![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 54 matches
- 2004
- Jiguo Li, Yichen Zhang, Yuelong Zhu:
Security analysis and improvement of some proxy signature schemes. InfoSecu 2004: 27-32 - Lihua Wang, Zhenfu Cao, Eiji Okamoto, Ying Miao, Takeshi Okamoto:
Transformation-free proxy cryptosystems and their applications to electronic commerce. InfoSecu 2004: 92-98 - Xinpeng Zhang, Shuozhong Wang:
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size. InfoSecu 2004: 247-248 - Haiyong Bao, Zhenfu Cao, Haifeng Qian:
Cryptanalysis of group signature scheme from ID-based signature scheme. InfoSecu 2004: 115-118 - Zhenchuan Chai, Zhenfu Cao, Rongxing Lu:
ID-based threshold decryption without random oracles and its application in key escrow. InfoSecu 2004: 119-124 - Jingsong Cui, Rong Peng, Li-Na Wang:
The optimized key distribution scheme in threshold RSA. InfoSecu 2004: 18-21 - Shanshan Duan, Zhenfu Cao, Rongxing Lu:
Robust ID-based threshold signcryption scheme from pairings. InfoSecu 2004: 33-37 - Yiliang Han, Xiaoyuan Yang, Yupu Hu:
Signcryption based on elliptic curve and its multi-party schemes. InfoSecu 2004: 216-217 - Tongshen Hu, Xiamin, Qingzhang Chen, Kezhen Ying:
Design and implement of firewall-log-based online attack detection system. InfoSecu 2004: 146-149 - Tadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto:
Anonymous traceable disclosure scheme using pairing over elliptic curve. InfoSecu 2004: 48-52 - Ming Li, Dawu Gu, Yong Wang, Yingcai Bai:
Research on authenticated key agreement in group settings. InfoSecu 2004: 1-4 - Botao Li, Junzhou Luo:
On timeliness of a fair non-repudiation protocol. InfoSecu 2004: 99-106 - Zhongwen Li, Zhongpan Qiu:
A new type of security and safety architecture for distributed system: models and implementation. InfoSecu 2004: 107-114 - Bo Li, Xiao-Ping Qiu:
An application of machine leaning to network intrusion detection. InfoSecu 2004: 231-233 - Yunfeng Li, Qingsheng Zhu, Yukun Cao:
Automatic metadata generation based on neural network. InfoSecu 2004: 192-197 - Fang Liu, Kui Dai, Zhiying Wang:
Applying multiple criteria decision making to improve security architecture development. InfoSecu 2004: 244-246 - Wenjie Liu, Guochang Gu, Hongnan Wang:
Communication and recovery issues in grid environment. InfoSecu 2004: 82-86 - Peiyu Liu, Yuguo Liu:
Research on network information filtering model based on fuzzy set. InfoSecu 2004: 236-237 - Jingmei Liu, Baodian Wei, Xinmei Wang:
New method to determine algebraic expression of Rijndael S-box. InfoSecu 2004: 181-185 - Xin Liu
, Qiu-Liang Xu, Jiu-Qing Shang:
A public auction scheme based on group signature. InfoSecu 2004: 136-142 - Rongxing Lu, Zhenfu Cao:
A proxy-protected signature scheme based on conic. InfoSecu 2004: 22-26 - Wenjun Luo, Xiang Li:
A study of secure multi-party elementary function computation protocols. InfoSecu 2004: 5-12 - Chunbo Ma, Jun Ao, Dake He:
An ID-based group signature. InfoSecu 2004: 229-230 - Zuhua Shao:
Cryptanalysis of publicly verifiable authenticated encryption. InfoSecu 2004: 143-145 - Ke-jun Sheng, Jiqiang Liu, Xin Liu:
Organization structure based access control model. InfoSecu 2004: 210-215 - Yang Shi, Liming Cao, Xiaoping Wang:
A security scheme of electronic commerce for mobile agents uses undetachable digital signatures. InfoSecu 2004: 242-243 - Zhicai Shi, Zhenzhou Ji, Mingzeng Hu:
A novel distributed intrusion detection model based on mobile agent. InfoSecu 2004: 155-159 - Xingming Sun, Gang Luo, Huajun Huang:
Component-based digital watermarking of Chinese texts. InfoSecu 2004: 76-81 - Tieli Sun, Wei Zhao, Zhiyan Zhao:
An architecture of pattern-oriented distributed meta-search engine. InfoSecu 2004: 171-174 - Zuowen Tan, Zhuojun Liu:
Provably secure delegation-by-certification proxy signature schemes. InfoSecu 2004: 38-43
skipping 24 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-21 01:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint