|
Conferences in DBLP
- Fuchun Guo, Yi Mu, Zhide Chen
Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:1-14 [Conf]
- Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
A Generic Construction for Universally-Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:15-33 [Conf]
- Loránd Szöllösi, Tamás Marosits, Gábor Fehér, András Recski
Fast Digital Signature Algorithm Based on Subgraph Isomorphism. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:34-46 [Conf]
- Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
Efficient ID-Based Digital Signatures with Message Recovery. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:47-59 [Conf]
- Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini
Achieving Mobility and Anonymity in IP-Based Networks. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:60-79 [Conf]
- Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:80-101 [Conf]
- Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk
Forward-Secure Key Evolution in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:102-120 [Conf]
- Jihwan Lim, Sangjin Kim, Heekuck Oh
A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:121-132 [Conf]
- Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin
An Intelligent Network-Warning Model with Strong Survivability. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:133-145 [Conf]
- Sherman S. M. Chow
Running on Karma - P2P Reputation and Currency Systems. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:146-158 [Conf]
- Rui Zhang 0002, Hideki Imai
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:159-174 [Conf]
- Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
Extended Private Information Retrieval and Its Application in Biometrics Authentications. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:175-193 [Conf]
- Yinxia Sun, Futai Zhang, Joonsang Baek
Strongly Secure Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:194-208 [Conf]
- Solahuddin B. Shamsuddin, Michael E. Woodward
Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:209-227 [Conf]
- Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu
How to Secure Your Email Address Book and Beyond. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:228-246 [Conf]
- Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
Toward Non-parallelizable Client Puzzles. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:247-264 [Conf]
- Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. [Citation Graph (0, 0)][DBLP] CANS, 2007, pp:265-281 [Conf]
|