|
Conferences in DBLP
Constructive Cryptography - A Primer. [Citation Graph (, )][DBLP]
Security Mechanisms with Selfish Players in Wireless Networks. [Citation Graph (, )][DBLP]
Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory. [Citation Graph (, )][DBLP]
Multichannel Protocols to Prevent Relay Attacks. [Citation Graph (, )][DBLP]
A Traceability Attack against e-Passports. [Citation Graph (, )][DBLP]
Secure Computation with Fixed-Point Numbers. [Citation Graph (, )][DBLP]
Implementing a High-Assurance Smart-Card OS. [Citation Graph (, )][DBLP]
Unlinkable Priced Oblivious Transfer with Rechargeable Wallets. [Citation Graph (, )][DBLP]
Multiple Denominations in E-cash with Compact Transaction Data. [Citation Graph (, )][DBLP]
What's in a Name? [Citation Graph (, )][DBLP]
Cryptographic Protocol Analysis of AN.ON. [Citation Graph (, )][DBLP]
A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys. [Citation Graph (, )][DBLP]
Practical Private Set Intersection Protocols with Linear Complexity. [Citation Graph (, )][DBLP]
Design and Implementation of a Key-Lifecycle Management System. [Citation Graph (, )][DBLP]
Measuring the Perpetrators and Funders of Typosquatting. [Citation Graph (, )][DBLP]
A Learning-Based Approach to Reactive Security. [Citation Graph (, )][DBLP]
Embedded SFE: Offloading Server and Network Using Hardware Tokens. [Citation Graph (, )][DBLP]
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors. [Citation Graph (, )][DBLP]
Building Incentives into Tor. [Citation Graph (, )][DBLP]
Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections. [Citation Graph (, )][DBLP]
Automatically Preparing Safe SQL Queries. [Citation Graph (, )][DBLP]
PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure. [Citation Graph (, )][DBLP]
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. [Citation Graph (, )][DBLP]
Designing for Audit: A Voting Machine with a Tiny TCB. [Citation Graph (, )][DBLP]
Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits. [Citation Graph (, )][DBLP]
Security Applications of Diodes with Unique Current-Voltage Characteristics. [Citation Graph (, )][DBLP]
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. [Citation Graph (, )][DBLP]
All You Can Eat or Breaking a Real-World Contactless Payment System. [Citation Graph (, )][DBLP]
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model. [Citation Graph (, )][DBLP]
Using Sphinx to Improve Onion Routing Circuit Construction. [Citation Graph (, )][DBLP]
Secure Multiparty AES. [Citation Graph (, )][DBLP]
Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis. [Citation Graph (, )][DBLP]
On Robust Key Agreement Based on Public Key Authentication. [Citation Graph (, )][DBLP]
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing. [Citation Graph (, )][DBLP]
Signatures of Reputation. [Citation Graph (, )][DBLP]
Intention-Disguised Algorithmic Trading. [Citation Graph (, )][DBLP]
When Information Improves Information Security. [Citation Graph (, )][DBLP]
BetterThanPin: Empowering Users to Fight Phishing (Poster). [Citation Graph (, )][DBLP]
Certification Intermediaries and the Alternative (Poster). [Citation Graph (, )][DBLP]
SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs. [Citation Graph (, )][DBLP]
Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks. [Citation Graph (, )][DBLP]
Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols. [Citation Graph (, )][DBLP]
hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers. [Citation Graph (, )][DBLP]
|