|
Conferences in DBLP
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. [Citation Graph (, )][DBLP]
Integral Attacks on Reduced-Round ARIA Block Cipher. [Citation Graph (, )][DBLP]
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. [Citation Graph (, )][DBLP]
On the Security of NOEKEON against Side Channel Cube Attacks. [Citation Graph (, )][DBLP]
On Fast and Approximate Attack Tree Computations. [Citation Graph (, )][DBLP]
Width-3 Joint Sparse Form. [Citation Graph (, )][DBLP]
Accelerating Inverse of GF(2n) with Precomputation. [Citation Graph (, )][DBLP]
Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis. [Citation Graph (, )][DBLP]
The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups. [Citation Graph (, )][DBLP]
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. [Citation Graph (, )][DBLP]
Host-Based Security Sensor Integrity in Multiprocessing Environments. [Citation Graph (, )][DBLP]
Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. [Citation Graph (, )][DBLP]
Rate-Based Watermark Traceback: A New Approach. [Citation Graph (, )][DBLP]
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. [Citation Graph (, )][DBLP]
Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk. [Citation Graph (, )][DBLP]
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . [Citation Graph (, )][DBLP]
A Trustworthy ID Management Mechanism in Open Market. [Citation Graph (, )][DBLP]
BioID: Biometric-Based Identity Management. [Citation Graph (, )][DBLP]
Privacy Preserving of Trust Management Credentials Based on Trusted Computing. [Citation Graph (, )][DBLP]
Mitigating the Malicious Trust Expansion in Social Network Service. [Citation Graph (, )][DBLP]
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. [Citation Graph (, )][DBLP]
Certificateless KEM and Hybrid Signcryption Schemes Revisited. [Citation Graph (, )][DBLP]
A Deniable Group Key Establishment Protocol in the Standard Model. [Citation Graph (, )][DBLP]
Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. [Citation Graph (, )][DBLP]
Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis. [Citation Graph (, )][DBLP]
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. [Citation Graph (, )][DBLP]
Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]
Protection Profile for Secure E-Voting Systems. [Citation Graph (, )][DBLP]
|