The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Information Security and Cryptology (cisc)
2008 (conf/cisc/2008x)


  1. The State of Hash Functions and the NIST SHA-3 Competition. [Citation Graph (, )][DBLP]


  2. Key Evolution Systems in Untrusted Update Environments. [Citation Graph (, )][DBLP]


  3. Secure and Privacy-Preserving Information Brokering. [Citation Graph (, )][DBLP]


  4. Provably Secure Convertible Nominative Signature Scheme. [Citation Graph (, )][DBLP]


  5. Cryptanalysis of Two Ring Signcryption Schemes. [Citation Graph (, )][DBLP]


  6. Efficient Signcryption Key Encapsulation without Random Oracles. [Citation Graph (, )][DBLP]


  7. Strong Anonymous Signatures. [Citation Graph (, )][DBLP]


  8. Publicly Verifiable Privacy-Preserving Group Decryption. [Citation Graph (, )][DBLP]


  9. Privacy for Private Key in Signatures. [Citation Graph (, )][DBLP]


  10. Security of Truncated MACs. [Citation Graph (, )][DBLP]


  11. Security Analysis of Multivariate Polynomials for Hashing. [Citation Graph (, )][DBLP]


  12. SPVT-II: An Efficient Security Protocol Verifier Based on Logic Programming. [Citation Graph (, )][DBLP]


  13. Batch ZK Proof and Verification of OR Logic. [Citation Graph (, )][DBLP]


  14. Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. [Citation Graph (, )][DBLP]


  15. Impossible Differential Analysis of Reduced Round CLEFIA. [Citation Graph (, )][DBLP]


  16. Reducible Polynomial over F2 Constructed by Trinomial sigma-LFSR. [Citation Graph (, )][DBLP]


  17. Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. [Citation Graph (, )][DBLP]


  18. Further Observations on Certificateless Public Key Encryption. [Citation Graph (, )][DBLP]


  19. Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. [Citation Graph (, )][DBLP]


  20. New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. [Citation Graph (, )][DBLP]


  21. A Novel Marking Probability Distribution Using Probability Propagation in Hierarchical WSN. [Citation Graph (, )][DBLP]


  22. Key Predistribution Schemes Using Codes in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  23. Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  24. On the Computational Efficiency of XTR+. [Citation Graph (, )][DBLP]


  25. A Variant of Boneh-Gentry-Hamburg's Pairing-Free Identity Based Encryption Scheme. [Citation Graph (, )][DBLP]


  26. Inter-domain Identity-Based Proxy Re-encryption. [Citation Graph (, )][DBLP]


  27. Hardening Botnet by a Rational Botmaster. [Citation Graph (, )][DBLP]


  28. Separation of Duty in Trust-Based Collaboration. [Citation Graph (, )][DBLP]


  29. An Integrity Assurance Mechanism for Run-Time Programs. [Citation Graph (, )][DBLP]


  30. A Security and Performance Evaluation of Hash-Based RFID Protocols. [Citation Graph (, )][DBLP]


  31. Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002