The SCEAS System
Navigation Menu

Conferences in DBLP

(provsec)
2009 (conf/provsec/2009)


  1. A Brief History of Security Models for Confidentiality. [Citation Graph (, )][DBLP]


  2. Symbolic Methods for Provable Security. [Citation Graph (, )][DBLP]


  3. Efficient Non-interactive Universally Composable String-Commitment Schemes. [Citation Graph (, )][DBLP]


  4. Spatial Encryption under Simpler Assumption. [Citation Graph (, )][DBLP]


  5. Chosen-Ciphertext Secure RSA-Type Cryptosystems. [Citation Graph (, )][DBLP]


  6. Anonymous Conditional Proxy Re-encryption without Random Oracle. [Citation Graph (, )][DBLP]


  7. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. [Citation Graph (, )][DBLP]


  8. Identity-Based Verifiably Encrypted Signatures without Random Oracles. [Citation Graph (, )][DBLP]


  9. How to Prove Security of a Signature with a Tighter Security Reduction. [Citation Graph (, )][DBLP]


  10. Twin Signature Schemes, Revisited. [Citation Graph (, )][DBLP]


  11. On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions. [Citation Graph (, )][DBLP]


  12. Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? [Citation Graph (, )][DBLP]


  13. Anonymous Signatures Revisited. [Citation Graph (, )][DBLP]


  14. An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. [Citation Graph (, )][DBLP]


  15. Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. [Citation Graph (, )][DBLP]


  16. Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. [Citation Graph (, )][DBLP]


  17. Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge. [Citation Graph (, )][DBLP]


  18. Server-Controlled Identity-Based Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  19. Oracle Separation in the Non-uniform Model. [Citation Graph (, )][DBLP]


  20. GUC-Secure Set-Intersection Computation. [Citation Graph (, )][DBLP]


  21. Self-enforcing Private Inference Control. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002