The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACISP"( http://dblp.L3S.de/Venues/ACISP )

URL (DBLP): http://dblp.uni-trier.de/db/conf/acisp

Publication years (Num. hits)
1996 (30) 1997 (31) 1998 (38) 1999 (27) 2000 (40) 2001 (41) 2002 (38) 2003 (46) 2004 (42) 2005 (49) 2006 (37) 2007 (34) 2008 (35) 2009 (32) 2010 (25) 2011 (36) 2012 (36) 2013 (31) 2014 (33) 2015 (29) 2018 (52) 2019 (41)
Publication types (Num. hits)
inproceedings(781) proceedings(22)
Venues (Conferences, Journals, ...)
ACISP(803)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 391 occurrences of 265 keywords

Results
Found 803 publication records. Showing 803 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal, Dongxi Liu Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Atsunori Ichikawa, Wakaha Ogata, Koki Hamada, Ryo Kikuchi Efficient Secure Multi-Party Protocols for Decision Tree Classification. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yunwen Liu, Yu Sasaki Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sean Murphy, Rachel Player \delta -subgaussian Random Variables in Cryptography. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Jaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo, Qingkai Zeng AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xuejun Fan, Song Tian, Bao Li, Weixuan Li Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Xiaojian Pang, Li Yang, Maozhen Liu, Jianfeng Ma MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001 A Highly Secure MAC from Tweakable Blockciphers with Support for Short Tweaks. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Arnaud Sipasseuth, Thomas Plantard, Willy Susilo Improving the Security of the DRS Scheme with Uniformly Chosen Random Noise. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Terry Shue Chien Lau, Chik How Tan Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lucas Schabhüser, Denis Butin, Johannes Buchmann 0001 Function-Dependent Commitments from Homomorphic Authenticators. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alex Davidson, Amit Deo, Ela Lee, Keith Martin Strong Post-Compromise Secure Proxy Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy 0001, Willy Susilo A Lattice-Based Public Key Encryption with Equality Test in Standard Model. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Julian Jang-Jaccard, Fuchun Guo (eds.) Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Chunbo Zhu, Gaoli Wang, Boyu Zhu Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yi-Ting Huang, Yu-Yuan Chen, Chih-Chun Yang, Yeali S. Sun, Shun-Wen Hsiao, Meng Chang Chen Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Joseph Tonien, Guomin Yang The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tapas Pal, Ratna Dutta Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS Model. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wei Zong, Yang-Wai Chow, Willy Susilo Dimensionality Reduction and Visualization of Network Intrusion Detection Data. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Geng Li, Jianwei Liu, Zongyang Zhang Security Against Subversion in a Multi-surveillant Setting. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Lin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu A Flexible Instant Payment System Based on Blockchain. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda 0002, Yusuke Sakai 0001, Jacob C. N. Schuldt Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Liang Zheng, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dunming Li, Jenwen Mao, Fuke Shen A Novel Semi-supervised Adaboost Technique Based on Improved Tri-training. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Debanjan Sadhya, Bodhi Chakraborty A Quantitative Study of Attribute Based Correlation in Micro-databases and Its Effects on Privacy. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan 0005, Dongxi Liu Location Based Encryption. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yaoan Jin, Atsuko Miyaji Secure and Compact Elliptic Curve Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Weixuan Li, Wei Yu 0008, Bao Li, Xuejun Fan Speeding up Scalar Multiplication on Koblitz Curves Using \mu _4 Coordinates. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ziyu Wang, Jianwei Liu, Zongyang Zhang, Yanting Zhang, Jiayuan Yin, Hui Yu, Wenmao Liu A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Woojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim Automated Cash Mining Attacks on Mobile Advertising Networks. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mohammadreza Ashouri Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, Ximing Li Group ID-Based Encryption with Equality Test. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Timothy Curry, Devon Callahan, Benjamin Fuller, Laurent Michel DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Li-Ping Wang, Jingwei Hu Two New Module-Code-Based KEMs with Rank Metric. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tim van de Kamp, David Stritzl, Willem Jonker, Andreas Peter Two-Client and Multi-client Functional Encryption for Set Intersection. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu Fast-to-Finalize Nakamoto-Like Consensus. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nan Cui, Shengli Liu, Yunhua Wen, Dawu Gu Pseudorandom Functions from LWE: RKA Security and Application. Search on Bibsonomy ACISP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe 0001 Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yunhua Wen, Shengli Liu Reusable Fuzzy Extractor from LWE. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Handan Kilinç, Serge Vaudenay Secure Contactless Payment. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi CRT-KPS: A Key Predistribution Schemes Using CRT. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu Linkable Group Signature for Auditing Anonymous Communication. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kexin Hu, Zhenfeng Zhang Fast Lottery-Based Micropayments for Decentralized Currencies. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chen-Dong Ye, Tian Tian A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Liqiang Peng, Yao Lu 0002, Noboru Kunihiro, Rui Zhang 0002, Lei Hu A Deterministic Algorithm for Computing Divisors in an Interval. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Nicolas Marrière, Valérie Nachef, Emmanuel Volte Differential Attacks on Reduced Round LILLIPUT. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yeali S. Sun, Chien-Chun Chen, Shun-Wen Hsiao, Meng Chang Chen ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu Auditable Hierarchy-Private Public-Key Encryption. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue Live Path CFI Against Control Flow Hijacking Attacks. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu Decentralized Blacklistable Anonymous Credentials with Reputation. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shimin Li, Bei Liang, Rui Xue Private Functional Signatures: Definition and Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Qiqi Lai, Bo Yang 0003, Yong Yu 0002, Yuan Chen 0008, Liju Dong Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu Lattice-Based Universal Accumulator with Nonmembership Arguments. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sumanta Sarkar, Habeeb Syed Bounds on Differential and Linear Branch Number of Permutations. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chi Liu, Rongmao Chen, Yi Wang, Yongjun Wang Asymmetric Subversion Attacks on Signature Schemes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Guomin Yang (eds.) Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang 0002, Shuhui Chen, Ho-fung Leung Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yan Xu 0007, Ran Ding, Jie Cui 0004, Hong Zhong 0001 Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jian Shen 0001, Dengzhi Liu, Xiaofeng Chen 0001, Xinyi Huang, Jiageng Chen, Mingwu Zhang Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda 0002, Koki Hamada, Koji Chida Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jie Cui 0004, Jiantao He, Yan Xu 0007, Hong Zhong 0001 TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu Z-Channel: Scalable and Efficient Scheme in Zerocash. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Howard M. Heys Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode). Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Deqing Zou, Zhijun Deng, Zhen Li, Hai Jin 0001 Automatically Identifying Security Bug Reports via Multitype Features Analysis. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Bernardo David, Rafael Dowsley, Mario Larangeira 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zhe Xia, Liuying Sun, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yuntao Wang, Tsuyoshi Takagi Improving the BKZ Reduction Algorithm by Quick Reordering Technique. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001 Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Souradyuti Paul, Ananya Shrivastava Robust Multiparty Computation with Faster Verification Time. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xingye Lu, Zhenfei Zhang, Man Ho Au Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand New Attacks and Secure Design for Anonymous Distance-Bounding. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xavier Boyen, Thomas Haines Forward-Secure Linkable Ring Signatures. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eunkyung Kim 0002, Hyang-Sook Lee, Jeongeun Park Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xuecheng Ma, Xin Wang, Dongdai Lin Anonymous Identity-Based Encryption with Identity Recovery. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yinxia Sun, Futai Zhang, Anmin Fu Revocable Certificateless Encryption with Ciphertext Evolution. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li Lattice-Based Dual Receiver Encryption and More. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jintai Ding, Scott R. Fluhrer, Saraswathy RV Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yali Zeng, Xu Li, Xu Yang, Qikui Xu, Dongcheng Wang A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Terry Shue Chien Lau, Chik How Tan A New Encryption Scheme Based on Rank Metric Codes. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ryoma Ito, Atsuko Miyaji New Iterated RC4 Key Correlations. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu Revisiting the Incentive Mechanism of Bitcoin-NG. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hyung Tae Lee, Huaxiong Wang, Kai Zhang Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zhelei Sun, Peng Wang, Liting Zhang Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Priyanka Bose, Dipanjan Das 0002, Chandrasekaran Pandu Rangan Constant Size Ring Signature Without Random Oracle. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jianchang Lai, Yi Mu 0001, Fuchun Guo, Willy Susilo Improved Identity-Based Online/Offline Encryption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuu Ishida, Yohei Watanabe 0001, Junji Shikata Constructions of CCA-Secure Revocable Identity-Based Encryption. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryoma Ito, Atsuko Miyaji How TKIP Induces Biases of Internal States of Generic RC4. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yiteng Feng, Yi Mu 0001, Guomin Yang, Joseph K. Liu A New Public Remote Integrity Checking Scheme with User Privacy. Search on Bibsonomy ACISP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 803 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license