|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5495 occurrences of 1765 keywords
|
|
|
Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Aggelos Kiayias, Moti Yung |
Traitor Tracing with Constant Transmission Rate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 450-465, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Alexander Russell, Hong Wang 0002 |
How to Fool an Unbounded Adversary with a Short Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 133-148, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Adam J. Elbirt, W. Yip, B. Chetwynd, Christof Paar |
An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 9(4), pp. 545-557, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Yong-Cong Chen, Long-Wen Chang |
A secure and robust digital watermarking technique by the block cipher RC6 and secure hash algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (2) ![In: Proceedings of the 2001 International Conference on Image Processing, ICIP 2001, Thessaloniki, Greece, October 7-10, 2001, pp. 518-521, 2001, IEEE, 0-7803-6725-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Cheng-Ta Yang, Long-Wen Chang |
Image Authentication By Watermarking with Error Correction Based on Wavelet Packet Transform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2001 IEEE International Conference on Multimedia and Expo, ICME 2001, August 22-25, 2001, Tokyo, Japan, 2001, IEEE Computer Society, 0-7695-1198-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Jonathan Katz, Steven A. Myers, Rafail Ostrovsky |
Cryptographic Counters and Applications to Electronic Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 78-92, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Ali Saman Tosun, Wu-chi Feng |
Lightweight Security Mechanisms for Wireless Video Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2001 International Symposium on Information Technology (ITCC 2001), 2-4 April 2001, Las Vegas, NV, USA, pp. 157-161, 2001, IEEE Computer Society, 0-7695-1062-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | David A. Barr |
Copy Protection for High-Definition Baseband Video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2000 International Symposium on Information Technology (ITCC 2000), 27-29 March 2000, Las Vegas, NV, USA, pp. 174-177, 2000, IEEE Computer Society, 0-7695-0540-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Helena Handschuh, Howard M. Heys |
A Timing Attack on RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 306-318, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Timing Attacks |
19 | Mariusz H. Jakubowski, Ramarathnam Venkatesan |
The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 281-293, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Henk Meijer, Selim G. Akl |
Two New Secret Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 96-102, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
19 | Fahim K. Sufi, Ibrahim Khalil |
A New Feature Detection Mechanism and Its Application in Secured ECG Transmission with Noise Masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 33(2), pp. 121-132, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ECG obfuscation, ECG feature detection, Securing ECG data, ECG encryption, HIPAA |
19 | Meng Ao, Stan Z. Li |
Near Infrared Face Based Biometric Key Binding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, Third International Conference, ICB 2009, Alghero, Italy, June 2-5, 2009. Proceedings, pp. 376-385, 2009, Springer, 978-3-642-01792-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
BioHash, Key Binding, NIR Face, Biometric Encryption, ECC |
19 | Michael Adjedj, Julien Bringer, Hervé Chabanne, Bruno Kindarji |
Biometric Identification over Encrypted Data Made Feasible. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 86-100, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Biometrics, Identification, Searchable Encryption |
19 | Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos Mamoulis |
Secure kNN computation on encrypted databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, June 29 - July 2, 2009, pp. 139-152, 2009, ACM, 978-1-60558-551-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, encryption, knn |
19 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 235-255, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
19 | Rakeshbabu Bobba, Joe Muggli, Meenal Pant, Jim Basney, Himanshu Khurana |
Usable secure mailing lists with untrusted servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 103-116, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
e-mail list security, usability study, proxy re-encryption |
19 | Dennis Hofheinz, Eike Kiltz |
The Group of Signed Quadratic Residues and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 637-653, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hybrid ElGamal/DHIES, Public-key encryption, chosen-ciphertext security |
19 | Supachai Tangwongsan, Sathaporn Kassuvan |
A highly effective model for security protection against eavesdropping exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 891-895, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security protection, voice eavesdropping, voice encryption, security model, key exchange |
19 | Martín Abadi, Bogdan Warinschi |
Security analysis of cryptographically controlled access to XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ACM ![In: J. ACM 55(2), pp. 6:1-6:29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XML, Access control, authorization, encryption |
19 | Reihaneh Safavi-Naini, Shaoquan Jiang |
Non-interactive conference key distribution and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 271-282, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
conference key distribution, ring authentication, broadcast encryption, unconditional security |
19 | Jaeheung Lee, Junyoung Heo, Yookun Cho, Jiman Hong, Sung Y. Shin |
Secure deletion for NAND flash file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 1710-1714, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secure deletion, encryption, key management, file system, flash memory |
19 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Preserving confidentiality of security policies in data outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 75-84, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
encryption policy, security policy protection, privacy, data outsourcing |
19 | Takato Hirano, Koichiro Wada, Keisuke Tanaka |
Public-Key Cryptosystems with Primitive Power Roots of Unity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 98-112, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Paillier encryption scheme, factoring assumption, power roots of unity, homomorphism |
19 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 307-311, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
19 | Florian Kerschbaum, Julien Vayssière |
Privacy-preserving data analytics as an outsourced service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 87-96, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data analytics, remote auditing, outsourcing, searchable encryption |
19 | Jessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen |
A content-driven access control system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 26-35, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, secret sharing, revocation, inference control, attribute-based encryption |
19 | Sarah M. Diesburg, Christopher R. Meyers, David M. Lary, An-I Andy Wang |
When cryptography meets storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008, pp. 11-20, 2008, ACM, 978-1-60558-299-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
modes of encryption, two-time pads, block ciphers, storage, bloom filters |
19 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 18(10), pp. 1393-1406, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
19 | MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin |
Symmetric-key cryptosystem with DNA technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 324-333, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
symmetric-key encryption, DNA cryptography, DNA computing |
19 | Ling Cheung, Calvin C. Newport |
Provably secure ciphertext policy ABE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 456-465, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, public key cryptography, attribute-based encryption |
19 | Wei Wang 0015, Dongming Peng, Honggang Wang 0001, Hamid Sharif |
A cross layer resource allocation scheme for secure image delivery in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007, pp. 152-157, 2007, ACM, 978-1-59593-695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor network, cross layer optimization, selective encryption, unequal error protection |
19 | G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha |
Performance Enhancement of CAST-128 Algorithm by modifying its function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSS (1) ![In: Advances in Computer and Information Sciences and Engineering, Proceedings of the 2007 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007, pp. 256-260, 2007, Springer, 978-1-4020-8740-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext |
19 | Sven Laur, Helger Lipmaa |
A New Protocol for Conditional Disclosure of Secrets and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 207-225, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption |
19 | Lihua Wang 0001, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura |
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 297-311, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
proxy cryptosystem, certificate-based encryption (CBE), pairing |
19 | Manuel Barbosa, Pooya Farshim |
Randomness Reuse: Extensions and Improvements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 257-276, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Randomness Reuse, Multi-Recipient, Hybrid Encryption |
19 | Stefan Lemsitzer, Johannes Wolkerstorfer, Norbert Felber, Matthias Braendli |
Multi-gigabit GCM-AES Architecture Optimized for FPGAs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 227-238, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Galois/Counter Mode (GCM), hybrid multiplier, Field Programmable Gate Array (FPGA), Very Large Scale Integration (VLSI), Advanced Encryption Standard (AES), high throughput, digit-serial multiplier, bit-parallel multiplier |
19 | Avishay Traeger, Kumar Thangavelu, Erez Zadok |
Round-trip privacy with nfsv4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, StorageSS 2007, Alexandria, VA, USA, October 29, 2007, pp. 1-6, 2007, ACM, 978-1-59593-891-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
NFSv4, round-trip, encryption |
19 | Yehuda Lindell |
A Simpler Construction of CCA2-Secure Public-KeyEncryption under General Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 19(3), pp. 359-377, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Adaptive chosen-ciphertext attacks, Simulation-sound non-interactive zero-knowledge, Public-key encryption |
19 | Brian Rogers, Milos Prvulovic, Yan Solihin |
Efficient data protection for distributed shared memory multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACT ![In: 15th International Conference on Parallel Architectures and Compilation Techniques (PACT 2006), Seattle, Washington, USA, September 16-20, 2006, pp. 84-94, 2006, ACM, 1-59593-264-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
DSM multiprocessor, memory encryption and authentication, data security |
19 | Mihir Bellare, Tadayoshi Kohno, Victor Shoup |
Stateful public-key cryptosystems: how to encrypt with one 160-bit exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 380-389, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptography, public-key encryption |
19 | Daniel E. Stevenson |
PNG palette permuter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 11th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2006, Bologna, Italy, June 26-28, 2006, pp. 143-147, 2006, ACM, 1-59593-055-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
compression, encryption, steganography, CS2 |
19 | Tai-Chi Lee, Richard Zeien, Adam Roach, Patrick Robinson |
DES Decoding Using FPGA and Custom Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 575-577, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Parallel Processing, Encryption, Encoder, Decoder, DES, Decryption |
