The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Diffie-Hellman (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1990 (18) 1991-1995 (15) 1996-1997 (21) 1998 (19) 1999 (17) 2000 (27) 2001 (32) 2002 (38) 2003 (57) 2004 (90) 2005 (93) 2006 (101) 2007 (97) 2008 (107) 2009 (75) 2010 (33) 2011 (25) 2012 (18) 2013 (28) 2014 (25) 2015-2016 (36) 2017 (28) 2018 (28) 2019 (32) 2020 (22) 2021 (22) 2022 (30) 2023-2024 (14)
Publication types (Num. hits)
article(353) incollection(13) inproceedings(780) phdthesis(2)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(111) CRYPTO(60) EUROCRYPT(56) Public Key Cryptography(42) ASIACRYPT(29) CCS(23) J. Cryptol.(22) ProvSec(21) CoRR(19) CT-RSA(19) RFC(17) INDOCRYPT(16) ACISP(15) ISC(15) ACNS(14) CANS(13) More (+10 of total 348)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 917 occurrences of 351 keywords

Results
Found 1148 publication records. Showing 1148 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt Secure group key establishment revisited. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Group key establishment, Malicious insiders, Provable security
17Wei Gao 0007, Xueli Wang, Dongqing Xie Chameleon Hashes Without Key Exposure Based on Factoring. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chameleon signature, key-exposure, chameleon hash
17Haibo Tian, Xi Sun, Yumin Wang A New Public-Key Encryption Scheme. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, public-key cryptosystems, deduction
17Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 Formal Proofs for the Security of Signcryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Dario Catalano, David Pointcheval, Thomas Pornin Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Joonsang Baek, Willy Susilo, Jianying Zhou 0001 New constructions of fuzzy identity-based encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF efficient constructions, fuzzy identity-based encryption
17Ran Canetti, Susan Hohenberger Chosen-ciphertext secure proxy re-encryption. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption, obfuscation, chosen-ciphertext security, re-encryption
17Rafail Ostrovsky, Amit Sahai, Brent Waters Attribute-based encryption with non-monotonic access structures. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Stanislaw Jarecki, Jihye Kim, Gene Tsudik Robust group key agreement using short broadcasts. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fault tolerance, group key agreement
17Ling Cheung, Calvin C. Newport Provably secure ciphertext policy ABE. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute-based encryption
17Johann Großschädl, Alexander Szekely, Stefan Tillich The energy cost of cryptographic key establishment in wireless sensor networks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy evaluation, wireless networking, cryptography, security protocols, key establishment
17Dave Singelée, Bart Preneel Key Establishment Using Secure Distance Bounding Protocols. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jiguo Li 0001, Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Qianhong Wu Certificate-Based Signature: Security Model and Efficient Construction. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certificate-based signature, Key replacement attack, PKI
17Dimitrios Hristu-Varsakelis, Konstantinos Chalkias, George Stephanides Low-cost Anonymous Timed-Release Encryption. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple time-servers, cryptographic protocols, bilinear pairings, timed-release encryption
17M. M. Chowdhury An Authentication Scheme Using Non-Commutative Semigroups. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Chunxiang Gu, Yuefei Zhu An Efficient ID-Based Proxy Signature Scheme from Pairings. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bilinear pairings, proxy signatures, ID-based cryptography
17Leif Uhsadel, Axel Poschmann, Christof Paar Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 8-bit micro controller, secp160r1, wireless sensor network, elliptic curve cryptography, Micaz
17Douglas Wikström Designated Confirmer Signatures Revisited. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Cleopas O. Angaye, Paul S. Fisher Application of FI sequences for authentication in a network. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF finite induction, private keys, security, public keys
17Ernie Brickell, Jiangtao Li 0001 Enhanced privacy id: a direct anonymous attestation scheme with enhanced revocation capabilities. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, anonymity, cryptographic protocols, trusted computing
17Ratna Dutta Multi-Party Key Agreement in Password-Based Setting. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Yong Ho Hwang, Pil Joong Lee Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Zhaohui Cheng, Liqun Chen 0002, Li Ling, Richard Comley General and Efficient Certificateless Public Key Encryption Constructions. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF nonce-chained authentication, scalability, Cryptography, provable security, binary tree, group key exchange
17Fagen Li, Yupu Hu, Chuanrong Zhang An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF identity-based signcryption, Ad hoc networks, provable security, bilinear pairings
