History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 28 total

Quantum one-time programs. (Extended abstract). (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 344-360 (2013).
WorldCat.org
1
Count-min sketches for estimating password frequency within Hamming distance two. (English)
Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1‒3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 388-402 (2013).
WorldCat.org
2
Quantum key distribution in the classical authenticated key exchange framework. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 136-154 (2013).
WorldCat.org
3
Anonymity and one-way authentication in key exchange protocols. (English)
Des. Codes Cryptography 67, No. 2, 245-269 (2013).
WorldCat.org
4
Comparative eye tracking of experts and novices in web single sign-on. (English)
CODASPY, 105-116(2013)
WorldCat.org
5
Publicly verifiable ciphertexts. (English)
Journal of Computer SecurityJournal of Computer Security 21, N0. 5, 749-778(2013)
WorldCat.org
6
Usability and Security of Gaze-Based Graphical Grid Passwords. (English)
Financial Cryptography Workshops, 17-33(2013)
WorldCat.org
7
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. (English)
ESORICS, 381-399(2013)
WorldCat.org
8
Efficient modular exponentiation-based puzzles for denial-of-service protection. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 319-331 (2012).
WorldCat.org
9
Publicly verifiable ciphertexts. (English)
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 393-410 (2012).
WorldCat.org
10
Effort-release public-key encryption from cryptographic puzzles. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9‒11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 194-207 (2012).
WorldCat.org
11
Practical client puzzles in the standard model. (English)
ASIACCS, 42-43(2012)
WorldCat.org
12
Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks. (English)
WISE, 624-630(2012)
WorldCat.org
13
Towards a provably secure dos-resilient key exchange protocol with perfect forward secrecy. (English)
Bernstein, Daniel J. (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11‒14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 379-398 (2011).
WorldCat.org
14
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. (English)
Kiayias, Aggelos (ed.), Topics in cryptology ‒ CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14‒18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 284-301 (2011).
WorldCat.org
15
An integrated approach to cryptographic mitigation of denial-of-service attacks. (English)
ASIACCS, 114-123(2011)
WorldCat.org
16
Quantum coins. (English)
Bruen, Aiden A. (ed.) et al., Error-correcting codes, finite geometries and cryptography. Conference on “Error-control codes, information theory and applied cryptography", December 5‒6, 2007, Fields Institute, Toronto, Ontario, Canada. Canadian Mathematical Society special session “Error control codes, information theory and applied cryptography", CMS winter meeting, December 8‒10, 2007, London, Ontario, Canda. Selected papers. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-4956-9/pbk). Contemporary Mathematics 523, 35-47 (2010).
WorldCat.org
17
The case for quantum key distribution. (English)
Sergienko, Alexander (ed.) et al., Quantum communication and quantum networking. First international conference, QuantumComm 2009, Naples, Italy, October 26‒30, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-11730-5/pbk; 978-3-642-11731-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 36, 283-296 (2010).
WorldCat.org
18
Predicate-based key exchange. (English)
Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5‒7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 282-299 (2010).
WorldCat.org
19
One-time-password-authenticated key exchange. (English)
Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5‒7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 264-281 (2010).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 28 total

Valid XHTML 1.0 Transitional Valid CSS!