The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52) 2019 (41) 2020 (37) 2021 (36) 2022 (26) 2023 (28)
Publication types (Num. hits)
inproceedings(904) proceedings(26)
Venues (Conferences, Journals, ...)
ACISP(930)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 930 publication records. Showing 930 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Chun Ruan, Vijay Varadharajan Resolving Conflicts in Authorization Delegations. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee 0001, William Millan, Sang-Jae Moon, Leonie Simpson The LILI-II Keystream Generator. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Francesc Sebé, Josep Domingo-Ferrer Short 3-Secure Fingerprinting Codes for Copyright Protection. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Electronic copyright protection, Buyer collusion, Watermarking, Fingerprinting
1Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild Size of Broadcast in Threshold Schemes with Disenrollment. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ron Steinfeld, Joonsang Baek, Yuliang Zheng 0001 On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kouichi Sakurai, Tsuyoshi Takagi On the Security of a Modified Paillier Public-Key Primitive. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF One-wayness, Composite residuosity problem, Paillier cryptosystem, Factoring, Key distribution, Chosen ciphertext attack
1David Soldera, Jennifer Seberry, Chengxin Qu The Analysis of Zheng-Seberry Scheme. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto Modelling Trust Structures for Public Key Infrastructures. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Myungsun Kim, Kwangjo Kim A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Gap-problems, Bilinear Diffie-Hellman problem, Identification scheme, Weil-pairing
1Yanjiang Yang, Feng Bao 0001, Robert H. Deng Security Analysis and Improvement of the Global Key Recovery System. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hongjun Wu Cryptanalysis of Stream Cipher Alpha1. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Kouichi Sakurai On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack
1Paul England, Marcus Peinado Authenticated Operation of Open Computing Devices. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim 0001 On the Security of Reduced Versions of 3-Pass HAVAL. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Yvonne Hitchcock, Paul Montague A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Lynn Margaret Batten, Jennifer Seberry (eds.) Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Leonid Reyzin, Natan Reyzin Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Linear Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection
1Mitsuru Tada An Order-Specified Multisignature Scheme Secure against Active Insider Attacks. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang A Secure Re-keying Scheme with Key Recovery Property. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Bimal K. Roy A Brief Outline of Research on Correlation Immune Functions. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Boolean Function, Stream Cipher, Symmetry, Nonlinearity, Enumeration, Autocorrelation, Balancedness, Correlation Immunity, Algebraic Degree, Multiple Output Function
1Wieland Fischer, Jean-Pierre Seifert Note on Fast Computation of Secret RSA Exponents. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation
1DongGook Park, JungJoon Kim, Colin Boyd, Ed Dawson Cryptographic Salt: A Countermeasure against Denial-of-Service Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Susumu Yoshida A User Authentication Scheme with Identity and Location Privacy. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Along Lin A Knowledge-Based Approach to Internet Authorizations. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Akihiro Yamamura, Hirokazu Ishizuka Error Detection and Authentication in Quantum Key Distribution. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Yacov Yacobi A Few Thoughts on E-Commerce. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Naomaru Itoi, William A. Arbaugh, Samuela J. Pollack, Daniel M. Reeves Personal Secure Booting. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyun Sook Cho Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF (Super-)Pseudorandom permutation ensemble, MISTY-type transformation, KASUMI, Distinguisher
1Vlad Ingar Wietrzyk, Makoto Takizawa 0001, Vijay Varadharajan A Strategy for MLS Workflow. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Erik Zenner, Matthias Krause 0001, Stefan Lucks Improved Cryptanalysis of the Self-Shrinking Generator. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Chuchang Liu, Maris A. Ozols, Anthony Cant An Axiomatic Basis for Reasoning about Trust in PKIs. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF CA (Certificate Authority), PKI (Public Key Infrastructure), trust theory, certificate verification, trust, information security, certificate
1André Weimerskirch, Christof Paar, Sheueling Chang Shantz Elliptic Curve Cryptography on a Palm OS Device. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Douglas R. Stinson, Reto Strobl Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold Scheme for Implicit Certificates. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1B. Clifford Neuman Condition-Driven Integration of Security Services. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Hideaki Goto, Masahiro Mambo, Hiroki Shizuya, Yasuyoshi Watanabe Evaluation of Tamper-Resistant Software Deviating from Structured Programming Rules. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Kazumasa Omote, Atsuko Miyaji A Practical English Auction with One-Time Registration. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan, Yi Mu 0001 (eds.) Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Robert H. Deng, Peirong Feng, Yan Guo, Hongjun Wu 0001 Secure and Private Distribution of Online Video and Some Related Cryptographic Issues. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Chik How Tan, Xun Yi, Chee Kheong Siew Signature Schemes Based on 3rd Order Shift Registers. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Byoungcheon Lee, Heesun Kim, Kwangjo Kim Secure Mobile Agent Using Strong Non-designated Proxy Signature. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Secure mobile agent, strong non-designated proxy signature, multi-proxy signature
1Shahrokh Saeednia, Reihaneh Safavi-Naini, Willy Susilo On Classifying Conference Key Distribution Protocols. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Eun-Sun Cho, Sunho Hong, Sechang Oh, Hongjin Yeh, Manpyo Hong, Cheol Won Lee, Hyundong Park, Chun-Sik Park SKETHIC: Secure Kernel Extension against Trojan Horses with Information-Carrying Codes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Yuji Sugiyama Anonymous Statistical Survey of Attributes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Statistical survey of attributes, Anonymity, Shuffle, Group signature scheme, Threshold cryptosystem
1Chris Pavlovski, Colin Boyd Attacks Based on Small Factors in Various Group Structures. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Andreas Meyer 0003, Stefan Neis, Thomas Pfahler First Implementation of Cryptographic Protocols Based on Algebraic Number Fields. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Amr M. Youssef, Guang Gong Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1John Yesberg, Marie Henderson Applications of Trusted Review to Information Security. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Paul Montague, Khanh Quoc Nguyen Elliptic Curve Based Password Authenticated Key Exchange Protocols. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Kyungah Shim Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Anomalous curve, supersingular curve, elliptic curve discrete logarithm, Weil pairing
1Akihiro Yamamura, Taiichi Saito Private Information Retrieval Based on the Subgroup Membership Problem. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1David May 0001, Henk L. Muller, Nigel P. Smart Non-deterministic Processors. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Hwankoo Kim, Sang-Jae Moon New Public-Key Cryptosystem Using Divisor Class Groups. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jong-Phil Yang, Weon Shin, Kyung Hyune Rhee An End-to-End Authentication Protocol in Wireless Application Protocol. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Brian King Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Linear secret sharing, Randomness requirements, Threshold secret sharing
1Hossein Ghodosi, Josef Pieprzyk Democratic Systems. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Sung-Do Chi, Jong Sou Park, Ki-Chan Jung, Jang-Se Lee Network Security Modeling and Cyber Attack Simulation Methodology. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ayako Maeda, Atsuko Miyaji, Mitsuru Tada Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang How to Construct Fail-Stop Confirmer Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Arne Ansper, Ahto Buldas, Märt Saarepera, Jan Willemson Improving the Availability of Time-Stamping Services. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Karl Brincat, Chris J. Mitchell New CBC-MAC Forgery Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Sung-Ming Yen Practical Key Recovery Schemes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Yi Mu 0001, Vijay Varadharajan Fail-Stop Confirmer Signatures. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Heajoung Yoo, Seokhie Hong, Sangjin Lee 0002, Jong In Lim 0001, Okyeon Yi, Maenghee Sung A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Brian King Algorithms to Speed Up Computations in Threshold RSA. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 High Performance Agile Crypto Modules. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Yasuyuki Sakai, Kouichi Sakurai Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Natsume Matsuzaki, Jun Anzai, Tsutomu Matsumoto Light Weight Broadcast Exclusion Using Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Maris A. Ozols, Marie Henderson, Chuchang Liu, Anthony Cant The PKI Specification Dilemma: A Formal Solution. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Alan Underwood Professional Ethics in a Security and Privacy Context - the Perspective of a National Computing Society. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Masayuki Abe, Masayuki Kanda A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1John A. Clark, Jeremy Jacob Two-Stage Optimisation in the Design of Boolean Functions. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Kook-Heui Lee, Sang-Jae Moon AKA Protocols for Mobile Communications. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Lauren May, Lyta Penna, Andrew J. Clark An Implementation of Bitsliced DES on the Pentium MMXTM Processor. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hongjun Wu 0001, Feng Bao 0001, Dingfeng Ye, Robert H. Deng Cryptanalysis of Polynominal Authentication and Signature Scheme. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Juanma González Nieto, Kapali Viswanathan, Colin Boyd, Ed Dawson Key Recovery System for the Commercial Environment. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jovan Dj. Golic Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ernest F. Brickell, Giovanni Di Crescenzo, Yair Frankel Sharing Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Kouichi Sakurai, Shingo Miyazaki An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Zhu Hui, Daniel T. H. Tan A Novel Engine for Various Intrusion Detection Methods. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Panagiotis Sklavos, Angelos P. Varvitsiotis, Despina Polemi Securing Large E-Commerce Networks. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ed Dawson, Andrew J. Clark, Colin Boyd (eds.) Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Khanh Quoc Nguyen, Jacques Traoré An Online Public Auction Protocol Protecting Bidder Privacy. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao On Multiplicative Secret Sharing Schemes. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Shirow Mitomi, Atsuko Miyaji A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Kapali Viswanathan, Colin Boyd, Ed Dawson A Three Phased Schema for Sealed Bid Auction System Design. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hossein Ghodosi, Josef Pieprzyk Cheating Prevention in Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Audun Jøsang, Ingar Glenn Pedersen, Dean Povey PKI Seeks a Trusting Relationship. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Bob Blakley 0001, G. R. Blakley All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Panayiotis Kotzanikolaou, Mike Burmester, Vassilios Chrissikopoulos Secure Transactions with Mobile Agents in Hostile Environments. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hongjun Wu 0001, Feng Bao 0001, Dingfeng Ye, Robert H. Deng Cryptanalysis of the m-Permutation Protection Schemes. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hartono Kurnio, Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang Key Management for Secure Multicast with Dynamic Controller. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1G. R. Blakley, I. Borosh, Andreas Klappenecker Construction and Categories of Codes. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hiroshi Doi, Masahiro Mambo, Eiji Okamoto On the Security of the RSA-Based Multisignature Scheme for Various Group Structures. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Lawrie Brown Custom Safety Policies in Safe Erlang. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ernest Foo, Colin Boyd Passive Entities: A Strategy for Electronic Payment Design. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Agung Budi Prasetijo, Paul Ashley, Mark Looi, Andrew J. Clark, Gary Gaskell A Three-Party HTTP Proxy to Support Internet Content Regulation. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Joonsang Baek, Byoungcheon Lee, Kwangjo Kim Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 930 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license