19 | Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier |
Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOWS ![In: Fourth IEEE European Conference on Web Services (ECOWS 2006), 4-6 December 2006, Zürich, Switzerland, pp. 35-43, 2006, IEEE Computer Society, 0-7695-2737-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Secure Service discovery, Web Services, Service Oriented Architectures, Ubiquitous Computing, WS-Discovery, Attribute Based Encryption |
19 | Huafei Zhu, Feng Bao 0001 |
Oblivious Scalar-Product Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 313-323, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Oblivious scalar-product protocol, homomorphic commitment scheme, homomorphic public key encryption |
19 | Stefan Tillich, Johann Großschädl |
Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 270-284, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
embedded RISC processor, SPARC V8 architecture, Advanced Encryption Standard, instruction set extensions, efficient implementation |
19 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(10), pp. 22-24, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications |
19 | Changjie Wang, Ho-fung Leung |
A secure voter-resolved approval voting protocol over internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 646-652, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
approval voting, universal verification, voter-resolved, security, privacy protection, electronic voting, ElGamal encryption |
19 | Sanjit Chatterjee, Palash Sarkar 0001 |
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 424-440, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
parameter size, security, standard model, identity based encryption |
19 | Hao Yin, Chuang Lin 0002, Sebastien Berton, Xiaowen Chu 0001 |
A novel secure wireless video surveillance system based on Intel IXP425 network processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMuNeP ![In: WMuNeP'05 - Proceedings of the First ACM Workshop on Wireless Multimedia Networking and Performance Modeling, Montreal, Quebec, Canada, October 13, 2005, pp. 62-69, 2005, ACM, 1-59593-183-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
video selective encryption, wireless network, network processor, ad-hoc network security |
19 | Raphael Chung-Wei Phan, Bok-Min Goi |
On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 136-146, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
tweakable schemes, disk encryption, security bounds, Block cipher, modes of operation, distinguisher |
19 | Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen |
Securing Publish/Subscribe for Multi-domain Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28 - December 2, 2005, Proceedings, pp. 1-20, 2005, Springer, 3-540-30323-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
attribute encryption, message confidentiality, trust, role-based access control, publish/subscribe, content- based routing, loosely coupled applications |
19 | Xixiang Lv, Bo Yang, Changxing Pei |
Efficient Traitor Tracing Scheme Based On NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2005), 5-8 December 2005, Dalian, China, pp. 120-124, 2005, IEEE Computer Society, 0-7695-2405-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Information Security, Copyright Protection, Broadcast Encryption, Traitor Tracing |
19 | Chang N. Zhang, Honglan Zhong |
An Integrated Approach for Database Security and Fault Tolerance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA, pp. 762-766, 2004, IEEE Computer Society, 0-7695-2108-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
database encryption, redundant residue number, fault tolerance, authentication, error detection, error correction |
19 | Martin Feldhofer, Sandra Dominikus, Johannes Wolkerstorfer |
Strong Authentication for RFID Systems Using the AES Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 357-370, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
symmetric challenge-response, Radio frequency identification (RFID), low-power design, Advanced Encryption Standard (AES) |
19 | François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat |
A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2003, Monterey, CA, USA, February 23-25, 2003, pp. 216-224, 2003, ACM, 1-58113-651-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
AES RIJNDAEL, high encryption rates, FPGA, cryptography, reconfigurable hardware |
19 | Marco Casassa Mont, Keith Harrison, Martin Sadler |
The HP time vault service: exploiting IBE for timed release of confidential information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Twelfth International World Wide Web Conference, WWW 2003, Budapest, Hungary, May 20-24, 2003, pp. 160-169, 2003, ACM, 1-58113-680-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
disclosure policies, identifier-based encryption, timed-release, security, web service, privacy |
19 | Miodrag J. Mihaljevic |
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 137-154, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
stateless receivers, time varying schemes, heterogeneous structures, tree graphs, reconfigurability, key management, broadcast encryption |
19 | Nick A. Moldovyan |
On Cipher Design Based on Switchable Controlled Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 316-327, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Fast Encryption, Hardware-Oriented Ciphers, Switchable Operations, Controlled Operations, Data-Dependent Operations |
19 | Wenjun Zeng, Jiangtao Wen, Mike Severa |
Format-Compliant Selective Scrambling for Multimedia Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2002 International Symposium on Information Technology (ITCC 2002), 8-10 April 2002, Las Vegas, NV, USA, pp. 77, 2002, IEEE Computer Society, 0-7695-1506-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
selective scrambling, format compliant, access control, digital rights management, shuffling, selective encryption |
19 | Zhi Li, John Higgins, Mark J. Clement |
Performance of Finite Field Arithmetic in an Elliptic Curve Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 9th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2001), 15-18 August 2001, Cincinnati, OH, USA, pp. 249-, 2001, IEEE Computer Society, 0-7695-1315-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
