default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 52 matches
- 2018
- Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand:
New Attacks and Secure Design for Anonymous Distance-Bounding. ACISP 2018: 598-616 - Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe:
Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions. ACISP 2018: 341-359 - Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue:
Live Path CFI Against Control Flow Hijacking Attacks. ACISP 2018: 768-779 - Xavier Boyen, Thomas Haines:
Forward-Secure Linkable Ring Signatures. ACISP 2018: 245-264 - Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee:
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. ACISP 2018: 28-44 - Jie Cui, Jiantao He, Yan Xu, Hong Zhong:
TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller. ACISP 2018: 649-665 - Bernardo David, Rafael Dowsley, Mario Larangeira:
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. ACISP 2018: 45-63 - Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. ACISP 2018: 467-486 - Howard M. Heys:
Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode). ACISP 2018: 135-153 - Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. ACISP 2018: 265-283 - Kexin Hu, Zhenfeng Zhang:
Fast Lottery-Based Micropayments for Decentralized Currencies. ACISP 2018: 669-686 - Ryoma Ito, Atsuko Miyaji:
New Iterated RC4 Key Correlations. ACISP 2018: 154-171 - Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida:
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. ACISP 2018: 64-82 - Handan Kilinç, Serge Vaudenay:
Secure Contactless Payment. ACISP 2018: 579-597 - Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park:
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS. ACISP 2018: 101-113 - Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. ACISP 2018: 805-812 - Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong:
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. ACISP 2018: 539-557 - Terry Shue Chien Lau, Chik How Tan:
A New Encryption Scheme Based on Rank Metric Codes. ACISP 2018: 750-758 - Hyung Tae Lee, Huaxiong Wang, Kai Zhang:
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. ACISP 2018: 780-786 - Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan:
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. ACISP 2018: 455-466 - Shimin Li, Bei Liang, Rui Xue:
Private Functional Signatures: Definition and Construction. ACISP 2018: 284-303 - Chi Liu, Rongmao Chen, Yi Wang, Yongjun Wang:
Asymmetric Subversion Attacks on Signature Schemes. ACISP 2018: 376-395 - Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-fung Leung:
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. ACISP 2018: 431-451 - Xingye Lu, Zhenfei Zhang, Man Ho Au:
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. ACISP 2018: 813-820 - Xuecheng Ma, Xin Wang, Dongdai Lin:
Anonymous Identity-Based Encryption with Identity Recovery. ACISP 2018: 360-375 - Nicolas Marrière, Valérie Nachef, Emmanuel Volte:
Differential Attacks on Reduced Round LILLIPUT. ACISP 2018: 188-206 - Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst:
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. ACISP 2018: 759-767 - Yusuke Naito:
Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key. ACISP 2018: 225-242 - Souradyuti Paul, Ananya Shrivastava:
Robust Multiparty Computation with Faster Verification Time. ACISP 2018: 114-131 - Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu:
A Deterministic Algorithm for Computing Divisors in an Interval. ACISP 2018: 3-12
skipping 22 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-06 16:02 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint