The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Communication Networks (scn)
2004 (conf/scn/2004)

  1. Bart Preneel
    ECRYPT: The Cryptographic Research Challenges for the Next Decade. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:1-15 [Conf]
  2. Adam Young, Moti Yung
    Relationships Between Diffie-Hellman and "Index Oracles". [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:16-32 [Conf]
  3. Duong Hieu Phan, David Pointcheval
    On the Security Notions for Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:33-46 [Conf]
  4. Claude Crépeau, Kirill Morozov, Stefan Wolf
    Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:47-59 [Conf]
  5. Siamak Fayyaz Shahandashti, Mahmoud Salmasizadeh, Javad Mohajeri
    A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:60-76 [Conf]
  6. Jun Furukawa, Shoko Yonezawa
    Group Signatures with Separate and Distributed Authorities. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:77-90 [Conf]
  7. Giovanni Di Crescenzo, Gonzalo R. Arce, Renwei Ge
    Threshold Cryptography for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:91-104 [Conf]
  8. Fabien Laguillaumie, Damien Vergnaud
    Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:105-119 [Conf]
  9. Jan Camenisch, Jens Groth
    Group Signatures: Better Efficiency and New Theoretical Aspects. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:120-133 [Conf]
  10. Jan Camenisch, Maciej Koprowski, Bogdan Warinschi
    Efficient Blind Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:134-148 [Conf]
  11. Ari Juels
    Minimalist Cryptography for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:149-164 [Conf]
  12. Giuseppe Ateniese, Breno de Medeiros
    On the Key Exposure Problem in Chameleon Hashes. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:165-179 [Conf]
  13. Jonathan Katz, Rafail Ostrovsky, Michael O. Rabin
    Identity-Based Zero Knowledge. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:180-192 [Conf]
  14. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:193-207 [Conf]
  15. Nigel P. Smart
    Efficient Key Encapsulation to Multiple Parties. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:208-219 [Conf]
  16. Benoît Libert, Jean-Jacques Quisquater
    Improved Signcryption from q-Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:220-234 [Conf]
  17. Stelvio Cimato, Roberto De Prisco, Alfredo De Santis
    Colored Visual Cryptography Without Color Darkening. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:235-248 [Conf]
  18. Ventzislav Nikov, Svetla Nikova, Bart Preneel
    On the Size of Monotone Span Programs. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:249-262 [Conf]
  19. Douglas Wikström
    Universally Composable DKG with Linear Number of Exponentiations. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:263-277 [Conf]
  20. Joseph H. Silverman, Nigel P. Smart, Frederik Vercauteren
    An Algebraic Approach to NTRU (q = 2n) via Witt Vectors and Overdetermined Systems of Nonlinear Equations. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:278-293 [Conf]
  21. Christopher Wolf, An Braeken, Bart Preneel
    Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:294-309 [Conf]
  22. Miodrag J. Mihaljevic, Hideki Imai
    The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:310-323 [Conf]
  23. Hirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel
    Non-randomness of the Full 4 and 5-Pass HAVAL. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:324-336 [Conf]
  24. Amir Herzberg
    Controlling Spam by Secure Internet Content Selection. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:337-350 [Conf]
  25. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
    On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:351-366 [Conf]
  26. Le Van Ly, Werner Schindler
    How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:367-380 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002