History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 45 total

From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS. (English)
Sako, Kazue (ed.), Topics in cryptology ‒ CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 ‒ March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 55-71 (2016).
WorldCat.org
1
Safely Exporting Keys from Secure Channels - On the Security of EAP-TLS and TLS Key Exporters. (English)
EUROCRYPT (1), 670-698(2016)
WorldCat.org
2
Continuous after-the-fact leakage-resilient eCK-secure key exchange. (English)
Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15‒17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 277-294 (2015).
WorldCat.org
3
Modelling ciphersuite and version negotiation in the TLS protocol. (English)
Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 ‒ July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 270-288 (2015).
WorldCat.org
4
Hierarchical deterministic bitcoin wallets that tolerate key leakage. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 497-504 (2015).
WorldCat.org
5
Protecting encrypted cookies from compression side-channel attacks. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 86-106 (2015).
WorldCat.org
6
Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 ‒ July 1, 2015. Proceedings. (English)
Lecture Notes in Computer Science 9144. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). xi, 510~p. (2015).
WorldCat.org
7
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. (English)
ACM Conference on Computer and Communications Security, 1197-1210(2015)
WorldCat.org
8
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. (English)
IEEE Symposium on Security and Privacy, 553-570(2015)
WorldCat.org
9
An Analysis of TLS Handshake Proxying. (English)
TrustCom/BigDataSE/ISPA (1), 279-286(2015)
WorldCat.org
10
Secure modular password authentication for the web using channel bindings. (English)
Chen, Liqun (ed.) et al., Security standardisation research. First international conference, SSR 2014, London, UK, December 16‒17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-14053-7/hbk). Lecture Notes in Computer Science 8893, 167-189 (2014).
WorldCat.org
11
Double-authentication-preventing signatures. (English)
Kutyłowski, Mirosław (ed.) et al., Computer security ‒ ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-319-11202-2/pbk). Lecture Notes in Computer Science 8712, 436-453 (2014).
WorldCat.org
12
Continuous after-the-fact leakage-resilient key exchange. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7‒9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 258-273 (2014).
WorldCat.org
13
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. (English)
AISC, 37-45(2014)
WorldCat.org
14
Modelling after-the-fact leakage for key exchange. (English)
ASIACCS, 207-216(2014)
WorldCat.org
15
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. (English)
ACM Conference on Computer and Communications Security, 369-381(2014)
WorldCat.org
16
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
17
Usability and security of gaze-based graphical grid passwords. (English)
Adams, Andrew A. (ed.) et al., Financial cryptography and data security. FC 2013 workshops, USEC and WAHC 2013, Okinawa, Japan, April 1, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-41319-3/pbk). Lecture Notes in Computer Science 7862, 17-33 (2013).
WorldCat.org
18
Quantum one-time programs. (Extended abstract). (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 344-360 (2013).
WorldCat.org
19
Count-min sketches for estimating password frequency within Hamming distance two. (English)
Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1‒3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 388-402 (2013).
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 45 total

Valid XHTML 1.0 Transitional Valid CSS!