|
Conferences in DBLP
Protecting IPTV Service Network against Malicious Rendezvous Point. [Citation Graph (, )][DBLP]
Design and Implementation of SIP-aware Security Management System. [Citation Graph (, )][DBLP]
Application Management Framework in User Centric Smart Card Ownership Model. [Citation Graph (, )][DBLP]
When Compromised Readers Meet RFID. [Citation Graph (, )][DBLP]
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? [Citation Graph (, )][DBLP]
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. [Citation Graph (, )][DBLP]
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. [Citation Graph (, )][DBLP]
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. [Citation Graph (, )][DBLP]
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity. [Citation Graph (, )][DBLP]
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. [Citation Graph (, )][DBLP]
ID-Based Adaptive Oblivious Transfer. [Citation Graph (, )][DBLP]
Unknown Plaintext Template Attacks. [Citation Graph (, )][DBLP]
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices. [Citation Graph (, )][DBLP]
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation. [Citation Graph (, )][DBLP]
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. [Citation Graph (, )][DBLP]
Finding Collisions for a 45-Step Simplified HAS-V. [Citation Graph (, )][DBLP]
Non-linear Error Detection for Finite State Machines. [Citation Graph (, )][DBLP]
Quadratic Equations from a Kind of S-boxes. [Citation Graph (, )][DBLP]
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure. [Citation Graph (, )][DBLP]
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. [Citation Graph (, )][DBLP]
A Selectable k-Times Relaxed Anonymous Authentication Scheme. [Citation Graph (, )][DBLP]
PUF-Based Authentication Protocols - Revisited. [Citation Graph (, )][DBLP]
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. [Citation Graph (, )][DBLP]
Securing Remote Access Inside Wireless Mesh Networks. [Citation Graph (, )][DBLP]
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. [Citation Graph (, )][DBLP]
USN Middleware Security Model. [Citation Graph (, )][DBLP]
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs. [Citation Graph (, )][DBLP]
|