Communications of the ACM
ACM SIGACT News
Communications of the ACM
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Inside risks: a risks-related bookshelf
Communications of the ACM
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
Explicit Communication Revisited: Two New Attacks on Authentication Protocols
IEEE Transactions on Software Engineering
Internet security: firewalls and beyond
Communications of the ACM
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
MediaBench: a tool for evaluating and synthesizing multimedia and communicatons systems
MICRO 30 Proceedings of the 30th annual ACM/IEEE international symposium on Microarchitecture
A Coding Approach for Detection of Tampering in Write-Once Optical Disks
IEEE Transactions on Computers
Robust IP watermarking methodologies for physical design
DAC '98 Proceedings of the 35th annual Design Automation Conference
Atomicity in electronic commerce
netWorker
Signature hiding techniques for FPGA intellectual property protection
Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design
Mobile networking in the Internet
Mobile Networks and Applications - Special issue: mobile networking in the Internet
ID-based secret-key cryptography
ACM SIGOPS Operating Systems Review
On the efficient implementation of fair non-repudiation
ACM SIGCOMM Computer Communication Review
Robust FPGA intellectual property protection through multiple small watermarks
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Proceedings of the 26th annual conference on Computer graphics and interactive techniques
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Factoring large numbers with programmable hardware
FPGA '00 Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays
Filtering Memory References to Increase Energy Efficiency
IEEE Transactions on Computers
Strength of two data encryption standard implementations under timing attacks
ACM Transactions on Information and System Security (TISSEC)
Technical opinion: designing cryptography for the new century
Communications of the ACM
A symmetric version of the McEliece public-key cryptosystem
International Journal of Network Management
Lx: a technology platform for customizable VLIW embedded processing
Proceedings of the 27th annual international symposium on Computer architecture
Information Security, Mathematics, and Public-Key Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Quicksilver: a quasi-static compiler for Java
OOPSLA '00 Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
Key management for encrypted broadcast
ACM Transactions on Information and System Security (TISSEC)
Mobile values, new names, and secure communication
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Verifying security protocols with Brutus
ACM Transactions on Software Engineering and Methodology (TOSEM)
Design of a trust model for a secure multi-agent marketplace
Proceedings of the fifth international conference on Autonomous agents
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
A method to compress and anonymize packet traces
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
On the validity of digital signatures
ACM SIGCOMM Computer Communication Review
On the techniques of enhancing the security of block ciphers
ACM SIGOPS Operating Systems Review
Secure multi-party computation problems and their applications: a review and open problems
Proceedings of the 2001 workshop on New security paradigms
Improving A Solution's Quality Through Parallel Processing
The Journal of Supercomputing
System design methodologies for a wireless security processing platform
Proceedings of the 39th annual Design Automation Conference
A secure multicast protocol with copyright protection
ACM SIGCOMM Computer Communication Review
Securing wireless data: system architecture challenges
Proceedings of the 15th international symposium on System Synthesis
Efficient and secure keys management for wireless mobile communications
Proceedings of the second ACM international workshop on Principles of mobile computing
Taming access control security: extending capabilities using the views relationship
Software—Practice & Experience
Automated Software Engineering
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
A Study of Communication Delays for Web Transactions
Cluster Computing
A Hardware Implementation of a Genetic Programming System Using FPGAs and Handel-C
Genetic Programming and Evolvable Machines
The Dynamics of the Electronic Market: An Evolutionary Game Approach
Information Systems Frontiers
Pseudorandom Number Generators Based on Chaotic Dynamical Systems
Open Systems & Information Dynamics
How to decrypt or even substitute DES-Encrypted messages in 228 steps
Information Processing Letters
Towards a Reference Model for Surveying Mobile Agent Systems
Autonomous Agents and Multi-Agent Systems
Computer
Dependable Computing and Online Testing in Adaptive and Configurable Systems
IEEE Design & Test
Architectures and VLSI Implementations of the AES-Proposal Rijndael
IEEE Transactions on Computers
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
A bisimulation method for cryptographic protocols
Nordic Journal of Computing
Hardware Implementation of Bluetooth Security
IEEE Pervasive Computing
Creating a National Lab Shared Storage Infrastructure
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Scalable space/time-shared stream-processing on the run-time reconfigurable PCA architecture
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Data Dissemination Approaches for Performance Discovery in Grid Systems
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Atomicity versus Anonymity: Distributed Transactions for Electronic Commerce
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Maintaining the Validity of Digital Signatures in B2B Applications
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Loyalty Program Scheme for Anonymous Payment System
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
An Equitably Fair On-line Auction Scheme
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Transactional Security for a Distributed Reputation Management System
EC-WEB '02 Proceedings of the Third International Conference on E-Commerce and Web Technologies
INEXP: Information Exchange Protocol for Interoperability
ICADL '02 Proceedings of the 5th International Conference on Asian Digital Libraries: Digital Libraries: People, Knowledge, and Technology
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine
SAC '98 Proceedings of the Selected Areas in Cryptography
Community Computing and Support Systems, Social Interaction in Networked Communities [the book is based on the Kyoto Meeting on Social Interaction and Communityware, held in Kyoto, Japan, in June 1998]
Community Formation via a Distributed, Privacy-Protecting Matchmaking System
Community Computing and Support Systems, Social Interaction in Networked Communities [the book is based on the Kyoto Meeting on Social Interaction and Communityware, held in Kyoto, Japan, in June 1998]
Image Watermarking for Copyright Protection
ALENEX '99 Selected papers from the International Workshop on Algorithm Engineering and Experimentation
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Decidability and Closure Properties of Equational Tree Languages
RTA '02 Proceedings of the 13th International Conference on Rewriting Techniques and Applications
Plausible Deniability Using Automated Linguistic Stegonagraphy
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Fair On-Line Auctions without Special Trusted Parties
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Secret Key Authentication with Software-Only Verification
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Intellectual Property Metering
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Compiling Applications for ConCISe: An Example of Automatic HW/SW Partitioning and Synthesis
FPL '00 Proceedings of the The Roadmap to Reconfigurable Computing, 10th International Workshop on Field-Programmable Logic and Applications
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
ISC '01 Proceedings of the 4th International Conference on Information Security
Cryptographic Traces for Mobile Agents
Mobile Agents and Security
A Secure Pay-per View Scheme for Web-Based Video Service
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Secure Watermark Verification Scheme
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
EHBT: An Efficient Protocol for Group Key Management
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Efficient non-repudiation multicast source authentication schemes
Journal of Computer Science and Technology
Internet security and intrusion detection
Proceedings of the 25th International Conference on Software Engineering
Technology and Health Care
Building trust in online auction markets through an economic incentive mechanism
Decision Support Systems
ConCISe: A Compiler-Driven CPLD-Based Instruction Set Accelerator
FCCM '99 Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Probable Plaintext Cryptanalysis of the IP Security Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Misplaced Trust: Kerberos 4 Session Keys
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Gateways to Overcome Incompatibilities of Security Mechanisms
SRDS '99 Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
Embedding Security in Wireless Embedded Systems
VLSID '03 Proceedings of the 16th International Conference on VLSI Design
Concurrent Error Detection in Block Ciphers
ITC '00 Proceedings of the 2000 IEEE International Test Conference
Network Access and Data Security Design for Telemedicine Applications
ISCC '97 Proceedings of the 2nd IEEE Symposium on Computers and Communications (ISCC '97)
Fast Subword Permutation Instructions Using Omega and Flip Network Stages
ICCD '00 Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
Decomposing a kind of weakly invertible finite automata with delay 2
Journal of Computer Science and Technology
A survey of key management for secure group communication
ACM Computing Surveys (CSUR)
Protecting digital archives at the Greek Orthodox Archdiocese of America
Proceedings of the 3rd ACM workshop on Digital rights management
How to fake an RSA signature by encoding modular root finding as a SAT problem
Discrete Applied Mathematics - The renesse issue on satisfiability
Authentication of LZ-77 compressed data
Proceedings of the 2003 ACM symposium on Applied computing
Electronic Commerce Research
A new signature scheme: joint-signature
Proceedings of the 2004 ACM symposium on Applied computing
Security design for a new local area network AULWLAN
CompSysTech '03 Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning
Emerging challenges in designing secure mobile appliances
Ambient intelligence
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
The chimaera reconfigurable functional unit
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Role-based access control in ambient and remote space
Proceedings of the ninth ACM symposium on Access control models and technologies
Security as a new dimension in embedded system design
Proceedings of the 41st annual Design Automation Conference
Secure and private sequence comparisons
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Privacy preserving electronic surveillance
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Digital signature: use and modification to achieve success in next generational e-business processes
Information and Management
Key Management for Encrypted Data Storage in Distributed Systems
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Performance Efficiency of Context-Flow System-on-Chip Platform
Proceedings of the 2003 IEEE/ACM international conference on Computer-aided design
Trustworthy 100-year digital objects: Evidence after every witness is dead
ACM Transactions on Information Systems (TOIS)
Security challenges for enterprise Java in an e-business environment
IBM Systems Journal
Optimizing array reference checking in Java programs
IBM Systems Journal
Security in embedded systems: Design challenges
ACM Transactions on Embedded Computing Systems (TECS)
A Novel Optimal Load Distribution Algorithm for Divisible Loads
Cluster Computing
On the Security of Polling Protocols in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Proceedings of the 2004 workshop on Multimedia and security
Securing Mobile Appliances: New Challenges for the System Designer
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
A Low Device Occupation IP to Implement Rijndael Algorithm
DATE '03 Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2
A framework of secure location service for position-based ad hoc routing
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Proceedings of the second international workshop on Mobility management & wireless access protocols
A workload characterization of elliptic curve cryptography methods in embedded environments
MEDEA '03 Proceedings of the 2003 workshop on MEmory performance: DEaling with Applications , systems and architecture
Quantum-noise: protected data encryption for WDM fiber-optic networks
ACM SIGCOMM Computer Communication Review
ssmail: Opportunistic Encryption in sendmail
LISA '99 Proceedings of the 13th USENIX conference on System administration
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
Hardware Engines for Bus Encryption: A Survey of Existing Techniques
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach
Proceedings of the conference on Design, Automation and Test in Europe - Volume 3
Algebraic Power Analysis by Abstract Interpretation
Higher-Order and Symbolic Computation
Implementation of the SHA-2 Hash Family Standard Using FPGAs
The Journal of Supercomputing
Security Enhancement in InfiniBand Architecture
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Using visual tags to bypass Bluetooth device discovery
ACM SIGMOBILE Mobile Computing and Communications Review
A cryptography course for non-mathematicians
Proceedings of the 1st annual conference on Information security curriculum development
Privacy-preserving credit checking
Proceedings of the 6th ACM conference on Electronic commerce
A Data-Driven Approach for Embedded Security
ISVLSI '05 Proceedings of the IEEE Computer Society Annual Symposium on VLSI: New Frontiers in VLSI Design
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Robust non-interactive zero-knowledge watermarking scheme against cheating prover
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Encyclopedia of Computer Science
An efficient high quality random number generator for multi-programmed systems
Journal of Computer Security
Behavioral synthesis techniques for intellectual property protection
ACM Transactions on Design Automation of Electronic Systems (TODAES)
Query execution assurance for outsourced databases
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Study on security based on PKI for e-commerce of statistics information system
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
The study on the application of BAN logic in formal analysis of authentication protocols
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols
IEEE Transactions on Mobile Computing
Teaching cryptography to undergraduate students in small liberal art schools
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
A New Type of Attacks on Block Ciphers
Problems of Information Transmission
Teaching cryptography in an applied computing program
Journal of Computing Sciences in Colleges
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
Proceedings of the conference on Design, automation and test in Europe: Designers' forum
To secure XML documents with the extension function of XSLT
Software—Practice & Experience - Research Articles
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
The Journal of Supercomputing
Optimizing compiler for shared-memory multiple SIMD architecture
Proceedings of the 2006 ACM SIGPLAN/SIGBED conference on Language, compilers, and tool support for embedded systems
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Parallelization of the data encryption standard(DES) algorithm
Enhanced methods in computer security, biometric and artificial intelligence systems
Analysis of non-linear pseudo-noise sequences
Enhanced methods in computer security, biometric and artificial intelligence systems
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Journal of Systems and Software
An object-oriented cryptosystem based on two-level reconfigurable computing architecture
Journal of Systems and Software
Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
Nordic Journal of Computing
Proceedings of the 43rd annual Design Automation Conference
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
Enhancing wireless video streaming using lightweight approximate authentication
Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks
Offline architecture for real-time betting
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Implementing encrypted streaming video in a distributed server environment
Proceedings of the 2005 ACM SIGCHI International Conference on Advances in computer entertainment technology
Towards an open, trusted digital rights management platform
Proceedings of the ACM workshop on Digital rights management
On-Chip Communication Architectures: System on Chip Interconnect
On-Chip Communication Architectures: System on Chip Interconnect
A lightweight and anonymous copyright-protection protocol
Computer Standards & Interfaces
Security requirements for internet voting
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
Efficient and Adaptive Threshold Signatures for Ad hoc networks
Electronic Notes in Theoretical Computer Science (ENTCS)
Performance evaluation of distributed multiple home agents with HAHA protocol
International Journal of Network Management
Security enhancement of an IC-card-based remote login mechanism
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cheat-proof playout for centralized and peer-to-peer gaming
IEEE/ACM Transactions on Networking (TON)
Improving authentication of remote card transactions with mobile personal trusted devices
Computer Communications
Transform-domain and DSP based secure speech communication system
Microprocessors & Microsystems
A methodology for verification of digital items in fair exchange protocols with active trustee
Electronic Commerce Research
Proceedings of the conference on Design, automation and test in Europe
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
A processing model for the optimal querying of encrypted XML documents in XQuery
ADC '07 Proceedings of the eighteenth conference on Australasian database - Volume 63
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
Proceedings of the 2007 international workshop on Parallel symbolic computation
STEM: seamless transport endpoint mobility
ACM SIGMOBILE Mobile Computing and Communications Review
Cryptanalysis of a new signal security system for multimedia data transmission
EURASIP Journal on Applied Signal Processing
EURASIP Journal on Applied Signal Processing
A secure and robust object-based video authentication system
EURASIP Journal on Applied Signal Processing
Information Sciences: an International Journal
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture
IEEE Transactions on Parallel and Distributed Systems
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
IEEE Transactions on Dependable and Secure Computing
A case study of the rustock rootkit and spam bot
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Exploring software partitions for fast security processing on a multiprocessor mobile SoC
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
NS2: networked searchable store with correctness
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Development of the attack against RSA with low public exponent and related messages
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
Random-bit sequence generation from image data
Image and Vision Computing
Towards the semantic extraction of digital signatures for librarian image-identification purposes
Journal of the American Society for Information Science and Technology
Security design for three-party encrypted key exchange protocol using smart cards
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Image encryption with compound chaotic sequence cipher shifting dynamically
Image and Vision Computing
Undercover: authentication usable in front of prying eyes
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A new approach for building secure applications based on internet infrastructure
International Journal of Computer Applications in Technology
Self-contextual network management system
International Journal of Internet Protocol Technology
A self-encryption authentication protocol for teleconference services
International Journal of Security and Networks
Anonymous authentication scheme for wireless communications
International Journal of Mobile Communications
Silence detection in secure P2P VoIP multiconferencing
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Secure architecture for the digital rights management of the m-content
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Integrated Computer-Aided Engineering - Artificial Neural Networks
Robust RSA distributed signatures for large-scale long-lived ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Cryptanalysis of the RCES/RSES image encryption scheme
Journal of Systems and Software
Adaptive watermark mechanism for rightful ownership protection
Journal of Systems and Software
Utilizing national public-key infrastructure in mobile payment systems
Electronic Commerce Research and Applications
Ubiquity
Enhancing web browsing security on public terminals using mobile composition
Proceedings of the 6th international conference on Mobile systems, applications, and services
EURASIP Journal on Information Security
An optimal low-power/high performance DDP-based Cobra-H64 cipher
Proceedings of the 3rd international conference on Mobile multimedia communications
An FPGA-based implementation of the Pomaranch stream cipher
Proceedings of the 3rd international conference on Mobile multimedia communications
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Design of secure hardware for ATM networks
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
The Multics encipher_Algorithm
Cryptologia
New algorithms and protocols for information authentication in automatic control systems
Automation and Remote Control
Lockr: social access control for web 2.0
Proceedings of the first workshop on Online social networks
Analyzing the structure of a class of linear automata over a ring $$ Z_{p^k } $$
Cybernetics and Systems Analysis
Location-based trust for mobile user-generated content: applications, challenges and implementations
Proceedings of the 9th workshop on Mobile computing systems and applications
Advanced method for cryptographic protocol verification
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
Secure mobile electronic card used in medical services
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
A distributed speaker authentication system
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
Solution for non-repudiation in GSM WAP applications
SEPADS'08 Proceedings of the 7th WSEAS International Conference on Software Engineering, Parallel and Distributed Systems
Research on a Novel Hashing Stream Cipher
Computational Intelligence and Security
The Banknote Anti-forgery System Based on Digital Signature Algorithms
PAISI, PACCF and SOCO '08 Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics
New State Recovery Attack on RC4
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
How to Solve Consensus in the Smallest Window of Synchrony
DISC '08 Proceedings of the 22nd international symposium on Distributed Computing
AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
Cybernetics and Systems
On quadratic approximations in block ciphers
Problems of Information Transmission
Speaker recognition techniques for remote authentication of users in computer networks
WSEAS TRANSACTIONS on SYSTEMS
Binding software to specific native hardware in a VM environment: the puf challenge and opportunity
Proceedings of the 1st ACM workshop on Virtual machine security
Smart card based solution for non-repudiation in GSM WAP applications
WSEAS Transactions on Computers
Network Security Using Biometric and Cryptography
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
An Efficient Authentication and Key Agreement Protocol in RFID System
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
New stream ciphers based on elliptic curve point multiplication
Computer Communications
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
WSEAS Transactions on Computers
Securing the Frisbee multicast disk loader
CSET'08 Proceedings of the conference on Cyber security experimentation and test
An incentive-based electronic payment scheme for digital content transactions over the Internet
Journal of Network and Computer Applications
Study of using shift registers in cryptosystems for grade 8 irreducible polynomials
SMO'08 Proceedings of the 8th conference on Simulation, modelling and optimization
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables
PSIVT '09 Proceedings of the 3rd Pacific Rim Symposium on Advances in Image and Video Technology
Enabling new mobile applications with location proofs
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Convertible multi-authenticated encryption scheme with one-way hash function
Computer Communications
A new method for intrusion detection on hierarchical wireless sensor networks
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
An Efficient Reversible Image Authentication Method
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Journal of Systems Architecture: the EUROMICRO Journal
An efficient proxy raffle protocol with anonymity-preserving
Computer Standards & Interfaces
The Append-Only Web Bulletin Board
Formal Aspects in Security and Trust
Formalizing Excusableness of Failures in Multi-Agent Systems
Agent Computing and Multi-Agent Systems
Design of a Passport Anti-forgery System Based on Digital Signature Schemes
PAISI '09 Proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics
Hardware-assisted run-time monitoring for secure program execution on embedded processors
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Simulation study of the functioning of LFSR for grade 4 irreducible polynomials
SEPADS'09 Proceedings of the 8th WSEAS International Conference on Software engineering, parallel and distributed systems
