History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 36 total

Continuous after-the-fact leakage-resilient key exchange. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7‒9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 258-273 (2014).
WorldCat.org
1
Double-Authentication-Preventing Signatures. (English)
ESORICS (1), 436-453(2014)
WorldCat.org
2
Plaintext awareness in identity-based key encapsulation. (English)
Int. J. Inf. Sec.Int. J. Inf. Sec. 13, N0. 1, 25-49(2014)
WorldCat.org
3
Continuous After-the-Fact Leakage-Resilient Key Exchange. (English)
ACISP, 258-273(2014)
WorldCat.org
4
Modelling after-the-fact leakage for key exchange. (English)
ASIACCS, 207-216(2014)
WorldCat.org
5
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. (English)
ACM Conference on Computer and Communications Security, 369-381(2014)
WorldCat.org
6
Quantum one-time programs. (Extended abstract). (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 344-360 (2013).
WorldCat.org
7
Count-min sketches for estimating password frequency within Hamming distance two. (English)
Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1‒3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 388-402 (2013).
WorldCat.org
8
Quantum key distribution in the classical authenticated key exchange framework. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 136-154 (2013).
WorldCat.org
9
Anonymity and one-way authentication in key exchange protocols. (English)
Des. Codes Cryptography 67, No. 2, 245-269 (2013).
WorldCat.org
10
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
11
Usability and security of gaze-based graphical grid passwords. (English)
Adams, Andrew A. (ed.) et al., Financial cryptography and data security. FC 2013 workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-41319-3/pbk). Lecture Notes in Computer Science 7862, 17-33 (2013).
WorldCat.org
12
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems. (English)
ESORICS, 381-399(2013)
WorldCat.org
13
Publicly verifiable ciphertexts. (English)
Journal of Computer SecurityJournal of Computer Security 21, N0. 5, 749-778(2013)
WorldCat.org
14
Comparative eye tracking of experts and novices in web single sign-on. (English)
CODASPY, 105-116(2013)
WorldCat.org
15
Usability and Security of Gaze-Based Graphical Grid Passwords. (English)
Financial Cryptography Workshops, 17-33(2013)
WorldCat.org
16
Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. (English)
Wang, X. Sean (ed.) et al., Web information systems engineering ‒ WISE 2012. 13th international conference, Paphos, Cyprus, November 28‒30, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-35062-7/pbk). Lecture Notes in Computer Science 7651, 624-630 (2012).
WorldCat.org
17
Efficient modular exponentiation-based puzzles for denial-of-service protection. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 319-331 (2012).
WorldCat.org
18
Publicly verifiable ciphertexts. (English)
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 393-410 (2012).
WorldCat.org
19
Effort-release public-key encryption from cryptographic puzzles. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9‒11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 194-207 (2012).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 36 total

Valid XHTML 1.0 Transitional Valid CSS!