The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Authenticated with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1991 (16) 1992-1995 (17) 1996-1997 (16) 1998-1999 (30) 2000 (23) 2001 (38) 2002 (65) 2003 (85) 2004 (117) 2005 (178) 2006 (183) 2007 (179) 2008 (187) 2009 (171) 2010 (120) 2011 (127) 2012 (119) 2013 (145) 2014 (147) 2015 (175) 2016 (170) 2017 (185) 2018 (166) 2019 (182) 2020 (187) 2021 (165) 2022 (180) 2023 (192) 2024 (52)
Publication types (Num. hits)
article(1871) incollection(8) inproceedings(1703) phdthesis(35)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1224 occurrences of 496 keywords

Results
Found 3617 publication records. Showing 3617 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
83Yehuda Lindell, Anna Lysyanskaya, Tal Rabin On the composition of authenticated Byzantine Agreement. Search on Bibsonomy J. ACM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authenticated Byzantine Agreement, lower bounds, randomized protocols, protocol composition
78Giuseppe Di Battista, Bernardo Palazzi Authenticated Relational Tables and Authenticated Skip Lists. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authenticated Relational Table, Authenticated Skip List, Authenticated query
75Michel Abdalla, Pierre-Alain Fouque, David Pointcheval Password-Based Authenticated Key Exchange in the Three-Party Setting. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password, key distribution, authenticated key exchange, multi-party protocols
67Yevgeniy Dodis, Jee Hea An Concealment and Its Applications to Authenticated Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
59Muxiang Zhang New Approaches to Password Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
59Yehuda Lindell, Anna Lysyanskaya, Tal Rabin On the composition of authenticated byzantine agreement. Search on Bibsonomy STOC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
59Malte Borcherding On the Number of Authenticated Rounds in Byzantine Agreement. Search on Bibsonomy WDAG The full citation details ... 1995 DBLP  DOI  BibTeX  RDF fault tolerance, distributed systems, authentication, Byzantine Agreement
59Shuhua Wu, Yuefei Zhu Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, key exchange, password authenticated, dynamic group
59Eun-Jun Yoon, Kee-Young Yoo Robust Authenticated Encryption Scheme with Message Linkages. Search on Bibsonomy KES (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Message linkage, Cryptography, Signature, Authenticated encryption
59Taekyoung Kwon 0002 Authenticated Key Agreement Without Subgroup Element Verification. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Small Subgroup Attacks, Authentication, Cryptographic Protocols, Authenticated Key Agreement
59Phillip Rogaway Authenticated-encryption with associated-data. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption
56Rana Barua, Ratna Dutta, Palash Sarkar 0001 Extending Joux's Protocol to Multi Party Key Agreement (Extended Abstract). Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF group key agreement, ID based cryptography, pairing based cryptography, authenticated key agreement
51Yin Yang 0001, Dimitris Papadias, Stavros Papadopoulos 0001, Panos Kalnis Authenticated join processing in outsourced databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF database outsourcing, query authentication, join algorithms
51Jianhong Zhang, Cheng Ji On the Security of two Authenticated Encryption Schemes. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee Rate-Distortion-Authentication Optimized Streaming of Authenticated Video. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Gang Yao, Dengguo Feng, Xiaoxi Han Improved Client-to-Client Password-Authenticated Key Exchange Protocol. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Hui-Feng Huang, Chin-Chen Chang 0001 An Efficient Convertible Authenticated Encryption Scheme and Its Variant. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
51Chanathip Namprempre Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
51Lan Zhou, Willy Susilo, Yi Mu 0001 Efficient ID-Based Authenticated Group Key Agreement from Bilinear Pairings. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authenticated group key agreement, cryptography, bilinear pairings, ID-based
51Stefan Lucks Two-Pass Authenticated Encryption Faster Than Generic Composition. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF associated data, OMAC, provable security, authenticated encryption
51Kaouthar Blibech, Alban Gabillon CHRONOS: an authenticated dictionary based on skip lists for timestamping systems. Search on Bibsonomy SWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF order of insertion, timestamping systems, skip lists, authenticated dictionaries
51Shuhong Wang 0001, Jie Wang 0038, Maozhi Xu Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cross-realm setting, Security, Dictionary attacks, Password-authenticated key exchange
51Michael T. Goodrich, Michael Shin, Roberto Tamassia, William H. Winsborough Authenticated Dictionaries for Fresh Attribute Credentials. Search on Bibsonomy iTrust The full citation details ... 2003 DBLP  DOI  BibTeX  RDF third-party data publication, authentication of cached data, trust management, dynamic data structures, certificate revocation, digital credential, authenticated dictionary
48Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Youngsook Lee, Junghyun Nam, Dongho Won An Inter-domain Key Agreement Protocol Using Weak Passwords. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication, password, Key exchange, public key
48Isamu Teranishi, Jun Furukawa 0001, Kazue Sako k-Times Anonymous Authentication (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic 0001, Calvin C. Newport Securing every bit: authenticated broadcast in radio networks. Search on Bibsonomy SPAA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless networks, broadcast, byzantine faults
43Gang Yao, Hongji Wang, Qingshan Jiang An Authenticated 3-Round Identity-Based Group Key Agreement Protocol. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu Authenticated Directed Diffusion. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Directed Diffusion
43Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt (Password) Authenticated Key Establishment: From 2-Party to Group. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF protocol compiler, common reference string model, key establishment, password-based authentication
43Ji-Seon Lee, Jik Hyun Chang Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a Ring. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Muxiang Zhang Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Youngsook Lee, Junghyun Nam, Jin Kwak, Dongho Won Password-Only Authenticated Key Exchange Between Two Agents in the Four-Party Setting. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, agent, Password, key exchange, inter-domain
43Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting System Call Monitoring Using Authenticated System Calls. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF operating systems, security policy, Intrusion tolerance, compiler techniques, sandboxing
43Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting Authenticated System Calls. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Muxiang Zhang Password Authenticated Key Exchange Using Quadratic Residues. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee 0001, Chang-Seop Park Password-Authenticated Key Exchange between Clients with Different Passwords. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF key exchange, Password authentication, dictionary attack, Kerberos, cross-realm
43Victor Boyko, Philip D. MacKenzie, Sarvar Patel Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
43Klaas Ole Kürtz, Henning Schnoor, Thomas Wilke Computationally secure two-round authenticated message exchange. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF authenticated message exchange, cryptographic protocols, timestamps
43Dengguo Feng, Jing Xu 0002 A New Client-to-Client Password-Authenticated Key Agreement Protocol. Search on Bibsonomy IWCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Password-authenticated key agreement, cryptanalysis, provable security, cross-realm
43Cas J. F. Cremers Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Session- state reveal, Ephemeral Key reveal, Provably-secure, Authenticated Key Exchange
43Xing-Lan Zhang Authenticated Key Exchange Protocol in One-Round. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Diffie-Hellman key exchange, Authenticated key exchange, Forward secrecy, Round complexity
43E. Dongna, Qingfeng Cheng, Chuangui Ma Password Authenticated Key Exchange Based on RSA in the Three-Party Settings. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-Residue Attack, RSA, Password Authenticated Key Exchange
43Wenting Jin, Jing Xu 0002 An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm
43Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
43Shuhua Wu, Yuefei Zhu Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, Password, authenticated key exchange, cross-realm
43Tetsu Iwata Authenticated Encryption Mode for Beyond the Birthday Bound Security. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher
43Satyajit Banerjee, Debapriyay Mukhopadhyay Symmetric key based authenticated querying in wireless sensor networks. Search on Bibsonomy InterSense The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authenticated querying, pairwise key pre-distribution, perfect and provable security, symmetric and public key cryptography
43Tarjei K. Mandt, Chik How Tan Certificateless Authenticated Two-Party Key Agreement Protocols. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear map, authenticated key agreement, Certificateless public key cryptography
43Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee 0001 Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile network security, Cryptography, dictionary attacks, password-authenticated key exchange, round complexity
43Weijia Wang, Lei Hu Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF password, key distribution, authenticated key exchange, multi-party protocol
43Raphael Chung-Wei Phan, Bok-Min Goi Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF client-to-client, unknown key-share, cryptanalysis, replay attack, Password-authenticated key exchange
43Duong Viet, Akihiro Yamamura, Hidema Tanaka Anonymous Password-Based Authenticated Key Exchange. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Password-based authenticated key exchange, Anonymous group authentication, Oblivious transfer
43Eun-Jun Yoon, Kee-Young Yoo New Efficient Simple Authenticated Key Agreement Protocol. Search on Bibsonomy COCOON The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Modification attack, Elliptic curve discrete logarithm problem, Authenticated key agreement, Password guessing attack
43Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee 0001 Constant-Round Authenticated Group Key Exchange for Dynamic Groups. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF dynamic authenticated group key exchange, ad hoc networks
43Ratna Dutta, Rana Barua, Palash Sarkar 0001 Provably Secure Authenticated Tree Based Group Key Agreement. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF provable security, bilinear pairing, group key agreement, authenticated key agreement
43Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
40Shafi Goldwasser, Yehuda Lindell Secure Multi-Party Computation without Agreement. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Broadcast, Secure multi-party computation, Protocol composition
40Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee 0001 Efficient ID-based Group Key Agreement with Bilinear Maps. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Atefeh Mashatan, Douglas R. Stinson Interactive two-channel message authentication based on Interactive-Collision Resistant hash functions. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Two-channel cryptography, Authenticated channel, Hash functions, Message authentication
40Zhenyu Hu, JianChun Jiang, Fuchun Sun 0001 Using IND-CVA for constructing secure communication. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF integrity, authenticated encryption, semantic security, universally composable security, secure channel
40Guomin Li, Dake He, Wei Guo Password-Based Tripartite Key Exchange Protocol with Forward Secrecy. Search on Bibsonomy RSKT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Password-based tripartite authenticated key exchange, Known key attacks, Forward secrecy
40Raylin Tso, Takeshi Okamoto, Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature
35Scott A. Crosby, Dan S. Wallach Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Hong Tang, Liehuang Zhu, Yuanda Cao, Dazhen Wang A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ellipse curve, bilinear pairing, group key agreement, secure group communication
35Maw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive Applications. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Emmanuel Bresson, Olivier Chevassut, David Pointcheval Provably secure authenticated group Diffie-Hellman key exchange. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptography, Diffie-Hellman, Group Key Exchange
35Jonathan Katz, Moti Yung Scalable Protocols for Authenticated Group Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Yvo Desmedt, Tanja Lange 0001, Mike Burmester Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Tree based GKE, Ad-Hoc Groups, Authentication, Anonymity, Key Distribution, Forward Security, Group Key Exchange
35Pierre E. Abi-Char, Abdallah Mhamed, Bachar El-Hassan A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Zhishou Zhang, Qibin Sun, Wai-Choong Wong, John G. Apostolopoulos, Susie J. Wee Rate-Distortion Optimized Streaming of Authenticated Video. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Taekyoung Kwon 0002, Dong Hoon Lee 0002 Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Kyung-Ah Shim, Seung-Hyun Seo Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Yijuan Shi, Gongliang Chen, Jianhua Li 0001 ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear parings, Key agreement, group key agreement, ID-based cryptography
35Tianjie Cao, Dongdai Lin, Rui Xue 0001 ID-Based Ring Authenticated Encryption. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Serge Vaudenay Secure Communications over Insecure Channels Based on Short Authenticated Strings. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Hui-Feng Huang, Chin-Chen Chang 0001 Enhancement of an Authenticated Multiple-Key Agreement Protocol Without Using Conventional One-Way Function. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Muxiang Zhang Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Jonathan Katz, Moti Yung Scalable Protocols for Authenticated Group Key Exchange. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Soichi Furuya, Kouichi Sakurai Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF real-or-random security, Stream cipher, provable security, message authentication, mode of operation
35Duncan S. Wong, Agnes Hui Chan Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia Persistent Authenticated Dictionaries and Their Applications. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan Password-Authenticated Key Exchange Based on RSA. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Boyeon Song, Kwangjo Kim Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Zhiguo Wan, Robert H. Deng, Feng Bao 0001, Bart Preneel, Ming Gu 0001 n PAKE+: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security protocol, group key agreement, password-authenticated key exchange
35Yin Yang 0001, Stavros Papadopoulos 0001, Dimitris Papadias, George Kollios Authenticated indexing for outsourced spatial databases. Search on Bibsonomy VLDB J. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Authenticated index, Database outsourcing, Mobile computing, Spatial database
35Hai Huang 0005, Zhenfu Cao An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF BDH problem, twin Diffie-Hellman, ID-based, authenticated key exchange
35Qingfeng Cheng, Chuangui Ma, Xuexian Hu A New Strongly Secure Authenticated Key Exchange Protocol. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Extended Canetti-Krawczyk model, Gap Diffie-Hellman assumption, Random oracle model, Authenticated key exchange
35Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar Authenticated Encryption in WSN Using eSTREAM Ciphers. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption
35Xun Yi, Raylin Tso, Eiji Okamoto ID-Based Group Password-Authenticated Key Exchange. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF protocol compiler, common reference model, group key agreement, Password-authenticated key exchange
35Stanislaw Jarecki, Jihye Kim, Gene Tsudik Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, authenticated key exchange, secret handshakes
35Kazuki Yoneyama, Haruki Ota, Kazuo Ohta Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF different password, C2C-PAKE, cross-realm setting, undetectable on-line dictionary attacks, Authenticated key exchange
35Noel McCullagh, Paulo S. L. M. Barreto A New Two-Party Identity-Based Authenticated Key Agreement. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear maps, Tate pairing, identity-based cryptography, authenticated key agreement
35Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Breaking and provably repairing the SSH authenticated encryption scheme: A case study of the Encode-then-Encrypt-and-MAC paradigm. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, Authenticated encryption, security proofs
35Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung A Division-of-Labor-Signature (t, n) Threshold-Authenticated Encryption Scheme with Message Linkage Based on the Elliptic Curve Cryptosystem. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF (t, n) threshold signature, Authenticated Encryption Scheme, Message Linkage, Elliptic Curve Cryptosystem, Division of labor
35Liang Fang, Sam Meder, Olivier Chevassut, Frank Siebenlist Secure password-based authenticated key exchange for web services. Search on Bibsonomy SWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, web services, password, authenticated key exchange
35Dimane Mpoeleng, Paul D. Ezhilchelvan, Neil A. Speirs From Crash Tolerance to Authenticated Byzantine Tolerance: A Structured Approach, the Cost and Benefits. Search on Bibsonomy DSN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Authenticated Byzantine failures, fail- signal, CORBA, group communication, self-checking, total order, State machine replication
35Mihir Bellare, Tadayoshi Kohno, Chanathip Namprempre Authenticated encryption in SSH: provably fixing the SSH binary packet protocol. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure shell, stateful decryption, authenticated encryption, security proofs, SSH
35Jian-Zhu Lu, Huo Yan Chen Improvement of authenticated encryption scheme with (t, n) shared verification. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery
Displaying result #1 - #100 of 3617 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license