A hybrid security protocol for sensor networks
International Journal of Communication Networks and Distributed Systems
Geocode Matching and Privacy Preservation
Privacy, Security, and Trust in KDD
Digital signature and hash function irregularity
TELE-INFO'09 Proceedings of the 8th Wseas international conference on Telecommunications and informatics
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Design of the host guard firewall for network protection
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
A fast and secure method for anonymizing packet traffic and call traces
ICCOM'08 Proceedings of the 12th WSEAS international conference on Communications
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
A new hardware efficient stream cipher based on hash functions
International Journal of Communication Networks and Distributed Systems
Efficient migration access control for mobile agents
Computer Standards & Interfaces
Analyzing a class of pseudo-random bit generator through inductive machine learning paradigm
Intelligent Data Analysis
Enhancing Progressive Encryption for Scalable Video Streams
EUNICE '09 Proceedings of the 15th Open European Summer School and IFIP TC6.6 Workshop on The Internet of the Future
Using Walk-SAT and Rel-SAT for cryptographic key search
IJCAI'99 Proceedings of the 16th international joint conference on Artifical intelligence - Volume 1
Fair and distributed peer-to-peer allocation of a common, refillable resource
Journal of Parallel and Distributed Computing
A lightweight secure protocol for wireless sensor networks
Computer Communications
Future active Ip networks security architecture
Computer Communications
Protection of a mobile agent with a reference clone
Computer Communications
Technical challenges of network anonymity
Computer Communications
On the implementation of security policies with adaptative encryption
Computer Communications
A public fragile watermarking scheme for 3D model authentication
Computer-Aided Design
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps
Computers and Electrical Engineering
Lockr: better privacy for social networks
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Full custom low-power/high performance DDP-based Cobra-H64 cipher
Computers and Electrical Engineering
Mutual anonymity protocol with integrity protection for mobile peer-to-peer networks
International Journal of Security and Networks
Verifying Cryptographic Software Correctness with Respect to Reference Implementations
FMICS '09 Proceedings of the 14th International Workshop on Formal Methods for Industrial Critical Systems
Towards access control aware P2P data management systems
Proceedings of the 2009 EDBT/ICDT Workshops
Stepwise deployment methodology of a service oriented architecture for business communities
Information and Software Technology
A probability model for reconstructing secret sharing under the internet environment
Information Sciences: an International Journal
Bit-oriented generators for Wireless Sensor Networks and low cost RFID transponders
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Image scrambling encryption algorithm of pixel bit based on chaos map
Pattern Recognition Letters
A transformation from the Fibonacci to the Galois NLFSRs
IEEE Transactions on Information Theory
Distributed secret on the basis of the linear correcting codes
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Proceedings of the 2010 EDBT/ICDT Workshops
The GCHQ protocol and its problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
An improved asymmetric watermarking system using matrix embedding
IH'06 Proceedings of the 8th international conference on Information hiding
Construct public key encryption scheme using ergodic matrices over GF(2)
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
On large distributions for linear cryptanalysis
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
The technologist and internet security and privacy practices
UI-HCII'07 Proceedings of the 2nd international conference on Usability and internationalization
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Color image encryption based on one-time keys and robust chaotic maps
Computers & Mathematics with Applications
Modified AES using chaotic key generator for satellite imagery encryption
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
Integrating identity based cryptography with cryptographically generated addresses in mobile IPv6
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Using adaptative encryption for ubiquitous environments
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Algorithms for sensor and ad hoc networks: advanced lectures
Algorithms for sensor and ad hoc networks: advanced lectures
Tri-layer stego for enhanced security: a keyless random approach
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Chaos-based secure satellite imagery cryptosystem
Computers & Mathematics with Applications
A novel public key self-embedding fragile watermarking technique for image authentication
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs
Wireless Personal Communications: An International Journal
Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations
IEEE Transactions on Information Theory
Secure wireless communication with dynamic secrets
INFOCOM'10 Proceedings of the 29th conference on Information communications
