History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 38 total

Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 ‒ July 1, 2015. Proceedings. (English)
Lecture Notes in Computer Science 9144. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). xi, 510~p. EUR~77.04 (2015).
WorldCat.org
1
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. (English)
ACISP, 270-288(2015)
WorldCat.org
2
Protecting Encrypted Cookies from Compression Side-Channel Attacks. (English)
Financial Cryptography, 86-106(2015)
WorldCat.org
3
Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. (English)
Financial Cryptography, 497-504(2015)
WorldCat.org
4
Continuous after-the-fact leakage-resilient key exchange. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7‒9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 258-273 (2014).
WorldCat.org
5
Double-Authentication-Preventing Signatures. (English)
ESORICS (1), 436-453(2014)
WorldCat.org
6
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. (English)
ACM Conference on Computer and Communications Security, 369-381(2014)
WorldCat.org
7
Modelling after-the-fact leakage for key exchange. (English)
ASIACCS, 207-216(2014)
WorldCat.org
8
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. (English)
AISC, 37-45(2014)
WorldCat.org
9
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
10
Usability and security of gaze-based graphical grid passwords. (English)
Adams, Andrew A. (ed.) et al., Financial cryptography and data security. FC 2013 workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-41319-3/pbk). Lecture Notes in Computer Science 7862, 17-33 (2013).
WorldCat.org
11
Quantum one-time programs. (Extended abstract). (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 344-360 (2013).
WorldCat.org
12
Count-min sketches for estimating password frequency within Hamming distance two. (English)
Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1‒3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 388-402 (2013).
WorldCat.org
13
Quantum key distribution in the classical authenticated key exchange framework. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 136-154 (2013).
WorldCat.org
14
Anonymity and one-way authentication in key exchange protocols. (English)
Des. Codes Cryptography 67, No. 2, 245-269 (2013).
WorldCat.org
15
Publicly verifiable ciphertexts. (English)
Journal of Computer SecurityJournal of Computer Security 21, N0. 5, 749-778(2013)
WorldCat.org
16
Comparative eye tracking of experts and novices in web single sign-on. (English)
CODASPY, 105-116(2013)
WorldCat.org
17
Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. (English)
Wang, X. Sean (ed.) et al., Web information systems engineering ‒ WISE 2012. 13th international conference, Paphos, Cyprus, November 28‒30, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-35062-7/pbk). Lecture Notes in Computer Science 7651, 624-630 (2012).
WorldCat.org
18
Efficient modular exponentiation-based puzzles for denial-of-service protection. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 319-331 (2012).
WorldCat.org
19
Publicly verifiable ciphertexts. (English)
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 393-410 (2012).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 38 total

Valid XHTML 1.0 Transitional Valid CSS!