The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Hash with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1973 (17) 1974-1977 (20) 1978-1980 (18) 1981-1982 (16) 1983-1984 (19) 1985 (16) 1986-1987 (16) 1988-1989 (33) 1990 (33) 1991 (27) 1992 (38) 1993 (28) 1994 (44) 1995 (33) 1996 (36) 1997 (47) 1998 (42) 1999 (62) 2000 (56) 2001 (85) 2002 (139) 2003 (183) 2004 (329) 2005 (415) 2006 (468) 2007 (493) 2008 (494) 2009 (456) 2010 (240) 2011 (205) 2012 (223) 2013 (226) 2014 (182) 2015 (188) 2016 (241) 2017 (229) 2018 (227) 2019 (260) 2020 (232) 2021 (255) 2022 (304) 2023 (278) 2024 (60)
Publication types (Num. hits)
article(2517) book(3) incollection(69) inproceedings(4361) phdthesis(63)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3717 occurrences of 1502 keywords

Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle Producing Collisions for PANAMA. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Palash Sarkar 0001, Douglas R. Stinson Frameproof and IPP Codes. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Jean-Sébastien Coron, David Naccache Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang Fail-Stop Signature for Long Messages. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway UMAC: Fast and Secure Message Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Nihar R. Mahapatra, Shantanu Dutt Scalable Global and Local Hashing Strategies for Duplicate Pruning in Parallel A* Graph Search. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF duplicate pruning, isoefficiency function, parallel A*, scalability, traveling salesman problem, communication delay, k-ary n-cubes, graph search, A* algorithm, branch-and-bound search
16Bart Preneel Cryptographic Primitives for Information Authentication - State of the Art. Search on Bibsonomy State of the Art in Applied Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16René J. Glaise, J. Munier A Low Cost Searching Device for an ATM Adapter. Search on Bibsonomy ICCCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Soon Myoung Chung, Jaerheen Yang A Parallel Distributive Join Algorithm for Cube-Connected Multiprocessors. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cube-connected processors, performance analysis, parallel processing, hashing join, Distributive join
16Martin Dietzfelbinger Universal Hashing and k-Wise Independent Random Variables via Integer Arithmetic without Primes. Search on Bibsonomy STACS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Mihir Bellare, Phillip Rogaway Optimal Asymmetric Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
16Hugo Krawczyk LFSR-based Hashing and Authentication. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
16Thierry Baritaud, Henri Gilbert, Marc Girault FFT Hashing is not Collision-free. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
16Alexander Russell Necessary and Sufficient Conditions For Collision-Free Hashing. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
16Tetsuo Asano, Takeshi Tokuyama Algorithms for Projecting Points to Give the Most Uniform Distribution with Applications to Hashing. Search on Bibsonomy SIGAL International Symposium on Algorithms The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
16Karl S. Brace, Richard L. Rudell, Randal E. Bryant Efficient Implementation of a BDD Package. Search on Bibsonomy DAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
16Derek L. Beatty, Randal E. Bryant Fast Incremental Circuit Analysis Using Extracted Hierarchy. Search on Bibsonomy DAC The full citation details ... 1988 DBLP  BibTeX  RDF
16Ghassan Z. Qadah Filter-Based Join Algorithms on Uniprocessor and Distributed-Memory Multiprocessor Database Machines. Search on Bibsonomy EDBT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
16Carla Schlatter Ellis Extendible Hashing for Concurrent Operations and Distributed Data. Search on Bibsonomy PODS The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
16Jani Hautakorpi, Jouni Mäenpää Load balancing for structured P2P networks using the advanced finger selection algorithm (AFSA). Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Bamboo, simulation, peer-to-peer, load balancing, distributed hash table, Chord
16Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem
16Xianghan Zheng, Vladimir A. Oleshchuk A secure architecture for P2PSIP-based communication systems. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chord secure proxy, DHT (distributed hash table), session initiation protocol (SIP), peer-to-peer (P2P), chord, P2PSIP
16Tetsu Iwata, Kan Yasuda BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode
16Adrian Nistor, Darko Marinov, Josep Torrellas Light64: lightweight hardware support for data race detection during systematic testing of parallel programs. Search on Bibsonomy MICRO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF execution history hash, data race, systematic testing
16Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Ylianttila Feasibility evaluation of a communication-oriented P2P system in mobile environments. Search on Bibsonomy Mobility Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Kademlia, communication-oriented, distributed hash table (DHT), energy consumption, churn
16Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer Rebound Attack on the Full Lane Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3
16Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer Rebound Distinguishers: Results on the Full Whirlpool Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, distinguisher, near-collision
16Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin Linearization Framework for Collision Attacks: Application to CubeHash and MD6. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CubeHash and MD6, Hash functions, collisions, differential attack, SHA-3
16Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security
16Florian Mendel, Martin Schläffer On Free-Start Collisions and Collisions for TIB3. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-3 competition, TIB3, free-start collision, Hash function, collision attack
16Ewan Fleischmann, Michael Gorski, Stefan Lucks On the Security of Tandem-DM. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security
16Thomas Fuhr 0001, Thomas Peyrin Cryptanalysis of RadioGatún. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RadioGatún, cryptanalysis, hash functions
16Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen Cryptanalysis of MDC-2. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDC-2, hash function, collision, preimage
16Markus Rückert Verifiably Encrypted Signatures from RSA without NIZKs. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Online contract signing, RSA, Merkle hash trees
16Kota Ideguchi, Dai Watanabe Second Preimage Attack on SHAMATA-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, second preimage attack, SHA-3 candidate
16Chyouhwa Chen, Chia-Liang Tsai, Kun-Cheng Tsai Fleet: An Effective System for Publish/Subscribe Service over P2P Networks. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF peer-to-peer protocols, distributed hash table, P2P Networks, structured overlay networks
16Fuchun Guo, Yi Mu 0001, Willy Susilo How to Prove Security of a Signature with a Tighter Security Reduction. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Signature, Security Proof, Chameleon Hash
16Misagh Mohammadizadeh, Ali Movaghar 0001, Seyad Mohammad Safi SEAODV: secure efficient AODV routing protocol for MANETs networks. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AODV, HEAP, one-way hash function, secure routing protocol
16Ching-Nung Yang, Chih-Cheng Wu, Chih-Yang Chiu, Shin-Yan Chiou, Wen-Chiuan Liao Micropayment schemes with ability to return changes. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF macropayment, payword, e-commerce, hash chain, micropayment
16Yingwu Zhu, Haiying Shen An efficient and scalable framework for content-based publish/subscribe systems. Search on Bibsonomy Peer-to-Peer Netw. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Subscription management, Event matching, Event delivery, Distributed hash tables, K-D trees, Content-based publish/subscribe
16Parag Agarwal, Srinivas Rajagopalan, B. Prabhakaran 0001 Minimizing probable collision pairs searched in interactive animation authoring. Search on Bibsonomy Vis. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collision detection and prediction, Spatial hash table, Bounding volume hierarchy, Spatial partitioning
16Al-Sakib Khan Pathan, Choong Seon Hong SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF One-way hash chain, Shared secret key, Energy, Distance
16Alex Brodsky, Scott Lindenberg Our Brothers' Keepers: Secure Routing with High Performance. Search on Bibsonomy SSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF peer authentication, distributed hash tables, Secure routing
16Sarabjeet Singh Bedi, Rabia Bano, Shekhar Verma Image Index Based Digital Watermarking Techniqu for Ownership Claim and Buyer Fingerprinting. Search on Bibsonomy World Congress on Engineering (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Buyer fingerprint, Image key, Digital Watermarking, cryptographic hash function
16Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hash-chain scheme, High-speed identification, Bloom pre-computation scheme, RFID, Bloom filter
16Yi Yu 0001, J. Stephen Downie, Fabian Mörchen, Lei Chen 0002, Kazuki Joe, Vincent Oria COSIN: content-based retrieval system for cover songs. Search on Bibsonomy ACM Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cover songs, musical audio sequences summarization, content-based audio retrieval, hash-based indexing
16Hao Zhang 0006, Chuohao Yeo, Kannan Ramchandran VSYNC: a novel video file synchronization protocol. Search on Bibsonomy ACM Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF rsync, video file synchronization, video hash, vsync, zsync
16A. S. Poornima, B. B. Amberker A Secure Group Key Management Scheme for Sensor Networks. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hash Function, Secure Group Communication, Sensor node, Group Key
16Manik Lal Das, V. Lakshmi Narasimhan Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Hash function, Password, Key agreement, Non-monotonic logic
16Kei Takeshita, Masahiro Sasabe, Hirotaka Nakano Mobile P2P Networks for Highly Dynamic Environments. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF moble ad hoc network (MANET), local information sharing, clustering, distributed hash table (DHT)
16Yu Sasaki, Kazumaro Aoki Preimage Attacks on 3, 4, and 5-Pass HAVAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, preimage, one-way, meet-in-the-middle, local collision, HAVAL
16Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. Search on Bibsonomy CoNEXT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity protection, authentication, hash chains
16Adi Shamir SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SQUASH, RFID, MAC, Hash function, provable security
16Yu Sasaki, Kazumaro Aoki A Preimage Attack for 52-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HAS-160, splice-and-cut, hash function, preimage, one-way, local collision
16Jean-Philippe Aumasson Faster Multicollisions. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash function, collision
