|
Conferences in DBLP
Universal etaT Pairing Algorithm over Arbitrary Extension Degree. [Citation Graph (, )][DBLP]
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. [Citation Graph (, )][DBLP]
Secret Signatures: How to Achieve Business Privacy Efficiently? [Citation Graph (, )][DBLP]
Implementation of BioAPI Conformance Test Suite Using BSP Testing Model. [Citation Graph (, )][DBLP]
Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. [Citation Graph (, )][DBLP]
Geometrically Invariant Image Watermarking in the DWT Domain. [Citation Graph (, )][DBLP]
Implementation of LSM-Based RBAC Module for Embedded System. [Citation Graph (, )][DBLP]
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. [Citation Graph (, )][DBLP]
A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. [Citation Graph (, )][DBLP]
Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. [Citation Graph (, )][DBLP]
An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. [Citation Graph (, )][DBLP]
Detecting Motifs in System Call Sequences. [Citation Graph (, )][DBLP]
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. [Citation Graph (, )][DBLP]
Breaking 104 Bit WEP in Less Than 60 Seconds. [Citation Graph (, )][DBLP]
Efficient Implementation of the Pairing on Mobilephones Using BREW. [Citation Graph (, )][DBLP]
Security Analysis of MISTY1. [Citation Graph (, )][DBLP]
A Generic Method for Secure SBox Implementation. [Citation Graph (, )][DBLP]
On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences. [Citation Graph (, )][DBLP]
Authorization Constraints Specification of RBAC. [Citation Graph (, )][DBLP]
Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. [Citation Graph (, )][DBLP]
A Compositional Multiple Policies Operating System Security Model. [Citation Graph (, )][DBLP]
Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. [Citation Graph (, )][DBLP]
Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. [Citation Graph (, )][DBLP]
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. [Citation Graph (, )][DBLP]
Risk & Distortion Based K-Anonymity. [Citation Graph (, )][DBLP]
Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System. [Citation Graph (, )][DBLP]
ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems. [Citation Graph (, )][DBLP]
|