The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Practice and Experience (ispec)
2008 (conf/ispec/2008)


  1. Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. [Citation Graph (, )][DBLP]


  2. An On-Line Secure E-Passport Protocol. [Citation Graph (, )][DBLP]


  3. Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. [Citation Graph (, )][DBLP]


  4. 1-out-of-. [Citation Graph (, )][DBLP]


  5. A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. [Citation Graph (, )][DBLP]


  6. Private Query on Encrypted Data in Multi-user Settings. [Citation Graph (, )][DBLP]


  7. Towards Tamper Resistant Code Encryption: Practice and Experience. [Citation Graph (, )][DBLP]


  8. A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. [Citation Graph (, )][DBLP]


  9. RSA Moduli with a Predetermined Portion: Techniques and Applications. [Citation Graph (, )][DBLP]


  10. Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. [Citation Graph (, )][DBLP]


  11. Secure Cryptographic Precomputation with Insecure Memory. [Citation Graph (, )][DBLP]


  12. Securing Peer-to-Peer Distributions for Mobile Devices. [Citation Graph (, )][DBLP]


  13. Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. [Citation Graph (, )][DBLP]


  14. Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. [Citation Graph (, )][DBLP]


  15. PROBE: A Process Behavior-Based Host Intrusion Prevention System. [Citation Graph (, )][DBLP]


  16. Towards the World-Wide Quantum Network. [Citation Graph (, )][DBLP]


  17. Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. [Citation Graph (, )][DBLP]


  18. Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. [Citation Graph (, )][DBLP]


  19. Privacy of Recent RFID Authentication Protocols. [Citation Graph (, )][DBLP]


  20. A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. [Citation Graph (, )][DBLP]


  21. An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. [Citation Graph (, )][DBLP]


  22. Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. [Citation Graph (, )][DBLP]


  23. Secure Computation of the Vector Dominance Problem. [Citation Graph (, )][DBLP]


  24. Rational Secret Sharing with Repeated Games. [Citation Graph (, )][DBLP]


  25. Distributed Private Matching and Set Operations. [Citation Graph (, )][DBLP]


  26. Computational Soundness of Non-Malleable Commitments. [Citation Graph (, )][DBLP]


  27. Square Attack on Reduced-Round Zodiac Cipher. [Citation Graph (, )][DBLP]


  28. Analysis of Zipper as a Hash Function. [Citation Graph (, )][DBLP]


  29. On the Importance of the Key Separation Principle for Different Modes of Operation. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002