ElGamel, Encryption, Elliptic Curve, normal basis, polynomial basis |
19 | Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Wonil Lee, Okyeon Yi |
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 103-113, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Pseudorandom Function Family, Symmetric Encryption Schemes, Modes of Operation, Concrete Security |
19 | Eric Filiol, Caroline Fontaine |
A New Ultrafast Stream Cipher Design: COS Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, pp. 85-98, 2001, Springer, 3-540-43026-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register |
19 | Moni Naor, Benny Pinkas |
Efficient Trace and Revoke Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 1-20, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
tracing traitors, self enforcement, copyright protection, broadcast encryption, blacklisting, User revocation |
19 | Olivier Baudron, David Pointcheval, Jacques Stern |
Extended Notions of Security for Multicast Public Key Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 27th International Colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings, pp. 499-511, 2000, Springer, 3-540-67715-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Multicast encryption, semantic security, non-malleability |
19 | John Patrick McGregor, Ruby B. Lee |
Performance Impact of Data Compression on Virtual Private Network Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 500-510, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s |
19 | Feng Bao 0001, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan |
Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 10th International Workshop on Database & Expert Systems Applications, Florence, Italy, September 1-3, 1999, Proceedings., pp. 858-863, 1999, IEEE Computer Society, 0-7695-0281-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
provable security, fair exchange, multi-party protocol, verifiable encryption |
19 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Encrypted Message Authentication by Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings, pp. 69-81, 1999, Springer, 3-540-65644-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Authenticity, Network Security, Digital Signatures, Encryption, Public Key Cryptography, Confidentiality, Firewalls, Signcryption |
19 | Tim Wilkinson, Dave Hearn, Simon R. Wiseman |
Trustworthy Access Control with Untrustworthy Web Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 12-21, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
access control, web, encryption |
19 | Hongxue Wang, Vijay Varadharajan, Yan Zhang 0003 |
A Secure Communication Scheme for Multiagent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Multiagent Platforms, First Pacific Rim International Workshop on Multi-Agents, PRIMA '98, Singapore, November 23, 1998, Selected Papers, pp. 174-185, 1998, Springer, 3-540-65967-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
security, communication, cryptography, cooperation, encryption, Multiagent |
19 | Suan-Suan Chew, Kok-Leong Ng, Chye-Lin Chee |
IAuth: An authentication system for Internet applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 21st International Computer Software and Applications Conference (COMPSAC '97), 11-15 August 1997, Washington, DC, USA, pp. 654-659, 1997, IEEE Computer Society, 0-8186-8105-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
IAuth, authentication system, digital signing, Web application server, distributed computing, Internet applications, message authentication, client server, Web-based application, data encryption, security breach, cryptographic keys |
19 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 264-276, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
19 | Chooi-Tian Lee, Jack W. Harris |
Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 21st Conference on Local Computer Networks, Minneapolis, Minnesota, USA, October 13-16, 1996, pp. 116-125, 1996, IEEE Computer Society, 0-8186-7617-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program |
19 | Yanjiang Yang, Youcheng Zhang |
A Generic Scheme for Secure Data Sharing in Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 2011 International Conference on Parallel Processing Workshops, ICPPW 2011, Taipei, Taiwan, Sept. 13-16, 2011, pp. 145-153, 2011, IEEE Computer Society, 978-1-4577-1337-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
cloud computing, attribute-based encryption, proxy re-encryption, user revocation, fine grained access control |
19 | Faisal T. Ammari, Joan Lu |
Advanced XML Security: Framework for Building Secure XML Management System (SXMS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 120-125, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
xml encryption, xml security, encryption standards, data cleansing |
19 | Yossef Oren, Martin Feldhofer |
A low-resource public-key identification scheme for RFID tags and sensor nodes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 59-68, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
rabin encryption, rfid technology, public-key encryption, hardware implementation |
19 | Dulce B. Ponceleon, Julian A. Cerruti |
Multimedia content protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 14th ACM International Conference on Multimedia, Santa Barbara, CA, USA, October 23-27, 2006, pp. 12, 2006, ACM, 1-59593-447-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AACS, CPRM, watermarking, encryption, tracing, revocation, broadcast encryption, content protection, piracy |
19 | Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
Securely Utilizing External Computing Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 762-767, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
program encryption, circuit encryption, Boolean circuit, secure function evaluation, biometric identification |
19 | Lein Harn, David Huang |
A Protocol for Establishing Secure Communication Channels in a Large Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 6(1), pp. 188-191, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
