The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptology and Network Security (cans)
2009 (conf/cans/2009)


  1. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. [Citation Graph (, )][DBLP]


  2. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. [Citation Graph (, )][DBLP]


  3. On Cryptographic Schemes Based on Discrete Logarithms and Factoring. [Citation Graph (, )][DBLP]


  4. Asymptotically Optimal and Private Statistical Estimation. [Citation Graph (, )][DBLP]


  5. Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. [Citation Graph (, )][DBLP]


  6. Saturation Attack on the Block Cipher HIGHT. [Citation Graph (, )][DBLP]


  7. Extensions of the Cube Attack Based on Low Degree Annihilators. [Citation Graph (, )][DBLP]


  8. An Analysis of the Compact XSL Attack on BES and Embedded SMS4. [Citation Graph (, )][DBLP]


  9. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. [Citation Graph (, )][DBLP]


  10. Anonymizer-Enabled Security and Privacy for RFID. [Citation Graph (, )][DBLP]


  11. Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. [Citation Graph (, )][DBLP]


  12. DepenDNS: Dependable Mechanism against DNS Cache Poisoning. [Citation Graph (, )][DBLP]


  13. Privacy-Preserving Relationship Path Discovery in Social Networks. [Citation Graph (, )][DBLP]


  14. Verifying Anonymous Credential Systems in Applied Pi Calculus. [Citation Graph (, )][DBLP]


  15. Transferable Constant-Size Fair E-Cash. [Citation Graph (, )][DBLP]


  16. A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. [Citation Graph (, )][DBLP]


  17. Private-Key Hidden Vector Encryption with Key Confidentiality. [Citation Graph (, )][DBLP]


  18. Building Secure Networked Systems with Code Attestation. [Citation Graph (, )][DBLP]


  19. HPAKE : Password Authentication Secure against Cross-Site User Impersonation. [Citation Graph (, )][DBLP]


  20. An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. [Citation Graph (, )][DBLP]


  21. Ensuring Authentication of Digital Information Using Cryptographic Accumulators. [Citation Graph (, )][DBLP]


  22. MIBS: A New Lightweight Block Cipher. [Citation Graph (, )][DBLP]


  23. Distinguishing and Second-Preimage Attacks on CBC-Like MACs. [Citation Graph (, )][DBLP]


  24. Improving the Rainbow Attack by Reusing Colours. [Citation Graph (, )][DBLP]


  25. Side Channel Cube Attack on PRESENT. [Citation Graph (, )][DBLP]


  26. Algebraic Attack on the MQQ Public Key Cryptosystem. [Citation Graph (, )][DBLP]


  27. Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. [Citation Graph (, )][DBLP]


  28. Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves. [Citation Graph (, )][DBLP]


  29. On the Complexity of Computing Discrete Logarithms over Algebraic Tori. [Citation Graph (, )][DBLP]


  30. On the Usability of Secure Association of Wireless Devices Based on Distance Bounding. [Citation Graph (, )][DBLP]


  31. Short Hash-Based Signatures for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  32. Computing on Encrypted Data. [Citation Graph (, )][DBLP]


  33. Fully Robust Tree-Diffie-Hellman Group Key Exchange. [Citation Graph (, )][DBLP]


  34. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. [Citation Graph (, )][DBLP]


  35. Relinkable Ring Signature. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002