Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2011
- Imad M. Abbadi:
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure. ISPEC 2011: 71-82 - Tristan Allard, Benjamin Nguyen, Philippe Pucheral:
Sanitizing Microdata without Leak: Combining Preventive and Curative Actions. ISPEC 2011: 333-342 - Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin:
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. ISPEC 2011: 168-180 - Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. ISPEC 2011: 40-54 - Ning Ding, Dawu Gu:
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware. ISPEC 2011: 401-416 - Qiong Huang, Duncan S. Wong:
Short Convertible Undeniable Signature in the Standard Model. ISPEC 2011: 257-272 - Mahabir Prasad Jhanwar:
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme. ISPEC 2011: 273-287 - Jonghoon Kwon, Jehyun Lee, Heejo Lee:
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. ISPEC 2011: 343-361 - Junzuo Lai, Robert H. Deng, Yingjiu Li:
Fully Secure Cipertext-Policy Hiding CP-ABE. ISPEC 2011: 24-39 - Bo Liang, Wenling Wu, Liting Zhang:
BCBC: A More Efficient MAC Algorithm. ISPEC 2011: 233-246 - Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng:
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs. ISPEC 2011: 247-256 - Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia:
Encryption Simulatability Reconsidered. ISPEC 2011: 14-23 - Jun-e Liu, Zhiguo Wan, Ming Gu:
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing. ISPEC 2011: 98-107 - Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng:
How to Characterize Side-Channel Leakages More Accurately? ISPEC 2011: 196-207 - Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen:
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. ISPEC 2011: 55-70 - Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian:
An Efficient Group-Based Secret Sharing Scheme. ISPEC 2011: 288-301 - Jorge Nakahara Jr.:
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher. ISPEC 2011: 208-221 - Jiaxin Pan, Libin Wang, Changshe Ma:
Analysis and Improvement of an Authenticated Key Exchange Protocol. ISPEC 2011: 417-431 - Quan Pham, Jason Reid, Ed Dawson:
A Model for Constraint and Delegation Management. ISPEC 2011: 362-371 - Michael Rose, Thomas Plantard, Willy Susilo:
Improving BDD Cryptosystems in General Lattices. ISPEC 2011: 152-167 - Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova:
Privacy Enhanced Access Control by Means of Policy Blinding. ISPEC 2011: 108-122 - Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. ISPEC 2011: 317-332 - An Wang, Zheng Li, Xianwen Yang, Yanyan Yu:
A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. ISPEC 2011: 386-400 - Yikai Wang, Yi Mu, Minjie Zhang:
Policy-Based Authentication for Mobile Agents. ISPEC 2011: 123-137 - Yongzhuang Wei, Jiqiang Lu, Yupu Hu:
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. ISPEC 2011: 222-232 - Guangdong Yang, Shaohua Tang, Li Yang:
A Novel Group Signature Scheme Based on MPKC. ISPEC 2011: 181-195 - Lijun Zhang, Kunpeng Wang, Hong Wang, Dingfeng Ye:
Another Elliptic Curve Model for Faster Pairing Computation. ISPEC 2011: 432-446 - Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. ISPEC 2011: 83-97 - Xingwen Zhao, Fangguo Zhang:
Traitor Tracing against Public Collaboration. ISPEC 2011: 302-316 - Xuhua Zhou, Xuhua Ding, Kefei Chen:
Lightweight Delegated Subset Test with Privacy Protection. ISPEC 2011: 138-151
skipping 3 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-28 12:36 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint