|
Conferences in DBLP
- Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor
Two-Server Password-Only Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:1-16 [Conf]
- Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:17-32 [Conf]
- Raphael Chung-Wei Phan, Bok-Min Goi
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:33-39 [Conf]
- Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:40-55 [Conf]
- John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
A Traitor Tracing Scheme Based on RSA for Fast Decryption. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:56-74 [Conf]
- Jin Wook Byun, Dong Hoon Lee
N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:75-90 [Conf]
- Virgil Griffith, Markus Jakobsson
Messin' with Texas Deriving Mother's Maiden Names Using Public Records. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:91-103 [Conf]
- Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji
Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:104-121 [Conf]
- Wenliang Du, Michael T. Goodrich
Searching for High-Value Rare Events with Uncheatable Grid Computing. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:122-137 [Conf]
- Thomas Pornin, Julien P. Stern
Digital Signatures Do Not Guarantee Exclusive Ownership. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:138-150 [Conf]
- Vladimir Shpilrain, Alexander Ushakov
Thompson's Group and Public Key Cryptography. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:151-163 [Conf]
- Jintai Ding, Dieter Schmidt
Rainbow, a New Multivariable Polynomial Signature Scheme. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:164-175 [Conf]
- Martin Boesgaard, Thomas Christensen, Erik Zenner
Badger - A Fast and Provably Secure MAC. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:176-191 [Conf]
- Abdulrahman Alharby, Hideki Imai
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:192-205 [Conf]
- Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia
Indexing Information for Data Forensics. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:206-221 [Conf]
- Zhuowei Li, Amitabha Das, Jianying Zhou
Model Generalization and Its Implications on Intrusion Detection. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:222-237 [Conf]
- Gene Itkis, Robert McNerney, Scott Russell
Intrusion-Resilient Secure Channels. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:238-253 [Conf]
- Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
Optimal Asymmetric Encryption and Signature Paddings. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:254-268 [Conf]
- SeongHan Shin, Kazukuni Kobara, Hideki Imai
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:269-284 [Conf]
- Benoît Libert, Jean-Jacques Quisquater
Identity Based Encryption Without Redundancy. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:285-300 [Conf]
- Jiangtao Li, Ninghui Li
OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:301-317 [Conf]
- Lan Nguyen, Reihaneh Safavi-Naini
Dynamic k-Times Anonymous Authentication. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:318-333 [Conf]
- Guomin Yang, Duncan S. Wong, Xiaotie Deng
Efficient Anonymous Roaming and Its Security Analysis. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:334-349 [Conf]
- Markus Jakobsson, Liu Yang
Quantifying Security in Hybrid Cellular Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:350-363 [Conf]
- Flavio D. Garcia, Jaap-Henk Hoepman
Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:364-377 [Conf]
- Michael K. Reiter, XiaoFeng Wang, Matthew Wright
Building Reliable Mix Networks with Fair Exchange. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:378-392 [Conf]
- Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette
SCARE of the DES. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:393-406 [Conf]
- Boris Skoric, Pim Tuyls, W. Ophey
Robust Key Extraction from Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:407-422 [Conf]
- Yih-Chun Hu, Markus Jakobsson, Adrian Perrig
Efficient Constructions for One-Way Hash Chains. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:423-441 [Conf]
- Yan-Cheng Chang, Michael Mitzenmacher
Privacy Preserving Keyword Searches on Remote Encrypted Data. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:442-455 [Conf]
- Hsiao-Ying Lin, Wen-Guey Tzeng
An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:456-466 [Conf]
- Jens Groth
Non-interactive Zero-Knowledge Arguments for Voting. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:467-482 [Conf]
- Rui Zhang 0002, Jun Furukawa, Hideki Imai
Short Signature and Universal Designated Verifier Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:483-498 [Conf]
- Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
Efficient Identity Based Ring Signature. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:499-512 [Conf]
- Benoît Chevallier-Mames
New Signature Schemes with Coupons and Tight Reduction. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:513-528 [Conf]
|