default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2015
- Megha Agrawal, Donghoon Chang, Somitra Sanadhya:
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. ACISP 2015: 451-468 - Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim:
BP-XACML an Authorisation Policy Language for Business Processes. ACISP 2015: 307-325 - Gildas Avoine, Adrien Bourgeois, Xavier Carpent:
Analysis of Rainbow Tables with Fingerprints. ACISP 2015: 356-374 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. ACISP 2015: 93-106 - Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen:
Bad Directions in Cryptographic Hash Functions. ACISP 2015: 488-508 - Priyanka Bose, Dipanjan Das, Chandrasekaran Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. ACISP 2015: 230-247 - Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
A New General Framework for Secure Public Key Encryption with Keyword Search. ACISP 2015: 59-76 - Nilanjan Datta, Kan Yasuda:
Generalizing PMAC Under Weaker Assumptions. ACISP 2015: 433-450 - Benjamin Dowling, Douglas Stebila:
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. ACISP 2015: 270-288 - Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns:
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. ACISP 2015: 413-430 - Yiteng Feng, Yi Mu, Guomin Yang, Joseph K. Liu:
A New Public Remote Integrity Checking Scheme with User Privacy. ACISP 2015: 377-394 - Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. ACISP 2015: 343-355 - Clémentine Gritti, Willy Susilo, Thomas Plantard:
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. ACISP 2015: 395-412 - Felix Günther, Bertram Poettering:
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. ACISP 2015: 195-212 - Yuu Ishida, Yohei Watanabe, Junji Shikata:
Constructions of CCA-Secure Revocable Identity-Based Encryption. ACISP 2015: 174-191 - Ryoma Ito, Atsuko Miyaji:
How TKIP Induces Biases of Internal States of Generic RC4. ACISP 2015: 329-342 - Kaoru Kurosawa, Le Trieu Phong:
IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. ACISP 2015: 145-159 - Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo:
Improved Identity-Based Online/Offline Encryption. ACISP 2015: 160-173 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Cryptanalysis of Reduced-Round Whirlwind. ACISP 2015: 20-38 - Christophe Nègre, Guilherme Perin:
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS. ACISP 2015: 107-124 - Yusuke Sakai, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta:
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. ACISP 2015: 77-92 - Zhelei Sun, Peng Wang, Liting Zhang:
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. ACISP 2015: 3-19 - Qiang Tang:
Towards Forward Security Properties for PEKS and IBE. ACISP 2015: 127-144 - Biaoshuai Tao, Hongjun Wu:
Improving the Biclique Cryptanalysis of AES. ACISP 2015: 39-56 - Leliel Trethowen, Craig Anslow, Stuart Marshall, Ian Welch:
VisRAID: Visualizing Remote Access for Intrusion Detection. ACISP 2015: 289-306 - Yuyu Wang, Keisuke Tanaka:
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency. ACISP 2015: 213-229 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. ACISP 2015: 471-487 - Tingting Zhang, Hongda Li, Guifang Huang:
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. ACISP 2015: 251-269 - Ernest Foo, Douglas Stebila:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-25 00:19 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint