|
Conferences in DBLP
On the Effectiveness of Internal Patching Against File-Sharing Worms. [Citation Graph (, )][DBLP]
Peeking Through the Cloud: DNS-Based Estimation and Its Applications. [Citation Graph (, )][DBLP]
Pushback for Overlay Networks: Protecting Against Malicious Insiders. [Citation Graph (, )][DBLP]
PPAA: Peer-to-Peer Anonymous Authentication. [Citation Graph (, )][DBLP]
Generic Constructions of Stateful Public Key Encryption and Their Applications. [Citation Graph (, )][DBLP]
Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP]
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. [Citation Graph (, )][DBLP]
Attacking Reduced Round SHA-256. [Citation Graph (, )][DBLP]
Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. [Citation Graph (, )][DBLP]
Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. [Citation Graph (, )][DBLP]
Replay Attack in a Fair Exchange Protocol. [Citation Graph (, )][DBLP]
Improved Conditional E-Payments. [Citation Graph (, )][DBLP]
Anonymity in Transferable E-cash. [Citation Graph (, )][DBLP]
Generic Security-Amplifying Methods of Ordinary Digital Signatures. [Citation Graph (, )][DBLP]
New Differential-Algebraic Attacks and Reparametrization of Rainbow. [Citation Graph (, )][DBLP]
TrapdoorSanitizable Signatures and Their Application to Content Protection. [Citation Graph (, )][DBLP]
Multi-factor Authenticated Key Exchange. [Citation Graph (, )][DBLP]
Repelling Detour Attack Against Onions with Re-encryption. [Citation Graph (, )][DBLP]
Analysis of EAP-GPSK Authentication Protocol. [Citation Graph (, )][DBLP]
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. [Citation Graph (, )][DBLP]
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. [Citation Graph (, )][DBLP]
An Authentication Scheme Based on the Twisted Conjugacy Problem. [Citation Graph (, )][DBLP]
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. [Citation Graph (, )][DBLP]
A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. [Citation Graph (, )][DBLP]
On the Security of the CCM Encryption Mode and of a Slight Variant. [Citation Graph (, )][DBLP]
wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. [Citation Graph (, )][DBLP]
A Very Compact "Perfectly Masked" S-Box for AES. [Citation Graph (, )][DBLP]
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Traceable Privacy of Recent Provably-Secure RFID Protocols. [Citation Graph (, )][DBLP]
The Security of EPC Gen2 Compliant RFID Protocols. [Citation Graph (, )][DBLP]
|