History

Please fill in your query. A complete syntax description you will find on the General Help page.

Result 21 to 40 of 57 total

Towards a common notion of privacy leakage on public database (English)
BWCCA, 186-191 (2010).
21
On a construction of stream-cipher-based hash functions (English)
SECRYPT, 334-343 (2010).
22
A user-oriented anonymization mechanism for public data (English)
DPM/SETOP, 22-35 (2010).
23
The {\sc rakaposhi} stream cipher. (English)
Qing, Sihan (ed.) et al., Information and communications security. 11th international conference, ICICS 2009, Beijing, China, December 14‒17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-11144-0/pbk). Lecture Notes in Computer Science 5927, 32-46 (2009).
24
Privacy-aware location database service for granular queries. (English)
Markowitch, Olivier (ed.) et al., Information security theory and practice. Smart devices, pervasive systems, and ubiquitous networks. Third IFIP WG 11.2 international workshop, WISTP 2009, Brussels, Belgium, September 1‒4, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03943-0/pbk). Lecture Notes in Computer Science 5746, 28-37 (2009).
25
Ternary subset difference method and its quantitative analysis. (English)
Chung, Kyo-Il (ed.) et al., Information security applications. 9th international workshop, WISA 2008, Jeju Island, Korea, September 23‒25, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-00305-9/pbk). Lecture Notes in Computer Science 5379, 225-239 (2009).
26
A fast $(k, L, n)$-threshold ramp secret sharing scheme (English)
IEICE Transactions 92-A, No. 8, 1808-1821 (2009).
27
Design of anonymous attribute authentication mechanism (English)
IEICE Transactions 92-B, No. 4, 1112-1118 (2009).
28
How to bootstrap security for ad-hoc network: revisited (English)
SEC, 119-131 (2009).
29
The rakaposhi stream cipher (English)
ICICS, 32-46 (2009).
30
Obfuscation mechanism in conjunction with tamper-proof module (English)
CSE (2), 665-670 (2009).
31
Privacy-aware location database service for granular queries (English)
WISTP, 28-37 (2009).
32
An offline peer-to-peer broadcasting scheme with anonymity (English)
SECRYPT, 75-82 (2009).
33
A new $(k,n)$-threshold secret sharing scheme and its extension. (English)
Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15‒18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 455-470 (2008).
34
Efficient implementation of the pairing on mobilephones using BREW. (English)
Kim, Sehun (ed.) et al., Information security applications. 8th international workshop, WISA 2007, Jeju Island, Korea, August 27‒29, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77534-8/pbk). Lecture Notes in Computer Science 4867, 203-214 (2008).
35
On a fast ({\it k, n})-threshold secret sharing scheme (English)
IEICE Transactions 91-A, No. 9, 2365-2378 (2008).
36
Analysis of program obfuscation schemes with variable encoding technique (English)
IEICE Transactions 91-A, No. 1, 316-329 (2008).
37
A fast $(3, n)$-threshold secret sharing scheme using exclusive-OR operations (English)
IEICE Transactions 91-A, No. 1, 127-138 (2008).
38
Efficient implementation of the pairing on mobilephones using BREW (English)
IEICE Transactions 91-D, No. 5, 1330-1337 (2008).
39
A new $(k, n)$-threshold secret sharing scheme and its extension (English)
IACR Cryptology ePrint Archive 2008, 409 (2008).
40

Result 21 to 40 of 57 total