Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2018
- Xiaofeng Chen, Dongdai Lin, Moti Yung:
Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10726, Springer 2018, ISBN 978-3-319-75159-7 [contents] - 2017
- Elisa Bertino:
Security and Privacy in the IoT. Inscrypt 2017: 3-10 - Liquan Chen, Ming Kim Lim, Muyang Wang:
Fully Homomorphic Encryption Scheme Based on Public Key Compression and Batch Processing. Inscrypt 2017: 242-259 - Cong Chen, Dongdai Lin, Wei Zhang, Xiaojun Zhou:
A Game-Based Framework Towards Cyber-Attacks on State Estimation in ICSs. Inscrypt 2017: 321-341 - Yuanhao Deng, Chenhui Jin, Rongjia Li:
Meet in the Middle Attack on Type-1 Feistel Construction. Inscrypt 2017: 427-444 - Hanwen Feng, Jianwei Liu, Qianhong Wu, Weiran Liu:
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext. Inscrypt 2017: 278-298 - Xinwei Gao, Jintai Ding, Jiqiang Liu, Lin Li:
Post-Quantum Secure Remote Password Protocol from RLWE Problem. Inscrypt 2017: 99-116 - Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Twisted Jacobi Intersection Curves. Inscrypt 2017: 117-138 - Nobuaki Kitajima, Naoto Yanai, Takashi Nishide:
Identity-Based Key-Insulated Aggregate Signatures, Revisited. Inscrypt 2017: 141-156 - Sudhakar Kumawat, Souradyuti Paul:
A New Constant-Size Accountable Ring Signature Scheme Without Random Oracles. Inscrypt 2017: 157-179 - Miroslaw Kutylowski:
On Crossroads of Privacy Protection. Inscrypt 2017: 11-20 - Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, Siyun Yan:
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures. Inscrypt 2017: 482-499 - Qiang Li, Yunan Zhang, Liya Su, Yang Wu, Xinjian Ma, Zeming Yang:
An Improved Method to Unveil Malware's Hidden Behavior. Inscrypt 2017: 362-382 - Chujiao Ma, John A. Chandy, Laurent Michel, Fanghui Liu, Waldemar Cruz:
Influence of Error on Hamming Weights for ASCA. Inscrypt 2017: 447-460 - Biao Qi, Zhixin Shi, Yan Wang, Jizhi Wang, Qiwen Wang, Jianguo Jiang:
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces. Inscrypt 2017: 383-403 - Kui Ren:
The Dual Role of Smartphones in IoT Security. Inscrypt 2017: 21-24 - Haibo Tian, Liqing Fu, Jiejie He:
A Simpler Bitcoin Voting Protocol. Inscrypt 2017: 81-98 - Chonghua Wang, Zhiyu Hao, Xiaochun Yun:
NOR: Towards Non-intrusive, Real-Time and OS-agnostic Introspection for Virtual Machines in Cloud Environment. Inscrypt 2017: 500-517 - Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, Dawu Gu:
NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries. Inscrypt 2017: 301-320 - Ping Wang, DongDong Shang:
A New Lattice Sieving Algorithm Base on Angular Locality-Sensitive Hashing. Inscrypt 2017: 65-80 - Biao Wang, Xueqing Wang, Rui Xue:
Leveled FHE with Matrix Message Space. Inscrypt 2017: 260-277 - Geng Wang, Xiao Zhang, Yanmei Li:
Constant Decryption-Cost Non-monotonic Ciphertext Policy Attribute-Based Encryption with Reduced Secret Key Size (and Dynamic Attributes). Inscrypt 2017: 223-241 - Xuguang Wu, Yiliang Han, Minqing Zhang, Shuaishuai Zhu:
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data. Inscrypt 2017: 211-222 - Shanding Xu, Xiwang Cao, Chunming Tang:
A Method to Enlarge the Design Distance of BCH Codes and Some Classes of Infinite Optimal Cyclic Codes. Inscrypt 2017: 518-528 - Xiaodong Yang, Ping Yang, Faying An, Shudong Li, Caifen Wang, Dengguo Feng:
Cryptanalysis and Improvement of a Strongly Unforgeable Identity-Based Signature Scheme. Inscrypt 2017: 196-208 - Jun Yin, Chuyan Ma, Lijun Lyu, Jian Song, Guang Zeng, Chuangui Ma, Fushan Wei:
Improved Cryptanalysis of an ISO Standard Lightweight Block Cipher with Refined MILP Modelling. Inscrypt 2017: 404-426 - Jingyue Yu, Yi Deng, Yu Chen:
From Attack on Feige-Shamir to Construction of Oblivious Transfer. Inscrypt 2017: 44-64 - Xiaojuan Zhang, Dongdai Lin:
Cryptanalysis of Acorn in Nonce-Reuse Setting. Inscrypt 2017: 342-361 - Xiu Zhang, Baoxu Liu, Xiaorui Gong, Zhenyu Song:
State-of-the-Art: Security Competition in Talent Education. Inscrypt 2017: 461-481 - Zheng Zhang, Fangguo Zhang, Huang Zhang:
Implementing Indistinguishability Obfuscation Using GGH15. Inscrypt 2017: 27-43
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-08-17 23:01 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint