|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3717 occurrences of 1502 keywords
|
|
|
Results
Found 7025 publication records. Showing 7013 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle |
Producing Collisions for PANAMA. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Palash Sarkar 0001, Douglas R. Stinson |
Frameproof and IPP Codes. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Jean-Sébastien Coron, David Naccache |
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang |
Fail-Stop Signature for Long Messages. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
16 | John Black, Shai Halevi, Hugo Krawczyk, Ted Krovetz, Phillip Rogaway |
UMAC: Fast and Secure Message Authentication. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Nihar R. Mahapatra, Shantanu Dutt |
Scalable Global and Local Hashing Strategies for Duplicate Pruning in Parallel A* Graph Search. |
IEEE Trans. Parallel Distributed Syst. |
1997 |
DBLP DOI BibTeX RDF |
duplicate pruning, isoefficiency function, parallel A*, scalability, traveling salesman problem, communication delay, k-ary n-cubes, graph search, A* algorithm, branch-and-bound search |
16 | Bart Preneel |
Cryptographic Primitives for Information Authentication - State of the Art. |
State of the Art in Applied Cryptography |
1997 |
DBLP DOI BibTeX RDF |
|
16 | René J. Glaise, J. Munier |
A Low Cost Searching Device for an ATM Adapter. |
ICCCN |
1997 |
DBLP DOI BibTeX RDF |
|
16 | Soon Myoung Chung, Jaerheen Yang |
A Parallel Distributive Join Algorithm for Cube-Connected Multiprocessors. |
IEEE Trans. Parallel Distributed Syst. |
1996 |
DBLP DOI BibTeX RDF |
cube-connected processors, performance analysis, parallel processing, hashing join, Distributive join |
16 | Martin Dietzfelbinger |
Universal Hashing and k-Wise Independent Random Variables via Integer Arithmetic without Primes. |
STACS |
1996 |
DBLP DOI BibTeX RDF |
|
16 | Mihir Bellare, Phillip Rogaway |
Optimal Asymmetric Encryption. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
16 | Hugo Krawczyk |
LFSR-based Hashing and Authentication. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
16 | Thierry Baritaud, Henri Gilbert, Marc Girault |
FFT Hashing is not Collision-free. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
16 | Alexander Russell |
Necessary and Sufficient Conditions For Collision-Free Hashing. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
16 | Tetsuo Asano, Takeshi Tokuyama |
Algorithms for Projecting Points to Give the Most Uniform Distribution with Applications to Hashing. |
SIGAL International Symposium on Algorithms |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Karl S. Brace, Richard L. Rudell, Randal E. Bryant |
Efficient Implementation of a BDD Package. |
DAC |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Derek L. Beatty, Randal E. Bryant |
Fast Incremental Circuit Analysis Using Extracted Hierarchy. |
DAC |
1988 |
DBLP BibTeX RDF |
|
16 | Ghassan Z. Qadah |
Filter-Based Join Algorithms on Uniprocessor and Distributed-Memory Multiprocessor Database Machines. |
EDBT |
1988 |
DBLP DOI BibTeX RDF |
|
16 | Carla Schlatter Ellis |
Extendible Hashing for Concurrent Operations and Distributed Data. |
PODS |
1983 |
DBLP DOI BibTeX RDF |
|
16 | Jani Hautakorpi, Jouni Mäenpää |
Load balancing for structured P2P networks using the advanced finger selection algorithm (AFSA). |
SAC |
2010 |
DBLP DOI BibTeX RDF |
Bamboo, simulation, peer-to-peer, load balancing, distributed hash table, Chord |
16 | Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang |
A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem |
16 | Xianghan Zheng, Vladimir A. Oleshchuk |
A secure architecture for P2PSIP-based communication systems. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
chord secure proxy, DHT (distributed hash table), session initiation protocol (SIP), peer-to-peer (P2P), chord, P2PSIP |
16 | Tetsu Iwata, Kan Yasuda |
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode |
16 | Adrian Nistor, Darko Marinov, Josep Torrellas |
Light64: lightweight hardware support for data race detection during systematic testing of parallel programs. |
MICRO |
2009 |
DBLP DOI BibTeX RDF |
execution history hash, data race, systematic testing |
16 | Zhonghong Ou, Erkki Harjula, Otso Kassinen, Mika Ylianttila |
Feasibility evaluation of a communication-oriented P2P system in mobile environments. |
Mobility Conference |
2009 |
DBLP DOI BibTeX RDF |
Kademlia, communication-oriented, distributed hash table (DHT), energy consumption, churn |