Multi-use and unidirectional identity-based proxy re-encryption schemes
Information Sciences: an International Journal
A content authentication method for digital television
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 1
WSEAS Transactions on Information Science and Applications
A data security protocol for the Trusted Truck® system
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
CCCP: secure remote storage for computational RFIDs
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Deductive verification of cryptographic software
Innovations in Systems and Software Engineering
An analysis of the RC4 family of stream ciphers against algebraic attacks
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
FPGA implementation for real time encryption engine for real time video
ICC'10 Proceedings of the 14th WSEAS international conference on Circuits
Efficient CRL search in vehicular network PKIS
Proceedings of the 6th ACM workshop on Digital identity management
How to speed-up your NLFSR-based stream cipher
Proceedings of the Conference on Design, Automation and Test in Europe
Secure masks for visual cryptography
Transactions on data hiding and multimedia security V
A novel key management and access control scheme for mobile agent
ICIC'06 Proceedings of the 2006 international conference on Intelligent computing: Part II
Another Constructed Chaotic Image Encryption Scheme Based on Toeplitz Matrix and Hankel Matrix
Fundamenta Informaticae
Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN
PCM'10 Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I
An algorithm for constructing a fastest Galois NLFSR generating a given sequence
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Joint distributed compression and encryption of correlated data in sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Reconfigurable memory based AES co-processor
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Journal of Systems and Software
IEEE Transactions on Neural Networks
The impact of TLS on SIP server performance
Principles, Systems and Applications of IP Telecommunications
A framework for secure device pairing by demonstration of physical proximity
Proceedings of the 8th International Conference on Frontiers of Information Technology
A secure broadcasting cryptosystem and its application to grid computing
Future Generation Computer Systems
A high-performance unified-field reconfigurable cryptographic processor
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Design and implementation of real time secured RS232 link for multiple FPGA communication
Proceedings of the 2011 International Conference on Communication, Computing & Security
Image distortion estimation by hash comparison
MMM'11 Proceedings of the 17th international conference on Advances in multimedia modeling - Volume Part I
Gemstone: a new stream cipher using coupled map lattice
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Hardware framework for the rabbit stream cipher
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
A correlation based detection system for keys reuse in SSH/SSL
AMERICAN-MATH'11/CEA'11 Proceedings of the 2011 American conference on applied mathematics and the 5th WSEAS international conference on Computer engineering and applications
Reliably erasing data from flash-based solid state drives
FAST'11 Proceedings of the 9th USENIX conference on File and stroage technologies
Automatic management of forums via artificial immune systems
International Journal of Autonomous and Adaptive Communications Systems
Chaotic cryptosystem based on inverse duffing circuit
NOLASC'06 Proceedings of the 5th WSEAS international conference on Non-linear analysis, non-linear systems and chaos
Fast pseudorandom generator based on packed matrices
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
An FPGA intellectual property authentication scheme through watermarking techniques
IMCAS'06 Proceedings of the 5th WSEAS international conference on Instrumentation, measurement, circuits and systems
Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher
ISNN'05 Proceedings of the Second international conference on Advances in neural networks - Volume Part II
A digital image encryption scheme based on the hybrid of cellular neural network and logistic map
ISNN'05 Proceedings of the Second international conference on Advances in neural networks - Volume Part II
Image encryption scheme based on chaotic neural system
ISNN'05 Proceedings of the Second international conference on Advances in neural networks - Volume Part II
Secure SMS communications for M-learning services
ECC'11 Proceedings of the 5th European conference on European computing conference
Developing an efficient query system for encrypted XML documents
Journal of Systems and Software
A web services based architecture for digital time stamping
Journal of Web Engineering
Design science in information systems research
MIS Quarterly
A single-key attack on the full GOST block cipher
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Quantum Information Processing
DESvisual: a visualization tool for the DES cipher
Journal of Computing Sciences in Colleges
Security enhancements for the additive cryptosystem
Journal of Computing Sciences in Colleges
Group-based reduction schemes for streaming applications
