The SCEAS System
Navigation Menu

Conferences in DBLP

Financial Cryptography (fc)
2010 (conf/fc/2010w)


  1. WLC Preface. [Citation Graph (, )][DBLP]


  2. Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices. [Citation Graph (, )][DBLP]


  3. Lighten Encryption Schemes for Secure and Private RFID Systems. [Citation Graph (, )][DBLP]


  4. Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags. [Citation Graph (, )][DBLP]


  5. A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. [Citation Graph (, )][DBLP]


  6. Reliable Food Traceability Using RFID Tagging. [Citation Graph (, )][DBLP]


  7. Lightweight Cryptography and DPA Countermeasures: A Survey. [Citation Graph (, )][DBLP]


  8. Securing the Use of RFID-Enabled Banknotes. [Citation Graph (, )][DBLP]


  9. Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. [Citation Graph (, )][DBLP]


  10. RLCPS Preface. [Citation Graph (, )][DBLP]


  11. SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications. [Citation Graph (, )][DBLP]


  12. A Secure and Privacy-Preserving Targeted Ad-System. [Citation Graph (, )][DBLP]


  13. Cryptographic Cloud Storage. [Citation Graph (, )][DBLP]


  14. Extending IPsec for Efficient Remote Attestation. [Citation Graph (, )][DBLP]


  15. Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions. [Citation Graph (, )][DBLP]


  16. How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. [Citation Graph (, )][DBLP]


  17. WECSR Preface. [Citation Graph (, )][DBLP]


  18. Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals. [Citation Graph (, )][DBLP]


  19. A Case Study on Measuring Statistical Data in the Tor Anonymity Network. [Citation Graph (, )][DBLP]


  20. A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets. [Citation Graph (, )][DBLP]


  21. Ethical Proactive Threat Research. [Citation Graph (, )][DBLP]


  22. A Framework for Understanding and Applying Ethical Principles in Network and Security Research. [Citation Graph (, )][DBLP]


  23. Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects. [Citation Graph (, )][DBLP]


  24. Ethical Guidelines for Computer Security Researchers: "Be Reasonable". [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002