The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptology and Network Security (cans)
2007 (conf/cans/2007)

  1. Fuchun Guo, Yi Mu, Zhide Chen
    Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:1-14 [Conf]
  2. Xinyi Huang, Yi Mu, Willy Susilo, Wei Wu
    A Generic Construction for Universally-Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:15-33 [Conf]
  3. Loránd Szöllösi, Tamás Marosits, Gábor Fehér, András Recski
    Fast Digital Signature Algorithm Based on Subgraph Isomorphism. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:34-46 [Conf]
  4. Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto
    Efficient ID-Based Digital Signatures with Message Recovery. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:47-59 [Conf]
  5. Rungrat Wiangsripanawan, Willy Susilo, Reihaneh Safavi-Naini
    Achieving Mobility and Anonymity in IP-Based Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:60-79 [Conf]
  6. Arpita Patra, Bhavani Shankar, Ashish Choudhary, K. Srinathan, C. Pandu Rangan
    Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:80-101 [Conf]
  7. Marek Klonowski, Miroslaw Kutylowski, Michal Ren, Katarzyna Rybarczyk
    Forward-Secure Key Evolution in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:102-120 [Conf]
  8. Jihwan Lim, Sangjin Kim, Heekuck Oh
    A Secure Location Service for Ad Hoc Position-Based Routing Using Self-signed Locations. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:121-132 [Conf]
  9. Bing Yang, Huaping Hu, Xiangwen Duan, Shiyao Jin
    An Intelligent Network-Warning Model with Strong Survivability. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:133-145 [Conf]
  10. Sherman S. M. Chow
    Running on Karma - P2P Reputation and Currency Systems. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:146-158 [Conf]
  11. Rui Zhang 0002, Hideki Imai
    Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:159-174 [Conf]
  12. Julien Bringer, Hervé Chabanne, David Pointcheval, Qiang Tang
    Extended Private Information Retrieval and Its Application in Biometrics Authentications. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:175-193 [Conf]
  13. Yinxia Sun, Futai Zhang, Joonsang Baek
    Strongly Secure Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:194-208 [Conf]
  14. Solahuddin B. Shamsuddin, Michael E. Woodward
    Modeling Protocol Based Packet Header Anomaly Detector for Network and Host Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:209-227 [Conf]
  15. Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu
    How to Secure Your Email Address Book and Beyond. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:228-246 [Conf]
  16. Suratose Tritilanunt, Colin Boyd, Ernest Foo, Juan Manuel González Nieto
    Toward Non-parallelizable Client Puzzles. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:247-264 [Conf]
  17. Vicente Benjumea, Seung Geol Choi, Javier Lopez, Moti Yung
    Anonymity 2.0 - X.509 Extensions Supporting Privacy-Friendly Authentication. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:265-281 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002