The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Aggelos Kiayias, Moti Yung Traitor Tracing with Constant Transmission Rate. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Alexander Russell, Hong Wang 0002 How to Fool an Unbounded Adversary with a Short Key. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Adam J. Elbirt, W. Yip, B. Chetwynd, Christof Paar An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Yong-Cong Chen, Long-Wen Chang A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm. Search on Bibsonomy ICIP (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Cheng-Ta Yang, Long-Wen Chang Image Authentication By Watermarking with Error Correction Based on Wavelet Packet Transform. Search on Bibsonomy ICME The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Jonathan Katz, Steven A. Myers, Rafail Ostrovsky Cryptographic Counters and Applications to Electronic Voting. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Ali Saman Tosun, Wu-chi Feng Lightweight Security Mechanisms for Wireless Video Transmission. Search on Bibsonomy ITCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19David A. Barr Copy Protection for High-Definition Baseband Video. Search on Bibsonomy ITCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Helena Handschuh, Howard M. Heys A Timing Attack on RC5. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Timing Attacks
19Mariusz H. Jakubowski, Ramarathnam Venkatesan The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Henk Meijer, Selim G. Akl Two New Secret Key Cryptosystems. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
19Fahim K. Sufi, Ibrahim Khalil A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking. Search on Bibsonomy J. Medical Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ECG obfuscation, ECG feature detection, Securing ECG data, ECG encryption, HIPAA
19Meng Ao, Stan Z. Li Near Infrared Face Based Biometric Key Binding. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF BioHash, Key Binding, NIR Face, Biometric Encryption, ECC
19Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji Biometric Identification over Encrypted Data Made Feasible. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Biometrics, Identification, Searchable Encryption
19Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos Mamoulis Secure kNN computation on encrypted databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, encryption, knn
19Benoît Libert, Damien Vergnaud Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF efficiency, traceability, Identity-based encryption
19Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana Usable secure mailing lists with untrusted servers. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-mail list security, usability study, proxy re-encryption
19Dennis Hofheinz, Eike Kiltz The Group of Signed Quadratic Residues and Applications. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hybrid ElGamal/DHIES, Public-key encryption, chosen-ciphertext security
19Supachai Tangwongsan, Sathaporn Kassuvan A highly effective model for security protection against eavesdropping exploits. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security protection, voice eavesdropping, voice encryption, security model, key exchange
19Martín Abadi, Bogdan Warinschi Security analysis of cryptographically controlled access to XML documents. Search on Bibsonomy J. ACM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XML, Access control, authorization, encryption
19Reihaneh Safavi-Naini, Shaoquan Jiang Non-interactive conference key distribution and its applications. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF conference key distribution, ring authentication, broadcast encryption, unconditional security
19Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, Sung Y. Shin Secure deletion for NAND flash file system. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure deletion, encryption, key management, file system, flash memory
19Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati Preserving confidentiality of security policies in data outsourcing. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption policy, security policy protection, privacy, data outsourcing
19Takato Hirano, Koichiro Wada, Keisuke Tanaka Public-Key Cryptosystems with Primitive Power Roots of Unity. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism
19Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i
19Florian Kerschbaum, Julien Vayssière Privacy-preserving data analytics as an outsourced service. Search on Bibsonomy SWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data analytics, remote auditing, outsourcing, searchable encryption
19Jessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen A content-driven access control system. Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, secret sharing, revocation, inference control, attribute-based encryption
19Sarah M. Diesburg, Christopher R. Meyers, David M. Lary, An-I Andy Wang When cryptography meets storage. Search on Bibsonomy StorageSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF modes of encryption, two-time pads, block ciphers, storage, bloom filters
19Manhee Lee, Eun Jung Kim 0001 A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption
19MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin Symmetric-key cryptosystem with DNA technology. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF symmetric-key encryption, DNA cryptography, DNA computing
19Ling Cheung, Calvin C. Newport Provably secure ciphertext policy ABE. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute-based encryption
19Wei Wang 0015, Dongming Peng, Honggang Wang 0001, Hamid Sharif A cross layer resource allocation scheme for secure image delivery in wireless sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wireless sensor network, cross layer optimization, selective encryption, unequal error protection
19G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha Performance Enhancement of CAST-128 Algorithm by modifying its function. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext
19Sven Laur, Helger Lipmaa A New Protocol for Conditional Disclosure of Secrets and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption
19Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy cryptosystem, certificate-based encryption (CBE), pairing
19Manuel Barbosa, Pooya Farshim Randomness Reuse: Extensions and Improvements. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Randomness Reuse, Multi-Recipient, Hybrid Encryption
19Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert Felber, Matthias Braendli Multi-gigabit GCM-AES Architecture Optimized for FPGAs. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Galois/Counter Mode (GCM), hybrid multiplier, Field Programmable Gate Array (FPGA), Very Large Scale Integration (VLSI), Advanced Encryption Standard (AES), high throughput, digit-serial multiplier, bit-parallel multiplier
19Avishay Traeger, Kumar Thangavelu, Erez Zadok Round-trip privacy with nfsv4. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF NFSv4, round-trip, encryption
19Yehuda Lindell A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Adaptive chosen-ciphertext attacks, Simulation-sound non-interactive zero-knowledge, Public-key encryption
19Brian Rogers, Milos Prvulovic, Yan Solihin Efficient data protection for distributed shared memory multiprocessors. Search on Bibsonomy PACT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DSM multiprocessor, memory encryption and authentication, data security
19Mihir Bellare, Tadayoshi Kohno, Victor Shoup Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, public-key encryption
19Daniel E. Stevenson PNG palette permuter. Search on Bibsonomy ITiCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF compression, encryption, steganography, CS2
19Tai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson DES Decoding Using FPGA and Custom Instructions. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Parallel Processing, Encryption, Encoder, Decoder, DES, Decryption
19Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. Search on Bibsonomy ECOWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Service discovery, Web Services, Service Oriented Architectures, Ubiquitous Computing, WS-Discovery, Attribute Based Encryption
19Huafei Zhu, Feng Bao 0001 Oblivious Scalar-Product Protocols. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Oblivious scalar-product protocol, homomorphic commitment scheme, homomorphic public key encryption
19Stefan Tillich, Johann Großschädl Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF embedded RISC processor, SPARC V8 architecture, Advanced Encryption Standard, instruction set extensions, efficient implementation
19Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications
19Changjie Wang, Ho-fung Leung A secure voter-resolved approval voting protocol over internet. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF approval voting, universal verification, voter-resolved, security, privacy protection, electronic voting, ElGamal encryption
19Sanjit Chatterjee, Palash Sarkar 0001 Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF parameter size, security, standard model, identity based encryption
19Hao Yin, Chuang Lin 0002, Sebastien Berton, Xiaowen Chu 0001 A novel secure wireless video surveillance system based on Intel IXP425 network processor. Search on Bibsonomy WMuNeP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF video selective encryption, wireless network, network processor, ad-hoc network security
19Raphael Chung-Wei Phan, Bok-Min Goi On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tweakable schemes, disk encryption, security bounds, Block cipher, modes of operation, distinguisher
19Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen Securing Publish/Subscribe for Multi-domain Systems. Search on Bibsonomy Middleware The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attribute encryption, message confidentiality, trust, role-based access control, publish/subscribe, content- based routing, loosely coupled applications
19Xixiang Lv, Bo Yang, Changxing Pei Efficient Traitor Tracing Scheme Based On NTRU. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Information Security, Copyright Protection, Broadcast Encryption, Traitor Tracing
19Chang N. Zhang, Honglan Zhong An Integrated Approach for Database Security and Fault Tolerance. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF database encryption, redundant residue number, fault tolerance, authentication, error detection, error correction
19Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer Strong Authentication for RFID Systems Using the AES Algorithm. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES)
19François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. Search on Bibsonomy FPGA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF AES RIJNDAEL, high encryption rates, FPGA, cryptography, reconfigurable hardware
19Marco Casassa Mont, Keith Harrison, Martin Sadler The HP time vault service: exploiting IBE for timed release of confidential information. Search on Bibsonomy WWW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF disclosure policies, identifier-based encryption, timed-release, security, web service, privacy
19Miodrag J. Mihaljevic Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stateless receivers, time varying schemes, heterogeneous structures, tree graphs, reconfigurability, key management, broadcast encryption
19Nick A. Moldovyan On Cipher Design Based on Switchable Controlled Operations. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Fast Encryption, Hardware-Oriented Ciphers, Switchable Operations, Controlled Operations, Data-Dependent Operations
19Wenjun Zeng, Jiangtao Wen, Mike Severa Format-Compliant Selective Scrambling for Multimedia Access Control. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF selective scrambling, format compliant, access control, digital rights management, shuffling, selective encryption
19Zhi Li, John Higgins, Mark J. Clement Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. Search on Bibsonomy MASCOTS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ElGamel, Encryption, Elliptic Curve, normal basis, polynomial basis
19Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Wonil Lee, Okyeon Yi Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Pseudorandom Function Family, Symmetric Encryption Schemes, Modes of Operation, Concrete Security
19Eric Filiol, Caroline Fontaine A New Ultrafast Stream Cipher Design: COS Ciphers. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register
19Moni Naor, Benny Pinkas Efficient Trace and Revoke Schemes. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation
19Olivier Baudron, David Pointcheval, Jacques Stern Extended Notions of Security for Multicast Public Key Cryptosystems. Search on Bibsonomy ICALP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Multicast encryption, semantic security, non-malleability
19John Patrick McGregor, Ruby B. Lee Performance Impact of Data Compression on Virtual Private Network Transactions. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s
19Feng Bao 0001, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. Search on Bibsonomy DEXA Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF provable security, fair exchange, multi-party protocol, verifiable encryption
19Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Encrypted Message Authentication by Firewalls. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption
19Tim Wilkinson, Dave Hearn, Simon R. Wiseman Trustworthy Access Control with Untrustworthy Web Servers. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF access control, web, encryption
19Hongxue Wang, Vijay Varadharajan, Yan Zhang 0003 A Secure Communication Scheme for Multiagent Systems. Search on Bibsonomy PRIMA The full citation details ... 1998 DBLP  DOI  BibTeX  RDF security, communication, cryptography, cooperation, encryption, Multiagent
19Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee IAuth: An authentication system for Internet applications. Search on Bibsonomy COMPSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys
19Adam L. Young, Moti Yung The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log
19Chooi-Tian Lee, Jack W. Harris Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program
19Yanjiang Yang, Youcheng Zhang A Generic Scheme for Secure Data Sharing in Cloud. Search on Bibsonomy ICPP Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF cloud computing, attribute-based encryption, proxy re-encryption, user revocation, fine grained access control
19Faisal T. Ammari, Joan Lu Advanced XML Security: Framework for Building Secure XML Management System (SXMS). Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF xml encryption, xml security, encryption standards, data cleansing
19Yossef Oren, Martin Feldhofer A low-resource public-key identification scheme for RFID tags and sensor nodes. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF rabin encryption, rfid technology, public-key encryption, hardware implementation
19Dulce B. Ponceleon, Julian A. Cerruti Multimedia content protection. Search on Bibsonomy ACM Multimedia The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy
19Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar Securely Utilizing External Computing Power. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF program encryption, circuit encryption, Boolean circuit, secure function evaluation, biometric identification
19Lein Harn, David Huang A Protocol for Establishing Secure Communication Channels in a Large Network. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange
18Noriaki Hashimoto, Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Yi Mu 0001, Willy Susilo, Yan-Xia Lin, Chun Ruan Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Carlos Cid Some Algebraic Aspects of the Advanced Encryption Standard. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Enrico Buonanno, Jonathan Katz, Moti Yung Incremental Unforgeable Encryption. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen Differential Cryptanalysis of the ICE Encryption Algorithm. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Mitsuru Matsui New Block Encryption Algorithm MISTY. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Helena Handschuh, Henri Gilbert x2 Cryptanalysis of the SEAL Encryption Algorithm. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Sanjeev Ghosh, Sangeeta Mishra, Payal Saha Chaos based encryption technique for digital images. Search on Bibsonomy ICWET The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Kenneth G. Paterson, Sriramkrishnan Srinivasan On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60
16J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten Lest we remember: cold-boot attacks on encryption keys. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jun Peng, Du Zhang, Xiaofeng Liao 0001 Design of a novel image block encryption algorithm based on chaotic systems. Search on Bibsonomy IEEE ICCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Bai Zhongying, Qin Jiancheng Webpage Encryption Based on Polymorphic Javascript Algorithm. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Tetsu Iwata, Kan Yasuda BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode
16Fangchao Wang, Sen Bai, Guibin Zhu, Zhenghui Song An Image Encryption Algorithm Based on N-Dimension Affine Transformation. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Craig Gentry, Shai Halevi Hierarchical Identity Based Encryption with Polynomially Many Levels. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Edna Milgo A secure unidirectional proxy re-encryption using identity and secret key exchange. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cipher attacks, proxy, cryptosystems, ciphertexts
16Nigel P. Smart, Bogdan Warinschi Identity Based Group Signatures from Hierarchical Identity-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Xiangyi Hu, Guifen Zhao, Guanning Xu Security Scheme for Online Banking Based on Secret Key Encryption. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa Efficient Public Key Encryption Based on Ideal Lattices. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. Search on Bibsonomy ICIC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad, Janet Jackel Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy. Search on Bibsonomy UC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 21739 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license