17Gökay Saldamli, Çetin Kaya Koç Spectral Modular Exponentiation. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17William Hasenplaugh, Gunnar Gaubatz, Vinodh Gopal Fast Modular Reduction. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jianhong Zhang An Improved Designated-Verifier Proxy Signature Scheme. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ioannis Chatzigiannakis, Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis Agent-based Distributed Group Key Establishment in Wireless Sensor Networks. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Xavier Boyen Miniature CCA2 PK Encryption: Tight Security Without Redundancy. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ueli M. Maurer, Dominik Raub Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Black-box fields, computational algebra, homomorphic encryption, generic algorithms, one-way permutations
17Tatsuaki Okamoto Authenticated Key Exchange and Key Encapsulation in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ratna Dutta Overcome Weakness of a Password-Based Group Key Agreement Protocol. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko Efficient Pseudorandom Generators Based on the DDH Assumption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17He Ge, Stephen R. Tate A Direct Anonymous Attestation Scheme for Embedded Devices. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature
17Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart Identity-Based Traitor Tracing. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao An Efficient Certified Email Protocol. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Certified Email Protocol, D Optimistic Fair Exchange Protocol, Fair Exchange Protocol
17Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan Traitor Tracing with Optimal Transmission Rate. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Constant Transmission Rate, Bilinear Maps, Traitor Tracing, Fingerprint Codes
17Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Secure Remote User Authentication Scheme Using Bilinear Pairings. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart card, Password, Bilinear pairings, Key agreement
17Wei Wu 0001, Yi Mu 0001, Willy Susilo, Jennifer Seberry, Xinyi Huang 0001 Identity-Based Proxy Signature from Pairings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Chia-Hui Wang, Mei-Wen Li, Wanjiun Liao A Distributed Key-Changing Mechanism for Secure Voice Over IP (VoIP) Service. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Yoon-Su Jeong, Sang Ho Lee 0002 Hybrid Key Establishment Protocol Based on ECC for Wireless Sensor Network. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi 0001 Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic curves, Pairing based cryptosystem
17Lasse Øverlier, Paul F. Syverson Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17SeongHan Shin, Kazukuni Kobara, Hideki Imai A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang Proxy Re-signature Schemes Without Random Oracles. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy re-signature, existential unforgeability, standard model, bilinear maps, ID-based
17Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy cryptosystem, certificate-based encryption (CBE), pairing
17Xiangxue Li, Dong Zheng 0001, Kefei Chen Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. Search on Bibsonomy ICA3PP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF characteristic sequence, linkable ring signature, linear feedback shift-register, threshold signature
17Seokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch Verification. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF BDH assumption, bilinear map, Group key agreement, batch verification
17Lei Zhang 0009, Futai Zhang, Fangguo Zhang New Efficient Certificateless Signature Scheme. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certificateless signature scheme, cryptography, bilinear map, random oracle model
17Dong Zheng 0001, Xiangxue Li, Kefei Chen, Jianhua Li Linkable Ring Signatures from Linear Feedback Shift Register. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Characteristic sequence, Linkabilty, Anonymity, Linear feedback shift register, Ring signatures
17Jin Li 0002, Tsz Hon Yuen, Kwangjo Kim Practical Threshold Signatures Without Random Oracles. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CDH problem, Threshold Signature, Bilinear groups
17Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Palash Sarkar 0001, Sanjit Chatterjee Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Lei Zhang 0009, Futai Zhang, Wei Wu 0001 A Provably Secure Ring Signature Scheme in Certificateless Cryptography. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Random Oracle model, Ring Signature, Certificateless Cryptography
17Chin-Chen Chang 0001, Hao-Chuan Tsai, Yi-Hui Chen An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jun Shao 0001, Zhenfu Cao, Licheng Wang, Rongxing Lu Efficient Password-Based Authenticated Key Exchange Without Public Information. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Elaine Shi, John Bethencourt, T.-H. Hubert Chan, Dawn Xiaodong Song, Adrian Perrig Multi-Dimensional Range Query over Encrypted Data. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Chen Yang, Furong Wang, Xinmei Wang Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Eun-Kyung Ryu, Tsuyoshi Takagi Efficient Conjunctive Keyword-Searchable Encryption. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen Authenticated Broadcast Encryption Scheme. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptography, broadcast encryption, bilinear map
17Dennis Hofheinz, Eike Kiltz Secure Hybrid Encryption from Weakened Key Encapsulation. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Yongping Zhang, Wei Wei, Tianjie Cao Improvement of an Authenticated Key Agreement Protocol. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Elliptic Curves, Key Agreement Protocol
