History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 33 total

Continuous after-the-fact leakage-resilient key exchange. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7‒9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 258-273 (2014).
WorldCat.org
1
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. (English)
ACM Conference on Computer and Communications Security, 369-381(2014)
WorldCat.org
2
Modelling after-the-fact leakage for key exchange. (English)
ASIACCS, 207-216(2014)
WorldCat.org
3
Double-Authentication-Preventing Signatures. (English)
ESORICS (1), 436-453(2014)
WorldCat.org
4
Plaintext awareness in identity-based key encapsulation. (English)
Int. J. Inf. Sec.Int. J. Inf. Sec. 13, N0. 1, 25-49(2014)
WorldCat.org
5
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
6
Usability and security of gaze-based graphical grid passwords. (English)
Adams, Andrew A. (ed.) et al., Financial cryptography and data security. FC 2013 workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-41319-3/pbk). Lecture Notes in Computer Science 7862, 17-33 (2013).
WorldCat.org
7
Quantum one-time programs. (Extended abstract). (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 344-360 (2013).
WorldCat.org
8
Count-min sketches for estimating password frequency within Hamming distance two. (English)
Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1‒3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 388-402 (2013).
WorldCat.org
9
Quantum key distribution in the classical authenticated key exchange framework. (English)
Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4‒7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 136-154 (2013).
WorldCat.org
10
Anonymity and one-way authentication in key exchange protocols. (English)
Des. Codes Cryptography 67, No. 2, 245-269 (2013).
WorldCat.org
11
Publicly verifiable ciphertexts. (English)
Journal of Computer SecurityJournal of Computer Security 21, N0. 5, 749-778(2013)
WorldCat.org
12
Comparative eye tracking of experts and novices in web single sign-on. (English)
CODASPY, 105-116(2013)
WorldCat.org
13
Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. (English)
Wang, X. Sean (ed.) et al., Web information systems engineering ‒ WISE 2012. 13th international conference, Paphos, Cyprus, November 28‒30, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-35062-7/pbk). Lecture Notes in Computer Science 7651, 624-630 (2012).
WorldCat.org
14
Efficient modular exponentiation-based puzzles for denial-of-service protection. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 319-331 (2012).
WorldCat.org
15
Publicly verifiable ciphertexts. (English)
Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5‒7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 393-410 (2012).
WorldCat.org
16
Effort-release public-key encryption from cryptographic puzzles. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9‒11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 194-207 (2012).
WorldCat.org
17
Practical client puzzles in the standard model. (English)
ASIACCS, 42-43(2012)
WorldCat.org
18
Towards a provably secure DoS-resilient key exchange protocol with perfect forward secrecy. (English)
Bernstein, Daniel J. (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11‒14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 379-398 (2011).
WorldCat.org
19
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols. (English)
Kiayias, Aggelos (ed.), Topics in cryptology ‒ CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14‒18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 284-301 (2011).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 33 total

Valid XHTML 1.0 Transitional Valid CSS!