The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Melissa Chase, Sherman S. M. Chow Improving privacy and security in multi-authority attribute-based encryption. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-authority, removing trusted party, privacy, attribute based encryption, anonymous credential
21Nuttapong Attrapadung, Hideki Imai Dual-Policy Attribute Based Encryption. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key policy, Attribute-based encryption, Ciphertext policy
21Cuauhtemoc Mancillas-López, Debrup Chakraborty, Francisco Rodríguez-Henríquez On Some Weaknesses in the Disk Encryption Schemes EME and EME2. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tweakable Enciphering Schemes, Disc Encryption, EME, Modes of operation
21Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-Insulated Encryption, Wireless Sensor Network, Key pre-distribution
21Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar Authenticated Encryption in WSN Using eSTREAM Ciphers. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption
21Dennis Hofheinz, Eike Kiltz Practical Chosen Ciphertext Secure Encryption from Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF factoring, public-key encryption, chosen-ciphertext security
21Davide Alessio, Marc Joye A simple construction for public-key encryption with revocable anonymity: the honest-sender case. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, public-key encryption, key-privacy
21Laila El Aimani Anonymity from Public Key Encryption to Undeniable Signatures. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Encryption schemes, KEM/DEM, Convertible undeniable signatures, Anonymity, Generic construction
21Benny Applebaum, David Cash, Chris Peikert, Amit Sahai Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-dependent message security, Learning problems, Encryption, Lattice-based cryptography
21Vivaksha J. Jariwala, Devesh C. Jinwala A taxonomy of security attacks on the advanced encryption standard. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF advanced encryption standard, attacks, cipher
21Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pairwise independent, Parallelizable, Authentication, Encryption, Block ciphers
21Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Windows operating system, performance, wireless, throughput, encryption, response time
21Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF black-box constructions, Public-key encryption, semantic security, non-malleability
21Christopher James Hargreaves, Howard Chivers Recovery of Encryption Keys from Memory Using a Linear Scan. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Live Forensics, Encryption, Digital Evidence, Forensic Computing
21Victor Korobitsin, Sergey Ilyin GOST-28147 Encryption Implementation on Graphics Processing Units. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ciphering algorithm, graphics processing units, encryption
21Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri An Image Encryption System by Cellular Automata with Memory. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF image security, Lossy method, Cryptography, Cellular automata, image encryption, CA
21Kenneth G. Paterson, Sriramkrishnan Srinivasan Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities. Search on Bibsonomy Pairing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multi-TA IBE, multiple trusted authorities, anonymity, identity-based encryption
21Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Recipient Anonymity, Access Control on Encrypted Data, Attribute-Based Encryption, Ciphertext Policy
21Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 Effect of Security Increment to Symmetric Data Encryption through AES Methodology. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption
21Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, Zhihui Zhang A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internally Perturbed Plus, Encryption Scheme, Quadratic Polynomial, Multivariate Public Key Cryptosystem
21Renfei Liu, Keshab K. Parhi Fast composite field S-box architectures for advanced encryption standard. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF advanced encryption standard (aes), composite finite field, s-box, precomputation
21Laszlo Hars Discryption: Internal Hard-Disk Encryption for Secure Storage. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Discryption, hard-disk encryption, security, data storage
21Jie Chen 0055, YuPu Hu, Yueyu Zhang Impossible differential cryptanalysis of Advanced Encryption Standard. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis
21Jong Hwan Park, Dong Hoon Lee 0001 Direct Chosen-Ciphertext Secure Hierarchical ID-Based Encryption Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chosen Ciphertext Security, Hierarchical Identity Based Encryption
21Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides Low-cost Anonymous Timed-Release Encryption. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple time-servers, cryptographic protocols, bilinear pairings, timed-release encryption
21Lauri I. W. Pesonen, David M. Eyers, Jean Bacon Encryption-enforced access control in dynamic multi-domain publish/subscribe networks. Search on Bibsonomy DEBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF administrative domains, attribute encryption, secure publish/subscribe systems, distributed access control
21Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Relations Among Notions of Non-malleability for Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public-key Encryption, Non-malleability
21Ting Chen, Feng Li Analysis of Pi Series and Its Application to Image Encryption. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pi Series, Quasi-chaotic Characteristics, Chaotic Series, Image Encryption Algorithm, Security Analysis
21Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides Improved Anonymous Timed-Release Encryption. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pre-computations, multiple receivers, bilinear pairings, timed-release encryption
