The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISC"( http://dblp.L3S.de/Venues/ISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isw

Publication years (Num. hits)
2001 (38) 2002 (39) 2003 (34) 2004 (37) 2005 (39) 2006 (46) 2007 (30) 2008 (34) 2009 (39) 2010 (36) 2011 (27) 2012 (25) 2013 (65) 2014 (73) 2015 (70) 2016 (53) 2017 (49) 2018 (49) 2019 (42) 2020 (52) 2021 (47) 2022 (49) 2023 (52)
Publication types (Num. hits)
inproceedings(990) proceedings(35)
Venues (Conferences, Journals, ...)
ISC(1025)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 348 occurrences of 264 keywords

Results
Found 1025 publication records. Showing 1025 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Suvasini Panigrahi, Shamik Sural Detection of Database Intrusion Using a Two-Stage Fuzzy System. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fuzzy-Bayesian inference, Suspicion score, Fuzzy logic, Intrusion detection, Database security
1Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl Cancelable Iris Biometrics Using Block Re-mapping and Image Warping. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Juan A. Garay, Vladimir Kolesnikov, Rae McLellan MAC Precomputation with Applications to Secure Memory. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Erik Zenner Nonce Generators and the Nonce Reset Problem. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nonce Reset, Nonce Generator, Cryptography, Security Engineering, Nonce
1Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein 0001 Adding Trust to P2P Distribution of Paid Content. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li 0002 A New Construction of Boolean Functions with Maximum Algebraic Immunity. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Boolean Function, Algebraic Attacks, Balancedness, Algebraic Immunity
1Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud Fair E-Cash: Be Compact, Spend Faster. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fair e-cash, batch RSA, privacy-preserving, blind signature
1Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
1Manachai Toahchoodee, Xing Xie 0002, Indrakshi Ray Towards Trustworthy Delegation in Role-Based Access Control Model. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jin Li 0002, Kui Ren 0001, Bo Zhu 0001, Zhiguo Wan Privacy-Aware Attribute-Based Encryption with User Accountability. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Attribute-based, Access control, Anonymity, Accountability, Ciphertext-policy
1Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio A. Ardagna (eds.) Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peng Yang 0002, Rui Zhang 0002, Kanta Matsuura, Hideki Imai Generic Construction of Stateful Identity Based Encryption. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Bogdan Groza, Marius Minea A Calculus to Detect Guessing Attacks. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Boris Rozenberg, Ehud Gudes, Yuval Elovici SISR - A New Model for Epidemic Spreading of Electronic Threats. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kaushik Roy 0002, Prabir Bhattacharya Iris Recognition in Nonideal Situations. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF variational level set method, nonideal situations, genetic algorithms, Iris recognition, curve evolution
1Jianfeng Lu, Ruixuan Li 0001, Zhengding Lu, Jinwei Hu, Xiaopu Ma Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF constraint, Separation-of-Duty, usage control
1Gildas Avoine, Aslan Tchamkerten An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF false-acceptance rate, proximity check, mafia fraud, Authentication, RFID, memory, relay attack
1Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel A New Approach to chi2 Cryptanalysis of Block Ciphers. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ? 2, square and linear cryptanalysis, Block ciphers
1Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda Automated Spyware Collection and Analysis. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel Towards Unifying Vulnerability Information for Attack Graph Construction. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi A Storage Efficient Redactable Signature in the Standard Model. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Amitabh Saxena, Brecht Wyseur, Bart Preneel Towards Security Notions for White-Box Cryptography. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Serdar Pehlivanoglu Traitor Tracing without A Priori Bound on the Coalition Size. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kan Yasuda HMAC without the "Second" Key. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cascade construction, prefix-free PRF, hybrid argument, multi-oracle family, affix
1Keith B. Frikken, Marina Blanton, Mikhail J. Atallah Robust Authentication Using Physically Unclonable Functions. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan On the Security of Identity Based Ring Signcryption Schemes. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack
1Matthew Burnside, Angelos D. Keromytis F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yu Sasaki Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL
1Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Shay Gueron, Michael E. Kounavis Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi A Demonstrative Ad Hoc Attestation System. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Kiosk computing, platform integrity, smart cards, Trusted computing, attestation
1Helger Lipmaa New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Computationally-private information retrieval, conditional disclosure of secrets, oblivious transfer, homomorphic encryption
1Sebastiaan Indesteege, Bart Preneel Collisions for RC4-Hash. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RC4-Hash, multicollisions, hash functions, collisions
1Claudio Soriente, Gene Tsudik, Ersin Uzun HAPADEP: Human-Assisted Pure Audio Device Pairing. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF User-Aided Security, Secure Device Pairing, Secure First Connect, Authentication Protocols, Man-in-the-Middle attacks
1Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos Antisocial Networks: Turning a Social Network into a Botnet. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or
1Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou 0001 Certificate-Based Signature Schemes without Pairings or Random Oracles. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Lei Zhang 0012, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom Improved Impossible Differential Attacks on Large-Block Rijndael. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Impossible differential distinguisher, Impossible differential attack, Block cipher, Rijndael
1Jianyong Huang, Jennifer Seberry, Willy Susilo A Five-Round Algebraic Property of the Advanced Encryption Standard. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF A Five-Round Algebraic Property of the AES, Algorithm ?, Variants of Algorithm ?, ?AES, AES, Linear Equations
1Pei-Yih Ting, Xiao-Wei Huang An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold proxy signature, Cryptography, Proxy signature
1Jintai Ding, Dieter Schmidt, Fabian Werner Algebraic Attack on HFE Revisited. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gröbner basis, multivariate public key cryptosystem, HFE
1Baris Coskun, Cormac Herley Can "Something You Know" Be Saved?. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, passwords, challenge response
1Jiali Choy, Khoongming Khoo New Applications of Differential Bounds of the SDS Structure. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SPN, branch number, {0, 1}-matrices, differential, universal hash functions
1Yali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Somitra Kumar Sanadhya, Palash Sarkar 0001 Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 family, reduced round attacks, cryptanalysis
1Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee (eds.) Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1David Champagne, Reouven Elbaz, Ruby B. Lee The Reduced Address Space (RAS) for Application Memory Authentication. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Memory authentication, integrity tree, secure computing architecture
1Lei Liu 0021, Songqing Chen, Guanhua Yan, Zhao Zhang 0010 BotTracer: Execution-Based Bot-Like Malware Detection. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine, Botnet, malware detection
1Matthew Burnside, Angelos D. Keromytis Path-Based Access Control for Enterprise Networks. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Path-based, SOA, access control, enterprise, Keynote
1Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Differential side-channel analysis, AES hardware, Stochastic model, DPA, Rank correlation, Template attacks
1Liqun Chen 0002, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi Property-Based Attestation without a Trusted Third Party. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Property-based attestation, proof of membership, configuration anonymity, ring signatures, user privacy
1Sherman S. M. Chow, Raphael C.-W. Phan Proxy Re-signatures in the Standard Model. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Proxy re-signature, compartment signature, standard model
1Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos Compromising Anonymity Using Packet Spinning. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo Strong Accumulators from Collision-Resistant Hashing. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collision-resistant Hashing, e-Invoice, Accumulators
1Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos Athos: Efficient Authentication of Outsourced File Systems. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hyundo Park, Peng Li 0059, Debin Gao, Heejo Lee, Robert H. Deng Distinguishing between FE and DDoS Using Randomness Check. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Flash Event, Randomness Check, Network Security, Distributed Denial of Service
1Subhamoy Maitra, Santanu Sarkar 0001 Revisiting Wiener's Attack - New Weak Keys in RSA. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Factorization, Weak Keys
1Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy Property-Based TPM Virtualization. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dinei A. F. Florêncio, Cormac Herley One-Time Password Access to Any Server without Changing the Server. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF replay resistance, authentication, Passwords, one-time passwords
1Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis Behavior-Based Network Access Control: A Proof-of-Concept. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network Access Control Technologies, Intrusion Detection Systems
1Yi Lu 0002, Huaxiong Wang, San Ling Cryptanalysis of Rabbit. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit
1Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao 0001 An Efficient PIR Construction Using Trusted Hardware. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wolfgang De Meuter (eds.) Advances in Smalltalk, 14th International Smalltalk Conference, ISC 2006, Prague, Czech Republic, September 4-8, 2006, Revised Selected Papers Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Guilhem Castagnos, Damien Vergnaud Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Polynomial Diffie-Hellman Problems, Standard Model, Public Key Encryption, Random Oracle Model, Semantic Security, Chosen-Ciphertext Attacks
1Cheng-Kang Chu, Wen-Guey Tzeng Identity-Based Proxy Re-encryption Without Random Oracles. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF standard model, identity-based encryption, Proxy re-encryption
1George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel Efficient Negative Databases from Cryptographic Hash Functions. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Thomas Raffetseder, Christopher Krügel, Engin Kirda Detecting System Emulators. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta 0001 (eds.) Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Akashi Satoh, Takeshi Sugawara 0001, Takafumi Aoki High-Speed Pipelined Hardware Architecture for Galois Counter Mode. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Joo Yeon Cho, Josef Pieprzyk Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS
1Joachim Biskup, Jan-Hendrik Lochner Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control
1Pradeep Kumar Mishra, Vassil S. Dimitrov Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Quintupling, Efficient Curve Arithmetic, Elliptic Curve Cryptosystems, Scalar Multiplication
1Iosif-Viorel Onut, Ali A. Ghorbani 0001 Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Feature evaluation, Network Intrusion Detection
1Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao An Efficient Certified Email Protocol. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol
1Daniel Boteanu, José M. Fernandez 0001, John McHugh, John Mullins Queue Management as a DoS Counter-Measure? Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF degradation of service attack, dynamic timeout, timeout, queue management, Denial of service attack
1Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan Traitor Tracing with Optimal Transmission Rate. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Constant Transmission Rate, Bilinear Maps, Traitor Tracing, Fingerprint Codes
1Jorge Nakahara Jr., Ivan Carlos Pavão Impossible-Differential Attacks on Large-Block Rijndael. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information security, Impossible differential cryptanalysis
1Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque E-NIPS: An Event-Based Network Intrusion Prediction System. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion detection and prediction, attack classes, network security
1Yao-Dong Zhao, Wen-Feng Qi 0001 Small Private-Exponent Attack on RSA with Primes Sharing Bits. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Kim-Kwang Raymond Choo Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reveal query, anonymity, provable security, Key agreement, identity-based cryptography
1Fabien Laguillaumie, Damien Vergnaud On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures
1Alexander W. Dent, Qiang Tang 0001 Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Billy Bob Brumley, Kaisa Nyberg Differential Properties of Elliptic Curves and Blind Signatures. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential uniformity, implicit public key certificates, key issuing protocols, provable security, Elliptic curves, blind signatures, digital signature schemes, message recovery
1Mehmet S. Kiraz, Berry Schoenmakers, José Villegas Efficient Committed Oblivious Transfer of Bit Strings. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Committed oblivious transfer, Commitments, Homomorphic encryption
1Yvo Desmedt, Kaoru Kurosawa A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF threshold decryption, Goldwasser- Micali, Rabin, cryptography, Threshold signatures
1Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg Enabling Fairer Digital Rights Management with Trusted Computing. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stateful licenses, Trusted Computing, security architectures
1Guilhem Castagnos, Benoît Chevallier-Mames Towards a DL-Based Additively Homomorphic Encryption Scheme. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ElGamal encryption scheme, Naccache-Stern cryptosystem, DL-based homomorphic scheme, public-key cryptography, standard model
1Debra L. Cook, Moti Yung, Angelos D. Keromytis The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Variable-length block ciphers, reduction proof, security analysis, key recovery attacks
1Gautham Sekar, Souradyuti Paul, Bart Preneel New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov On the Concept of Software Obfuscation in Computer Security. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Program obfuscation, security, encryption, Turing machine
1Sherman S. M. Chow Token-Controlled Public Key Encryption in the Standard Model. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Token-controlled, provable security, standard model, public key encryption, timed-release encryption
1Stephen Drape, Clark D. Thomborson, Anirban Majumdar 0001 Specifying Imperative Data Obfuscations. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data Obfuscation, Specification, Refinement, Correctness
1Johan Brichau, Andy Kellens, Kris Gybels, Kim Mens, Robert Hirschfeld, Theo D'Hondt Application-Specific Models and Pointcuts Using a Logic Meta Language. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1David Röthlisberger, Marcus Denker, Éric Tanter Unanticipated Partial Behavioral Reflection. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Alexandre Bergel, Stéphane Ducasse, Colin Putney, Roel Wuyts Meta-driven Browsers. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF UI, Tools, MetaModeling, Browsers, Squeak
1Alexandre Bergel, Stéphane Ducasse, Oscar Nierstrasz, Roel Wuyts Stateful Traits. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael Prasse Let's Modularize the Data Model Specifications of the ObjectLens in VisualWorks/Smalltalk. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ObjectLens, VisualWorks, OR-Mapping, Design Pattern, Generative Programming, Smalltalk, Software Product Families
1Andres Fortier, Nicolás Cañibano, Julián Grigera, Gustavo Rossi, Silvia E. Gordillo An Object-Oriented Approach for Context-Aware Applications. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Luc Fabresse, Christophe Dony, Marianne Huchard Scl: A Simple, Uniform and Operational Language for Component-Oriented Programming in Smalltalk. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unanticipated composition, component property, connector, component-oriented programming
1Maurizio Atzori Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF low distortion, k-anonymity, data privacy
Displaying result #701 - #800 of 1025 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license