History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 48 total

Safely exporting keys from secure channels. On the security of EAP-TLS and TLS key exporters. (English)
Fischlin, Marc (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8‒12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 670-698 (2016).
WorldCat.org
1
From stateless to stateful: generic authentication and authenticated encryption constructions with application to TLS. (English)
Sako, Kazue (ed.), Topics in cryptology ‒ CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 ‒ March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 55-71 (2016).
WorldCat.org
2
Secure Logging Schemes and Certificate Transparency. (English)
ESORICS (2), 140-158(2016)
WorldCat.org
3
Secure modular password authentication for the web using channel bindings. (English)
Int. J. Inf. Sec. 15, N0. 6, 597-620(2016)
WorldCat.org
4
Authenticated Network Time Synchronization. (English)
USENIX Security Symposium, 823-840(2016)
WorldCat.org
5
Continuous after-the-fact leakage-resilient eCK-secure key exchange. (English)
Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15‒17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 277-294 (2015).
WorldCat.org
6
Modelling ciphersuite and version negotiation in the TLS protocol. (English)
Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 ‒ July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 270-288 (2015).
WorldCat.org
7
Hierarchical deterministic bitcoin wallets that tolerate key leakage. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 497-504 (2015).
WorldCat.org
8
Protecting encrypted cookies from compression side-channel attacks. (English)
Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26‒30, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-47853-0/pbk; 978-3-662-47854-7/ebook). Lecture Notes in Computer Science 8975, 86-106 (2015).
WorldCat.org
9
Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 ‒ July 1, 2015. Proceedings. (English)
Lecture Notes in Computer Science 9144. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). xi, 510~p. (2015).
WorldCat.org
10
A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates. (English)
ACM Conference on Computer and Communications Security, 1197-1210(2015)
WorldCat.org
11
Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem. (English)
IEEE Symposium on Security and Privacy, 553-570(2015)
WorldCat.org
12
An Analysis of TLS Handshake Proxying. (English)
TrustCom/BigDataSE/ISPA (1), 279-286(2015)
WorldCat.org
13
Secure modular password authentication for the web using channel bindings. (English)
Chen, Liqun (ed.) et al., Security standardisation research. First international conference, SSR 2014, London, UK, December 16‒17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-14053-7/hbk). Lecture Notes in Computer Science 8893, 167-189 (2014).
WorldCat.org
14
Double-authentication-preventing signatures. (English)
Kutyłowski, Mirosław (ed.) et al., Computer security ‒ ESORICS 2014. 19th European symposium on research in computer security, Wrocław, Poland, September 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-319-11202-2/pbk). Lecture Notes in Computer Science 8712, 436-453 (2014).
WorldCat.org
15
Continuous after-the-fact leakage-resilient key exchange. (English)
Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7‒9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 258-273 (2014).
WorldCat.org
16
Formalising Human Recognition: a Fundamental Building Block for Security Proofs. (English)
AISC, 37-45(2014)
WorldCat.org
17
Multi-Ciphersuite Security of the Secure Shell (SSH) Protocol. (English)
ACM Conference on Computer and Communications Security, 369-381(2014)
WorldCat.org
18
Modelling after-the-fact leakage for key exchange. (English)
ASIACCS, 207-216(2014)
WorldCat.org
19
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 48 total

Valid XHTML 1.0 Transitional Valid CSS!