Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2014
- Michel Abdalla:
Password-Based Authenticated Key Exchange: An Overview. ProvSec 2014: 1-9 - Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu:
Bounded Pre-image Awareness and the Security of Hash-Tree Keyless Signatures. ProvSec 2014: 130-145 - Jiageng Chen, Atsuko Miyaji, Chunhua Su:
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags. ProvSec 2014: 103-116 - Hui Cui, Yi Mu, Man Ho Au:
Complete Robustness in Identity-Based Encryption. ProvSec 2014: 342-349 - Ivan Damgård, Jesper Buus Nielsen:
Adaptive versus Static Security in the UC Model. ProvSec 2014: 10-28 - Nilanjan Datta, Mridul Nandi:
Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. ProvSec 2014: 300-308 - Shoichi Hirose, Hidenori Kuwakado:
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function. ProvSec 2014: 71-86 - Shoichi Hirose, Hidenori Kuwakado:
Forward-Secure Sequential Aggregate Message Authentication Revisited. ProvSec 2014: 87-102 - Shuichi Katsumata, Noboru Kunihiro:
Constructing Subspace Membership Encryption through Inner Product Encryption. ProvSec 2014: 223-242 - Lukasz Krzywiecki:
Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. ProvSec 2014: 334-341 - Peeter Laud, Alisa Pankova:
Verifiable Computation in Multiparty Protocols with Honest Majority. ProvSec 2014: 146-161 - Rongxing Lu, Xiaodong Lin, Jun Shao, Kaitai Liang:
RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. ProvSec 2014: 194-205 - Koji Nuida:
How to Use Pseudorandom Generators in Unconditional Security Settings. ProvSec 2014: 291-299 - Tapas Pandit, Sumit Kumar Pandey, Rana Barua:
Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. ProvSec 2014: 274-290 - Somindu C. Ramanna, Palash Sarkar:
Efficient (Anonymous) Compact HIBE from Standard Assumptions. ProvSec 2014: 243-258 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:
Misuse-Resistant Variants of the OMD Authenticated Encryption Mode. ProvSec 2014: 55-70 - Mehdi Tibouchi:
Impossibility of Surjective Icart-Like Encodings. ProvSec 2014: 29-39 - Yuyu Wang, Keisuke Tanaka:
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency. ProvSec 2014: 117-129 - Yohei Watanabe, Junji Shikata:
Timed-Release Computational Secret Sharing Scheme and Its Applications. ProvSec 2014: 326-333 - Haiyang Xue, Xianhui Lu, Bao Li, Yamin Liu:
Lossy Trapdoor Relation and Its Applications to Lossy Encryption and Adaptive Trapdoor Relation. ProvSec 2014: 162-177 - Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto:
A Short Fail-Stop Signature Scheme from Factoring. ProvSec 2014: 309-316 - Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai:
Fine-Grained Conditional Proxy Re-Encryption and Application. ProvSec 2014: 206-222 - Kazuki Yoneyama:
Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols. ProvSec 2014: 317-325 - Kazuki Yoneyama, Goichiro Hanaoka:
Compact Public Key Encryption with Minimum Ideal Property of Hash Functions. ProvSec 2014: 178-193 - Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ProvSec 2014: 259-273 - Guangyao Zhao, Lei Cheng, Chao Li, Ruilin Li, Xuan Shen:
On the Practical Security Bound of GF-NLFSR Structure with SPN Round Function. ProvSec 2014: 40-54 - Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. Lecture Notes in Computer Science 8782, Springer 2014, ISBN 978-3-319-12474-2 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-29 21:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint