The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WISA"( http://dblp.L3S.de/Venues/WISA )

URL (DBLP): http://dblp.uni-trier.de/db/conf/IEEEwisa

Publication years (Num. hits)
2003 (36) 2004 (38) 2005 (29) 2006 (31) 2007 (28) 2008 (25) 2009 (29) 2010 (25) 2011 (51) 2012 (75) 2013 (18) 2014 (32) 2015 (36) 2016 (35) 2017 (92) 2018 (67) 2019 (102) 2020 (91) 2021 (92) 2022 (90) 2023 (80) 2024 (1)
Publication types (Num. hits)
inproceedings(1071) proceedings(32)
Venues (Conferences, Journals, ...)
WISA(1103)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 210 occurrences of 158 keywords

Results
Found 1103 publication records. Showing 1103 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kyo-Il Chung, Kiwook Sohn, Moti Yung (eds.) Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen 0001 ID-Based Adaptive Oblivious Transfer. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gildas Avoine, Cédric Lauradoux, Tania Martin When Compromised Readers Meet RFID. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel, Willem Jonker Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel Finding Collisions for a 45-Step Simplified HAS-V. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mark Manulis Securing Remote Access Inside Wireless Mesh Networks. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kun Peng, Feng Bao 0001 Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Takeshi Sugawara 0001, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Akashi Satoh Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mijoo Kim, Miyeon Yoon, Hyun Cheol Jeong, Heung Youl Youm USN Middleware Security Model. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1KyoungHee Ko, Hwan-Kuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, Hyun-Cheol Jeong Design and Implementation of SIP-aware Security Management System. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Neil Hanley, Michael Tunstall, William P. Marnane Unknown Plaintext Template Attacks. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thomas Plos, Michael Hutter, Martin Feldhofer On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dae Hyun Yum, Sun Young Kim, Ho-Kun Moon, Mi-Yeon Kim, Jae-Hoon Roh, Pil Joong Lee Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Heike Busch, Stefan Katzenbeisser 0001, Paul Baecher PUF-Based Authentication Protocols - Revisited. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes Application Management Framework in User Centric Smart Card Ownership Model. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Timo Kasper, David F. Oswald, Christof Paar EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. Search on Bibsonomy WISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose Security Analysis of DRBG Using HMAC in NIST SP 800-90. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIST SP 800-90, pseudorandom bit generator, HMAC, pseudorandom function
1Hidenori Kuwakado, Shoichi Hirose Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mooseop Kim, Jaecheol Ryou 0001, Sungik Jun Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jörn-Marc Schmidt, Chong Hee Kim A Probing Attack on AES. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Probing Attack, Smart Card, AES
1Qingyu Xu, Mingxing He Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key distribution self-healing, storage complexity, wireless sensor network, computational secure, unconditional secure, key revocation
1Sehun Kim, Moti Yung, Hyung-Woo Lee (eds.) Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic
1Jun Zhou, Mingxing He An Improved Distributed Key Management Scheme in Wireless Sensor Networks. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Distributed wireless sensor networks, Key management, Secret sharing, Continuity
1Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai Ternary Subset Difference Method and Its Quantitative Analysis. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Subset Difference Method, Ternary Tree, Broadcast Encryption
1Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem
1Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Certificate-based, Security Models, Generic Construction, Certificateless
1Md. Shariful Islam, Md. Abdul Hamid, Byung Goo Choi, Choong Seon Hong Securing Layer-2 Path Selection in Wireless Mesh Networks. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle Tree-based Authentication, Layer-2 Routing, Security, Wireless Mesh Networks
1Takeshi Sugawara 0001, Naofumi Homma, Takafumi Aoki, Akashi Satoh Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hash function, Hardware architecture, Whirlpool, Cryptographic hardware
1Christoph Herbst, Marcel Medwed Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Montgomery Ladder, Base Point Blinding, Smart Cards, RSA, Side- Channel Attacks, Power Analysis, Microcontroller, Template Attacks
1Donghyun Choi, Sungkyu Cho, Dongho Won, Seungjoo Kim Protection Profile for Connected Interoperable DRM Framework. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sooyoung Chae, Hosub Lee 0002, Jaeik Cho, Manhyun Jung, Jongin Lim 0001, Jongsub Moon A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Data set evaluation, Network data comparing, Statistical data analysis
1Marcel Medwed, Elisabeth Oswald Template Attacks on ECDSA. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Peishun Wang, Huaxiong Wang, Josef Pieprzyk An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Common secure index, dynamic accumulator, conjunctive keyword search
1Camille Vuillaume, Katsuyuki Okeya, Erik Dahmen, Johannes Buchmann 0001 Public Key Authentication with Memory Tokens. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low-cost implementation, authentication, Merkle signatures
1Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka Sanitizable and Deletable Signature. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sanitizable signature, deletable signature, Digital signature, aggregate signature
1Marek Klonowski, Michal Przykucki, Tomasz Struminski Data Deletion with Provable Security. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secure data deletion, cryptographic key storage, provable security
1Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secret Handshake with Multiple Groups, Privacy preserving authentication, Monotone Condition, Anonymity
1Hassan Jameel, Riaz Ahmed Shaikh 0001, Le Xuan Hung, Weiwei Yuan, Syed Muhammad Khaliq-ur-Rahman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes Image-Feature Based Human Identification Protocols on Limited Display Devices. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Josep M. Miret, Daniel Sadornil, Juan Tena, Rosana Tomàs, Magda Valls On Avoiding ZVP-Attacks Using Isogeny Volcanoes. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Emmanuel Prouff, Matthieu Rivain A Generic Method for Secure SBox Implementation. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shijun Xiang, Hyoung-Joong Kim Geometrically Invariant Image Watermarking in the DWT Domain. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lei Xia, Wei Huang, Hao Huang A Compositional Multiple Policies Operating System Security Model. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege
1Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka Efficient Implementation of the Pairing on Mobilephones Using BREW. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobilephone, Efficient Implementation, Pairing Based Cryptosystem, BREW
1Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo Secret Signatures: How to Achieve Business Privacy Efficiently? Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secret signature, signature privacy, public provability, public auction, anonymity, key agreement
1Lilong Han, Qingtang Liu, Zongkai Yang Authorization Constraints Specification of RBAC. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RCL2000, DSOD, Constraints, RBAC, SOD
1Junsheng Chang, Huaimin Wang, Gang Yin, Yang-Bin Tang ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1William O. Wilson, Jan Feyereisl, Uwe Aickelin Detecting Motifs in System Call Sequences. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Frederic Stumpf, Patrick Röder, Claudia Eckert 0001 An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yoshiki Sameshima, Hideaki Saisho, Tsutomu Matsumoto, Norihisa Komoda Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secret leakage, secure OS, virtual machine, information flow, virus
1Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto Universal etaT Pairing Algorithm over Arbitrary Extension Degree. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Duursma-Lee algorithm, Tate pairing, efficient implementation, ? T pairing
1Myeonggil Choi, Sangmun Shin Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart card, ECC, Side channel attack, Power analysis attack
1Shenkun Xu, Xiaojun Ye Risk & Distortion Based K-Anonymity. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security models, Proxy signatures, Undeniable signatures, Security proof, Convertible
1Toru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara, Hideki Imai Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jihyeon Jang, Stephen J. Elliott, Hakil Kim Implementation of BioAPI Conformance Test Suite Using BSP Testing Model. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF BioAPI, Conformance Test Suite, Biometric Service Pro- vider
1Yongxin Zhou 0002, Alec Main, Yuan Xiang Gu, Harold Johnson Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHA-256 (384,512), Iteration Bound Analysis, Throughput Optimum Architecture
1Jae-Deok Lim, Sung-Kyong Un, Jeong-Nyeo Kim, ChoelHoon Lee Implementation of LSM-Based RBAC Module for Embedded System. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Colin D. Walter Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, SPA, Side channel leakage
1Jae-Kwang Lee, Okyeon Yi, Moti Yung (eds.) Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin Breaking 104 Bit WEP in Less Than 60 Seconds. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Zhuo Tang, Ruixuan Li 0001, Zhengding Lu, Zhumu Wen Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Swee-Won Lo, Raphael C.-W. Phan, Bok-Min Goi On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web submission and review software, privacy, protocol, email, passwords, security analysis
1Yong Ki Lee, Ingrid Verbauwhede A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compact Elliptic Curve Processor, Montgomery Scalar Multiplication
1Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko Security Analysis of MISTY1. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MISTY1, Higher order differential, Chosen plaintext attack
1JooSeok Song, Taekyoung Kwon 0002, Moti Yung (eds.) Information Security Applications, 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Crypto-Biometric, Cancelable Template, Privacy, Fuzzy Vault
1Jae-Chul Park, Bong-Nam Noh SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Web Application Parameter, Web Application Security, SQL Injection Attack, Pairwise Sequence Alignment
1Hiroaki Kikuchi, Masato Terada How Many Malicious Scanners Are in the Internet? Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Naoyuki Yamashita, Keisuke Tanaka Secret Handshake with Multiple Groups. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy, Authentication, Anonymity, Secret Handshake
1Yoonkyung Kim, Byeong-Mo Chang Visualization of Permission Checks in Java Using Static Analysis. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Java, static analysis, stack inspection
1Taekyoung Kwon 0002, Jung Hee Cheon, Yongdae Kim, Jaeil Lee Privacy Protection in PKIs: A Separation-of-Authority Approach. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jabeom Gu, Jaehoon Nah, Cheoljoo Chae, Jae-Kwang Lee, Jongsoo Jang Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Feng Cheng 0002, Christoph Meinel Deployment of Virtual Machines in Lock-Keeper. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Harikrishna Vasanta, Reihaneh Safavi-Naini, Nicholas Paul Sheppard, Jan Martin Surminen Distributed Management of OMA DRM Domains. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim 0001, Dong Kyue Kim Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF electronic seal, RFID, AES, message authentication code, pseudorandom function
1Chin-Chen Chang 0001, Chia-Chi Wu A Novel Key Agreement Scheme in a Multiple Server Environment. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, password, Key agreement, multi-server, remote authentication
1Youngok Jeong, Younggoo Han, Hyunwoo Kim, Woochul Shim, Jaehong Kim, Sehun Kim Cost-Effective IDS Operating Scheme in MANETs. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hyun-Sun Kang, Chang-Seop Park Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Bo-Chao Cheng, Huan Chen 0002 Quality Assurance for Evidence Collection in Network Forensics. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chanil Park, Junbeom Hur, Chanoe Kim, Young-joo Shin, Hyunsoo Yoon Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Takayuki Tobita, Hironori Yamamoto, Hiroshi Doi, Keigo Majima Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy, Group Signature, Oblivious Transfer
1Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim 0001 PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Wei Gao 0007, Guilin Wang, Xueli Wang, Dongqing Xie Controllable Ring Signatures. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Byungkwan Park, Daesung Moon, Yongwha Chung, Jin-Won Park Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Performance Evaluation, Smart Card, Fingerprint Verification
1Jongho Ryu EAP Using the Split Password-Based Authenticated Key Agreement. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mihui Kim, Inshil Doh, Kijoon Chae A Key Management Based on Multiple Regression in Hierarchical Sensor Network. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Seung-Hyun Paek, Yoon-Keun Oh, Do-Hoon Lee sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Saeran Kwon, Sang-Ho Lee Identity-Based Key Issuing Without Secure Channel in a Broad Area. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon Investigations of Power Analysis Attacks and Countermeasures for ARIA. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA, smartcard, ARIA
1Jianqing Ma, Shiyong Zhang, YiPing Zhong, Xiaowen Tong SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Wen-Shenq Juang Efficient User Authentication and Key Agreement in Wireless Sensor Networks. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF shared key distribution, session key agreement, sensor networks, authentication, network security, key distribution
1Michiru Tanaka, Yoshimi Teshigawara A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi E-Passport: The Global Traceability Or How to Feel Like a UPS Package. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MRTD, Basic Access Control, RF Eavesdropper, MRTD Cracker, Privacy, Biometrics, E-Passport
1Taekyoung Kwon 0002, Dong Hoon Lee 0002 Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1103 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license