The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1978 (18) 1979-1981 (18) 1982-1983 (17) 1984 (26) 1985 (26) 1986-1987 (42) 1988 (20) 1989 (31) 1990 (25) 1991 (25) 1992 (17) 1993 (51) 1994 (65) 1995 (27) 1996 (58) 1997 (89) 1998 (116) 1999 (148) 2000 (187) 2001 (229) 2002 (289) 2003 (357) 2004 (500) 2005 (677) 2006 (689) 2007 (725) 2008 (751) 2009 (671) 2010 (530) 2011 (572) 2012 (633) 2013 (733) 2014 (776) 2015 (941) 2016 (1073) 2017 (1169) 2018 (1276) 2019 (1398) 2020 (1460) 2021 (1482) 2022 (1544) 2023 (1748) 2024 (510)
Publication types (Num. hits)
article(10762) book(19) data(2) incollection(152) inproceedings(10612) phdthesis(167) proceedings(25)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 21739 publication records. Showing 21739 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill Order-Preserving Symmetric Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Pardeep Kumar 0001, Sang il Cho, Hoon-Jae Lee 0001 PingPong-MAC: secure ubiquitous sensor network with authenticated encryption. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PingPong-MAC, authentication, data integrity, stream cipher, confidentiality, ubiquitous sensor network
16Siva Anantharaman, Hai Lin 0005, Christopher Lynch, Paliath Narendran, Michaël Rusinowitch Unification Modulo Homomorphic Encryption. Search on Bibsonomy FroCoS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Mridul Nandi Fast and Secure CBC-Type MAC Algorithms. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OMAC, padding rule, prf-security, CBC-MAC
16Luther Martin Identity-Based Encryption Comes of Age. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Luther Martin Identity-Based Encryption and Beyond. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Guillaume Duc, Ronan Keryell Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Lihua Liu, Zhengjun Cao Security Analysis of One Verifiable Encryption Scheme. Search on Bibsonomy Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Mahmood Al-khassaweneh, Selin Aviyente Image encryption scheme based on using least square approximation techniques. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Joonsang Baek, Han Chiang Tan, Jianying Zhou 0001, Jun Wen Wong Realizing Stateful Public Key Encryption in Wireless Sensor Network. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Dan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. Search on Bibsonomy FOCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wen Tao Zhu General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Vipul Goyal, Abhishek Jain 0002, Omkant Pandey, Amit Sahai Bounded Ciphertext Policy Attribute Based Encryption. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Matthew Henricksen Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Mengqi Zeng, Fangyong Hou, Dawu Gu, Yuanyuan Zhang 0002, NingNan Song Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer On the Security of the CCM Encryption Mode and of a Slight Variant. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCM, CBC-MAC, Counter mode
16Junpei Kawamoto, Qiang Ma 0001, Masatoshi Yoshikawa Reducing Data Decryption Cost by Broadcast Encryption and Account Assignment for Web Applications. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Shuaijun Li, Fei Peng An Encryption Algorithm for 2D Engineering Graphics' Content Based on Chaos Systems. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Dongming Chen, Zhiliang Zhu 0001, Guangming Yang An Improved Image Encryption Algorithm Based on Chaos. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hongjuan Liu, Zhiliang Zhu, Huiyan Jiang, Beilei Wang A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Leyou Zhang, Yupu Hu, Ningbo Mu An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi Towards Trusted Broadcast Encryption. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16N. K. Sreelaja, G. A. Vijayalakshmi Pai Swarm intelligence based key generation for text encryption in cellular networks. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Yassin M. Hasan, Hesham A. Abulenein Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Malika Izabachène, David Pointcheval New Anonymity Notions for Identity-Based Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Joseph K. Liu, Jianying Zhou 0001 Efficient Certificate-Based Encryption in the Standard Model. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16H. F. Qi, X. H. Yang, R. Jiang, B. Liang, S. J. Zhou Novel End-to-End Voice Encryption Method in GSM System. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek Public-Key Encryption with Non-interactive Opening. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Eike Kiltz, Yevgeniy Vahlis CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Anna Slobodová Formal Verification of Hardware Support for Advanced Encryption Standard. Search on Bibsonomy FMCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Bo Mao, Dan Feng 0001, Suzhen Wu, Jianxi Chen, Lingfang Zeng Performance-Directed iSCSI Security with Parallel Encryption. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Haibo Tian, Xi Sun, Yumin Wang A New Public-Key Encryption Scheme. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, public-key cryptosystems, deduction
16Shiguo Lian, Zhongxuan Liu, Zhen Ren, Haila Wang Commutative Encryption and Watermarking in Video Compression. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Hanno Scharwächter, David Kammler, Andreas Wieferink, Manuel Hohenauer, Kingshuk Karuri, Jianjiang Ceng, Rainer Leupers, Gerd Ascheid, Heinrich Meyr ASIP architecture exploration for efficient IPSec encryption: A case study. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computer-aided design, ADL, ASIP, IPSec
16Faith M. Heikkila Encryption: Security Considerations for Portable Media Devices. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Dominik Engel, Andreas Uhl An Attack Against Image-Based Selective Bitplane Encryption. Search on Bibsonomy ICIP (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Evangelos Papoutsis, Gareth Howells 0001, Andrew B. T. Hopkins, Klaus D. McDonald-Maier Integrating Multi-Modal Circuit Features within an Efficient Encryption System. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yael Gertner, Tal Malkin, Steven A. Myers Towards a Separation of Semantic and CCA Security for Public Key Encryption. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Shi-Hui Pei, Yong-Zhe Zhao, Hong-Wei Zhao Construct Public Key Encryption Scheme Using Ergodic Matrices over GF(2). Search on Bibsonomy TAMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yong Ho Hwang, Pil Joong Lee Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ralf Laue 0002, Oliver Kelm, Sebastian Schipp, Abdulhadi Shoufan, Sorin A. Huss Compact AES-based Architecture for Symmetric Encryption, Hash Function, and Random Number Generation. Search on Bibsonomy FPL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Melek Önen, Refik Molva Secure Data Aggregation with Multiple Encryption. Search on Bibsonomy EWSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Cécile Delerablée Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Dong-Joo Kang, Hak-Man Kim A Proposal for Key Policy of Symmetric Encryption Application to Cyber Security of KEPCO SCADA Network. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Shih-Wei Sun, Chun-Shien Lu, Pao-Chi Chang Joint Multimedia Fingerprinting and Encryption: Security Issues and Some Solutions. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Chris J. Mitchell Cryptanalysis of the EPBC Authenticated Encryption Mode. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Nicolas T. Courtois, Gregory V. Bard Algebraic Cryptanalysis of the Data Encryption Standard. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF s5DES, solving overdefined and sparse systems of multivariate equations, ElimLin algorithm, Gröbner bases, logical cryptanalysis, block ciphers, AES, DES, SAT solvers, algebraic cryptanalysis
16Jaeheung Lee, Junyoung Heo, Jaemin Park, Yookun Cho, Jiman Hong, Minkyu Park Buffer Cache Level Encryption for Embedded Secure Operating System. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Linux, Buffer Cache, Embedded Operating System, Cryptographic File System
16Vanesa Daza, Javier Herranz, Paz Morillo, Carla Ràfols CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Euijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia Transmission. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16John Bethencourt, Amit Sahai, Brent Waters Ciphertext-Policy Attribute-Based Encryption. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Akkapeddi Chandra Sekhar, K. Rama Sudha, P. V. G. D. Prasad Reddy Data Encryption Technique Using Random Number Generator. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Chu-Wee Lim, Khoongming Khoo An Analysis of XSL Applied to BES. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XSL algorithm, AES, linearisation, BES
16José M. Rodrigues, William Puech, Adrian G. Bors Selective Encryption of Human Skin in JPEG Images. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Adam Barth, Dan Boneh, Brent Waters Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Craig Gentry, Zulfikar Ramzan, David P. Woodruff Explicit Exclusive Set Systems with Applications to Broadcast Encryption. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Michel Abdalla, Dario Catalano, Alexander W. Dent, John Malone-Lee, Gregory Neven, Nigel P. Smart Identity-Based Encryption Gone Wild. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai Applying Fujisaki-Okamoto to Identity-Based Encryption. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis W3Bcrypt: Encryption as a Stylesheet. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Guosheng Gu, Guoqiang Han An Enhanced Chaos Based Image Encryption Algorithm. Search on Bibsonomy ICICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Pascal Paillier, Jorge Luis Villar Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Amir Akhavan, Hadi Mahmodi, Afshin Akhshani A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic Maps. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Heinz Hofbauer, Thomas Stütz, Andreas Uhl Selective Encryption for Hierarchical MPEG. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Aweke N. Lemma, Stefan Katzenbeisser 0001, Mehmet Utku Celik, Michiel van der Veen Secure Watermark Embedding Through Partial Encryption. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Dominik Engel, Rade Kutil, Andreas Uhl A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000
16Ulrich Huber 0001, Ahmad-Reza Sadeghi A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Chen Yang, Xiangguo Cheng, Wenping Ma 0002, Xinmei Wang A New ID-Based Broadcast Encryption Scheme. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jiantao Zhou 0001, Zhiqin Liang, Yan Chen 0007, Oscar C. Au On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT). Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Dominik Engel, Andreas Uhl Lightweight JPEG2000 Encryption with Anisotropic Wavelet Packets. Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Alexander W. Dent The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Satoshi Hada, Kouichi Sakurai Ciphertext-Auditable Public Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee, Yong-Seok Park, Jung-Chul Ahn An Efficient Key Distribution for Ubiquitous Environment in Ad-Hoc Network Using Broadcast Encryption. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jeong Su Park, Su-Mi Lee, Eun Young Choi, Dong Hoon Lee 0001 Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Deok-Gyu Lee, Jang-Su Park, Im-Yeong Lee Broadcast Encryption Using Efficient Key Distribution and Renewal for Ubiquitous Environments. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Dan Boneh, Xavier Boyen, Shai Halevi Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Peter Y. A. Ryan, Steve A. Schneider Prêt à Voter with Re-encryption Mixes. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Yong-Hong Zhang, Bao-Sheng Kang, Xue-Feng Zhang Image Encryption Algorithm Based on Chaotic Sequence. Search on Bibsonomy ICAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jinhong Luo, Haiyi Shi Research of Chaos Encryption Algorithm Based on Logistic Mapping. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Li Weng, Karel Wouters, Bart Preneel Extending the Selective MPEG Encryption Algorithm PVEA. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Nuttapong Attrapadung, Yang Cui 0001, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002 Relations Among Notions of Security for Identity Based Encryption Schemes. Search on Bibsonomy LATIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Haeryong Park, Kilsoo Chun Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Guillaume Duc, Ronan Keryell CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF thereshold cryptography, block cipher, secret sharing, shared computation
16Jun Yang 0002, Lan Gao, Youtao Zhang Improving Memory Encryption Performance in Secure Processors. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hardware/software protection, security and protection, Memory design
16Bin B. Zhu, Yang Yang, Shipeng Li 0001 JPEG 2000 syntax-compliant encryption preserving full scalability. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Hala A. Farouk, Magdy Saeb An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Pedro Adão, Gergei Bana, Andre Scedrov Computational and Information-Theoretic Soundness and Completeness of Formal Encryption. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Martín Abadi, Bogdan Warinschi Password-Based Encryption Analyzed. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Qiu-Hua Lin, Fuliang Yin, Hualou Liang Blind Source Separation-Based Encryption of Images and Speeches. Search on Bibsonomy ISNN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Amihai Motro, Francesco Parisi-Presicce Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Fuwen Liu, Hartmut König Puzzle - A Novel Video Encryption Algorithm. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Seunglim Yong, Sang-Ho Lee An Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Certificateless Public Key Encryption Without Pairing. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Kun Peng, Colin Boyd, Ed Dawson A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Yin-Qiao Peng, Shi-Yi Xie, Yue-Feng Chen, Rui Deng, Ling-Xi Peng A Publicly Verifiable Authenticated Encryption Scheme with Message Linkages. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 21739 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license