The SCEAS System
Navigation Menu

Conferences in DBLP

Security in Communication Networks (scn)
2008 (conf/scn/2008)


  1. Storage Encryption: A Cryptographer's View. [Citation Graph (, )][DBLP]


  2. Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries. [Citation Graph (, )][DBLP]


  3. CLL: A Cryptographic Link Layer for Local Area Networks. [Citation Graph (, )][DBLP]


  4. Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification. [Citation Graph (, )][DBLP]


  5. Privacy Preserving Data Mining within Anonymous Credential Systems. [Citation Graph (, )][DBLP]


  6. Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. [Citation Graph (, )][DBLP]


  7. Two Generic Constructions of Probabilistic Cryptosystems and Their Applications. [Citation Graph (, )][DBLP]


  8. Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. [Citation Graph (, )][DBLP]


  9. General Certificateless Encryption and Timed-Release Encryption. [Citation Graph (, )][DBLP]


  10. Efficient Certificate-Based Encryption in the Standard Model. [Citation Graph (, )][DBLP]


  11. An Improved Robust Fuzzy Extractor. [Citation Graph (, )][DBLP]


  12. On Linear Secret Sharing for Connectivity in Directed Graphs. [Citation Graph (, )][DBLP]


  13. Expressive Subgroup Signatures. [Citation Graph (, )][DBLP]


  14. Anonymous Proxy Signatures. [Citation Graph (, )][DBLP]


  15. Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem. [Citation Graph (, )][DBLP]


  16. Using Normal Bases for Compact Hardware Implementations of the AES S-Box. [Citation Graph (, )][DBLP]


  17. A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. [Citation Graph (, )][DBLP]


  18. Full Cryptanalysis of LPS and Morgenstern Hash Functions. [Citation Graph (, )][DBLP]


  19. A New DPA Countermeasure Based on Permutation Tables. [Citation Graph (, )][DBLP]


  20. Simplified Submission of Inputs to Protocols. [Citation Graph (, )][DBLP]


  21. Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited. [Citation Graph (, )][DBLP]


  22. Linear Bandwidth Naccache-Stern Encryption. [Citation Graph (, )][DBLP]


  23. Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. [Citation Graph (, )][DBLP]


  24. Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework). [Citation Graph (, )][DBLP]


  25. New Anonymity Notions for Identity-Based Encryption. [Citation Graph (, )][DBLP]


  26. A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. [Citation Graph (, )][DBLP]


  27. An Identity-Based Key Agreement Protocol for the Network Layer. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002