The SCEAS System
Navigation Menu

Conferences in DBLP

(iwsec)
2008 (conf/iwsec/2008)


  1. On Generating Elements of Orders Dividing p2k±pk+1. [Citation Graph (, )][DBLP]


  2. Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. [Citation Graph (, )][DBLP]


  3. Remarks on the Attack of Fouque et al. against the lIC Scheme. [Citation Graph (, )][DBLP]


  4. Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. [Citation Graph (, )][DBLP]


  5. Signcryption Scheme in Multi-user Setting without Random Oracles. [Citation Graph (, )][DBLP]


  6. Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices. [Citation Graph (, )][DBLP]


  7. The Superdiversifier: Peephole Individualization for Software Protection. [Citation Graph (, )][DBLP]


  8. Detecting Java Theft Based on Static API Trace Birthmark. [Citation Graph (, )][DBLP]


  9. Online Network Forensics for Automatic Repair Validation. [Citation Graph (, )][DBLP]


  10. Return Value Predictability Profiles for Self-healing. [Citation Graph (, )][DBLP]


  11. Involuntary Information Leakage in Social Network Services. [Citation Graph (, )][DBLP]


  12. Privacy Preserving Computations without Public Key Cryptographic Operation. [Citation Graph (, )][DBLP]


  13. A Novel Framework for Watermarking: The Data-Abstracted Approach. [Citation Graph (, )][DBLP]


  14. The Elliptic Curve Discrete Logarithm Problem: State of the Art. [Citation Graph (, )][DBLP]


  15. An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. [Citation Graph (, )][DBLP]


  16. Analysis of a Biometric Authentication Protocol for Signature Creation Application. [Citation Graph (, )][DBLP]


  17. Efficient Secure Labeling Method under Dynamic XML Data Streams. [Citation Graph (, )][DBLP]


  18. Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems. [Citation Graph (, )][DBLP]


  19. The Long-Short-Key Primitive and Its Applications to Key Security. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002