The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Secure with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1976 (16) 1977-1978 (16) 1979 (15) 1980-1981 (19) 1982-1983 (29) 1984 (34) 1985 (34) 1986 (23) 1987 (40) 1988 (49) 1989 (70) 1990 (84) 1991 (65) 1992 (80) 1993 (90) 1994 (113) 1995 (91) 1996 (177) 1997 (182) 1998 (287) 1999 (365) 2000 (389) 2001 (556) 2002 (688) 2003 (949) 2004 (1291) 2005 (1751) 2006 (2029) 2007 (2179) 2008 (2159) 2009 (2046) 2010 (1416) 2011 (1672) 2012 (1552) 2013 (1840) 2014 (1836) 2015 (2324) 2016 (2333) 2017 (2745) 2018 (3002) 2019 (3155) 2020 (3262) 2021 (3436) 2022 (3509) 2023 (3638) 2024 (875)
Publication types (Num. hits)
article(21303) book(77) data(3) incollection(392) inproceedings(29814) phdthesis(766) proceedings(156)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14395 occurrences of 3839 keywords

Results
Found 52511 publication records. Showing 52511 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Jason Keller, Joe Kilian A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Voting, Secure Computation
17Maria Striki, John S. Baras, Kyriakos Manousakis Fault-Tolerant Extension of Hypercube for Secure and Reliable Group Communications. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure, Fault-Tolerant, Routing, Robust, Efficient, Hypercube, Key Agreement
17Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa Secure Biometric Authentication with Improved Accuracy. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Biometric Authentication, Cryptography, Classifier
17Kaoru Kurosawa, Kazuhiro Suzuki Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Perfectly secure message transmission, efficiency, information theoretic security
17Peishun Wang, Huaxiong Wang, Josef Pieprzyk An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Common secure index, dynamic accumulator, conjunctive keyword search
17Nabil R. Adam, Vijay Atluri, Soon Ae Chun, John Ellenberger, Basit Shafiq, Jaideep Vaidya, Hui Xiong 0001 Secure information sharing and analysis for effective emergency management. Search on Bibsonomy DG.O The full citation details ... 2008 DBLP  BibTeX  RDF context-based content filtering, data analysis and fusing, emergency management ontology, policy-based sharing and dissemination, secure information sharing, strategic decision support, web services, semantics, policy, situation awareness, emergency management
17Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Policy Interoperation, RBAC, Multi-Domain
17Md. Shariful Islam, Young Yig Yoon, Md. Abdul Hamid, Choong Seon Hong A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network. Search on Bibsonomy ICCSA (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure Hybrid Wireless Mesh Protocol (SHWMP), Authentication, Wireless Mesh Network, Merkle Tree
17Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Thomas Banton, Dennis Proffitt, Greg Humphreys Quantifying usability in secure graphics: assessing the user costs of protecting 3D content. Search on Bibsonomy APGV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure graphics, usability, perception, 3D reconstruction
17Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SEAD, I-SEAD protocol, Ad hoc networks, simulation experiments, secure routing protocol
17Mark W. Storer, Kevin M. Greenan, Darrell D. E. Long, Ethan L. Miller Secure data deduplication. Search on Bibsonomy StorageSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF single-instance storage, optimization, cryptography, encryption, capacity, deduplication, secure storage
17Carmela Troncoso, Danny De Cock, Bart Preneel Improving secure long-term archival of digitally signed documents. Search on Bibsonomy StorageSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digitally signed documents, retimestamping, secure long-term archiving
17Bastian Braun SAVE: static analysis on versioning entities. Search on Bibsonomy SESS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF static analysis, version control system, incremental analysis, secure software development
17Paul C. van Oorschot, Tao Wan 0004, Evangelos Kranakis On interdomain routing security and pretty secure BGP (psBGP). Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, trust, certificates, BGP, public-key infrastructure, interdomain routing, secure routing protocols
17Jeffrey S. Dwoskin, Ruby B. Lee Hardware-rooted trust for secure key management and transient trust. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hardware policy enforcement, secret protection (sp), transient trust, key management, emergency response, secure processors
17Xinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert A trusted mobile phone reference architecturevia secure kernel. Search on Bibsonomy STC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF trusted mobile computing, security architecture, isolation, SELinux, secure kernel
17Jaap-Henk Hoepman, Andreas Larsson, Elad Michael Schiller, Philippas Tsigas Secure and Self-stabilizing Clock Synchronization in Sensor Networks. Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure and Resilient Computer Systems, Sensor-Network Systems, Self-Stabilization, Clock-synchronization
17J. Martin Leo Manickam, R. Bhuvaneswari, Marcharla Anjaneyulu Bhagyaveni, S. Shanmugavel Secure routing protocol for mobile ad-hoc networks. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF attacks on MANETs, promiscuous mode, wired and wireless networks, ad-hoc networking, secure routing
17Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew K. Franklin Secure Linear Algebra Using Linearly Recurrent Sequences. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure Linear Algebra, Linearly Recurrent Sequences, Wiedemann’s Algorithm
17Kwonseung Shin, Min Young Chung, Hyunseung Choo Energy Efficient Forwarding Scheme for Secure Wireless Ad Hoc Routing Protocols. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public Key and Secure Ad-hoc Routing, Energy Efficiency
17Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secret leakage, secure OS, virtual machine, information flow, virus
17Jonathan Katz On achieving the "best of both worlds" in secure multiparty computation. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure computation
17Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula Trust Enhanced Secure Mobile Ad-Hoc Network Routing. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reputation and trust, Security, mobile ad-hoc networks, intrusion detection, secure routing
17Chunhua Su, Feng Bao 0001, Jianying Zhou 0001, Tsuyoshi Takagi, Kouichi Sakurai Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure approximation, clustering, privacy-preserving
17Jihwan Lim, Sangjin Kim, Heekuck Oh A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure location service, ad hoc network, position-based routing
17Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Reliable and Secure Communication, Information Theoretic Security, Directed Networks, Communication Efficiency
17Neerja Bhatnagar, Ethan L. Miller Designing a secure reliable file system for sensor networks. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sensor network file system, secure, reliable
17Ragib Hasan, Radu Sion, Marianne Winslett Introducing secure provenance: problems and challenges. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF provenance, secure storage, lineage
17Alfred C. Weaver Secure Sockets Layer. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, Secure Sockets Layer
17Xun Wang, Sriram Chellappan, Phillip Boyer, Dong Xuan On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure overlay forwarding system, DDoS attacks
17Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh Secure function evaluation with ordered binary decision diagrams. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary decision diagrams, secure function evaluation
17Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters Secure attribute-based systems. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure systems, attribute-based encryption, applied cryptography
17Idir Bakdi Towards a Secure and Practical Multifunctional Smart Card. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multifunctional smart card, secure hardware token, privacy
17Lei Tang, Xiaoyan Hong, Phillip G. Bradford Secure Relative Location Determination in Vehicular Network. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure vehicular relative location, security, vehicular networks
17Qiming Li, Yagiz Sutcu, Nasir D. Memon Secure Sketch for Biometric Templates. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF biometric template, continuous domain, Secure sketch
17Slim Trabelsi, Jean-Christophe R. Pazzaglia, Yves Roudier Secure Web Service Discovery: Overcoming Challenges of Ubiquitous Computing. Search on Bibsonomy ECOWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Service discovery, Web Services, Service Oriented Architectures, Ubiquitous Computing, WS-Discovery, Attribute Based Encryption
17Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond Choo Formal analysis of secure contracting protocol for e-tendering. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF e-tendering, secure e-contract, e-commerce security
17Emmanuel Prouff, Christophe Giraud 0001, Sébastien Aumônier Provably Secure S-Box Implementation Based on Fourier Transform. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Provably Secure Countermeasure, Symmetric Cryptosystems, FOX, AES, Differential Power Analysis, Fourier Transform, S-Box
17Moni Naor, Benny Pinkas Computationally Secure Oblivious Transfer. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Privacy preserving computation, Cryptography, Oblivious transfer, Secure function evaluation
17Carlisle M. Adams Building Secure Web-Based Environments: Understanding Research Interrelationships through a Construction Metaphor. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure Web-based environments
17Matt Bishop, Deborah A. Frincke Teaching Secure Programming. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF education, training, computer science, secure programming
17Jong-Hyuk Roh, Kyoon-Ha Lee Key Management for Secure Overlay Multicast. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key hierarchy, Key Management, Overlay Multicast, Secure Multicast
17Yogesh Karandikar, Xukai Zou, Yuan-Shun Dai Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Differential Access Control, Dynamic Conferencing, Access Control, Key Management, Secure Group Communication
17Jörg Platte, Edwin Naroska A combined hardware and software architecture for secure computing. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encrypted programs, secure processors, certified execution
17Heeyoul Kim, Seong-Min Hong 0001, Hyunsoo Yoon, Jung Wan Cho Secure Group Communication with Multiplicative One-way Functions. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key update, security, cryptographic protocols, secure group communication, group key management