17Zhiguo Wan, Robert H. Deng, Feng Bao 0001, Bart Preneel n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jason Barbour, Mohamed F. Younis Sensor Network Connectivity and Security Analysis Using a Single Per-node Random Key. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Felix Brandt 0001 How to obtain full privacy in auctions. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptographic protocols, Auctions, Homomorphic encryption
17Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson Threshold Password-Authenticated Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key exchange, Password authentication, Dictionary attack, Threshold cryptosystems
17Wenliang Du, Jing Deng 0001, Yunghsiang S. Han, Pramod K. Varshney A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Wireless sensor networks, network security, key predistribution
17Jun Furukawa 0001, Kazue Sako An Efficient Publicly Verifiable Mix-Net for Long Inputs. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hybrid-mix, efficient, public verifiability, multiple encryption
17Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Efficient Conjunctive Keyword Search on Encrypted Data Storage System. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Martin Hlavác, Tomás Rosa Extended Hidden Number Problem and Its Cryptanalytic Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DSA implementation, hyper-threading, lattice, sliding window, side channel analysis, cache analysis
17Zhenchuan Chai, Zhenfu Cao, Rongxing Lu Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy. Search on Bibsonomy WASA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Sepideh Fouladgar, Bastien Mainaud, Khaled Masmoudi, Hossam Afifi Tiny 3-TLS: A Trust Delegation Protocol for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17G. Shailaja, K. Phani Kumar, Ashutosh Saxena Universal Designated Multi Verifier Signature without Random Oracles. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Kundan Kumar, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury A Programmable Parallel Structure to perform Galois Field Exponentiation. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Sunghyuck Hong, Noé Lopez-Benitez Enhanced Group Key Generation Algorithm. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Chris Peikert On Error Correction in the Exponent. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Alexander W. Dent, Steven D. Galbraith Hidden Pairings and Trapdoor DDH Groups. Search on Bibsonomy ANTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Martin Schaffer, Peter Schartner Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17He Ge, Stephen R. Tate A group signature scheme with signature claiming and variable linkability. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Roberto Zunino, Pierpaolo Degano Handling exp, × (and Timestamps) in Protocol Analysis. Search on Bibsonomy FoSSaCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Zhenfeng Zhang, Duncan S. Wong, Jing Xu 0002, Dengguo Feng Certificateless Public-Key Signature: Security Model and Efficient Construction. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 Proxy Signature Without Random Oracles. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Without Random Oracles, CDH Problem, Bilinear Pairings, Proxy Signature
17Lan Zhou, Willy Susilo, Yi Mu 0001 Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authenticated group key agreement, cryptography, bilinear pairings, ID-based
17He Ge, Stephen R. Tate Efficient Authenticated Key-Exchange for Devices with a Trusted Manager. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Embedded Systems, Authentication, Key Exchange, Strong RSA Assumption
17Eun-Jun Yoon, Kee-Young Yoo A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Michel Abdalla, David Pointcheval A Scalable Password-Based Group Key Exchange Protocol in the Standard Model. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smooth Projective Hash Functions, Group Key Exchange, Password-based Authentication
17Sylvain Pasini, Serge Vaudenay SAS-Based Authenticated Key Agreement. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval The Twist-AUgmented Technique for Key Exchange. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Craig Gentry, Zulfikar Ramzan Identity-Based Aggregate Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17SeongHan Shin, Kazukuni Kobara, Hideki Imai An Authentication and Key Exchange Protocol for Secure Credential Services. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jung Doo Koo, Jungsook Koo, Dong Chun Lee Secure Authentication Protocol in Mobile IPv6 Networks. Search on Bibsonomy KES (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Kenneth G. Paterson, Jacob C. N. Schuldt Efficient Identity-Based Signatures Secure in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Man Ho Au, Willy Susilo, Siu-Ming Yiu Event-Oriented k-Times Revocable-iff-Linked Group Signatures. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Xavier Boyen, Brent Waters Compact Group Signatures Without Random Oracles. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Krzysztof Pietrzak Composition Implies Adaptive Security in Minicrypt. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Craig Gentry Practical Identity-Based Encryption Without Random Oracles. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Identity Based Encryption
Displaying result #801 - #900 of 1148 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license