|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 348 occurrences of 264 keywords
|
|
|
Results
Found 1025 publication records. Showing 1025 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Suvasini Panigrahi, Shamik Sural |
Detection of Database Intrusion Using a Two-Stage Fuzzy System. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Fuzzy-Bayesian inference, Suspicion score, Fuzzy logic, Intrusion detection, Database security |
1 | Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl |
Cancelable Iris Biometrics Using Block Re-mapping and Image Warping. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Juan A. Garay, Vladimir Kolesnikov, Rae McLellan |
MAC Precomputation with Applications to Secure Memory. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Erik Zenner |
Nonce Generators and the Nonce Reset Problem. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Nonce Reset, Nonce Generator, Cryptography, Security Engineering, Nonce |
1 | Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein 0001 |
Adding Trust to P2P Distribution of Paid Content. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li 0002 |
A New Construction of Boolean Functions with Maximum Algebraic Immunity. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Boolean Function, Algebraic Attacks, Balancedness, Algebraic Immunity |
1 | Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud |
Fair E-Cash: Be Compact, Spend Faster. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Fair e-cash, batch RSA, privacy-preserving, blind signature |
1 | Mario Lamberger, Florian Mendel |
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3 |
1 | Manachai Toahchoodee, Xing Xie 0002, Indrakshi Ray |
Towards Trustworthy Delegation in Role-Based Access Control Model. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jin Li 0002, Kui Ren 0001, Bo Zhu 0001, Zhiguo Wan |
Privacy-Aware Attribute-Based Encryption with User Accountability. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Attribute-based, Access control, Anonymity, Accountability, Ciphertext-policy |
1 | Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio A. Ardagna (eds.) |
Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai |
Generic Construction of Stateful Identity Based Encryption. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan Groza, Marius Minea |
A Calculus to Detect Guessing Attacks. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Boris Rozenberg, Ehud Gudes, Yuval Elovici |
SISR - A New Model for Epidemic Spreading of Electronic Threats. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kaushik Roy 0002, Prabir Bhattacharya |
Iris Recognition in Nonideal Situations. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
variational level set method, nonideal situations, genetic algorithms, Iris recognition, curve evolution |
1 | Jianfeng Lu, Ruixuan Li 0001, Zhengding Lu, Jinwei Hu, Xiaopu Ma |
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
constraint, Separation-of-Duty, usage control |
1 | Gildas Avoine, Aslan Tchamkerten |
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
false-acceptance rate, proximity check, mafia fraud, Authentication, RFID, memory, relay attack |
1 | Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel |
A New Approach to chi2 Cryptanalysis of Block Ciphers. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
? 2, square and linear cryptanalysis, Block ciphers |
1 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel |
Towards Unifying Vulnerability Information for Attack Graph Construction. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi |
A Storage Efficient Redactable Signature in the Standard Model. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Amitabh Saxena, Brecht Wyseur, Bart Preneel |
Towards Security Notions for White-Box Cryptography. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Serdar Pehlivanoglu |
Traitor Tracing without A Priori Bound on the Coalition Size. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kan Yasuda |
HMAC without the "Second" Key. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Cascade construction, prefix-free PRF, hybrid argument, multi-oracle family, affix |
1 | Keith B. Frikken, Marina Blanton, Mikhail J. Atallah |
Robust Authentication Using Physically Unclonable Functions. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
1 | Matthew Burnside, Angelos D. Keromytis |
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki |
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL |
1 | Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang |
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shay Gueron, Michael E. Kounavis |
Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi |
A Demonstrative Ad Hoc Attestation System. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Kiosk computing, platform integrity, smart cards, Trusted computing, attestation |
1 | Helger Lipmaa |
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Computationally-private information retrieval, conditional disclosure of secrets, oblivious transfer, homomorphic encryption |
1 | Sebastiaan Indesteege, Bart Preneel |
Collisions for RC4-Hash. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
RC4-Hash, multicollisions, hash functions, collisions |
1 | Claudio Soriente, Gene Tsudik, Ersin Uzun |
HAPADEP: Human-Assisted Pure Audio Device Pairing. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
User-Aided Security, Secure Device Pairing, Secure First Connect, Authentication Protocols, Man-in-the-Middle attacks |
1 | Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Antisocial Networks: Turning a Social Network into a Botnet. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or |
1 | Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