16 | Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer |
Rebound Attack on the Full Lane Compression Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3 |
16 | Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer |
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, distinguisher, near-collision |
16 | Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin |
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
CubeHash and MD6, Hash functions, collisions, differential attack, SHA-3 |
16 | Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang 0031, Kazuo Ohta |
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Indifferentiability, Merkle-Damgård hash function, Variants of Random Oracle, Cryptosystems Security |
16 | Florian Mendel, Martin Schläffer |
On Free-Start Collisions and Collisions for TIB3. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
SHA-3 competition, TIB3, free-start collision, Hash function, collision attack |
16 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
On the Security of Tandem-DM. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security |
16 | Thomas Fuhr 0001, Thomas Peyrin |
Cryptanalysis of RadioGatún. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
RadioGatún, cryptanalysis, hash functions |
16 | Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen |
Cryptanalysis of MDC-2. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
MDC-2, hash function, collision, preimage |
16 | Markus Rückert |
Verifiably Encrypted Signatures from RSA without NIZKs. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Online contract signing, RSA, Merkle hash trees |
16 | Kota Ideguchi, Dai Watanabe |
Second Preimage Attack on SHAMATA-512. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHAMATA, hash function, second preimage attack, SHA-3 candidate |
16 | Chyouhwa Chen, Chia-Liang Tsai, Kun-Cheng Tsai |
Fleet: An Effective System for Publish/Subscribe Service over P2P Networks. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
peer-to-peer protocols, distributed hash table, P2P Networks, structured overlay networks |
16 | Fuchun Guo, Yi Mu 0001, Willy Susilo |
How to Prove Security of a Signature with a Tighter Security Reduction. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Signature, Security Proof, Chameleon Hash |
16 | Misagh Mohammadizadeh, Ali Movaghar 0001, Seyad Mohammad Safi |
SEAODV: secure efficient AODV routing protocol for MANETs networks. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
AODV, HEAP, one-way hash function, secure routing protocol |
16 | Ching-Nung Yang, Chih-Cheng Wu, Chih-Yang Chiu, Shin-Yan Chiou, Wen-Chiuan Liao |
Micropayment schemes with ability to return changes. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
macropayment, payword, e-commerce, hash chain, micropayment |
16 | Yingwu Zhu, Haiying Shen |
An efficient and scalable framework for content-based publish/subscribe systems. |
Peer-to-Peer Netw. Appl. |
2008 |
DBLP DOI BibTeX RDF |
Subscription management, Event matching, Event delivery, Distributed hash tables, K-D trees, Content-based publish/subscribe |
16 | Parag Agarwal, Srinivas Rajagopalan, B. Prabhakaran 0001 |
Minimizing probable collision pairs searched in interactive animation authoring. |
Vis. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Collision detection and prediction, Spatial hash table, Bounding volume hierarchy, Spatial partitioning |
16 | Al-Sakib Khan Pathan, Choong Seon Hong |
SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. |
Ann. des Télécommunications |
2008 |
DBLP DOI BibTeX RDF |
One-way hash chain, Shared secret key, Energy, Distance |
16 | Alex Brodsky, Scott Lindenberg |
Our Brothers' Keepers: Secure Routing with High Performance. |
SSS |
2008 |
DBLP DOI BibTeX RDF |
peer authentication, distributed hash tables, Secure routing |
16 | Sarabjeet Singh Bedi, Rabia Bano, Shekhar Verma |
Image Index Based Digital Watermarking Techniqu for Ownership Claim and Buyer Fingerprinting. |
World Congress on Engineering (Selected Papers) |
2008 |
DBLP DOI BibTeX RDF |
Buyer fingerprint, Image key, Digital Watermarking, cryptographic hash function |
16 | Yasunobu Nohara, Sozo Inoue, Hiroto Yasuura |
A Secure High-Speed Identification Scheme for RFID Using Bloom Filters. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Hash-chain scheme, High-speed identification, Bloom pre-computation scheme, RFID, Bloom filter |
16 | Yi Yu 0001, J. Stephen Downie, Fabian Mörchen, Lei Chen 0002, Kazuki Joe, Vincent Oria |