17Yingpeng Sang, Hong Shen 0001, Zonghua Zhang An Efficient Protocol for the Problem of Secure Two-party Vector Dominance. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF vector dominance, secure multiparty computation, homomorphic encryption
17Rida A. Bazzi, Goran Konjevod Efficient Verification for Provably Secure Storage and Secret Sharing in Systems Where Half the Servers Are Faulty. Search on Bibsonomy DISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secret sharing, Byzantine failures, Secure storage
17Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan Reasoning about Secure Interoperation Using Soft Constraints. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF constraint satisfaction, Secure interoperation
17Yehuda Lindell Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation. Search on Bibsonomy J. Cryptol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Constant-round protocols, Coin-tossing, Secure computation
17Sapon Tanachaiwiwat, Pinalkumar Dave, Rohan Bhindwale, Ahmed Helmy Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks. Search on Bibsonomy SenSys The full citation details ... 2003 DBLP  DOI  BibTeX  RDF secure location, trust routing, sensor networks, location awareness
17Roberto Di Pietro, Antonio Durante, Luigi V. Mancini A Reliable Key Authentication Schema for Secure Multicast Communications. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure multicast communications, logical key hierarchy, re-keying, security, authenticity, confidentiality, key distribution, group key management
17Jan Jürjens Using UMLsec and goal trees for secure systems development. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF UMLsec, goal trees, secure systems development, Unified Modeling Language (UML), UML, formal semantics
17Javier López 0001, Antonio Mana, José A. Montenegro, Juan J. Ortega, José M. Troya Towards a Trustful and Flexible Environment for Secure Communications with Public Administrations. Search on Bibsonomy EGOV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Electronic Forms, Public Key Infrastructure, Public Administrations, Secure Communications, Certification Authorities
17Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia Efficient and secure keys management for wireless mobile communications. Search on Bibsonomy POMC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF backward secrecy, network dynamics management, cryptography, distributed algorithms, wireless communications, key distribution, secure multicast, forward secrecy, collusion, key generation, key management protocol
17Elisa Bertino, Barbara Catania, Elena Ferrari A nested transaction model for multilevel secure database management systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF multilevel secure database management systems, concurrency control, covert channels, Nested transactions
17Wenliang Du, Mikhail J. Atallah Secure multi-party computation problems and their applications: a review and open problems. Search on Bibsonomy NSPW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF privacy, secure multi-party computation
17Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine Enabling Secure On-Line DNS Dynamic Update. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC
17Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell Secure Smart Homes using Jini and UIUC SESAME. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices
17Jatin N. Hansoty, Mladen A. Vouk, Shyhtsun Felix Wu LAVA: Secure Delegation of Mobile Applets: Design, Implementation, and Applications. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF LAVA, secure delegation, mobile applets, distributed computing paradigm, network-based applications, web-based mobile applets, SNMP network management, design, electronic commerce, intelligent agent, implementation, active networking, system management, computer network management, security threats, prototype implementation
17Feng Bao 0004, Yutaka Funyu, Yukihiro Hamada, Yoshihide Igarashi Reliable broadcasting and secure distributing in channel networks. Search on Bibsonomy ISPAN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF channel networks, secure message distributing, message distribution schemes, secret sharing, spanning trees, security of data, reliable broadcasting, fault-tolerant communication
17Dalia Malki, Michael K. Reiter A High-Throughput Secure Reliable Multicast Protocol. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF fault tolerance, group communication, agreement, secure multicast
17Iwen E. Kang, Thomas F. Keefe Concurrency control for federated multilevel secure database systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF MLS database systems, federated MLS database, local database systems, global serializability, security, interoperation, distributed databases, concurrency control, concurrency control, transaction processing, transaction processing, open systems, security of data, federated, multilevel secure database systems
16Takaaki Mizuki, Hideaki Sone Six-Card Secure AND and Four-Card Secure XOR. Search on Bibsonomy FAW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jungin Kim, Bhavani Thuraisingham Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON. Search on Bibsonomy ISORC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Srijith Krishnan Nair, Ivan Djordjevic, Bruno Crispo, Theodosis Dimitrakos Secure web service federation management using tpm virtualisation. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF membership management, security, web services, trusted computing, federation