Certificate-Based Signature Schemes without Pairings or Random Oracles. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0012, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom |
Improved Impossible Differential Attacks on Large-Block Rijndael. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Impossible differential distinguisher, Impossible differential attack, Block cipher, Rijndael |
1 | Jianyong Huang, Jennifer Seberry, Willy Susilo |
A Five-Round Algebraic Property of the Advanced Encryption Standard. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
A Five-Round Algebraic Property of the AES, Algorithm ?, Variants of Algorithm ?, ?AES, AES, Linear Equations |
1 | Pei-Yih Ting, Xiao-Wei Huang |
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Threshold proxy signature, Cryptography, Proxy signature |
1 | Jintai Ding, Dieter Schmidt, Fabian Werner |
Algebraic Attack on HFE Revisited. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Gröbner basis, multivariate public key cryptosystem, HFE |
1 | Baris Coskun, Cormac Herley |
Can "Something You Know" Be Saved?. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Authentication, passwords, challenge response |
1 | Jiali Choy, Khoongming Khoo |
New Applications of Differential Bounds of the SDS Structure. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
SPN, branch number, {0, 1}-matrices, differential, universal hash functions |
1 | Yali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal |
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 family, reduced round attacks, cryptanalysis |
1 | Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee (eds.) |
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David Champagne, Reouven Elbaz, Ruby B. Lee |
The Reduced Address Space (RAS) for Application Memory Authentication. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Memory authentication, integrity tree, secure computing architecture |
1 | Lei Liu 0021, Songqing Chen, Guanhua Yan, Zhao Zhang 0010 |
BotTracer: Execution-Based Bot-Like Malware Detection. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
virtual machine, Botnet, malware detection |
1 | Matthew Burnside, Angelos D. Keromytis |
Path-Based Access Control for Enterprise Networks. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Path-based, SOA, access control, enterprise, Keynote |
1 | Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust |
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Differential side-channel analysis, AES hardware, Stochastic model, DPA, Rank correlation, Template attacks |
1 | Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
Property-Based Attestation without a Trusted Third Party. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy |
1 | Sherman S. M. Chow, Raphael C.-W. Phan |
Proxy Re-signatures in the Standard Model. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Proxy re-signature, compartment signature, standard model |
1 | Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos |
Compromising Anonymity Using Packet Spinning. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo |
Strong Accumulators from Collision-Resistant Hashing. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Collision-resistant Hashing, e-Invoice, Accumulators |
1 | Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos |
Athos: Efficient Authentication of Outsourced File Systems. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hyundo Park, Peng Li 0059, Debin Gao, Heejo Lee, Robert H. Deng |
Distinguishing between FE and DDoS Using Randomness Check. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Flash Event, Randomness Check, Network Security, Distributed Denial of Service |
1 | Subhamoy Maitra, Santanu Sarkar 0001 |
Revisiting Wiener's Attack - New Weak Keys in RSA. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Factorization, Weak Keys |
1 | Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Property-Based TPM Virtualization. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dinei A. F. Florêncio, Cormac Herley |
One-Time Password Access to Any Server without Changing the Server. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
replay resistance, authentication, Passwords, one-time passwords |
1 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
Behavior-Based Network Access Control: A Proof-of-Concept. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Network Access Control Technologies, Intrusion Detection Systems |
1 | Yi Lu 0002, Huaxiong Wang, San Ling |
Cryptanalysis of Rabbit. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit |
1 | Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao 0001 |
An Efficient PIR Construction Using Trusted Hardware. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wolfgang De Meuter (eds.) |
Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Guilhem Castagnos, Damien Vergnaud |
Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Polynomial Diffie-Hellman Problems, Standard Model, Public Key Encryption, Random Oracle Model, Semantic Security, Chosen-Ciphertext Attacks |
1 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Based Proxy Re-encryption Without Random Oracles. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption, Proxy re-encryption |
1 | George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel |
Efficient Negative Databases from Cryptographic Hash Functions. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Raffetseder, Christopher Krügel, Engin Kirda |
Detecting System Emulators. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta 0001 (eds.) |
Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Akashi Satoh, Takeshi Sugawara 0001, Takafumi Aoki |