COSIN: content-based retrieval system for cover songs. |
ACM Multimedia |
2008 |
DBLP DOI BibTeX RDF |
cover songs, musical audio sequences summarization, content-based audio retrieval, hash-based indexing |
16 | Hao Zhang 0006, Chuohao Yeo, Kannan Ramchandran |
VSYNC: a novel video file synchronization protocol. |
ACM Multimedia |
2008 |
DBLP DOI BibTeX RDF |
rsync, video file synchronization, video hash, vsync, zsync |
16 | A. S. Poornima, B. B. Amberker |
A Secure Group Key Management Scheme for Sensor Networks. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Hash Function, Secure Group Communication, Sensor node, Group Key |
16 | Manik Lal Das, V. Lakshmi Narasimhan |
Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic Logic. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Hash function, Password, Key agreement, Non-monotonic logic |
16 | Kei Takeshita, Masahiro Sasabe, Hirotaka Nakano |
Mobile P2P Networks for Highly Dynamic Environments. |
PerCom |
2008 |
DBLP DOI BibTeX RDF |
moble ad hoc network (MANET), local information sharing, clustering, distributed hash table (DHT) |
16 | Yu Sasaki, Kazumaro Aoki |
Preimage Attacks on 3, 4, and 5-Pass HAVAL. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
splice-and-cut, hash function, preimage, one-way, meet-in-the-middle, local collision, HAVAL |
16 | Tobias Heer, Stefan Götz 0001, Oscar García Morchon, Klaus Wehrle |
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication. |
CoNEXT |
2008 |
DBLP DOI BibTeX RDF |
integrity protection, authentication, hash chains |
16 | Adi Shamir |
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
SQUASH, RFID, MAC, Hash function, provable security |
16 | Yu Sasaki, Kazumaro Aoki |
A Preimage Attack for 52-Step HAS-160. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
HAS-160, splice-and-cut, hash function, preimage, one-way, local collision |
16 | Jean-Philippe Aumasson |
Faster Multicollisions. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
hash function, collision |
16 | Dmitry Khovratovich |
Two Attacks on RadioGatún. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
sponge, cryptanalysis, hash functions |
16 | Hyun Namgoong, Kyoung-Mo Yang, Sung-Kwon Yang, Charles Borchert, Hong-Gee Kim |
STAN: Social, Trusted Annotation Network. |
ASWC |
2008 |
DBLP DOI BibTeX RDF |
Trusted Annotation Network, Hash algorithm, Virtual URI, Social, Semantic Desktop, Trust Network |
16 | Michalis Potamias, Vassilis Athitsos |
Nearest neighbor search methods for handshape recognition. |
PETRA |
2008 |
DBLP DOI BibTeX RDF |
BoostMap, DBH, distance-based hashing, hand pose estimation, embeddings, gesture recognition, hash-based indexing |
16 | André Brinkmann, Sascha Effert |
Data replication in p2p environments. |
SPAA |
2008 |
DBLP DOI BibTeX RDF |
capacity efficiency, distributed hash functions, p2p networks, data replication, heterogeneous environments |
16 | Carlos Abalde, Víctor M. Gulías, Laura M. Castro |
Efficient Discovery of Widely Distributed and Non-volatile Resources on DHTs. |
ICIW |
2008 |
DBLP DOI BibTeX RDF |
Routing Index, Peer-to-Peer, Distributed Hash Table, Spanning-Tree, Resource Discovery |
16 | Tomoyuki Shibata, Osamu Yamaguchi |
Local Fisher Discriminant Component Hashing for Fast Nearest Neighbor Classification. |
SSPR/SPR |
2008 |
DBLP DOI BibTeX RDF |
approximate nearest neighbor classification, dimensionality reduction, hash, high- dimensional space |
16 | Lawrence Cheng, Alex Galis, Bertrand Mathieu, Kerry Jean, Roel Ocampo, Lefteris Mamatas, Javier Rubio-Loyola, Joan Serrat 0001, Andreas Berl, Hermann de Meer, Steven Davy, Zeinab Movahedi, Laurent Lefèvre |
Self-organising Management Overlays for Future Internet Services. |
MACE |
2008 |
DBLP DOI BibTeX RDF |
Self-organised management, Autonomic Internet, Peer-to-Peer, Distributed hash tables |
16 | Christos Tryfonopoulos, Christian Zimmer 0001, Gerhard Weikum, Manolis Koubarakis |
Architectural Alternatives for Information Filtering in Structured Overlays. |
IEEE Internet Comput. |
2007 |
DBLP DOI BibTeX RDF |
information retrieval, distributed systems, peer-to-peer, architectures, distributed hash tables, DHT, information filtering, publish-subscribe, information storage, information technology and systems |
16 | Valerie King, Scott Lewis, Jared Saia, Maxwell Young |
Choosing a Random Peer in Chord. |
Algorithmica |
2007 |
DBLP DOI BibTeX RDF |
Attack-resistance, Peer-to-peer, Distributed algorithms, Randomized algorithms, Distributed Hash table, Data collection, Chord |
