The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Communication Networks (scn)
2006 (conf/scn/2006)

  1. Amos Beimel, Matthew K. Franklin
    Edge Eavesdropping Games. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:1-17 [Conf]
  2. Alejandro Hevia
    Universally Composable Simultaneous Broadcast. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:18-33 [Conf]
  3. Kaoru Kurosawa, Swee-Huay Heng
    Relations Among Security Notions for Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:34-48 [Conf]
  4. Aggelos Kiayias, Hong-Sheng Zhou
    Concurrent Blind Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:49-62 [Conf]
  5. Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater
    Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:63-77 [Conf]
  6. Joan Daemen, Vincent Rijmen
    Understanding Two-Round Differentials in AES. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:78-94 [Conf]
  7. Jiqiang Lu, Changhoon Lee, Jongsung Kim
    Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:95-110 [Conf]
  8. Man Ho Au, Willy Susilo, Yi Mu
    Constant-Size Dynamic k-TAA. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:111-125 [Conf]
  9. Amir Herzberg, Igal Yoffe
    On Secure Orders in the Presence of Faults. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:126-140 [Conf]
  10. Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
    Balancing Accountability and Privacy Using E-Cash (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:141-155 [Conf]
  11. Sébastien Kunz-Jacques, David Pointcheval
    About the Security of MTI/C0 and MQV. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:156-172 [Conf]
  12. David Galindo, Eike Kiltz
    Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:173-185 [Conf]
  13. Sébastien Kunz-Jacques, David Pointcheval
    A New Key Exchange Protocol Based on MQV Assuming Public Computations. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:186-200 [Conf]
  14. Jaume Martí-Farré, Carles Padró
    Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:201-215 [Conf]
  15. Roberto De Prisco, Alfredo De Santis
    Cheating Immune (2, n)-Threshold Visual Secret Sharing. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:216-228 [Conf]
  16. S. Dov Gordon, Jonathan Katz
    Rational Secret Sharing, Revisited. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:229-241 [Conf]
  17. Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong
    On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:242-256 [Conf]
  18. Joan Daemen, Gilles Van Assche
    Distinguishing Stream Ciphers with Convolutional Filters. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:257-270 [Conf]
  19. Fida El Haje, Yuri Golubev, Pierre-Yvan Liardet, Yannick Teglia
    On Statistical Testing of Random Numbers Generators. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:271-287 [Conf]
  20. Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest
    Lightweight Email Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:288-302 [Conf]
  21. Daniel V. Bailey, Ari Juels
    Shoehorning Security into the EPC Tag Standard. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:303-320 [Conf]
  22. Walid Bagga, Stefano Crosta, Refik Molva
    Proof-Carrying Proxy Certificates. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:321-335 [Conf]
  23. Olivier Billet, Henri Gilbert
    Cryptanalysis of Rainbow. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:336-347 [Conf]
  24. Éric Levieil, Pierre-Alain Fouque
    An Improved LPN Algorithm. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:348-359 [Conf]
  25. Ivan Damgård
    Theory and Practice of Multiparty Computation. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:360-364 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002