High-Speed Pipelined Hardware Architecture for Galois Counter Mode. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Joo Yeon Cho, Josef Pieprzyk |
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS |
1 | Joachim Biskup, Jan-Hendrik Lochner |
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control |
1 | Pradeep Kumar Mishra, Vassil S. Dimitrov |
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Quintupling, Efficient Curve Arithmetic, Elliptic Curve Cryptosystems, Scalar Multiplication |
1 | Iosif-Viorel Onut, Ali A. Ghorbani 0001 |
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Feature evaluation, Network Intrusion Detection |
1 | Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao |
An Efficient Certified Email Protocol. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol |
1 | Daniel Boteanu, José M. Fernandez 0001, John McHugh, John Mullins |
Queue Management as a DoS Counter-Measure? |
ISC |
2007 |
DBLP DOI BibTeX RDF |
degradation of service attack, dynamic timeout, timeout, queue management, Denial of service attack |
1 | Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan |
Traitor Tracing with Optimal Transmission Rate. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Constant Transmission Rate, Bilinear Maps, Traitor Tracing, Fingerprint Codes |
1 | Jorge Nakahara Jr., Ivan Carlos Pavão |
Impossible-Differential Attacks on Large-Block Rijndael. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
information security, Impossible differential cryptanalysis |
1 | Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque |
E-NIPS: An Event-Based Network Intrusion Prediction System. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Intrusion detection and prediction, attack classes, network security |
1 | Yao-Dong Zhao, Wen-Feng Qi 0001 |
Small Private-Exponent Attack on RSA with Primes Sharing Bits. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Kim-Kwang Raymond Choo |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
reveal query, anonymity, provable security, Key agreement, identity-based cryptography |
1 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
1 | Alexander W. Dent, Qiang Tang 0001 |
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Billy Bob Brumley, Kaisa Nyberg |
Differential Properties of Elliptic Curves and Blind Signatures. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
differential uniformity, implicit public key certificates, key issuing protocols, provable security, Elliptic curves, blind signatures, digital signature schemes, message recovery |
1 | Mehmet S. Kiraz, Berry Schoenmakers, José Villegas |
Efficient Committed Oblivious Transfer of Bit Strings. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Committed oblivious transfer, Commitments, Homomorphic encryption |
1 | Yvo Desmedt, Kaoru Kurosawa |
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
threshold decryption, Goldwasser- Micali, Rabin, cryptography, Threshold signatures |
1 | Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg |
Enabling Fairer Digital Rights Management with Trusted Computing. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
stateful licenses, Trusted Computing, security architectures |
1 | Guilhem Castagnos, Benoît Chevallier-Mames |
Towards a DL-Based Additively Homomorphic Encryption Scheme. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model |
1 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Variable-length block ciphers, reduction proof, security analysis, key recovery attacks |
1 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov |
On the Concept of Software Obfuscation in Computer Security. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Program obfuscation, security, encryption, Turing machine |
1 | Sherman S. M. Chow |
Token-Controlled Public Key Encryption in the Standard Model. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Token-controlled, provable security, standard model, public key encryption, timed-release encryption |
1 | Stephen Drape, Clark D. Thomborson, Anirban Majumdar 0001 |
Specifying Imperative Data Obfuscations. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Data Obfuscation, Specification, Refinement, Correctness |
1 | Johan Brichau, Andy Kellens, Kris Gybels, Kim Mens, Robert Hirschfeld, Theo D'Hondt |
Application-Specific Models and Pointcuts Using a Logic Meta Language. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David Röthlisberger, Marcus Denker, Éric Tanter |
Unanticipated Partial Behavioral Reflection. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Bergel, Stéphane Ducasse, Colin Putney, Roel Wuyts |
Meta-driven Browsers. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
UI, Tools, MetaModeling, Browsers, Squeak |
1 | Alexandre Bergel, Stéphane Ducasse, Oscar Nierstrasz, Roel Wuyts |
Stateful Traits. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael Prasse |
Let's Modularize the Data Model Specifications of the ObjectLens in VisualWorks/Smalltalk. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
ObjectLens, VisualWorks, OR-Mapping, Design Pattern, Generative Programming, Smalltalk, Software Product Families |
1 | Andres Fortier, Nicolás Cañibano, Julián Grigera, Gustavo Rossi, Silvia E. Gordillo |
An Object-Oriented Approach for Context-Aware Applications. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Luc Fabresse, Christophe Dony, Marianne Huchard |
Scl: A Simple, Uniform and Operational Language for Component-Oriented Programming in Smalltalk. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
unanticipated composition, component property, connector, component-oriented programming |
1 | Maurizio Atzori |
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
low distortion, k-anonymity, data privacy |
Displaying result #701 - #800 of 1025 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|