16 | Haiying Shen, Cheng-Zhong Xu 0001 |
Locality-Aware and Churn-Resilient Load-Balancing Algorithms in Structured Peer-to-Peer Networks. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Cycloid, peer-to-peer, load balancing, distributed hash table, heterogeneity, proximity |
16 | Samir Ghamri-Doudane, Nazim Agoulmine |
Enhanced DHT-based P2P Architecture for Effective Resource Discovery and Management. |
J. Netw. Syst. Manag. |
2007 |
DBLP DOI BibTeX RDF |
Resource localization, Load balancing, Distributed hash tables, Service discovery, Peer-to-Peer systems, Complex queries |
16 | Weining Qian, Linhao Xu, Aoying Zhou, Minqi Zhou |
SONNET: subscription using path queries over structured overlay networks. |
Frontiers Comput. Sci. China |
2007 |
DBLP DOI BibTeX RDF |
distributed Hash table, overlay network, data dissemination, Publish/Subscribe system |
16 | Ee-Chien Chang, Sujoy Roy |
Robust Extraction of Secret Bits from Minutiae. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
Locality preserving hash, Cryptography, Fuzzy vault, Secure sketch |
16 | Cristina Satizábal, Rafael Martínez-Peláez, Jordi Forné, Francisco Rico-Novella |
Reducing the Computational Cost of Certification Path Validation in Mobile Payment. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
certification path validation, hash chains, mobile payment, Public Key Infrastructure (PKI) |
16 | Sebastiaan Indesteege, Bart Preneel |
Preimages for Reduced-Round Tiger. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
hash functions, preimages, Tiger |
16 | Jintai Ding, Bo-Yin Yang |
Multivariates Polynomials for Hashing. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
hash function, multivariate polynomials, sparse |
16 | Jani Hautakorpi, Gonzalo Camarillo |
Evaluation of DHTs from the viewpoint of interpersonal communications. |
MUM |
2007 |
DBLP DOI BibTeX RDF |
peer-to-peer, distributed hash tables, P2PSIP |
16 | Ravi Kumar 0001, Jasmine Novak, Bo Pang 0001, Andrew Tomkins |
On anonymizing query logs via token-based hashing. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
hash-based anonymization, privacy, query logs |
16 | Sangyeun Cho, Joel R. Martin, Ruibin Xu, Mohammad H. Hammoud, Rami G. Melhem |
CA-RAM: A High-Performance Memory Substrate for Search-Intensive Applications. |
ISPASS |
2007 |
DBLP DOI BibTeX RDF |
high-performance search accelerator, high-performance memory substrate, search-intensive application, content addressable random access memory, search operation, memory hierarchy concept, direct hardware implementation, parallel key matching operation, hash function, memory access, application-specific processor, memory structure, hashing technique |
16 | Firdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood |
Secure Group Communication with Self-healing and Rekeying in Wireless Sensor Networks. |
MSN |
2007 |
DBLP DOI BibTeX RDF |
one-way hash chains, security, sensor networks, key distribution, secure group communication |
16 | Reza Akbarinia, Esther Pacitti, Patrick Valduriez |
Data currency in replicated DHTs. |
SIGMOD Conference |
2007 |
DBLP DOI BibTeX RDF |
data currency, data dvailability, peer-to-peer, distributed hash table (DHT), data replication |
16 | José San Pedro, Sergio Domínguez |
Network-aware identification of video clip fragments. |
CIVR |
2007 |
DBLP DOI BibTeX RDF |
copyright management, video identification, DRM, video monitoring, robust hash |
16 | Ondrej Chum, James Philbin, Michael Isard, Andrew Zisserman |
Scalable near identical image and shot detection. |
CIVR |
2007 |
DBLP DOI BibTeX RDF |
large image databases, min hash, LSH, near duplicate detection |
16 | Joan Daemen, Gilles Van Assche |
Producing Collisions for Panama, Instantaneously. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
hash function, collision, symmetric cryptography |
16 | Yannick Seurin, Thomas Peyrin |
Security Analysis of Constructions Combining FIL Random Oracles. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
block ciphers, hash functions, provable security, random oracle, compression functions |
16 | Christophe Tartary, Huaxiong Wang |
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Adversarial Network, Prediction Hashing, Erasure Codes, Hash Chains, Stream Authentication, Polynomial Reconstruction |
16 | Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Preimage Attack on the Parallel FFT-Hashing Function. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
the Parallel FFT-Hashing function, Cryptographic Hash Function, Preimage Attack |
16 | Jürg Wullschleger |
Oblivious-Transfer Amplification. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
oblivious-transfer amplification, universal oblivious transfer, weak oblivious transfer, computational weak oblivious transfer, distributed leftover hash lemma, hard-core lemma |
16 | Byung Ryong Kim, Ki-Chang Kim |
Query Processing to Efficient Search in Ubiquitous Computing. |
International Conference on Computational Science (4) |
2007 |
DBLP DOI BibTeX RDF |
ubiquitous computing, query processing, distributed hash table |
16 | Shuihua Han, Chao-Hsien Chu, Shuangyuan Yang |
Content-based Image Authentication: Current Status, Issues, and Challenges. |
ICSC |
2007 |
DBLP DOI BibTeX RDF |
content-based authentication, security, performance trade-off, Image hash |
16 | Carlos Abalde, Víctor M. Gulías, Laura M. Castro |
Towards a Decentralized and Structured Network of P2P Public Information Screens. |
EUROCAST |
2007 |
DBLP DOI BibTeX RDF |
P2P, Distributed Hash Table, Content Distribution Network |
16 | Christophe Tartary, Huaxiong Wang, Josef Pieprzyk |
An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
Unsecured Channel, Erasure Code, Stream Authentication, Merkle Hash Tree, Polynomial Reconstruction |
16 | Wenhui Ma, Wenfang Wang, Jing Liu |
Scalable keyword search based on semantic in DHT based peer-to-peer system. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
ontology, peer-to-peer, search, distributed hash tables |
16 | Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu 0001, Özgül Küçük, Bart Preneel |
MAME: A Compression Function with Reduced Hardware Requirements. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
low-resource implementation, hash functions, compression functions |
16 | Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack |
A global view of kad. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
peer-to-peer, distributed hash table, lookup |
16 | Rosario Gennaro, Yehuda Lindell |
A framework for password-based authenticated key exchange1. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
projective hash functions, authentication, Passwords, dictionary attack |
16 | Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous, Nathanael Cottin |
Meaningful electronic signatures based on an automatic indexing method. |
Artif. Intell. Law |
2006 |
DBLP DOI BibTeX RDF |
legal information, security, information systems, indexing, hash function, certification, electronic signature |
16 | Roberto Di Pietro, Luigi V. Mancini, Antonio Durante, Vishwas Patil |
Addressing the shortcomings of one-way chains. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
one-way chain, secure group management for multicast, chameleon hash |
16 | Dayin Wang, Dongdai Lin, Wenling Wu |
OPMAC: One-Key Poly1305 MAC. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Carter-Wegman MAC, Universal Hash Family, Block cipher, Message Authentication Code, Pseudorandom Function, Pseudorandom Permutation |
16 | Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. |
ARC |
2006 |
DBLP DOI BibTeX RDF |
exhaustive key search, cryptanalysis, hash-functions, FPGA implementation, time-memory trade-off, rainbow table |
16 | Eun-Jun Yoon, Kee-Young Yoo |
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. |
ICCSA (1) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, Network security, Hash function, Password authentication, Diffie-Hellman, Stolen-verifier attack |
16 | Dong-Guk Han, Tsuyoshi Takagi, Howon Kim 0001, Kyoil Chung |
New Security Problem in RFID Systems "Tag Killing". |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
security, privacy, Radio frequency identification (RFID), hash chain, challenge-response |
16 | Predrag Knezevic, Andreas Wombacher, Thomas Risse 0001 |
DHT-Based Self-adapting Replication Protocol for Achieving High Data Availability. |
SITIS |
2006 |
DBLP DOI BibTeX RDF |
decentralized data management, high data availability, distributed hash tables, self- adaptation |
16 | Iuon-Chang Lin, Hsia-Hung Ou, Min-Shiang Hwang |
A user authentication system using back-propagation network. |
Neural Comput. Appl. |
2005 |
DBLP DOI BibTeX RDF |
Neural network, Information security, User authentication, One-way hash function, Back-propagation network |
16 | Chun-Shien Lu, Chao-Yong Hsu |
Geometric distortion-resilient image hashing scheme and its applications on copy detection and authentication. |
Multim. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Searching, Robustness, Hash, Copy detection, Geometric distortion |
|
|