Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2011
- Yongwha Chung, Moti Yung:
Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6513, Springer 2011, ISBN 978-3-642-17954-9 [contents] - 2010
- Boufeldja Allailou, Abdelaziz Marjane, Abdellah Mokrane:
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs. WISA 2010: 76-91 - Takehiko Amaki, Masanori Hashimoto, Yukio Mitsuyama, Takao Onoye:
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling. WISA 2010: 107-121 - Kehua Bao, Zhenfeng Zhang:
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks. WISA 2010: 221-233 - Nico Döttling, Dejan E. Lazich, Jörn Müller-Quade, Antonio Sobreira de Almeida:
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity. WISA 2010: 206-220 - Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. WISA 2010: 337-350 - Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother. WISA 2010: 307-321 - M. Abdelaziz Elaabid, Olivier Meynard, Sylvain Guilley, Jean-Luc Danger:
Combined Side-Channel Attacks. WISA 2010: 175-190 - Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama:
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage. WISA 2010: 15-30 - Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall:
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations. WISA 2010: 243-257 - Jae-hoon Jang, Don-Gu Yeo, Dong-hee Lee, Heung-Youl Youm:
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6. WISA 2010: 150-159 - Changlong Jin, Shengzhe Li, Hakil Kim, Eunsoo Park:
Fingerprint Liveness Detection Based on Multiple Image Quality Features. WISA 2010: 281-291 - Wenpan Jing, Haixia Xu, Bao Li:
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets. WISA 2010: 31-43 - Jean-Marie Kabasele-Tenday:
Using Special Use Cases for Security in the Software Development Life Cycle. WISA 2010: 122-134 - Hansung Lee, Yunsu Chung, Jeongnyeo Kim, Daihee Park:
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram. WISA 2010: 273-280 - Hongying Liu, Guoyu Qian, Satoshi Goto, Yukiyasu Tsunoo:
Correlation Power Analysis Based on Switching Glitch Model. WISA 2010: 191-205 - Atsuko Miyaji, Kazumasa Omote:
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks. WISA 2010: 135-149 - Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Hidden Credential Retrieval without Random Oracles. WISA 2010: 160-174 - Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, Kazuo Ohta:
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis. WISA 2010: 258-272 - Thi Hai Binh Nguyen, Van Huan Nguyen, Hakil Kim:
Robust Feature Extraction for Facial Image Quality Assessment. WISA 2010: 292-306 - Takashi Nishide, Kouichi Sakurai:
Distributed Paillier Cryptosystem without Trusted Dealer. WISA 2010: 44-60 - Sumit Kumar Pandey, Rana Barua:
Construction of Identity Based Signcryption Schemes. WISA 2010: 1-14 - Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li:
Full-Round Differential Attack on TWIS Block Cipher. WISA 2010: 234-242 - Colin D. Walter:
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains. WISA 2010: 61-75 - Erich Wenger, Martin Feldhofer, Norbert Felber:
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices. WISA 2010: 92-106 - Kazuki Yoneyama:
Cross-Realm Password-Based Server Aided Key Exchange. WISA 2010: 322-336
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-28 00:06 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint