The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Communication Networks (scn)
2010 (conf/scn/2010)


  1. Time-Specific Encryption. [Citation Graph (, )][DBLP]


  2. Public-Key Encryption with Efficient Amortized Updates. [Citation Graph (, )][DBLP]


  3. Generic Constructions of Parallel Key-Insulated Encryption. [Citation Graph (, )][DBLP]


  4. Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk). [Citation Graph (, )][DBLP]


  5. Differential Fault Analysis of LEX. [Citation Graph (, )][DBLP]


  6. Generalized RC4 Key Collisions and Hash Collisions. [Citation Graph (, )][DBLP]


  7. On the Indifferentiability of the Grøstl Hash Function. [Citation Graph (, )][DBLP]


  8. Algorithmic Tamper-Proof Security under Probing Attacks. [Citation Graph (, )][DBLP]


  9. Leakage-Resilient Storage. [Citation Graph (, )][DBLP]


  10. Searching Keywords with Wildcards on Encrypted Data. [Citation Graph (, )][DBLP]


  11. Threshold Attribute-Based Signcryption. [Citation Graph (, )][DBLP]


  12. Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. [Citation Graph (, )][DBLP]


  13. Improved Primitives for Secure Multiparty Integer Computation. [Citation Graph (, )][DBLP]


  14. How to Pair with a Human. [Citation Graph (, )][DBLP]


  15. A New Security Model for Authenticated Key Agreement. [Citation Graph (, )][DBLP]


  16. A Security Enhancement and Proof for Authentication and Key Agreement (AKA). [Citation Graph (, )][DBLP]


  17. Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model. [Citation Graph (, )][DBLP]


  18. Kleptography from Standard Assumptions and Applications. [Citation Graph (, )][DBLP]


  19. Provably Secure Convertible Undeniable Signatures with Unambiguity. [Citation Graph (, )][DBLP]


  20. History-Free Aggregate Message Authentication Codes. [Citation Graph (, )][DBLP]


  21. Recursive Lattice Reduction. [Citation Graph (, )][DBLP]


  22. Adaptively Secure Identity-Based Identification from Lattices without Random Oracles. [Citation Graph (, )][DBLP]


  23. The Fiat-Shamir Transform for Group and Ring Signature Schemes. [Citation Graph (, )][DBLP]


  24. Get Shorty via Group Signatures without Encryption. [Citation Graph (, )][DBLP]


  25. Group Message Authentication. [Citation Graph (, )][DBLP]


  26. Fast Secure Computation of Set Intersection. [Citation Graph (, )][DBLP]


  27. Distributed Private-Key Generators for Identity-Based Cryptography. [Citation Graph (, )][DBLP]


  28. Solving Revocation with Efficient Update of Anonymous Credentials. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002