secure communication channels, open media, large distributed network, data attack vulnerability, data encryption/decryption techniques, secret session key, locally trusted centers, public-key distribution, RSA encryption scheme, authentication, protocols, protocol, computer networks, public key cryptography, security of data, key distribution, information access, data storage, data transformation, telecommunication channels, multi-user system, knowledge exchange |
18 | Noriaki Hashimoto, Shoko Imaizumi, Masaaki Fujiyoshi, Hitoshi Kiya |
Hierarchical encryption using short encryption keys for scalable access control of JPEG 2000 coded images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2008, October 12-15, 2008, San Diego, California, USA, pp. 3116-3119, 2008, IEEE, 978-1-4244-1765-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Yi Mu 0001, Willy Susilo, Yan-Xia Lin, Chun Ruan |
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2004, Higher-Level Decision Making, 9th Asian Computing Science Conference, Dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday, Chiang Mai, Thailand, December 8-10, 2004, Proceedings, pp. 169-181, 2004, Springer, 3-540-24087-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Carlos Cid |
Some Algebraic Aspects of the Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Conference ![In: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, pp. 58-66, 2004, Springer, 3-540-26557-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Enrico Buonanno, Jonathan Katz, Moti Yung |
Incremental Unforgeable Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 109-124, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen |
Differential Cryptanalysis of the ICE Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 5th International Workshop, FSE '98, Paris, France, March 23-25, 1998, Proceedings, pp. 270-283, 1998, Springer, 3-540-64265-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Mitsuru Matsui |
New Block Encryption Algorithm MISTY. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 54-68, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
18 | Helena Handschuh, Henri Gilbert |
x2 Cryptanalysis of the SEAL Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 1-12, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Sanjeev Ghosh, Sangeeta Mishra, Payal Saha |
Chaos based encryption technique for digital images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWET ![In: Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25 - 26, 2011, pp. 300-303, 2011, ACM, 978-1-4503-0449-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
16 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(2), pp. 219-241, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
16 | J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten |
Lest we remember: cold-boot attacks on encryption keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(5), pp. 91-98, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Jun Peng, Du Zhang, Xiaofeng Liao 0001 |
Design of a novel image block encryption algorithm based on chaotic systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the 8th IEEE International Conference on Cognitive Informatics, ICCI 2009, June 15-17, 2009, Hong Kong, China, pp. 215-221, 2009, IEEE Computer Society, 978-1-4244-4642-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Bai Zhongying, Qin Jiancheng |
Webpage Encryption Based on Polymorphic Javascript Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 327-330, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Tetsu Iwata, Kan Yasuda |
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 313-330, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode |
16 | Fangchao Wang, Sen Bai, Guibin Zhu, Zhenghui Song |
An Image Encryption Algorithm Based on N-Dimension Affine Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 8th IEEE/ACIS International Conference on Computer and Information Science, IEEE/ACIS ICIS 2009, June 1-3, 2009, Shanghai, China, pp. 579-585, 2009, IEEE Computer Society, 978-0-7695-3641-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Craig Gentry, Shai Halevi |
Hierarchical Identity Based Encryption with Polynomially Many Levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 6th Theory of Cryptography Conference, TCC 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings, pp. 437-456, 2009, Springer, 978-3-642-00456-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Edna Milgo |
A secure unidirectional proxy re-encryption using identity and secret key exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 47th Annual Southeast Regional Conference, 2009, Clemson, South Carolina, USA, March 19-21, 2009, 2009, ACM, 978-1-60558-421-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cipher attacks, proxy, cryptosystems, ciphertexts |
16 | Nigel P. Smart, Bogdan Warinschi |
Identity Based Group Signatures from Hierarchical Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings, pp. 150-170, 2009, Springer, 978-3-642-03297-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Xiangyi Hu, Guifen Zhao, Guanning Xu |
Security Scheme for Online Banking Based on Secret Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 636-639, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa |
Efficient Public Key Encryption Based on Ideal Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 617-635, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Fahad Bin Muhaya, Muhammad Usama, Muhammad Khurram Khan |
Modified AES Using Chaotic Key Generator for Satellite Imagery Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Emerging Intelligent Computing Technology and Applications, 5th International Conference on Intelligent Computing, ICIC 2009, Ulsan, South Korea, September 16-19, 2009. Proceedings, pp. 1014-1024, 2009, Springer, 978-3-642-04069-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad, Janet Jackel |
Foundations of Optical Encryption: Formal Modeling and Achieving Shannon Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UC ![In: Unconventional Computation, 8th International Conference, UC 2009, Ponta Delgada, Azores, Portugal, September 7-11, 2009. Proceedings, pp. 125-142, 2009, Springer, 978-3-642-03744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
|
|