


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2005
- Rui Zhang, Hideki Imai:
Improvements on Security Proofs of Some Identity Based Encryption Schemes. CISC 2005: 28-41 - Xiaolan Joy Zhang, Brian King:
Modeling RFID Security. CISC 2005: 75-90 - Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song:
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. CISC 2005: 346-357 - Tianjie Cao, Dongdai Lin:
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. CISC 2005: 233-241 - Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang:
Efficient Group Signatures from Bilinear Pairing. CISC 2005: 128-139 - Sherman S. M. Chow
, Zhengjun Cao, Joseph K. Liu:
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. CISC 2005: 290-301 - Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn:
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. CISC 2005: 358-369 - Giovanni Di Crescenzo:
You Can Prove So Many Things in Zero-Knowledge. CISC 2005: 10-27 - Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura
:
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. CISC 2005: 395-406 - Fei Gao, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu:
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. CISC 2005: 302-312 - Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz:
Towards a General RC4-Like Keystream Generator. CISC 2005: 162-174 - Chunxiang Gu, Yuefei Zhu:
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . CISC 2005: 42-52 - Hyun-Sun Kang, Chang-Seop Park:
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. CISC 2005: 407-418 - Fagen Li, Juntao Gao, Yupu Hu:
ID-Based Threshold Unsigncryption Scheme from Pairings. CISC 2005: 242-253 - Hongda Li, Bao Li:
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. CISC 2005: 210-220 - Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong:
ID-Based Signature Scheme Without Trusted PKG. CISC 2005: 53-62 - Wenping Ma, Fu Tai Zhang:
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. CISC 2005: 384-394 - Pradeep Kumar Mishra:
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. CISC 2005: 324-335 - Chang-Joo Moon, Woojin Paik, Young-Gab Kim
, JuHum Kwon:
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. CISC 2005: 265-278 - Gil-Jong Mun, Yongmin Kim, DongKook Kim, BongNam Noh:
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. CISC 2005: 254-264 - Cheol-Min Park, Myung-Hwan Kim, Moti Yung:
A Remark on Implementing the Weil Pairing. CISC 2005: 313-323 - Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim
:
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. CISC 2005: 279-289 - Jong-Hyuk Roh, Kyoon-Ha Lee:
Key Management for Secure Overlay Multicast. CISC 2005: 336-345 - Roman Schlegel, Serge Vaudenay:
Enforcing Email Addresses Privacy Using Tokens. CISC 2005: 91-100 - Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:
Specifying Authentication Using Signal Events in CSP. CISC 2005: 63-74 - Zuhua Shao:
Enhanced Aggregate Signatures from Pairings. CISC 2005: 140-149 - Jihong Teng, Shiqu Li, Xiaoying Huang:
The kth-Order Quasi-Generalized Bent Functions over Ring Zp. CISC 2005: 189-201 - Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. CISC 2005: 113-127 - Serge Vaudenay:
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. CISC 2005: 1-9 - Peng Wang
, Dengguo Feng, Wenling Wu:
HCTR: A Variable-Input-Length Enciphering Mode. CISC 2005: 175-188
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-16 07:08 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
