The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Cryptography and Network Security (acns)
2006 (conf/acns/2006)

  1. Ahren Studer, Chenxi Wang
    Adaptive Detection of Local Scanners. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:1-17 [Conf]
  2. Jianhua Yang, Yongzhong Zhang
    Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:18-32 [Conf]
  3. Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough
    DSO: Dependable Signing Overlay. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:33-49 [Conf]
  4. Ahto Buldas, Sven Laur
    Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:50-65 [Conf]
  5. Sébastien Canard, Aline Gouget, Emeline Hufschmitt
    A Handy Multi-coupon System. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:66-81 [Conf]
  6. Dongvu Tonien, Reihaneh Safavi-Naini
    An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:82-97 [Conf]
  7. Sujata Doshi, Fabian Monrose, Aviel D. Rubin
    Efficient Memory Bound Puzzles Using Pattern Databases. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:98-113 [Conf]
  8. Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam
    Effect of Malicious Synchronization. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:114-129 [Conf]
  9. Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
    Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:130-145 [Conf]
  10. Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
    Password Based Server Aided Key Exchange . [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:146-161 [Conf]
  11. Qiang Tang, Kim-Kwang Raymond Choo
    Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:162-177 [Conf]
  12. Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm
    Stateful Subset Cover. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:178-193 [Conf]
  13. Khoongming Khoo, Guang Gong, Hian-Kiat Lee
    The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:194-209 [Conf]
  14. Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding
    Breaking a New Instance of TTM Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:210-225 [Conf]
  15. Raphael C.-W. Phan, Bok-Min Goi
    Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:226-238 [Conf]
  16. Christoph Herbst, Elisabeth Oswald, Stefan Mangard
    An AES Smart Card Implementation Resistant to Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:239-252 [Conf]
  17. Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi
    Physical Security Bounds Against Tampering. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:253-267 [Conf]
  18. Camille Vuillaume, Katsuyuki Okeya
    Flexible Exponentiation with Resistance to Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:268-283 [Conf]
  19. Dayin Wang, Dongdai Lin, Wenling Wu
    An Improved Poly1305 MAC. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:284-292 [Conf]
  20. Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng
    Certificateless Public-Key Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:293-308 [Conf]
  21. Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi
    High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:309-324 [Conf]
  22. Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Authentication for Paranoids: Multi-party Secret Handshakes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:325-339 [Conf]
  23. Xinghua Li, Sang-Jae Moon, Jianfeng Ma
    On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:340-348 [Conf]
  24. Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
    W3Bcrypt: Encryption as a Stylesheet. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:349-364 [Conf]
  25. Dibyendu Chakrabarti, Jennifer Seberry
    Combinatorial Structures for Design of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:365-374 [Conf]
  26. Nitesh Saxena
    Public Key Cryptography Sans Certificates in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:375-389 [Conf]
  27. JongHyup Lee, Taekyoung Kwon, JooSeok Song
    Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:390-404 [Conf]
  28. Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal
    A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:405-420 [Conf]
  29. Pinhui Ke, Jie Zhang, Qiaoyan Wen
    Results on Almost Resilient Functions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:421-432 [Conf]
  30. Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
    Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:433-447 [Conf]
  31. Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
    On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:448-458 [Conf]
  32. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Improving the Randomized Initial Point Countermeasure Against DPA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:459-469 [Conf]
  33. Aggelos Kiayias, Antonina Mitrofanova
    Syntax-Driven Private Evaluation of Quantified Membership Queries. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:470-485 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002