The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Cryptography and Network Security (acns)
2009 (conf/acns/2009)

  1. Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys. [Citation Graph (, )][DBLP]

  2. Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. [Citation Graph (, )][DBLP]

  3. Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior. [Citation Graph (, )][DBLP]

  4. How to Extract and Expand Randomness: A Summary and Explanation of Existing Results. [Citation Graph (, )][DBLP]

  5. Novel Precomputation Schemes for Elliptic Curve Cryptosystems. [Citation Graph (, )][DBLP]

  6. Practical Secure Evaluation of Semi-private Functions. [Citation Graph (, )][DBLP]

  7. Secure Hamming Distance Based Computation and Its Applications. [Citation Graph (, )][DBLP]

  8. Efficient Robust Private Set Intersection. [Citation Graph (, )][DBLP]

  9. A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]

  10. An Efficient Identity-Based Online/Offline Encryption Scheme. [Citation Graph (, )][DBLP]

  11. Dual-Policy Attribute Based Encryption. [Citation Graph (, )][DBLP]

  12. Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions. [Citation Graph (, )][DBLP]

  13. Malyzer: Defeating Anti-detection for Application-Level Malware Analysis. [Citation Graph (, )][DBLP]

  14. A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks. [Citation Graph (, )][DBLP]

  15. Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. [Citation Graph (, )][DBLP]

  16. Tracing and Revoking Pirate Rebroadcasts. [Citation Graph (, )][DBLP]

  17. Efficient Deniable Authentication for Signatures. [Citation Graph (, )][DBLP]

  18. Homomorphic MACs: MAC-Based Integrity for Network Coding. [Citation Graph (, )][DBLP]

  19. Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. [Citation Graph (, )][DBLP]

  20. Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. [Citation Graph (, )][DBLP]

  21. Cryptanalysis of Twister. [Citation Graph (, )][DBLP]

  22. Cryptanalysis of CubeHash. [Citation Graph (, )][DBLP]

  23. Collision Attack on Boole. [Citation Graph (, )][DBLP]

  24. Integrity Protection for Revision Control. [Citation Graph (, )][DBLP]

  25. Fragility of the Robust Security Network: 802.11 Denial of Service. [Citation Graph (, )][DBLP]

  26. Fast Packet Classification Using Condition Factorization. [Citation Graph (, )][DBLP]

  27. Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches. [Citation Graph (, )][DBLP]

  28. Broadcast Attacks against Lattice-Based Cryptosystems. [Citation Graph (, )][DBLP]

  29. Partial Key Exposure Attack on CRT-RSA. [Citation Graph (, )][DBLP]

  30. How to Compare Profiled Side-Channel Attacks?. [Citation Graph (, )][DBLP]

  31. Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis. [Citation Graph (, )][DBLP]

  32. Attacking ECDSA-Enabled RFID Devices. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002