The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Cryptography and Network Security (acns)
2007 (conf/acns/2007)

  1. Qiong Huang, Duncan S. Wong, Yiming Zhao
    Generic Transformation to Strongly Unforgeable Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:1-17 [Conf]
  2. Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Yi Mu
    Efficient Generic On-Line/Off-Line Signatures Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:18-30 [Conf]
  3. Johannes Buchmann, Erik Dahmen, Elena Klintsevich, Katsuyuki Okeya, Camille Vuillaume
    Merkle Signatures with Virtually Unlimited Signature Capacity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:31-45 [Conf]
  4. Diana von Bidder, David A. Basin, Germano Caronni
    Midpoints Versus Endpoints: From Protocols to Firewalls. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:46-64 [Conf]
  5. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
    An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:65-86 [Conf]
  6. Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng
    Analyzing an Electronic Cash Protocol Using Applied Pi Calculus. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:87-103 [Conf]
  7. Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner
    Cryptanalysis of the TRMC-4 Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:104-115 [Conf]
  8. Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen
    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:116-128 [Conf]
  9. Bahador Bakhshi, Babak Sadeghiyan
    A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:129-140 [Conf]
  10. Stefan Tillich, Christoph Herbst, Stefan Mangard
    Protecting AES Software Implementations on 32-Bit Processors Against Power Analysis. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:141-157 [Conf]
  11. Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won
    Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:158-176 [Conf]
  12. Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu
    Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:177-193 [Conf]
  13. Philip Zigoris, Hongxia Jin
    Bayesian Methods for Practical Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:194-206 [Conf]
  14. Sven Laur, Helger Lipmaa
    A New Protocol for Conditional Disclosure of Secrets and Its Applications. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:207-225 [Conf]
  15. Ronghua Li, Chuankun Wu
    An Unconditionally Secure Protocol for Multi-Party Set Intersection. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:226-236 [Conf]
  16. Keith B. Frikken
    Privacy-Preserving Set Union. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:237-252 [Conf]
  17. Jiangtao Li, Ninghui Li, Rui Xue
    Universal Accumulators with Efficient Nonmembership Proofs. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:253-269 [Conf]
  18. Stanislaw Jarecki, Xiaomin Liu
    Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:270-287 [Conf]
  19. Matthew Green, Giuseppe Ateniese
    Identity-Based Proxy Re-encryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:288-306 [Conf]
  20. Guomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang
    A More Natural Way to Construct Identity-Based Identification Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:307-322 [Conf]
  21. Rui Zhang 0002
    Tweaking TBE/IBE to PKE Transforms with Chameleon Hash Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:323-339 [Conf]
  22. Chunxiang Gu, Yuefei Zhu, Yonghui Zheng
    Certified E-Mail Protocol in the ID-Based Setting. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:340-353 [Conf]
  23. Roberto Tamassia, Nikos Triandopoulos
    Efficient Content Authentication in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:354-372 [Conf]
  24. Fagen Li, Yupu Hu, Chuanrong Zhang
    An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:373-384 [Conf]
  25. Ratna Dutta, Ee-Chien Chang, Sourav Mukhopadhyay
    Efficient Self-healing Key Distribution with Revocation for Wireless Sensor Networks Using One Way Key Chains. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:385-400 [Conf]
  26. Patrick Schaller, Srdjan Capkun, David A. Basin
    BAP: Broadcast Authentication Using Cryptographic Puzzles. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:401-419 [Conf]
  27. Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
    Compressed XTR. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:420-431 [Conf]
  28. Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park
    Sliding Window Method for NTRU. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:432-442 [Conf]
  29. Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee
    Efficient Certificateless Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:443-458 [Conf]
  30. Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi
    Security Mediated Certificateless Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:459-477 [Conf]
  31. Laila El Aimani, Damien Vergnaud
    Gradually Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:478-496 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002