16Dmitry Khovratovich Two Attacks on RadioGatún. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sponge, cryptanalysis, hash functions
16Hyun Namgoong, Kyoung-Mo Yang, Sung-Kwon Yang, Charles Borchert, Hong-Gee Kim STAN: Social, Trusted Annotation Network. Search on Bibsonomy ASWC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trusted Annotation Network, Hash algorithm, Virtual URI, Social, Semantic Desktop, Trust Network
16Michalis Potamias, Vassilis Athitsos Nearest neighbor search methods for handshape recognition. Search on Bibsonomy PETRA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BoostMap, DBH, distance-based hashing, hand pose estimation, embeddings, gesture recognition, hash-based indexing
16André Brinkmann, Sascha Effert Data replication in p2p environments. Search on Bibsonomy SPAA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF capacity efficiency, distributed hash functions, p2p networks, data replication, heterogeneous environments
16Carlos Abalde, Víctor M. Gulías, Laura M. Castro Efficient Discovery of Widely Distributed and Non-volatile Resources on DHTs. Search on Bibsonomy ICIW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Routing Index, Peer-to-Peer, Distributed Hash Table, Spanning-Tree, Resource Discovery
16Tomoyuki Shibata, Osamu Yamaguchi Local Fisher Discriminant Component Hashing for Fast Nearest Neighbor Classification. Search on Bibsonomy SSPR/SPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF approximate nearest neighbor classification, dimensionality reduction, hash, high- dimensional space
16Lawrence Cheng, Alex Galis, Bertrand Mathieu, Kerry Jean, Roel Ocampo, Lefteris Mamatas, Javier Rubio-Loyola, Joan Serrat 0001, Andreas Berl, Hermann de Meer, Steven Davy, Zeinab Movahedi, Laurent Lefèvre Self-organising Management Overlays for Future Internet Services. Search on Bibsonomy MACE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Self-organised management, Autonomic Internet, Peer-to-Peer, Distributed hash tables
16Christos Tryfonopoulos, Christian Zimmer 0001, Gerhard Weikum, Manolis Koubarakis Architectural Alternatives for Information Filtering in Structured Overlays. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information retrieval, distributed systems, peer-to-peer, architectures, distributed hash tables, DHT, information filtering, publish-subscribe, information storage, information technology and systems
16Valerie King, Scott Lewis, Jared Saia, Maxwell Young Choosing a Random Peer in Chord. Search on Bibsonomy Algorithmica The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Attack-resistance, Peer-to-peer, Distributed algorithms, Randomized algorithms, Distributed Hash table, Data collection, Chord
16Haiying Shen, Cheng-Zhong Xu 0001 Locality-Aware and Churn-Resilient Load-Balancing Algorithms in Structured Peer-to-Peer Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cycloid, peer-to-peer, load balancing, distributed hash table, heterogeneity, proximity
16Samir Ghamri-Doudane, Nazim Agoulmine Enhanced DHT-based P2P Architecture for Effective Resource Discovery and Management. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Resource localization, Load balancing, Distributed hash tables, Service discovery, Peer-to-Peer systems, Complex queries
16Weining Qian, Linhao Xu, Aoying Zhou, Minqi Zhou SONNET: subscription using path queries over structured overlay networks. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed Hash table, overlay network, data dissemination, Publish/Subscribe system
16Ee-Chien Chang, Sujoy Roy Robust Extraction of Secret Bits from Minutiae. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Locality preserving hash, Cryptography, Fuzzy vault, Secure sketch
16Cristina Satizábal, Rafael Martínez-Peláez, Jordi Forné, Francisco Rico-Novella Reducing the Computational Cost of Certification Path Validation in Mobile Payment. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF certification path validation, hash chains, mobile payment, Public Key Infrastructure (PKI)
16Sebastiaan Indesteege, Bart Preneel Preimages for Reduced-Round Tiger. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, preimages, Tiger
16Jintai Ding, Bo-Yin Yang Multivariates Polynomials for Hashing. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, multivariate polynomials, sparse
16Jani Hautakorpi, Gonzalo Camarillo Evaluation of DHTs from the viewpoint of interpersonal communications. Search on Bibsonomy MUM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF peer-to-peer, distributed hash tables, P2PSIP
16Ravi Kumar 0001, Jasmine Novak, Bo Pang 0001, Andrew Tomkins On anonymizing query logs via token-based hashing. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash-based anonymization, privacy, query logs
16Sangyeun Cho, Joel R. Martin, Ruibin Xu, Mohammad H. Hammoud, Rami G. Melhem CA-RAM: A High-Performance Memory Substrate for Search-Intensive Applications. Search on Bibsonomy ISPASS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high-performance search accelerator, high-performance memory substrate, search-intensive application, content addressable random access memory, search operation, memory hierarchy concept, direct hardware implementation, parallel key matching operation, hash function, memory access, application-specific processor, memory structure, hashing technique
16Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF one-way hash chains, security, sensor networks, key distribution, secure group communication
16Reza Akbarinia, Esther Pacitti, Patrick Valduriez Data currency in replicated DHTs. Search on Bibsonomy SIGMOD Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data currency, data dvailability, peer-to-peer, distributed hash table (DHT), data replication
16José San Pedro, Sergio Domínguez Network-aware identification of video clip fragments. Search on Bibsonomy CIVR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF copyright management, video identification, DRM, video monitoring, robust hash
16Ondrej Chum, James Philbin, Michael Isard, Andrew Zisserman Scalable near identical image and shot detection. Search on Bibsonomy CIVR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF large image databases, min hash, LSH, near duplicate detection
16Joan Daemen, Gilles Van Assche Producing Collisions for Panama, Instantaneously. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, collision, symmetric cryptography
16Yannick Seurin, Thomas Peyrin Security Analysis of Constructions Combining FIL Random Oracles. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF block ciphers, hash functions, provable security, random oracle, compression functions
16Christophe Tartary, Huaxiong Wang Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Adversarial Network, Prediction Hashing, Erasure Codes, Hash Chains, Stream Authentication, Polynomial Reconstruction
16Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Preimage Attack on the Parallel FFT-Hashing Function. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF the Parallel FFT-Hashing function, Cryptographic Hash Function, Preimage Attack
16Jürg Wullschleger Oblivious-Transfer Amplification. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF oblivious-transfer amplification, universal oblivious transfer, weak oblivious transfer, computational weak oblivious transfer, distributed leftover hash lemma, hard-core lemma
16Byung Ryong Kim, Ki-Chang Kim Query Processing to Efficient Search in Ubiquitous Computing. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ubiquitous computing, query processing, distributed hash table
16Shuihua Han, Chao-Hsien Chu, Shuangyuan Yang Content-based Image Authentication: Current Status, Issues, and Challenges. Search on Bibsonomy ICSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF content-based authentication, security, performance trade-off, Image hash
16Carlos Abalde, Víctor M. Gulías, Laura M. Castro Towards a Decentralized and Structured Network of P2P Public Information Screens. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF P2P, Distributed Hash Table, Content Distribution Network
16Christophe Tartary, Huaxiong Wang, Josef Pieprzyk An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction
16Wenhui Ma, Wenfang Wang, Jing Liu Scalable keyword search based on semantic in DHT based peer-to-peer system. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ontology, peer-to-peer, search, distributed hash tables
16Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu 0001, Özgül Küçük, Bart Preneel MAME: A Compression Function with Reduced Hardware Requirements. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF low-resource implementation, hash functions, compression functions
16Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack A global view of kad. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF peer-to-peer, distributed hash table, lookup
16Rosario Gennaro, Yehuda Lindell A framework for password-based authenticated key exchange1. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF projective hash functions, authentication, Passwords, dictionary attack
16Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous, Nathanael Cottin Meaningful electronic signatures based on an automatic indexing method. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2006 DBLP  DOI  BibTeX  RDF legal information, security, information systems, indexing, hash function, certification, electronic signature
16Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil Addressing the shortcomings of one-way chains. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF one-way chain, secure group management for multicast, chameleon hash
16Dayin Wang, Dongdai Lin, Wenling Wu OPMAC: One-Key Poly1305 MAC. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Carter-Wegman MAC, Universal Hash Family, Block cipher, Message Authentication Code, Pseudorandom Function, Pseudorandom Permutation
16Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF exhaustive key search, cryptanalysis, hash-functions, FPGA implementation, time-memory trade-off, rainbow table
16Eun-Jun Yoon, Kee-Young Yoo Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, Network security, Hash function, Password authentication, Diffie-Hellman, Stolen-verifier attack
16Dong-Guk Han, Tsuyoshi Takagi, Howon Kim 0001, Kyoil Chung New Security Problem in RFID Systems "Tag Killing". Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, privacy, Radio frequency identification (RFID), hash chain, challenge-response
16Predrag Knezevic, Andreas Wombacher, Thomas Risse 0001 DHT-Based Self-adapting Replication Protocol for Achieving High Data Availability. Search on Bibsonomy SITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF decentralized data management, high data availability, distributed hash tables, self- adaptation
16Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang A user authentication system using back-propagation network. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Neural network, Information security, User authentication, One-way hash function, Back-propagation network
16Chun-Shien Lu, Chao-Yong Hsu Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Authentication, Searching, Robustness, Hash, Copy detection, Geometric distortion
Displaying result #901 - #1000 of 7013 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license