Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2016
- Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou:
Why Software DoS Is Hard to Fix: Denying Access in Embedded Android Platforms. ACNS 2016: 193-211 - Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Fuzzy Signatures: Relaxing Requirements and a New Construction. ACNS 2016: 97-116 - Hamza Abusalah, Georg Fuchsbauer:
Constrained PRFs for Unbounded Inputs with Short Keys. ACNS 2016: 445-463 - Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrzak:
Offline Witness Encryption. ACNS 2016: 285-303 - Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Cristina Onete, Benjamin Richard:
A Cryptographic Analysis of UMTS/LTE AKA. ACNS 2016: 18-35 - Megumi Ando, Joshua D. Guttman, Alberto R. Papaleo, John Scire:
Hash-Based TPM Signatures for the Quantum World. ACNS 2016: 77-94 - Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada:
Attribute Based Encryption with Direct Efficiency Tradeoff. ACNS 2016: 249-266 - Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:
Better Preprocessing for Secure Multiparty Computation. ACNS 2016: 327-345 - Alex Biryukov, Daniel Dinu, Johann Großschädl:
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice. ACNS 2016: 537-557 - Simon R. Blackburn, Matthew J. B. Robshaw:
On the Security of the Algebraic Eraser Tag Authentication Protocol. ACNS 2016: 3-17 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth:
Foundations of Fully Dynamic Group Signatures. ACNS 2016: 117-136 - Xavier Boyen, Qinyi Li:
Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions. ACNS 2016: 267-284 - Jagmohan Chauhan, Hassan Jameel Asghar, Anirban Mahanti, Mohamed Ali Kâafar:
Gesture-Based Continuous Authentication for Wearable Devices: The Smart Glasses Use Case. ACNS 2016: 648-665 - Mauro Conti, Claudio Guarisco, Riccardo Spolaor:
CAPTCHaStar! A Novel CAPTCHA Based on Interactive Shape Discovery. ACNS 2016: 611-628 - Edouard Cuvelier, Olivier Pereira:
Verifiable Multi-party Computation with Perfectly Private Audit Trail. ACNS 2016: 367-385 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:
Square Attack on 7-Round Kiasu-BC. ACNS 2016: 500-517 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval:
Legally Fair Contract Signing Without Keystones. ACNS 2016: 175-190 - Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security. ACNS 2016: 156-174 - Ian Goldberg, Graeme Jenkinson, Frank Stajano:
Low-Cost Mitigation Against Cold Boot Attacks for an Authentication Token. ACNS 2016: 36-57 - Alonso González, Carla Ràfols:
New Techniques for Non-interactive Shuffle and Range Arguments. ACNS 2016: 427-444 - Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger:
Memory Carving in Embedded Devices: Separate the Wheat from the Chaff. ACNS 2016: 592-608 - Krzysztof Grining, Marek Klonowski, Piotr Syga:
Practical Fault-Tolerant Data Aggregation. ACNS 2016: 386-404 - Angela Jäschke, Frederik Armknecht:
Accelerating Homomorphic Computations on Rational Numbers. ACNS 2016: 405-423 - Elena Kirshanova, Alexander May, Friedrich Wiemer:
Parallel Implementation of BDD Enumeration for LWE. ACNS 2016: 580-591 - Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. ACNS 2016: 518-536 - Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters:
Deterministic Public-Key Encryption Under Continual Leakage. ACNS 2016: 304-323 - Jean Lancrenon, Marjan Skrobot, Qiang Tang:
Two More Efficient Variants of the J-PAKE Protocol. ACNS 2016: 58-76 - Pierre Lestringant, Frédéric Guihéry, Pierre-Alain Fouque:
Assisted Identification of Mode of Operation in Binary Code with Dynamic Data Flow Slicing. ACNS 2016: 561-579 - Benoît Libert, Fabrice Mouhartem, Khoa Nguyen:
A Lattice-Based Group Signature Scheme with Message-Dependent Opening. ACNS 2016: 137-155 - Yunwen Liu, Qingju Wang, Vincent Rijmen:
Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey. ACNS 2016: 485-499
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-02 20:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint