|
Conferences in DBLP
- Michael E. Locasto, Angelos D. Keromytis
CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:1-15 [Conf]
- Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang
Private Keyword-Based Push and Pull with Applications to Anonymous Communication. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:16-30 [Conf]
- Philippe Golle, Jessica Staddon, Brent R. Waters
Secure Conjunctive Keyword Search over Encrypted Data. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:31-45 [Conf]
- Jens Groth
Evaluating Security of Voting Schemes in the Universal Composability Framework. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:46-60 [Conf]
- Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:61-75 [Conf]
- Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
On the Security of Cryptosystems with All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:76-90 [Conf]
- Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen
Centralized Management of Virtual Security Zones in IP Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:91-102 [Conf]
- Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
S-RIP: A Secure Distance Vector Routing Protocol. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:103-119 [Conf]
- Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
A Pay-per-Use DoS Protection Mechanism for the Web. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:120-134 [Conf]
- Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
Limited Verifier Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:135-148 [Conf]
- Willy Susilo, Yi Mu
Deniable Ring Authentication Revisited. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:149-163 [Conf]
- Atsuko Miyaji, Kozue Umeda
A Fully-Functional Group Signature Scheme over Only Known-Order Group. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:164-179 [Conf]
- Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu
Some Observations on Zap and Its Applications. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:180-193 [Conf]
- Weiming Zhang, Shiqu Li
Security Measurements of Steganographic Systems. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:194-204 [Conf]
- Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo
X2Rep: Enhanced Trust Semantics for the XRep Protocol. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:205-219 [Conf]
- Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
One-Round Protocols for Two-Party Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:220-232 [Conf]
- Muxiang Zhang
Password Authenticated Key Exchange Using Quadratic Residues. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:233-247 [Conf]
- Colin Boyd, Wenbo Mao, Kenneth G. Paterson
Key Agreement Using Statically Keyed Authenticators. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:248-262 [Conf]
- Andrew K. Wright, John A. Kinast, Joe McCarty
Low-Latency Cryptographic Protection for SCADA Communications. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:263-277 [Conf]
- InKyoung Jeun, Jongwook Park, TaeKyu Choi, SangWan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin
A Best Practice for Root CA Key Update in PKI. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:278-291 [Conf]
- Stephen W. Boyd, Angelos D. Keromytis
SQLrand: Preventing SQL Injection Attacks. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:292-302 [Conf]
- Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:303-309 [Conf]
- Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano
Success Probability in Chi2-Attacks. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:310-325 [Conf]
- Ali Kanso
More Generalized Clock-Controlled Alternating Step Generator. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:326-338 [Conf]
- Daisuke Inoue, Masahiro Kuroda
FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:339-354 [Conf]
- Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:355-368 [Conf]
- Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:369-382 [Conf]
- Katsuyuki Okeya, Tsuyoshi Takagi
Security Analysis of CRT-Based Cryptosystems. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:383-397 [Conf]
- Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:398-413 [Conf]
- Shuhong Wang, Jie Wang, Maozhi Xu
Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:414-425 [Conf]
- Hyung-Woo Lee
Advanced Packet Marking Mechanism with Pushback for IP Traceback. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:426-438 [Conf]
- Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li
A Parallel Intrusion Detection System for High-Speed Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:439-451 [Conf]
- Dong Yu, Deborah A. Frincke
A Novel Framework for Alert Correlation and Understanding. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:452-466 [Conf]
- BaiJie Kuang, Yuefei Zhu, YaJuan Zhang
An Improved Algorithm for uP + vQ Using JSF13. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:467-478 [Conf]
- Palash Sarkar, Pradeep Kumar Mishra, Rana Barua
New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn). [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:479-493 [Conf]
- Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:494-508 [Conf]
|