|
Conferences in DBLP
Property-Based TPM Virtualization. [Citation Graph (, )][DBLP]
A Demonstrative Ad Hoc Attestation System. [Citation Graph (, )][DBLP]
Property-Based Attestation without a Trusted Third Party. [Citation Graph (, )][DBLP]
The Reduced Address Space (RAS) for Application Memory Authentication. [Citation Graph (, )][DBLP]
An Efficient PIR Construction Using Trusted Hardware. [Citation Graph (, )][DBLP]
Athos: Efficient Authentication of Outsourced File Systems. [Citation Graph (, )][DBLP]
BotTracer: Execution-Based Bot-Like Malware Detection. [Citation Graph (, )][DBLP]
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. [Citation Graph (, )][DBLP]
Distinguishing between FE and DDoS Using Randomness Check. [Citation Graph (, )][DBLP]
Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]
Compromising Anonymity Using Packet Spinning. [Citation Graph (, )][DBLP]
Behavior-Based Network Access Control: A Proof-of-Concept. [Citation Graph (, )][DBLP]
Path-Based Access Control for Enterprise Networks. [Citation Graph (, )][DBLP]
Cryptanalysis of Rabbit. [Citation Graph (, )][DBLP]
Algebraic Attack on HFE Revisited. [Citation Graph (, )][DBLP]
Revisiting Wiener's Attack - New Weak Keys in RSA. [Citation Graph (, )][DBLP]
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. [Citation Graph (, )][DBLP]
Proxy Re-signatures in the Standard Model. [Citation Graph (, )][DBLP]
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. [Citation Graph (, )][DBLP]
Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]
Improved Impossible Differential Attacks on Large-Block Rijndael. [Citation Graph (, )][DBLP]
A Five-Round Algebraic Property of the Advanced Encryption Standard. [Citation Graph (, )][DBLP]
Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. [Citation Graph (, )][DBLP]
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. [Citation Graph (, )][DBLP]
Collisions for RC4-Hash. [Citation Graph (, )][DBLP]
New Applications of Differential Bounds of the SDS Structure. [Citation Graph (, )][DBLP]
HAPADEP: Human-Assisted Pure Audio Device Pairing. [Citation Graph (, )][DBLP]
One-Time Password Access to Any Server without Changing the Server. [Citation Graph (, )][DBLP]
Can "Something You Know" Be Saved?. [Citation Graph (, )][DBLP]
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. [Citation Graph (, )][DBLP]
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. [Citation Graph (, )][DBLP]
Strong Accumulators from Collision-Resistant Hashing. [Citation Graph (, )][DBLP]
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. [Citation Graph (, )][DBLP]
|