21Chin-Chen Chang 0001, Yu-Wei Su, Iuon-Chang Lin A broadcast-encryption-based key management scheme for dynamic multicast communications work-in-progress. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multicast key management, broadcast encryption
21Yao Zhang, Chun Yuan, Yuzhuo Zhong Implementing DRM over Peer-to-Peer Networks with Broadcast Encryption. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authorized Domain, DRM, Broadcast Encryption, P2P Networks
21Rajarathnam Chandramouli, Satish Bapatla, K. P. Subbalakshmi, R. N. Uma Battery power-aware encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Low-power encryption, optimization, profiling
21Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh Forgery attack on the RPC incremental unforgeable encryption scheme. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF incremental encryption, forgery attack
21Zhenyong Chen, Zhang Xiong 0001, Long Tang A Novel Scrambling Scheme for Digital Video Encryption. Search on Bibsonomy PSIVT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MPEG-4, Scrambling, Video Encryption
21Hamdy S. Soliman, Mohammed Omari Application of synchronous dynamic encryption system (SDES) in wireless sensor networks. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF deployment knowledge, encryption permutation vectors, power balancing, sensors security primitives, stream ciphers
21Hui Qin, Tsutomu Sasao, Yukihiro Iguchi An FPGA design of AES encryption circuit with 128-bit keys. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF AES encryption, FPGA, pipeline
21Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater Efficient and Non-interactive Timed-Release Encryption. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF provable security, formal models, timed-release encryption
21Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF (t, n) threshold signature, Authenticated Encryption Scheme, Message Linkage, Elliptic Curve Cryptosystem, Division of labor
21Nicolas T. Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
21Joonsang Baek, Yuliang Zheng 0001 Zheng and Seberry's public key encryption scheme revisited. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Zheng-Seberry scheme, Public key encryption, Chosen ciphertext security
21Christopher Kachris, Nikolaos G. Bourbakis, Apostolos Dollas A Reconfigurable Logic-Based Processor for the SCAN Image and Video Encryption Algorithm. Search on Bibsonomy Int. J. Parallel Program. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptography, block cipher, reconfigurable logic, image encryption
21Nikolaos G. Bourbakis, Apostolos Dollas SCAN-Based Compression-Encryption-Hiding for Video on Demand. Search on Bibsonomy IEEE Multim. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Image Video Compression, Multimedia on demand, FPGA, encryption, information hiding
21Koutarou Suzuki, Makoto Yokoo Secure Generalized Vickrey Auction Using Homomorphic Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Generalized Vickrey Auction, game-theory, mechanism design, combinatorial auction, homomorphic encryption
21Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai Broadcast encryption with short keys and transmissions. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF constant transmission rate, one-way accumulators, revocation scheme, copyright protection, broadcast encryption
21Miodrag J. Mihaljevic Broadcast Encryption Schemes Based on the Sectioned Key Tree. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stateless receivers, key management, Broadcast encryption
21Anh Duc Duong, Hoang Kiem, Minh-Triet Tran, Luong Han Co The Advanced Encryption Standard and its Application in the Examination Security in Vietnam. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Examination Security, Conventional cryptography, Rijndael Block Cipher, Advanced Encryption Standard, Public key cryptography
21Yevgeniy Dodis, Moti Yung Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case. Search on Bibsonomy IEEE Security in Storage Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptographic key storage, key storage protection, gradual key exposure, exposure resilience, key redundancy, hierarchical id-based encryption, bi-linear Diffie-Hellman
21Jakob Jonsson, Burton S. Kaliski Jr. On the Security of RSA Encryption in TLS. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key encapsulation, RSA encryption, TLS
21Makoto Yokoo, Koutarou Suzuki Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions. Search on Bibsonomy AAMAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security and agents, privacy, dynamic programming, electronic commerce, auction, public key encryption
21Siguna Müller On the Security of Williams Based Public Key Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF (Weak)- Sole-Samplability, Factorization Intractability, Oracle Hashing, Williams' Encryption Scheme, Chosen Ciphertext Security, Plaintext Awareness
21Jian-Zhu Lu, Huo Yan Chen Improvement of authenticated encryption scheme with (t, n) shared verification. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery
21Alejandro Hevia, Marcos A. Kiwi Strength of two data encryption standard implementations under timing attacks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cryptography, cryptanalysis, data encryption standard, timing attack
21Mahmoud T. El-Hadidi, Nadia Hamed Hegazi, Heba Kamal Aslan Performance Evaluation of a New Hybrid Encryption Protocol for Authentication and Key Distribution. Search on Bibsonomy ISCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authentication, Performance Analysis, Key Distribution, Hybrid Encryption
21Mihir Bellare, Phillip Rogaway On the Construction of Variable-Input-Length Ciphers. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Provable Security, Modes of Operation, Symmetric Encryption, Ciphers
20Alexandros Bakas, Antonis Michalas Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
20Alexandros Bakas, Antonis Michalas Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. Search on Bibsonomy SecureComm (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
20Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
20Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
20Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti POTSHARDS - a secure, recoverable, long-term archival storage system. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2009 DBLP  DOI  BibTeX  RDF approximate pointers, secret splitting, Archival storage
19Xiaojun Ruan, Adam Manzanares, Shu Yin, Mais Nijim, Xiao Qin 0001 Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms? Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Alexandra Boldyreva, David Cash, Marc Fischlin, Bogdan Warinschi Foundations of Non-malleable Hash and One-Way Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt Efficient Constructions of Signcryption Schemes and Signcryption Composability. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-user security, signcryption, generic construction
19Ralf Küsters, Tomasz Truderung, Andreas Vogt 0001 Improving and Simplifying a Variant of Prêt à Voter. Search on Bibsonomy VoteID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Emilia Käsper, Peter Schwabe Faster and Timing-Attack Resistant AES-GCM. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Galois/Counter mode, cache-timing attacks, AES, fast implementations
19Luther Martin Key-Management Infrastructure for Protecting Stored Data. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Brett Hemenway, Rafail Ostrovsky Public-Key Locally-Decodable Codes. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bounded Channel Model, Error Correcting Codes, Public Key Cryptography, Chinese Remainder Theorem, Private Information Retrieval, Locally Decodable Codes
19Sean O'Melia, Adam J. Elbirt Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Phillip Rogaway, Mihir Bellare Robust computational secret sharing and a unified account of classical secret-sharing goals. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage
19Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai Orthogonality between Key Privacy and Data Privacy, Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jamie Levy, Bilal Khan 0002 Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yeongyun Kim, Sung Ho Jin, Yong Man Ro Scalable Security and Conditional Access Control for Multiple Regions of Interest in Scalable Video Coding. Search on Bibsonomy IWDW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Chen Xiao, Shilong Ma, Ke Xu 0001, Lifeng Wang, Weifeng Lv A Dynamic Optimal Selective Control Mechanism for Multi-Datastream Security in Video Conference System. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Kun Peng, Ed Dawson Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Palash Sarkar 0001, Sanjit Chatterjee Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Alexander Russell, Hong Wang 0002 How to fool an unbounded adversary with a short key. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona Recovering DC Coefficients in Block-Based DCT. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Wassim Itani, Ayman I. Kayssi, Ali Chehab An enterprise policy-based security protocol for protecting relational database network objects. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF customizable security, policy-driven security, security, relational databases
19Yang Cui 0001, Kazukuni Kobara, Hideki Imai On Achieving Chosen Ciphertext Security with Decryption Errors. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Tayana Morkel, Jan H. P. Eloff, Martin S. Olivier Using Image Steganography for Decryptor Distribution. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Amit Manjhi, Anastassia Ailamaki, Bruce M. Maggs, Todd C. Mowry, Christopher Olston, Anthony Tomasic Simultaneous scalability and security for data-intensive web applications. Search on Bibsonomy SIGMOD Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Huizhang Shen, Jidi Zhao, Huanchen Wang Illegal Intrusion Detection Based on Hidden Information Database. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Ventzislav Nikov, Svetla Nikova, Bart Preneel A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Homomorphic Semantically Secure Cryptosystems, Paillier’s Public-Key Cryptosystem, Non-Interactive Zero-Knowledge Arguments, Oblivious Transfer
19Istemi Ekin Akkus, Öznur Özkasap, M. Reha Civanlar Secure Transmission of Video on an End System Multicast Using Public Key Cryptography. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Aggelos Kiayias, Antonina Mitrofanova Testing Disjointness of Private Datasets. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto A Universally Composable Secure Channel Based on the KEM-DEM Framework. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara A Timed-Release Key Management Scheme for Backward Recovery. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Willy Susilo, Fangguo Zhang, Yi Mu 0001 Privacy-Enhanced Internet Storage. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Aggelos Kiayias, Yona Raekow, Alexander Russell Efficient Steganography with Provable Security Guarantees. Search on Bibsonomy Information Hiding The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Marko Hassinen, Petteri Mussalo Client controlled security for web applications. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Daesung Moon, Yongwha Chung, Kiyoung Moon, Sung Bum Pan Secure and Efficient Transmissions of Fingerprint Images for Embedded Processors. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Biometrics, Embedded Processors, Fingerprint Verification
19Philippe Golle, Ari Juels Parallel mixing. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mixnet, privacy, anonymity, permutation, parallel execution
19Markku-Juhani Olavi Saarinen Encrypted Watermarks and Linux Laptop Security. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Jonathan Katz Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Alexander W. Dent A Designer's Guide to KEMs. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Yevgeniy Dodis, Joel Spencer On the (non)Universality of the One-Time Pad. Search on Bibsonomy FOCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Jonathan Katz, Moti Yung Threshold Cryptosystems Based on Factoring. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 21739 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license