|
Conferences in DBLP
(provsec) 2009 (conf/provsec/2009)
A Brief History of Security Models for Confidentiality. [Citation Graph (, )][DBLP]
Symbolic Methods for Provable Security. [Citation Graph (, )][DBLP]
Efficient Non-interactive Universally Composable String-Commitment Schemes. [Citation Graph (, )][DBLP]
Spatial Encryption under Simpler Assumption. [Citation Graph (, )][DBLP]
Chosen-Ciphertext Secure RSA-Type Cryptosystems. [Citation Graph (, )][DBLP]
Anonymous Conditional Proxy Re-encryption without Random Oracle. [Citation Graph (, )][DBLP]
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. [Citation Graph (, )][DBLP]
Identity-Based Verifiably Encrypted Signatures without Random Oracles. [Citation Graph (, )][DBLP]
How to Prove Security of a Signature with a Tighter Security Reduction. [Citation Graph (, )][DBLP]
Twin Signature Schemes, Revisited. [Citation Graph (, )][DBLP]
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. [Citation Graph (, )][DBLP]
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? [Citation Graph (, )][DBLP]
Anonymous Signatures Revisited. [Citation Graph (, )][DBLP]
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. [Citation Graph (, )][DBLP]
Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. [Citation Graph (, )][DBLP]
Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. [Citation Graph (, )][DBLP]
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge. [Citation Graph (, )][DBLP]
Server-Controlled Identity-Based Authenticated Key Exchange. [Citation Graph (, )][DBLP]
Oracle Separation in the Non-uniform Model. [Citation Graph (, )][DBLP]
GUC-Secure Set-Intersection Computation. [Citation Graph (, )][DBLP]
Self-enforcing Private Inference Control. [Citation Graph (, )][DBLP]
|