|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 348 occurrences of 264 keywords
|
|
|
Results
Found 1025 publication records. Showing 1025 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Suvasini Panigrahi, Shamik Sural |
Detection of Database Intrusion Using a Two-Stage Fuzzy System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 107-120, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Fuzzy-Bayesian inference, Suspicion score, Fuzzy logic, Intrusion detection, Database security |
1 | Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl |
Cancelable Iris Biometrics Using Block Re-mapping and Image Warping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 135-142, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Juan A. Garay, Vladimir Kolesnikov, Rae McLellan |
MAC Precomputation with Applications to Secure Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 427-442, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Erik Zenner |
Nonce Generators and the Nonce Reset Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 411-426, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Nonce Reset, Nonce Generator, Cryptography, Security Engineering, Nonce |
1 | Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein 0001 |
Adding Trust to P2P Distribution of Paid Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 459-474, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li 0002 |
A New Construction of Boolean Functions with Maximum Algebraic Immunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 177-185, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Boolean Function, Algebraic Attacks, Balancedness, Algebraic Immunity |
1 | Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud |
Fair E-Cash: Be Compact, Spend Faster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 294-309, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Fair e-cash, batch RSA, privacy-preserving, blind signature |
1 | Mario Lamberger, Florian Mendel |
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 68-78, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3 |
1 | Manachai Toahchoodee, Xing Xie 0002, Indrakshi Ray |
Towards Trustworthy Delegation in Role-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 379-394, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jin Li 0002, Kui Ren 0001, Bo Zhu 0001, Zhiguo Wan |
Privacy-Aware Attribute-Based Encryption with User Accountability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 347-362, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Attribute-based, Access control, Anonymity, Accountability, Ciphertext-policy |
1 | Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio A. Ardagna (eds.) |
Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![Springer, 978-3-642-04473-1 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai |
Generic Construction of Stateful Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 338-346, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan Groza, Marius Minea |
A Calculus to Detect Guessing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 59-67, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Boris Rozenberg, Ehud Gudes, Yuval Elovici |
SISR - A New Model for Epidemic Spreading of Electronic Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 242-249, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kaushik Roy 0002, Prabir Bhattacharya |
Iris Recognition in Nonideal Situations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 143-150, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
variational level set method, nonideal situations, genetic algorithms, Iris recognition, curve evolution |
1 | Jianfeng Lu, Ruixuan Li 0001, Zhengding Lu, Jinwei Hu, Xiaopu Ma |
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 403-410, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
constraint, Separation-of-Duty, usage control |
1 | Gildas Avoine, Aslan Tchamkerten |
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 250-261, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
false-acceptance rate, proximity check, mafia fraud, Authentication, RFID, memory, relay attack |
1 | Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel |
A New Approach to chi2 Cryptanalysis of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 1-16, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
? 2, square and linear cryptanalysis, Block ciphers |
1 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 202-217, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel |
Towards Unifying Vulnerability Information for Attack Graph Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 218-233, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi |
A Storage Efficient Redactable Signature in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 326-337, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Amitabh Saxena, Brecht Wyseur, Bart Preneel |
Towards Security Notions for White-Box Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 49-58, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Serdar Pehlivanoglu |
Traitor Tracing without A Priori Bound on the Coalition Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 234-241, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kan Yasuda |
HMAC without the "Second" Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 443-458, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cascade construction, prefix-free PRF, hybrid argument, multi-oracle family, affix |
1 | Keith B. Frikken, Marina Blanton, Mikhail J. Atallah |
Robust Authentication Using Physically Unclonable Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 262-277, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 310-325, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
1 | Matthew Burnside, Angelos D. Keromytis |
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 491-506, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki |
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 79-94, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL |
1 | Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang |
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 114-130, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shay Gueron, Michael E. Kounavis |
Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 331-340, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi |
A Demonstrative Ad Hoc Attestation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 17-30, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Kiosk computing, platform integrity, smart cards, Trusted computing, attestation |
1 | Helger Lipmaa |
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 441-454, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Computationally-private information retrieval, conditional disclosure of secrets, oblivious transfer, homomorphic encryption |
1 | Sebastiaan Indesteege, Bart Preneel |
Collisions for RC4-Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 355-366, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RC4-Hash, multicollisions, hash functions, collisions |
1 | Claudio Soriente, Gene Tsudik, Ersin Uzun |
HAPADEP: Human-Assisted Pure Audio Device Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 385-400, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
User-Aided Security, Secure Device Pairing, Secure First Connect, Authentication Protocols, Man-in-the-Middle attacks |
1 | Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Antisocial Networks: Turning a Social Network into a Botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 146-160, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 455-470, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or |
1 | Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou 0001 |
Certificate-Based Signature Schemes without Pairings or Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 285-297, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0012, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom |
Improved Impossible Differential Attacks on Large-Block Rijndael. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 298-315, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Impossible differential distinguisher, Impossible differential attack, Block cipher, Rijndael |
1 | Jianyong Huang, Jennifer Seberry, Willy Susilo |
A Five-Round Algebraic Property of the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 316-330, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
A Five-Round Algebraic Property of the AES, Algorithm ?, Variants of Algorithm ?, ?AES, AES, Linear Equations |
1 | Pei-Yih Ting, Xiao-Wei Huang |
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 277-284, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Threshold proxy signature, Cryptography, Proxy signature |
1 | Jintai Ding, Dieter Schmidt, Fabian Werner |
Algebraic Attack on HFE Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 215-227, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Gröbner basis, multivariate public key cryptosystem, HFE |
1 | Baris Coskun, Cormac Herley |
Can "Something You Know" Be Saved?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 421-440, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication, passwords, challenge response |
1 | Jiali Choy, Khoongming Khoo |
New Applications of Differential Bounds of the SDS Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 367-384, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SPN, branch number, {0, 1}-matrices, differential, universal hash functions |
1 | Yali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal |
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 487-501, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 244-259, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 family, reduced round attacks, cryptanalysis |
1 | Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee (eds.) |
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![Springer, 978-3-540-85884-3 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David Champagne, Reouven Elbaz, Ruby B. Lee |
The Reduced Address Space (RAS) for Application Memory Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 47-63, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Memory authentication, integrity tree, secure computing architecture |
1 | Lei Liu 0021, Songqing Chen, Guanhua Yan, Zhao Zhang 0010 |
BotTracer: Execution-Based Bot-Like Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 97-113, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machine, Botnet, malware detection |
1 | Matthew Burnside, Angelos D. Keromytis |
Path-Based Access Control for Enterprise Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 191-203, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Path-based, SOA, access control, enterprise, Keynote |
1 | Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust |
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 341-354, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Differential side-channel analysis, AES hardware, Stochastic model, DPA, Rank correlation, Template attacks |
1 | Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
Property-Based Attestation without a Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 31-46, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy |
1 | Sherman S. M. Chow, Raphael C.-W. Phan |
Proxy Re-signatures in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 260-276, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Proxy re-signature, compartment signature, standard model |
1 | Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos |
Compromising Anonymity Using Packet Spinning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 161-174, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo |
Strong Accumulators from Collision-Resistant Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 471-486, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Collision-resistant Hashing, e-Invoice, Accumulators |
1 | Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos |
Athos: Efficient Authentication of Outsourced File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 80-96, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hyundo Park, Peng Li 0059, Debin Gao, Heejo Lee, Robert H. Deng |
Distinguishing between FE and DDoS Using Randomness Check. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 131-145, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Flash Event, Randomness Check, Network Security, Distributed Denial of Service |
1 | Subhamoy Maitra, Santanu Sarkar 0001 |
Revisiting Wiener's Attack - New Weak Keys in RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 228-243, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Factorization, Weak Keys |
1 | Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Property-Based TPM Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 1-16, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Dinei A. F. Florêncio, Cormac Herley |
One-Time Password Access to Any Server without Changing the Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 401-420, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
replay resistance, authentication, Passwords, one-time passwords |
1 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
Behavior-Based Network Access Control: A Proof-of-Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 175-190, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Network Access Control Technologies, Intrusion Detection Systems |
1 | Yi Lu 0002, Huaxiong Wang, San Ling |
Cryptanalysis of Rabbit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 204-214, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit |
1 | Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao 0001 |
An Efficient PIR Construction Using Trusted Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 64-79, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Wolfgang De Meuter (eds.) |
Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![Springer, 978-3-540-71835-2 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Guilhem Castagnos, Damien Vergnaud |
Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 333-350, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Polynomial Diffie-Hellman Problems, Standard Model, Public Key Encryption, Random Oracle Model, Semantic Security, Chosen-Ciphertext Attacks |
1 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Based Proxy Re-encryption Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 189-202, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
standard model, identity-based encryption, Proxy re-encryption |
1 | George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel |
Efficient Negative Databases from Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 423-436, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Raffetseder, Christopher Krügel, Engin Kirda |
Detecting System Emulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 1-18, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta 0001 (eds.) |
Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![Springer, 978-3-540-75495-4 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Akashi Satoh, Takeshi Sugawara 0001, Takafumi Aoki |
High-Speed Pipelined Hardware Architecture for Galois Counter Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 118-129, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Joo Yeon Cho, Josef Pieprzyk |
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 230-248, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS |
1 | Joachim Biskup, Jan-Hendrik Lochner |
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 407-422, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control |
1 | Pradeep Kumar Mishra, Vassil S. Dimitrov |
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 390-406, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Quintupling, Efficient Curve Arithmetic, Elliptic Curve Cryptosystems, Scalar Multiplication |
1 | Iosif-Viorel Onut, Ali A. Ghorbani 0001 |
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 19-36, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Feature evaluation, Network Intrusion Detection |
1 | Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao |
An Efficient Certified Email Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 145-157, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol |
1 | Daniel Boteanu, José M. Fernandez 0001, John McHugh, John Mullins |
Queue Management as a DoS Counter-Measure? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 263-280, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
degradation of service attack, dynamic timeout, timeout, queue management, Denial of service attack |
1 | Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan |
Traitor Tracing with Optimal Transmission Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 71-88, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Constant Transmission Rate, Bilinear Maps, Traitor Tracing, Fingerprint Codes |
1 | Jorge Nakahara Jr., Ivan Carlos Pavão |
Impossible-Differential Attacks on Large-Block Rijndael. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 104-117, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information security, Impossible differential cryptanalysis |
1 | Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque |
E-NIPS: An Event-Based Network Intrusion Prediction System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 37-52, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion detection and prediction, attack classes, network security |
1 | Yao-Dong Zhao, Wen-Feng Qi 0001 |
Small Private-Exponent Attack on RSA with Primes Sharing Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 221-229, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Sherman S. M. Chow, Kim-Kwang Raymond Choo |
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 203-220, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reveal query, anonymity, provable security, Key agreement, identity-based cryptography |
1 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 175-188, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
1 | Alexander W. Dent, Qiang Tang 0001 |
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 158-174, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Billy Bob Brumley, Kaisa Nyberg |
Differential Properties of Elliptic Curves and Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 376-389, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
differential uniformity, implicit public key certificates, key issuing protocols, provable security, Elliptic curves, blind signatures, digital signature schemes, message recovery |
1 | Mehmet S. Kiraz, Berry Schoenmakers, José Villegas |
Efficient Committed Oblivious Transfer of Bit Strings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 130-144, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Committed oblivious transfer, Commitments, Homomorphic encryption |
1 | Yvo Desmedt, Kaoru Kurosawa |
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 351-361, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
threshold decryption, Goldwasser- Micali, Rabin, cryptography, Threshold signatures |
1 | Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg |
Enabling Fairer Digital Rights Management with Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 53-70, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
stateful licenses, Trusted Computing, security architectures |
1 | Guilhem Castagnos, Benoît Chevallier-Mames |
Towards a DL-Based Additively Homomorphic Encryption Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 362-375, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model |
1 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 89-103, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Variable-length block ciphers, reduction proof, security analysis, key recovery attacks |
1 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 249-262, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov |
On the Concept of Software Obfuscation in Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 281-298, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Program obfuscation, security, encryption, Turing machine |
1 | Sherman S. M. Chow |
Token-Controlled Public Key Encryption in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 315-332, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Token-controlled, provable security, standard model, public key encryption, timed-release encryption |
1 | Stephen Drape, Clark D. Thomborson, Anirban Majumdar 0001 |
Specifying Imperative Data Obfuscations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 299-314, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data Obfuscation, Specification, Refinement, Correctness |
1 | Johan Brichau, Andy Kellens, Kris Gybels, Kim Mens, Robert Hirschfeld, Theo D'Hondt |
Application-Specific Models and Pointcuts Using a Logic Meta Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers, pp. 1-22, 2006, Springer, 978-3-540-71835-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David Röthlisberger, Marcus Denker, Éric Tanter |
Unanticipated Partial Behavioral Reflection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers, pp. 47-65, 2006, Springer, 978-3-540-71835-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Bergel, Stéphane Ducasse, Colin Putney, Roel Wuyts |
Meta-driven Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers, pp. 134-156, 2006, Springer, 978-3-540-71835-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
UI, Tools, MetaModeling, Browsers, Squeak |
1 | Alexandre Bergel, Stéphane Ducasse, Oscar Nierstrasz, Roel Wuyts |
Stateful Traits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers, pp. 66-90, 2006, Springer, 978-3-540-71835-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael Prasse |
Let's Modularize the Data Model Specifications of the ObjectLens in VisualWorks/Smalltalk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers, pp. 111-133, 2006, Springer, 978-3-540-71835-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
ObjectLens, VisualWorks, OR-Mapping, Design Pattern, Generative Programming, Smalltalk, Software Product Families |
1 | Andres Fortier, Nicolás Cañibano, Julián Grigera, Gustavo Rossi, Silvia E. Gordillo |
An Object-Oriented Approach for Context-Aware Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers, pp. 23-46, 2006, Springer, 978-3-540-71835-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Luc Fabresse, Christophe Dony, Marianne Huchard |
Scl: A Simple, Uniform and Operational Language for Component-Oriented Programming in Smalltalk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers, pp. 91-110, 2006, Springer, 978-3-540-71835-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
unanticipated composition, component property, connector, component-oriented programming |
1 | Maurizio Atzori |
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 60-71, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
low distortion, k-anonymity, data privacy |
Displaying result #701 - #800 of 1025 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|