The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Cryptography and Network Security (acns)
2005 (conf/acns/2005)

  1. Jonathan Katz, Philip D. MacKenzie, Gelareh Taban, Virgil D. Gligor
    Two-Server Password-Only Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:1-16 [Conf]
  2. Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
    Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:17-32 [Conf]
  3. Raphael Chung-Wei Phan, Bok-Min Goi
    Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:33-39 [Conf]
  4. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:40-55 [Conf]
  5. John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
    A Traitor Tracing Scheme Based on RSA for Fast Decryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:56-74 [Conf]
  6. Jin Wook Byun, Dong Hoon Lee
    N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:75-90 [Conf]
  7. Virgil Griffith, Markus Jakobsson
    Messin' with Texas Deriving Mother's Maiden Names Using Public Records. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:91-103 [Conf]
  8. Ashraf Matrawy, Paul C. van Oorschot, Anil Somayaji
    Mitigating Network Denial-of-Service Through Diversity-Based Traffic Management. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:104-121 [Conf]
  9. Wenliang Du, Michael T. Goodrich
    Searching for High-Value Rare Events with Uncheatable Grid Computing. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:122-137 [Conf]
  10. Thomas Pornin, Julien P. Stern
    Digital Signatures Do Not Guarantee Exclusive Ownership. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:138-150 [Conf]
  11. Vladimir Shpilrain, Alexander Ushakov
    Thompson's Group and Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:151-163 [Conf]
  12. Jintai Ding, Dieter Schmidt
    Rainbow, a New Multivariable Polynomial Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:164-175 [Conf]
  13. Martin Boesgaard, Thomas Christensen, Erik Zenner
    Badger - A Fast and Provably Secure MAC. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:176-191 [Conf]
  14. Abdulrahman Alharby, Hideki Imai
    IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:192-205 [Conf]
  15. Michael T. Goodrich, Mikhail J. Atallah, Roberto Tamassia
    Indexing Information for Data Forensics. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:206-221 [Conf]
  16. Zhuowei Li, Amitabha Das, Jianying Zhou
    Model Generalization and Its Implications on Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:222-237 [Conf]
  17. Gene Itkis, Robert McNerney, Scott Russell
    Intrusion-Resilient Secure Channels. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:238-253 [Conf]
  18. Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
    Optimal Asymmetric Encryption and Signature Paddings. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:254-268 [Conf]
  19. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:269-284 [Conf]
  20. Benoît Libert, Jean-Jacques Quisquater
    Identity Based Encryption Without Redundancy. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:285-300 [Conf]
  21. Jiangtao Li, Ninghui Li
    OACerts: Oblivious Attribute Certificates. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:301-317 [Conf]
  22. Lan Nguyen, Reihaneh Safavi-Naini
    Dynamic k-Times Anonymous Authentication. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:318-333 [Conf]
  23. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Efficient Anonymous Roaming and Its Security Analysis. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:334-349 [Conf]
  24. Markus Jakobsson, Liu Yang
    Quantifying Security in Hybrid Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:350-363 [Conf]
  25. Flavio D. Garcia, Jaap-Henk Hoepman
    Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:364-377 [Conf]
  26. Michael K. Reiter, XiaoFeng Wang, Matthew Wright
    Building Reliable Mix Networks with Fair Exchange. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:378-392 [Conf]
  27. Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette
    SCARE of the DES. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:393-406 [Conf]
  28. Boris Skoric, Pim Tuyls, W. Ophey
    Robust Key Extraction from Physical Uncloneable Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:407-422 [Conf]
  29. Yih-Chun Hu, Markus Jakobsson, Adrian Perrig
    Efficient Constructions for One-Way Hash Chains. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:423-441 [Conf]
  30. Yan-Cheng Chang, Michael Mitzenmacher
    Privacy Preserving Keyword Searches on Remote Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:442-455 [Conf]
  31. Hsiao-Ying Lin, Wen-Guey Tzeng
    An Efficient Solution to the Millionaires' Problem Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:456-466 [Conf]
  32. Jens Groth
    Non-interactive Zero-Knowledge Arguments for Voting. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:467-482 [Conf]
  33. Rui Zhang 0002, Jun Furukawa, Hideki Imai
    Short Signature and Universal Designated Verifier Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:483-498 [Conf]
  34. Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
    Efficient Identity Based Ring Signature. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:499-512 [Conf]
  35. Benoît Chevallier-Mames
    New Signature Schemes with Coupons and Tight Reduction. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:513-528 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002