The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISPEC"( http://dblp.L3S.de/Venues/ISPEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ispec

Publication years (Num. hits)
2005 (36) 2006 (36) 2007 (27) 2008 (30) 2009 (35) 2010 (29) 2011 (33) 2012 (28) 2013 (28) 2014 (42) 2015 (39) 2016 (26) 2017 (58) 2018 (40) 2019 (29) 2021 (25) 2022 (36) 2023 (324)
Publication types (Num. hits)
inproceedings(882) proceedings(19)
Venues (Conferences, Journals, ...)
ISPEC(901)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 123 occurrences of 109 keywords

Results
Found 901 publication records. Showing 901 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian An Efficient Group-Based Secret Sharing Scheme. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Robert H. Deng, Yingjiu Li Fully Secure Cipertext-Policy Hiding CP-ABE. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng How to Characterize Side-Channel Leakages More Accurately? Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng 0001 On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1An Wang 0005, Zheng Li, Xianwen Yang, Yanyan Yu A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ning Ding 0001, Dawu Gu A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael Rose, Thomas Plantard, Willy Susilo Improving BDD Cryptosystems in General Lattices. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Qiong Huang 0001, Duncan S. Wong Short Convertible Undeniable Signature in the Standard Model. Search on Bibsonomy ISPEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Thomas Richard McEvoy, Stephen D. Wolthusen Host-Based Security Sensor Integrity in Multiprocessing Environments. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu 0005 Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhuo Tang, Shaohua Zhang, Kenli Li 0001, Benming Feng Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Masaya Yasuda The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zongbin Liu, Jiwu Jing, Peng Liu 0005 Rate-Based Watermark Traceback: A New Approach. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jiazhe Chen, Keting Jia Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Hui Li, Chuankun Wu, Lingbo Wei Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Atsuko Miyaji A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhen Wang, Xiaozhe Wang, Shuqin Fan Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry On the Security of NOEKEON against Side Channel Cube Attacks. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Youngsook Lee, Hyungkyu Yang, Dongho Won Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Daren Zha, Jiwu Jing, Le Kang Mitigating the Malicious Trust Expansion in Social Network Service. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Katsuyuki Okeya, Hidehiro Katou, Yasuyuki Nogami Width-3 Joint Sparse Form. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Certificateless KEM and Hybrid Signcryption Schemes Revisited. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Aivo Jürgenson, Jan Willemson On Fast and Approximate Attack Tree Computations. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Byoung-Jin Han, Donghwi Shin, Hyoung-Jin Lim, Inkyung Jeun, Hyun-Chul Jung BioID: Biometric-Based Identity Management. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bin Wu 0011, Dengguo Feng, Meijiao Duan Privacy Preserving of Trust Management Credentials Based on Trusted Computing. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Inkyung Jeun, Dongho Won A Trustworthy ID Management Mechanism in Open Market. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Farshid Farhat, Mohammad Reza Pakravan, Mahmoud Salmasizadeh, Mohammad Reza Aref Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jacob C. N. Schuldt, Kanta Matsuura An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lei Xu 0012, Dongdai Lin Accelerating Inverse of GF(2n) with Precomputation. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim Protection Profile for Secure E-Voting Systems. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chiew Kang Leng, Josef Pieprzyk Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yanjun Li, Wenling Wu, Lei Zhang 0012 Integral Attacks on Reduced-Round ARIA Block Cipher. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yazhe Zhang, Kunpeng Wang, Bao Li 0001 A Deniable Group Key Establishment Protocol in the Standard Model. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lin Xu, Dongdai Lin, Xin Li A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang (eds.) Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings Search on Bibsonomy ISPEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Robert H. Deng, Jianying Zhou 0001, Ying Qiu Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Michael Gorski, Stefan Lucks Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peng Wang 0009, Dengguo Feng, Wenling Wu, Liting Zhang On the Correctness of an Approach against Side-Channel Attacks. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jianhong Zhang On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Jeffrey B. Lotspiech Defending against the Pirate Evolution Attack. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Robert H. Deng, Shengli Liu 0001, Weidong Kou RSA-Based Certificateless Public Key Encryption. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chifumi Sato, Takeshi Okamoto, Eiji Okamoto Strongly Unforgeable ID-Based Signatures without Random Oracles. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi Ranking Attack Graphs with Graph Neural Networks. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qi Cheng 0008, Yong Yin, Kun Xiao, Ching-Fang Hsu 0001 On Non-representable Secret Sharing Matroids. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Michael Gorski, Stefan Lucks Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hongbo Yu, Xiaoyun Wang 0001 Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Certificateless Hybrid Signcryption. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Guifang Huang, Dongdai Lin, Yanshuo Zhang Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Huafei Zhu New Constructions for Reusable, Non-erasure and Universally Composable Commitments. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks Twister- A Framework for Secure and Fast Hash Functions. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Hui Li, Guilin Wang (eds.) Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shuhua Wu, Yuefei Zhu A Framework for Authenticated Key Exchange in the Standard Model. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohamed Karroumi, Ayoub Massoudi Hash-Based Key Management Schemes for MPEG4-FGS. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xianggen Wang, Dengguo Feng, Purui Su Reconstructing a Packed DLL Binary for Static Analysis. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xiaojuan Cai, Yonggen Gu Measuring Anonymity. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won Security Specification for Conversion Technologies of Heterogeneous DRM Systems. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta Secret Handshake: Strong Anonymity Definition and Construction. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gaoli Wang, Shaohui Wang Preimage Attack on Hash Function RIPEMD. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Farshid Farhat, Somayeh Salimi, Ahmad Salahi An Extended Authentication and Key Agreement Protocol of UMTS. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ruishan Zhang, Xinyuan Wang 0005, Xiaohui Yang, Ryan Farley, Xuxian Jiang An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shaomin Zhu, Jianming Liu A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kun Peng A Hybrid E-Voting Scheme. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Feng Cheng 0002, Sebastian Roschke, Christoph Meinel Implementing IDS Management on Lock-Keeper. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven Analysing Protocol Implementations. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Khaled Ouafi, Raphael C.-W. Phan Privacy of Recent RFID Authentication Protocols. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, RFID, provably secure, authentication protocols, untraceability
1Wen Ji, Lei Hu Square Attack on Reduced-Round Zodiac Cipher. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zodiac, square attack, block cipher
1Shaik Maleka, Amjed Shareef, C. Pandu Rangan Rational Secret Sharing with Repeated Games. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed computing, game theory, Secret sharing, repeated games
1Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF random value addition, side channel attacks, Tate pairing, ? T pairing
1Marc Joye RSA Moduli with a Predetermined Portion: Techniques and Applications. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression
1Danilo Gligoroski, Suzana Andova, Svein J. Knapskog On the Importance of the Key Separation Principle for Different Modes of Operation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quasigroup string transformations, block ciphers, modes of operation
1Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu Analysis of Zipper as a Hash Function. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hash Function, Compression Function, Zipper
1Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk Secure Computation of the Vector Dominance Problem. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jin Hong 0001, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hellman trade-off, distinguished points, time memory trade-off, rainbow table
1Qingsong Ye, Huaxiong Wang, Josef Pieprzyk Distributed Private Matching and Set Operations. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF private matching, private set operation, homomorphic encryption
1Qiang Tang 0001, Julien Bringer, Hervé Chabanne, David Pointcheval A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jong Hwan Park, Dong Hoon Lee 0001 A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Public Key Broadcast Encryption, Full Collusion-Security
1Minjin Kwon, Kyoochang Jeong, Heejo Lee PROBE: A Process Behavior-Based Host Intrusion Prevention System. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Liqun Chen, Yi Mu 0001, Willy Susilo (eds.) Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Patrick P. Tsang, Sean W. Smith Secure Cryptographic Precomputation with Insecure Memory. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Raylin Tso, Takeshi Okamoto, Eiji Okamoto 1-out-of-. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 1-out-of-n signature, oblivious signature, Schnorr signature, oblivious transfer
1Patrick P. Tsang, Sean W. Smith Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Non-Adjacent Form (NAF), ?-adic NAF (?-NAF), ?-adic NAF (?-NAF), Elliptic Curves, Frobenius Expansions
1Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Policy Interoperation, RBAC, Multi-Domain
1Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unsplittability, privacy, federation, unlinkability, payment system, loyalty, coupons
1Anongporn Salaiwarakul, Mark Dermot Ryan Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Quoc-Cuong Le, Patrick Bellot, Akim Demaille Towards the World-Wide Quantum Network. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1David Galindo, Flavio D. Garcia, Peter van Rossum Computational Soundness of Non-Malleable Commitments. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan Securing Peer-to-Peer Distributions for Mobile Devices. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF superdistribution, TrustZone, peer-to-peer, Trusted Computing, security architectures
1Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang An On-Line Secure E-Passport Protocol. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere Towards Tamper Resistant Code Encryption: Practice and Experience. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Robert H. Deng, Xuhua Ding, Yanjiang Yang Private Query on Encrypted Data in Multi-user Settings. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 901 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license