The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Cryptography and Network Security (acns)
2008 (conf/acns/2008)


  1. On the Effectiveness of Internal Patching Against File-Sharing Worms. [Citation Graph (, )][DBLP]


  2. Peeking Through the Cloud: DNS-Based Estimation and Its Applications. [Citation Graph (, )][DBLP]


  3. Pushback for Overlay Networks: Protecting Against Malicious Insiders. [Citation Graph (, )][DBLP]


  4. PPAA: Peer-to-Peer Anonymous Authentication. [Citation Graph (, )][DBLP]


  5. Generic Constructions of Stateful Public Key Encryption and Their Applications. [Citation Graph (, )][DBLP]


  6. Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  7. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. [Citation Graph (, )][DBLP]


  8. Attacking Reduced Round SHA-256. [Citation Graph (, )][DBLP]


  9. Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography. [Citation Graph (, )][DBLP]


  10. Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?. [Citation Graph (, )][DBLP]


  11. Replay Attack in a Fair Exchange Protocol. [Citation Graph (, )][DBLP]


  12. Improved Conditional E-Payments. [Citation Graph (, )][DBLP]


  13. Anonymity in Transferable E-cash. [Citation Graph (, )][DBLP]


  14. Generic Security-Amplifying Methods of Ordinary Digital Signatures. [Citation Graph (, )][DBLP]


  15. New Differential-Algebraic Attacks and Reparametrization of Rainbow. [Citation Graph (, )][DBLP]


  16. TrapdoorSanitizable Signatures and Their Application to Content Protection. [Citation Graph (, )][DBLP]


  17. Multi-factor Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  18. Repelling Detour Attack Against Onions with Re-encryption. [Citation Graph (, )][DBLP]


  19. Analysis of EAP-GPSK Authentication Protocol. [Citation Graph (, )][DBLP]


  20. Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns. [Citation Graph (, )][DBLP]


  21. PUF-HB: A Tamper-Resilient HB Based Authentication Protocol. [Citation Graph (, )][DBLP]


  22. An Authentication Scheme Based on the Twisted Conjugacy Problem. [Citation Graph (, )][DBLP]


  23. Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. [Citation Graph (, )][DBLP]


  24. A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation. [Citation Graph (, )][DBLP]


  25. On the Security of the CCM Encryption Mode and of a Slight Variant. [Citation Graph (, )][DBLP]


  26. wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm. [Citation Graph (, )][DBLP]


  27. A Very Compact "Perfectly Masked" S-Box for AES. [Citation Graph (, )][DBLP]


  28. Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  29. Traceable Privacy of Recent Provably-Secure RFID Protocols. [Citation Graph (, )][DBLP]


  30. The Security of EPC Gen2 Compliant RFID Protocols. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002