|
Conferences in DBLP
- Ahren Studer, Chenxi Wang
Adaptive Detection of Local Scanners. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:1-17 [Conf]
- Jianhua Yang, Yongzhong Zhang
Probabilistic Proof of an Algorithm to Compute TCP Packet Round-Trip Time for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:18-32 [Conf]
- Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas M. Blough
DSO: Dependable Signing Overlay. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:33-49 [Conf]
- Ahto Buldas, Sven Laur
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:50-65 [Conf]
- Sébastien Canard, Aline Gouget, Emeline Hufschmitt
A Handy Multi-coupon System. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:66-81 [Conf]
- Dongvu Tonien, Reihaneh Safavi-Naini
An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:82-97 [Conf]
- Sujata Doshi, Fabian Monrose, Aviel D. Rubin
Efficient Memory Bound Puzzles Using Pattern Databases. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:98-113 [Conf]
- Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam
Effect of Malicious Synchronization. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:114-129 [Conf]
- Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:130-145 [Conf]
- Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
Password Based Server Aided Key Exchange . [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:146-161 [Conf]
- Qiang Tang, Kim-Kwang Raymond Choo
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:162-177 [Conf]
- Mattias Johansson, Gunnar Kreitz, Fredrik Lindholm
Stateful Subset Cover. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:178-193 [Conf]
- Khoongming Khoo, Guang Gong, Hian-Kiat Lee
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:194-209 [Conf]
- Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding
Breaking a New Instance of TTM Cryptosystems. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:210-225 [Conf]
- Raphael C.-W. Phan, Bok-Min Goi
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:226-238 [Conf]
- Christoph Herbst, Elisabeth Oswald, Stefan Mangard
An AES Smart Card Implementation Resistant to Power Analysis Attacks. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:239-252 [Conf]
- Kerstin Lemke, Christof Paar, Ahmad-Reza Sadeghi
Physical Security Bounds Against Tampering. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:253-267 [Conf]
- Camille Vuillaume, Katsuyuki Okeya
Flexible Exponentiation with Resistance to Side Channel Attacks. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:268-283 [Conf]
- Dayin Wang, Dongdai Lin, Wenling Wu
An Improved Poly1305 MAC. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:284-292 [Conf]
- Zhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng
Certificateless Public-Key Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:293-308 [Conf]
- Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:309-324 [Conf]
- Stanislaw Jarecki, Jihye Kim, Gene Tsudik
Authentication for Paranoids: Multi-party Secret Handshakes. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:325-339 [Conf]
- Xinghua Li, Sang-Jae Moon, Jianfeng Ma
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:340-348 [Conf]
- Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
W3Bcrypt: Encryption as a Stylesheet. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:349-364 [Conf]
- Dibyendu Chakrabarti, Jennifer Seberry
Combinatorial Structures for Design of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:365-374 [Conf]
- Nitesh Saxena
Public Key Cryptography Sans Certificates in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:375-389 [Conf]
- JongHyup Lee, Taekyoung Kwon, JooSeok Song
Location-Aware Key Management Using Multi-layer Grids for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:390-404 [Conf]
- Kishan Chand Gupta, Pradeep Kumar Mishra, Pinakpani Pal
A General Methodology for Pipelining the Point Multiplication Operation in Curve Based Cryptography. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:405-420 [Conf]
- Pinhui Ke, Jie Zhang, Qiaoyan Wen
Results on Almost Resilient Functions. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:421-432 [Conf]
- Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:433-447 [Conf]
- Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:448-458 [Conf]
- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
Improving the Randomized Initial Point Countermeasure Against DPA. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:459-469 [Conf]
- Aggelos Kiayias, Antonina Mitrofanova
Syntax-Driven Private Evaluation of Quantified Membership Queries. [Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:470-485 [Conf]
|