|
Conferences in DBLP
(iwsec) 2008 (conf/iwsec/2008)
On Generating Elements of Orders Dividing p2k±pk+1. [Citation Graph (, )][DBLP]
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. [Citation Graph (, )][DBLP]
Remarks on the Attack of Fouque et al. against the lIC Scheme. [Citation Graph (, )][DBLP]
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. [Citation Graph (, )][DBLP]
Signcryption Scheme in Multi-user Setting without Random Oracles. [Citation Graph (, )][DBLP]
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices. [Citation Graph (, )][DBLP]
The Superdiversifier: Peephole Individualization for Software Protection. [Citation Graph (, )][DBLP]
Detecting Java Theft Based on Static API Trace Birthmark. [Citation Graph (, )][DBLP]
Online Network Forensics for Automatic Repair Validation. [Citation Graph (, )][DBLP]
Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]
Involuntary Information Leakage in Social Network Services. [Citation Graph (, )][DBLP]
Privacy Preserving Computations without Public Key Cryptographic Operation. [Citation Graph (, )][DBLP]
A Novel Framework for Watermarking: The Data-Abstracted Approach. [Citation Graph (, )][DBLP]
The Elliptic Curve Discrete Logarithm Problem: State of the Art. [Citation Graph (, )][DBLP]
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. [Citation Graph (, )][DBLP]
Analysis of a Biometric Authentication Protocol for Signature Creation Application. [Citation Graph (, )][DBLP]
Efficient Secure Labeling Method under Dynamic XML Data Streams. [Citation Graph (, )][DBLP]
Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems. [Citation Graph (, )][DBLP]
The Long-Short-Key Primitive and Its Applications to Key Security. [Citation Graph (, )][DBLP]
|