|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 123 occurrences of 109 keywords
|
|
|
Results
Found 901 publication records. Showing 901 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian |
An Efficient Group-Based Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 288-301, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Junzuo Lai, Robert H. Deng, Yingjiu Li |
Fully Secure Cipertext-Policy Hiding CP-ABE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 24-39, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng |
How to Characterize Side-Channel Leakages More Accurately? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 196-207, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng 0001 |
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 247-256, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | An Wang 0005, Zheng Li, Xianwen Yang, Yanyan Yu |
A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 386-400, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ning Ding 0001, Dawu Gu |
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 401-416, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Rose, Thomas Plantard, Willy Susilo |
Improving BDD Cryptosystems in General Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 152-167, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qiong Huang 0001, Duncan S. Wong |
Short Convertible Undeniable Signature in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings, pp. 257-272, 2011, Springer, 978-3-642-21030-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Richard McEvoy, Stephen D. Wolthusen |
Host-Based Security Sensor Integrity in Multiprocessing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 138-152, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu 0005 |
Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 153-171, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhuo Tang, Shaohua Zhang, Kenli Li 0001, Benming Feng |
Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 201-216, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Yasuda |
The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 110-122, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zongbin Liu, Jiwu Jing, Peng Liu 0005 |
Rate-Based Watermark Traceback: A New Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 172-186, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jiazhe Chen, Keting Jia |
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 1-18, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hui Li, Chuankun Wu, Lingbo Wei |
Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 324-340, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Atsuko Miyaji |
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 30-44, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan |
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 359-376, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhen Wang, Xiaozhe Wang, Shuqin Fan |
Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 96-109, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry |
On the Security of NOEKEON against Side Channel Cube Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 45-55, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Youngsook Lee, Hyungkyu Yang, Dongho Won |
Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 377-385, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daren Zha, Jiwu Jing, Le Kang |
Mitigating the Malicious Trust Expansion in Social Network Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 264-275, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Okeya, Hidehiro Katou, Yasuyuki Nogami |
Width-3 Joint Sparse Form. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 67-84, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Certificateless KEM and Hybrid Signcryption Schemes Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 294-307, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aivo Jürgenson, Jan Willemson |
On Fast and Approximate Attack Tree Computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 56-66, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Byoung-Jin Han, Donghwi Shin, Hyoung-Jin Lim, Inkyung Jeun, Hyun-Chul Jung |
BioID: Biometric-Based Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 241-250, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bin Wu 0011, Dengguo Feng, Meijiao Duan |
Privacy Preserving of Trust Management Credentials Based on Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 251-263, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Inkyung Jeun, Dongho Won |
A Trustworthy ID Management Mechanism in Open Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 229-240, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Farshid Farhat, Mohammad Reza Pakravan, Mahmoud Salmasizadeh, Mohammad Reza Aref |
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 187-200, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jacob C. N. Schuldt, Kanta Matsuura |
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 276-293, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim |
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 217-228, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lei Xu 0012, Dongdai Lin |
Accelerating Inverse of GF(2n) with Precomputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 85-95, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim |
Protection Profile for Secure E-Voting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 386-397, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Chiew Kang Leng, Josef Pieprzyk |
Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 341-358, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yanjun Li, Wenling Wu, Lei Zhang 0012 |
Integral Attacks on Reduced-Round ARIA Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 19-29, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yazhe Zhang, Kunpeng Wang, Bao Li 0001 |
A Deniable Group Key Establishment Protocol in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 308-323, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lin Xu, Dongdai Lin, Xin Li |
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings, pp. 123-137, 2010, Springer, 978-3-642-12826-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang (eds.) |
Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![Springer, 978-3-642-12826-4 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Robert H. Deng, Jianying Zhou 0001, Ying Qiu |
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 384-395, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 298-309, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang 0009, Dengguo Feng, Wenling Wu, Liting Zhang |
On the Correctness of an Approach against Side-Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 336-344, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy |
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 396-407, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jianhong Zhang |
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 47-58, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffrey B. Lotspiech |
Defending against the Pirate Evolution Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 147-158, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Junzuo Lai, Robert H. Deng, Shengli Liu 0001, Weidong Kou |
RSA-Based Certificateless Public Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 24-34, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su |
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 324-335, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Chifumi Sato, Takeshi Okamoto, Eiji Okamoto |
Strongly Unforgeable ID-Based Signatures without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 35-46, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi |
Ranking Attack Graphs with Graph Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 345-359, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Qi Cheng 0008, Yong Yin, Kun Xiao, Ching-Fang Hsu 0001 |
On Non-representable Secret Sharing Matroids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 124-135, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 310-323, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hongbo Yu, Xiaoyun Wang 0001 |
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 285-297, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi |
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 13-23, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Certificateless Hybrid Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 112-123, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Guifang Huang, Dongdai Lin, Yanshuo Zhang |
Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 93-101, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu |
New Constructions for Reusable, Non-erasure and Universally Composable Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 102-111, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks |
Twister- A Framework for Secure and Fast Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 257-273, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, Hui Li, Guilin Wang (eds.) |
