The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Communication Networks (scn)
2002 (conf/scn/2002)

  1. Eyal Kushilevitz
    Some Applications of Polynomials for the Design of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:1-13 [Conf]
  2. Ueli M. Maurer
    Secure Multi-party Computation Made Simple. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:14-28 [Conf]
  3. Jonathan Katz, Rafail Ostrovsky, Moti Yung
    Forward Secrecy in Password-Only Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:29-44 [Conf]
  4. Gene Tsudik
    Weak Forward Security in Mediated RSA. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:45-54 [Conf]
  5. Yevgeniy Dodis, Leonid Reyzin
    On the Power of Claw-Free Permutations. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:55-73 [Conf]
  6. Giovanni Di Crescenzo
    Equivocable and Extractable Commitment Schemes. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:74-87 [Conf]
  7. Nenad Dedic, Leonid Reyzin, Salil P. Vadhan
    An Improved Pseudorandom Generator Based on Hardness of Factoring. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:88-101 [Conf]
  8. Gene Itkis
    Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:102-118 [Conf]
  9. Giovanni Di Crescenzo, Olga Kornievskaia
    Efficient Re-keying Protocols for Multicast Encryption. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:119-132 [Conf]
  10. Frank Niedermeyer, Werner Schindler
    On a Class of Key Agreement Protocols Which Cannot Be Unconditionally Secure. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:133-145 [Conf]
  11. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    A Group Key Distribution Scheme with Decentralised User Join. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:146-163 [Conf]
  12. Yuri Borissov, Svetla Nikova, Bart Preneel, Joos Vandewalle
    On a Resynchronization Weakness in a Class of Combiners with Memory. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:164-173 [Conf]
  13. Ali Aydin Selçuk, Ali Biçak
    On Probability of Success in Linear and Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:174-185 [Conf]
  14. Hitoshi Yanami, Takeshi Shimoyama
    Differential Cryptanalysis of a Reduced-Round SEED. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:186-198 [Conf]
  15. Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
    Medical Information Privacy Assurance: Cryptographic and System Aspects. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:199-218 [Conf]
  16. Luigi Catuogno, Ivan Visconti
    A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:219-233 [Conf]
  17. Louis Granboulan
    How to Repair ESIGN. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:234-240 [Conf]
  18. Anton Kozlov, Leonid Reyzin
    Forward-Secure Signatures with Fast Key Update. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:241-256 [Conf]
  19. Paulo S. L. M. Barreto, Ben Lynn, Michael Scott
    Constructing Elliptic Curves with Prescribed Embedding Degrees. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:257-267 [Conf]
  20. Jan Camenisch, Anna Lysyanskaya
    A Signature Scheme with Efficient Protocols. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:268-289 [Conf]
  21. Yvo Desmedt, Yongge Wang
    Efficient Zero-Knowledge Proofs for Some Practical Graph Problems. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:290-302 [Conf]
  22. Xiaotie Deng, Chan H. Lee, Yunlei Zhao, Hong Zhu
    Reduction Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:303-317 [Conf]
  23. Shirley H. C. Cheung, Xiaotie Deng, Chan H. Lee, Yunlei Zhao
    A New Notion of Soundness in Bare Public-Key Model. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:318-325 [Conf]
  24. Amos Beimel, Yoav Stahl
    Robust Information-Theoretic Private Information Retrieval. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:326-341 [Conf]
  25. B. Prabhu, K. Srinathan, C. Pandu Rangan
    Trading Players for Efficiency in Unconditional Multiparty Computation. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:342-353 [Conf]
  26. Jaume Martí-Farré, Carles Padró
    Secret Sharing Schemes on Access Structures with Intersection Number Equal to One. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:354-363 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002