16Ying Guo, Guihua Zeng, Yun Mao Secure Broadcasting Using the Secure Quantum Lock in Noisy Environments. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Guevara Noubir, Guolong Lin, Mikhail Golitsine, Nick Plante Secure sharing of location information over Ad hoc networks: an application of secure multicast. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Joris Claessens, Bart Preneel, Joos Vandewalle Secure Communication for Secure Agent-Based Electronic Commerce Applications. Search on Bibsonomy E-Commerce Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller One-Round Secure Computation and Secure Autonomous Mobile Agents. Search on Bibsonomy ICALP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Javier López 0001, Antonio Mana, Juan J. Ortega Cert'eM: Certification System Based on Electronic Mail Service Structure. Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Paul A. Karger Securing virtual machine monitors: what is needed? Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF virtual machine monitors, hypervisors, security kernels
16Shuguo Han, Wee Keong Ng, Philip S. Yu Privacy-Preserving Singular Value Decomposition. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Alon Rosen, Gil Segev 0001 Chosen-Ciphertext Security via Correlated Products. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Saeed Samet, Ali Miri Privacy-Preserving Bayesian Network for Horizontally Partitioned Data. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Conditional Proxy Broadcast Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption
16Viviane Lima, Vitor Ruivo, Marília Curado Securing wireless mesh networks: a winning combination of routing and forwarding mechanisms. Search on Bibsonomy LANC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, routing protocols, wireless mesh networks
16Ahto Buldas, Sven Laur, Margus Niitsoo Oracle Separation in the Non-uniform Model. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Andrew Y. Lindell Local Sequentiality Does Not Help for Concurrent Composition. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Yevgeniy Dodis, Yael Tauman Kalai, Shachar Lovett On cryptography with auxiliary input. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF auxiliary information, encryption schemes, learning parity with noise, error-correcting codes, randomness extractors, code obfuscation
16Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa Tag-KEM/DEM: A New Framework for Hybrid Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption
16Myrto Arapinis, Stéphanie Delaune, Steve Kremer From One Session to Many: Dynamic Tags for Security Protocols. Search on Bibsonomy LPAR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jian Ren 0001 Privacy-Preserving Communication Algorithms and Network Protocols. Search on Bibsonomy WASA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Communication anonymity, sender anonymity, recipient anonymity, location privacy, unconditional security, content authenticity
16Vipul Goyal, Payman Mohassel, Adam D. Smith Efficient Two Party and Multi Party Computation Against Covert Adversaries. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Chik How Tan Signcryption Scheme in Multi-user Setting without Random Oracles. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF decisional bilinear Diffie-Hellman assumption, Signcryption
16Joonsang Baek, David Galindo, Willy Susilo, Jianying Zhou 0001 Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Shuguo Han, Wee Keong Ng Privacy-Preserving Linear Fisher Discriminant Analysis. Search on Bibsonomy PAKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jonathan Katz, Moti Yung Scalable Protocols for Authenticated Group Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Remo Meier, Bartosz Przydatek, Jürg Wullschleger Robuster Combiners for Oblivious Transfer. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF robust combiners, weak oblivious transfer, oblivious transfer
16Martin Suchara, Ioannis C. Avramopoulos, Jennifer Rexford Securing BGP incrementally. Search on Bibsonomy CoNEXT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yehuda Lindell, Anna Lysyanskaya, Tal Rabin On the composition of authenticated Byzantine Agreement. Search on Bibsonomy J. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated Byzantine Agreement, lower bounds, randomized protocols, protocol composition
16Tatsuaki Okamoto Efficient Blind and Partially Blind Signatures Without Random Oracles. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Eike Kiltz Chosen-Ciphertext Security from Tag-Based Encryption. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Dominik Zalewski Security Enhancement of Java Remote Method Invocation. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Vladislav Marinov, Jürgen Schönwälder Performance Analysis of SNMP over SSH. Search on Bibsonomy DSOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Shaoquan Jiang Efficient Primitives from Exponentiation in Zp. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jin Li 0002, Fangguo Zhang, Yanming Wang A Strong Identity Based Key-Insulated Cryptosystem. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key-insulated cryptosystem, Bilinear pairings, ID-based
16Jonathan Katz, Ji Sun Shin Modeling insider attacks on group key-exchange protocols. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF universal composability, group key exchange, insider attacks
16Yevgeniy Dodis, Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 52511 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license