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![Springer, 978-3-642-00842-9 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shuhua Wu, Yuefei Zhu |
A Framework for Authenticated Key Exchange in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 207-218, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mohamed Karroumi, Ayoub Massoudi |
Hash-Based Key Management Schemes for MPEG4-FGS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 245-256, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xianggen Wang, Dengguo Feng, Purui Su |
Reconstructing a Packed DLL Binary for Static Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 71-82, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng |
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 372-383, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xiaojuan Cai, Yonggen Gu |
Measuring Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 183-194, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won |
Security Specification for Conversion Technologies of Heterogeneous DRM Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 159-170, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta |
Secret Handshake: Strong Anonymity Definition and Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 219-229, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gaoli Wang, Shaohui Wang |
Preimage Attack on Hash Function RIPEMD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 274-284, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Farshid Farhat, Somayeh Salimi, Ahmad Salahi |
An Extended Authentication and Key Agreement Protocol of UMTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 230-244, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ruishan Zhang, Xinyuan Wang 0005, Xiaohui Yang, Ryan Farley, Xuxian Jiang |
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 59-70, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang |
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 83-92, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shaomin Zhu, Jianming Liu |
A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 136-146, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng |
A Hybrid E-Voting Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 195-206, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 1-12, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Feng Cheng 0002, Sebastian Roschke, Christoph Meinel |
Implementing IDS Management on Lock-Keeper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 360-371, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven |
Analysing Protocol Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings, pp. 171-182, 2009, Springer, 978-3-642-00842-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim |
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 176-187, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Khaled Ouafi, Raphael C.-W. Phan |
Privacy of Recent RFID Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 263-277, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, RFID, provably secure, authentication protocols, untraceability |
1 | Wen Ji, Lei Hu |
Square Attack on Reduced-Round Zodiac Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 377-391, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Zodiac, square attack, block cipher |
1 | Shaik Maleka, Amjed Shareef, C. Pandu Rangan |
Rational Secret Sharing with Repeated Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 334-346, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed computing, game theory, Secret sharing, repeated games |
1 | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto |
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 290-303, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
random value addition, side channel attacks, Tate pairing, ? T pairing |
1 | Marc Joye |
RSA Moduli with a Predetermined Portion: Techniques and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 116-130, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RSA-type cryptosystems, RSA moduli, RSA key lengths, diminished-radix moduli, key transport, key storage, key transmission, tamper-resistant devices, smart cards, key escrow, key generation, kleptography, setup, key compression |
1 | Danilo Gligoroski, Suzana Andova, Svein J. Knapskog |
On the Importance of the Key Separation Principle for Different Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 404-418, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
quasigroup string transformations, block ciphers, modes of operation |
1 | Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu |
Analysis of Zipper as a Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 392-403, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hash Function, Compression Function, Zipper |
1 | Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk |
Secure Computation of the Vector Dominance Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 319-333, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jin Hong 0001, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma |
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 131-145, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hellman trade-off, distinguished points, time memory trade-off, rainbow table |
1 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk |
Distributed Private Matching and Set Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 347-360, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
private matching, private set operation, homomorphic encryption |
1 | Qiang Tang 0001, Julien Bringer, Hervé Chabanne, David Pointcheval |
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 56-70, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jong Hwan Park, Dong Hoon Lee 0001 |
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 101-115, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Public Key Broadcast Encryption, Full Collusion-Security |
1 | Minjin Kwon, Kyoochang Jeong, Heejo Lee |
PROBE: A Process Behavior-Based Host Intrusion Prevention System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 203-217, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen, Yi Mu 0001, Willy Susilo (eds.) |
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![Springer, 978-3-540-79103-4 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Patrick P. Tsang, Sean W. Smith |
Secure Cryptographic Precomputation with Insecure Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 146-160, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
1-out-of-. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 45-55, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
1-out-of-n signature, oblivious signature, Schnorr signature, oblivious transfer |
1 | Patrick P. Tsang, Sean W. Smith |
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 188-202, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi |
Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 304-318, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Non-Adjacent Form (NAF), ?-adic NAF (?-NAF), ?-adic NAF (?-NAF), Elliptic Curves, Frobenius Expansions |
1 | Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu |
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 248-262, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Policy Interoperation, RBAC, Multi-Domain |
1 | Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi |
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 29-44, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
unsplittability, privacy, federation, unlinkability, payment system, loyalty, coupons |
1 | Anongporn Salaiwarakul, Mark Dermot Ryan |
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 1-13, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Quoc-Cuong Le, Patrick Bellot, Akim Demaille |
Towards the World-Wide Quantum Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 218-232, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | David Galindo, Flavio D. Garcia, Peter van Rossum |
Computational Soundness of Non-Malleable Commitments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 361-376, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan |
Securing Peer-to-Peer Distributions for Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 161-175, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
superdistribution, TrustZone, peer-to-peer, Trusted Computing, security architectures |
1 | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang |
An On-Line Secure E-Passport Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 14-28, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere |
Towards Tamper Resistant Code Encryption: Practice and Experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 86-100, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, Robert H. Deng, Xuhua Ding, Yanjiang Yang |
Private Query on Encrypted Data in Multi-user Settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 71-85, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #701 - #800 of 901 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|