The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Cryptography and Network Security (acns)
2010 (conf/acns/2010)

  1. On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption. [Citation Graph (, )][DBLP]

  2. How to Construct Interval Encryption from Binary Tree Encryption. [Citation Graph (, )][DBLP]

  3. Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. [Citation Graph (, )][DBLP]

  4. Trapdoor Sanitizable Signatures Made Easy. [Citation Graph (, )][DBLP]

  5. Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs. [Citation Graph (, )][DBLP]

  6. Redactable Signatures for Tree-Structured Data: Definitions and Constructions. [Citation Graph (, )][DBLP]

  7. Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions. [Citation Graph (, )][DBLP]

  8. Multi-trail Statistical Saturation Attacks. [Citation Graph (, )][DBLP]

  9. Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) . [Citation Graph (, )][DBLP]

  10. High Performance GHASH Function for Long Messages. [Citation Graph (, )][DBLP]

  11. Principles on the Security of AES against First and Second-Order Differential Power Analysis. [Citation Graph (, )][DBLP]

  12. Adaptive Chosen-Message Side-Channel Attacks. [Citation Graph (, )][DBLP]

  13. Secure Multiplicative Masking of Power Functions. [Citation Graph (, )][DBLP]

  14. Batch Groth-Sahai. [Citation Graph (, )][DBLP]

  15. Efficient and Secure Evaluation of Multivariate Polynomials and Applications. [Citation Graph (, )][DBLP]

  16. Efficient Implementation of the Orlandi Protocol. [Citation Graph (, )][DBLP]

  17. Improving the Round Complexity of Traitor Tracing Schemes. [Citation Graph (, )][DBLP]

  18. Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters. [Citation Graph (, )][DBLP]

  19. Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead. [Citation Graph (, )][DBLP]

  20. Deniable Internet Key Exchange. [Citation Graph (, )][DBLP]

  21. A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm. [Citation Graph (, )][DBLP]

  22. Secure Sketch for Multiple Secrets. [Citation Graph (, )][DBLP]

  23. A Message Recognition Protocol Based on Standard Assumptions. [Citation Graph (, )][DBLP]

  24. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. [Citation Graph (, )][DBLP]

  25. Privacy-Preserving Group Discovery with Linear Complexity. [Citation Graph (, )][DBLP]

  26. Two New Efficient PIR-Writing Protocols. [Citation Graph (, )][DBLP]

  27. Regulatory Compliant Oblivious RAM. [Citation Graph (, )][DBLP]

  28. Revisiting Unpredictability-Based RFID Privacy Models. [Citation Graph (, )][DBLP]

  29. On RFID Privacy with Mutual Authentication and Tag Corruption. [Citation Graph (, )][DBLP]

  30. Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures. [Citation Graph (, )][DBLP]

  31. COP: A Step toward Children Online Privacy. [Citation Graph (, )][DBLP]

  32. A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002