The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for encryption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1979 (20) 1980-1982 (19) 1983-1984 (32) 1985 (25) 1986-1987 (41) 1988 (19) 1989 (31) 1990 (21) 1991 (24) 1992 (17) 1993 (50) 1994 (64) 1995 (27) 1996 (56) 1997 (88) 1998 (112) 1999 (143) 2000 (157) 2001 (226) 2002 (276) 2003 (355) 2004 (494) 2005 (676) 2006 (682) 2007 (723) 2008 (749) 2009 (658) 2010 (527) 2011 (565) 2012 (624) 2013 (711) 2014 (747) 2015 (893) 2016 (1011) 2017 (1094) 2018 (1150) 2019 (254)
Publication types (Num. hits)
article(5208) book(12) incollection(132) inproceedings(7928) phdthesis(57) proceedings(24)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5495 occurrences of 1765 keywords

Results
Found 13361 publication records. Showing 13361 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
104Pooya Farshim, Bogdan Warinschi Certified Encryption Revisited. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Certified Encryption, Corrupt Decryption, Security Models, Identity-Based Encryption, Certificateless Encryption
83Satoshi Hada, Kouichi Sakurai A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
76Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Conditional Proxy Broadcast Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption
76Walid Bagga, Refik Molva, Stefano Crosta Policy-based encryption schemes from bilinear pairings. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
73Shiguo Lian Quasi-commutative watermarking and encryption for secure media content distribution. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Commutative watermarking and encryption (CWE), Watermarking, Digital rights management (DRM), Video encryption
72Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic encryption, code-based encryption, database security, hybrid encryption, searchable encryption
71Phillip Rogaway Nonce-Based Symmetric Encryption. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Initialization vector, provable security, modes of operation, symmetric encryption, nonces
68Phillip Rogaway, Don Coppersmith A Software-Optimized Encryption Algorithm. Search on Bibsonomy J. Cryptology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Cryptography, Cryptography, Stream cipher, Stream cipher, Encryption, Encryption, Key words
67Xu An Wang, Xiaoyuan Yang 0002 Proxy Re-encryption Scheme Based on SK Identity Based Encryption. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
67Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan An Implementation and Evaluation of Online Disk Encryption for Windows Systems. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disk encryption, Initialization vector, Storage data encryption/decryption and Sector-level encryption, Storage security
65Jonathan Katz, Arkady Yerukhimovich On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
64Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-Based encryption, broadcast encryption, forward security
64Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unjudgment, symmetric-content-non-malleability, symmetric-content-indistinguishability, symmetric-key-indistinguishablity, symmetric-content-length-indistinguishability, encryption, judgment, deduction systems
64Ramnath Venugopalan, Prasanth Ganesan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller, Mihail L. Sichitiu Encryption overhead in embedded systems and sensor network nodes: modeling and analysis. Search on Bibsonomy CASES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, sensor networks, embedded systems, encryption
62Jonathan Katz, Moti Yung Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
61Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
60Chik How Tan Public-Key Encryption from ID-Based Encryption Without One-Time Signature. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear maps
59Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption
59Ribao Wei, Dingfeng Ye Delegate predicate encryption and its application to anonymous authentication. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF predicate encryption, anonymous authentication
59Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
58Toshihiko Matsuo Proxy Re-encryption Systems for Identity-Based Encryption. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy re-encryption system, public key encryption, identity-based encryption
57Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks. Search on Bibsonomy IEEE Trans. Dependable Sec. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cost/performance, Security, Simulation, Optimization, Algorithms, Dynamic programming, Wireless communication, Emerging technologies, Wireless systems, Data encryption, Data Encryption, Security and Privacy Protection, integrity and protection
57Giovanni Di Crescenzo, Vishal Saraswat Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Searchable Public-Key Encryption, Quadratic Residuosity, Jacobi Symbol, Public-Key Encryption
57Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Timed-Release and Key-Insulated Public Key Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF timed-release, key-insulated encryption, authenticated encryption
57Dan Boneh, Jonathan Katz Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Public-key encryption, Identity-based encryption, Chosen-ciphertext security
57Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
57Mihir Bellare, Alexandra Boldyreva, Jessica Staddon Randomness Re-use in Multi-recipient Encryption Schemeas. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Encryption, provable security, randomness, broadcast encryption
56Yasumasa Nakai, Takahiro Matsuda 0002, Wataru Kitada, Kanta Matsuura A Generic Construction of Timed-Release Encryption with Pre-open Capability. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pre-open capability, public key encryption, identity-based encryption, timed-release encryption, generic construction
56Seiko Arita, Koji Tsurudome Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF threshold public-key encryption schemes, tag-based encryption schemes, the decisional bilinear Diffie-Hellman assumption, the decisional linear assumption
55Yuliang Zheng Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption
55Ivan Damgård, Lars R. Knudsen Two-Key Triple Encryption. Search on Bibsonomy J. Cryptology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF The Data Encryption Standard, The Data Encryption Standard, Block ciphers, Block ciphers, Pseudorandom generators, Pseudorandom generators, Key words, Multiple encryption, Multiple encryption
55Osamu Watanabe 0002, Akiko Nakazaki, Hitoshi Kiya A scalable encryption method allowing backward compatibility with JPEG2000 images. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen Authenticated Broadcast Encryption Scheme. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptography, broadcast encryption, bilinear map
53Dragos Trinca Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Parallel algorithms, Block ciphers, Convolutional codes, Symmetric encryption
53Ryotaro Hayashi 0001, Keisuke Tanaka Universally Anonymizable Public-Key Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cramer- Shoup, RSA-OAEP, anonymity, encryption, ElGamal, key-privacy
53Prasanth Ganesan, Ramnath Venugopalan, Pushkin Peddabachagari, Alexander G. Dean, Frank Mueller, Mihail L. Sichitiu Analyzing and modeling encryption overhead for sensor network nodes. Search on Bibsonomy Wireless Sensor Networks and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF encryption overhead, model, sensor networks, embedded systems, analysis
53Josef Pieprzyk, David Pointcheval Josef Pieprzyk, David Pointcheval. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privacy, authentication, parallelization, Signcryption
52Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto Multi-recipient Public-Key Encryption from Simulators in Security Proofs. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-recipient, IND-CCA, simulator, public-key encryption, broadcast encryption
52Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange 0001, John Malone-Lee, Gregory Neven, Pascal Paillier, Haixia Shi Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Search on Bibsonomy J. Cryptology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anonymity, Identity-based encryption, Random-oracle model, Foundations, Searchable encryption
52Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
52Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa Tag-KEM/DEM: A New Framework for Hybrid Encryption. Search on Bibsonomy J. Cryptology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tag-KEM, Key encapsulation, Threshold encryption, Hybrid encryption
52Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov Provably Secure Timed-Release Public Key Encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-insulated encryption, timed-release, authenticated encryption
52Luan Ibraimi, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identity-Based Encryption, Proxy re-encryption, Personal Health Record
52Shih-Ching Ou, Hung-Yuan Chung, Wen-Tsai Sung Improving the compression and encryption of images using FPGA-based cryptosystems. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Significance-linked connected component analysis (SLCCA), Image compression encryption scheme (ICES), Advance encryption standard (AES), Discrete wavelet transform (DWT)
52George Danezis Breaking Four Mix-Related Schemes Based on Universal Re-encryption. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Universal re-encryption, re-encryption mix networks, traffic analysis, anonymous communications
52Dominik Engel, Andreas Uhl Parameterized biorthogonal wavelet lifting for lightweight JPEG 2000 transparent encryption. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF lightweight encryption, parameterized biorthogonal wavelet lifting, transparent encryption, JPEG 2000
51Ronald L. Rivest All-or-Nothing Encryption and the Package Transform. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
51Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters Attribute-based encryption for fine-grained access control of encrypted data. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, delegation, broadcast encryption, attribute-based encryption, audit logs, hierarchical identity-based encryption
51Jeremy Epstein, Tim Williams Using Fortezza For Transparent File Encryption. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development
50Rosario Gennaro, Shai Halevi More on Key Wrapping. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deterministic Encryption, Key Wrapping, Modes of Operation, Symmetric Encryption
49Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Thomas Stütz, Andreas Uhl Transparent Image Encryption Using Progressive JPEG. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Yevgeniy Dodis, Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Ran Canetti, Shai Halevi, Jonathan Katz Adaptively-Secure, Non-interactive Public-Key Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Soichi Furuya, Kouichi Sakurai Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF real-or-random security, Stream cipher, provable security, message authentication, mode of operation
49Thomas Kunkelmann, Uwe Horn Video Encryption Based on Data Partitioning and Scalable Coding - A Comparison. Search on Bibsonomy IDMS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
48Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability
48Peter Gazi, Ueli M. Maurer Cascade Encryption Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cascade encryption, random system, indistinguishability, ideal cipher model
48Shiguo Lian, Jinsheng Sun, Guangjie Liu, Zhiquan Wang Efficient video encryption scheme based on advanced video coding. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multimedia content protection, Digital right management, AVC, Video encryption
48Alexander W. Dent A survey of certificateless encryption schemes and security models. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography, Public-key cryptography, Certificateless cryptography, Certificateless encryption
48Saurabh Panjwani Tackling Adaptive Corruptions in Multicast Encryption Protocols. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Adaptive Corruptions, Selective Decryption, Multicast, Encryption
48Yibo Fan, Jidong Wang, Takeshi Ikenaga, Yukiyasu Tsunoo, Satoshi Goto A New Video Encryption Scheme for H.264/AVC. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Video, Encryption, H.264/AVC
48Giuseppe Ateniese, Kevin Fu, Matthew Green 0001, Susan Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF double decryption, key translation, bilinear maps, Proxy re-encryption
48Jaimee Brown, Juan Manuel González Nieto, Colin Boyd Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RSA assumptions, public key encryption, chosen-ciphertext security
48Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded Applications. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF compact encryption/decryption implementation, FPGA, Cryptography, AES, DES
48Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
48Rosario Gennaro, Yael Gertner, Jonathan Katz Lower bounds on the efficiency of encryption and digital signature schemes. Search on Bibsonomy STOC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF lower bounds, digital signatures, encryption, black-box
48Oliver Jung, Christoph Ruland Encryption with Statistical Self-Synchronization in Synchronous Broadband Networks. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF SDH/SONET, Cryptography, Encryption, Confidentiality, Modes of Operation, Broadband Networks, Self-Synchronization
48Eiichiro Fujisaki, Tatsuaki Okamoto Secure Integration of Asymmetric and Symmetric Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Adaptive chosen-ciphertext attack, Random oracle model, Indistinguishability, Hybrid encryption
48Jude Angelo Ambrose, Sri Parameswaran, Aleksandar Ignjatovic MUTE-AES: a multiprocessor architecture to prevent power analysis based side channel attack of the AES algorithm. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Adam L. Young, Moti Yung Hiding Information Hiding. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Practical ID-based encryption for wireless sensor network. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF online/offline encryption, identity-based encryption, wireless sensor network security
47Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa Encryption over Semi-trusted Database. Search on Bibsonomy DASFAA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Database cryptography, server-based encryption, client-based encryption, semi-trusted database, mixed cryptography
47Kristen Dietiker PGP whole disk encryption: blazing trails in IT security at UW Medicine. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protected health information, whole disk encryption, encryption, compliance, Macintosh, software deployment, HIPAA, PGP, Windows XP
47Mihir Bellare, Adriana Palacio Protecting against key-exposure: strongly key-insulated encryption with optimal threshold. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key update, Encryption, Identity-based encryption, Key exposure
47David Galindo A Separation Between Selective and Full-Identity Security Notions for Identity-Based Encryption. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tag-based encryption, identity-based encryption, Foundations
47Ulrich Kühn 0001 Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA encryption, Side-channel attack, ElGamal encryption
47Markus Jakobsson On Quorum Controlled Asymmetric Proxy Re-encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF asymmetric proxy re-encryption, translation certificate, El Gamal encryption, quorum control, privacy, robustness
46Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
46Jiang Delei, Bai Sen, Dong Wenming An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-Filter. Search on Bibsonomy CSSE (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Masafumi Kusakawa, Harunaga Hiwatari, Tomoyuki Asano, Seiichi Matsuda Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Adam L. Young, Moti Yung Sliding Encryption: A Cryptographic Tool for Mobile Agents. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
45Dominik Engel, Thomas Stütz, Andreas Uhl Format-compliant jpeg2000 encryption with combined packet header and packet body protection. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF format-compliant encryption, packet body encryption, packet header encryption, JPEG2000
45Jonathan K. Millen, Hai-Ping Ko Narrowing terminates for encryption. Search on Bibsonomy CSFW The full citation details ... 1996 DBLP  DOI  BibTeX  RDF term replacement rules, reduction properties, symbolic encryption operations, narrowing steps, infinite sequence, popular abstract encryption operators, terminating algorithm, cryptography, encryption, access protocols, protocol analysis
45Yang Ou, Chul Sur, Kyung Hyune Rhee A Fast and Fully Format Compliant Protection of JPEG2000 Code-Streams. Search on Bibsonomy MMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Joint Compression and Encryption, Packet Header Encryption, JPEG2000, Arithmetic Coding
44Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard Practical Symmetric On-Line Encryption. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversary, Symmetric encryption, chosen plaintext attacks
44Hung-Min Sun, Muh-Chyi Leu A Real-Time Selective Video Encryption Using Context-Key Control. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
44Haifeng Qian, Yuan Zhou, Zhibin Li, Zecheng Wang, Bing Zhang 0008 Efficient public key encryption with smallest ciphertext expansion from factoring. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classification 94A60
44Fuchun Guo, Yi Mu 0001, Zhide Chen Identity-Based Online/Offline Encryption. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Tingjian Ge, Stanley B. Zdonik Fast, Secure Encryption for Indexing in a Column-Oriented DBMS. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Min-Sung Koh, Esteban Rodriguez-Marek, Claudio Talarico A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen-Plaintext Attacks. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Kwangjin Hong, Keechul Jung Partial Encryption of Digital Contents Using Face Detection Algorithm. Search on Bibsonomy PRICAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
44Chung-Ping Wu, C.-C. Jay Kuo Design of integrated multimedia compression and encryption systems. Search on Bibsonomy IEEE Trans. Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Ulf T. Mattsson A Practical Implementation of Transparent Encryption and Separation of Duties in Enterprise Databases: Protection against External and Internal Attacks on Databases. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Pierre-Alain Fouque, Antoine Joux, Guillaume Poupard Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Andris Ambainis, Adam D. Smith Small Pseudo-random Families of Matrices: Derandomizing Approximate Quantum Encryption. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Antonio Servetti, Juan Carlos De Martin Perception-based partial encryption of compressed speech. Search on Bibsonomy IEEE Trans. Speech and Audio Processing The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
43Sherman S. M. Chow, Volker Roth 0002, Eleanor G. Rieffel General Certificateless Encryption and Timed-Release Encryption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security-mediated certificateless encryption, standard model, timed-release encryption
43Craig Gentry Fully homomorphic encryption using ideal lattices. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fully homomorphic encryption
43Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano Private-Key Hidden Vector Encryption with Key Confidentiality. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private-key predicate encryption, key confidentiality
Displaying result #1 - #100 of 13361 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license