic functions, cryptographic function sharing, threshold function sharing, public key cryptography, secret sharing, public-key cryptosystems, distributed function, proactive security
17Susan K. Langford Weakness in Some Threshold Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems
17Vijay Varadharajan, Yi Mu 0001 On The Design Of Secure Electronic Payment Schemes For Internet. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS
17Chooi-Tian Lee, Jack W. Harris Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program
16Bin Ni, Naveen Santhapuri, Srihari Nelakuditi Wireless network coding and concurrent MAC: are these approaches complementary? Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Jessica Croft, Neal Patwari, Sneha Kumar Kasera Robust uncorrelated bit extraction methodologies for wireless sensors. Search on Bibsonomy IPSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bit extraction, RSS, radio channel
16Juan Julián Merelo Guervós, Antonio Miguel Mora, Thomas Philip Runarsson Beating exhaustive search at its own game: revisiting evolutionary mastermind. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF evolutionary algorithms, games, heuristics, hybrid algorithms
16Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin Privacy amplification with asymptotically optimal entropy loss. Search on Bibsonomy STOC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF entropy loss, information-theoretic key agreement, privacy amplification
16Phong Q. Nguyen, Oded Regev 0001 Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GGH, NTRUSign, Lattices, Moment, Gradient descent, Public-key cryptanalysis
16Ruoheng Liu, H. Vincent Poor Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Chin-Chen Chang 0001, Yi-Hui Chen, Chia-Chen Lin 0001 A data embedding scheme for color images based on genetic algorithm and absolute moment block truncation coding. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block truncation code, Modification direction, Genetic algorithm, Steganography, Data embedding
16Wenjing Lou, Wei Liu 0008, Yanchao Zhang, Yuguang Fang SPREAD: Improving network security by multipath routing in mobile ad hoc networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ad hoc networks, Network security, Multipath routing
16László Csirmaz, Péter Ligeti On an infinite family of graphs with information ratio 2 - 1/k. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60, 94A17
16Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Mario Strasser, Christina Pöpper, Srdjan Capkun Efficient uncoordinated FHSS anti-jamming communication. Search on Bibsonomy MobiHoc The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless security, frequency hopping, anti-jamming
16Karen Renaud, Joseph Maguire 0001 Armchair authentication. Search on Bibsonomy BCS HCI The full citation details ... 2009 DBLP  BibTeX  RDF graphical authentication mechanism, secluded space, context, shared space
16Jonathan Katz, Vinod Vaikuntanathan Signature Schemes with Bounded Leakage Resilience. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang Update on SEED: SEED-192/256. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, SEED
16Chi-Shiang Chan, Ching-Yun Chang An information hiding scheme by applying the dynamic programming strategy to LSB matching revisited. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LSB matching revisited, dynamic programming strategy, image hiding
16Tzu-Chuen Lu, Ying-Hsuan Huang An efficient block-based lossless information hiding technique. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distortion control, lossless information hiding, wavelet technique
16Yevgeniy Dodis, Daniel Wichs Non-malleable extractors and symmetric key cryptography from weak secrets. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bounded retrieval model, information reconcilliation, authentication, encryption, information theoretic security, randomness extractors, privacy amplification, authenticated key agreement
16Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
16Pooya Farshim, Bogdan Warinschi Certified Encryption Revisited. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption
16Lang Lin, Markus Kasper, Tim Güneysu, Christof Paar, Wayne P. Burleson Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trojan Hardware, Trojan Side-Channel, Hardware Trojan Detection, Covert Channel, Side-Channel Analysis
16Florian Kerschbaum, Alessandro Sorniotti RFID-based supply chain partner authentication and key agreement. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF proof of possession, authentication, supply chain, key agreement, rfid
16Imre Csiszár, Prakash Narayan Secrecy Capacities for Multiterminal Channel Models. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jing Deng 0001, Yunghsiang S. Han Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Edward W. Felten Coping with Outside-the-Box Attacks. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 8346 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license