ISRN Communications and Networking
OTM'11 Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I
ISC'06 Proceedings of the 9th international conference on Information Security
Federated Querying Architecture with Clinical & Translational Health IT Application
Journal of Medical Systems
An optimizing authenticated key exchange protocol for self-organizing sensor networks
UCS'06 Proceedings of the Third international conference on Ubiquitous Computing Systems
Verification condition generation via theorem proving
LPAR'06 Proceedings of the 13th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Towards a secure and practical multifunctional smart card
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Efficient batch verification for RSA-Type digital signatures in a ubiquitous environment
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A new public key certificate revocation scheme based on one-way hash chain
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
An implementation of, and attacks on, zero-knowledge watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
Achieving fairness in private contract negotiation
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Secure biometric authentication for weak computational devices
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
A novel cryptographic scheme based on wavelet neural networks
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
New efficient simple authenticated key agreement protocol
COCOON'05 Proceedings of the 11th annual international conference on Computing and Combinatorics
A new simple authenticated key agreement and protected password change protocol
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A secure password-authenticated key exchange between clients with different passwords
APWeb'06 Proceedings of the 2006 international conference on Advanced Web and Network Technologies, and Applications
A novel image cipher based on mixed transformed logistic maps
Multimedia Tools and Applications
Development of a neural net-based, personalized secure communication link
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part I
PCM'05 Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II
Trojan horse attack strategy on quantum private communication
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
An improved popescu's authenticated key agreement protocol
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Cryptanalysis of a chaotic neural network based multimedia encryption scheme
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Secure outsourcing of sequence comparisons
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
Electronic voting: an all-purpose platform
EGOV'05 Proceedings of the 4th international conference on Electronic Government
Performance enhancement of wireless cipher communication
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Architecture of a server-aided signature service (SASS) for mobile networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
A new pseudo-random generator based on gollmann cascades of baker-register-machines
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
A print-scan resistable digital seal system
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Key generation based on elliptic curve over finite prime field
International Journal of Electronic Security and Digital Forensics
The research on information hiding based on command sequence of FTP protocol
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
Flaws in generic watermarking protocols based on zero-knowledge proofs
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Architecture framework for device single sign on in personal area networks
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Computer Methods and Programs in Biomedicine
Mutual authentication and key exchange protocols with anonymity property for roaming services
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
ECvisual: a visualization tool for elliptic curve based ciphers
Proceedings of the 43rd ACM technical symposium on Computer Science Education
Subspace-based technique for speech encryption
Digital Signal Processing
A new protocol for protecting a mobile agent using a reference clone
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Cryptanalysis of the energy efficient stream ciphers SSC2
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Enhancing network intrusion detection with integrated sampling and filtering
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Highly reliable synchronous stream cipher system for link encryption
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
On optimizing the security-throughput trade-off in wireless networks with adversaries
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
The design and implementation of secure socket SCTP
Transactions on Computational Science VI
Chaotic keystream generator using coupled NDFs with parameter perturbing
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
PSD'06 Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases
MV3: a new word based stream cipher using rapid mixing and revolving buffers
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Modeling and simulating information security management
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
From image hashing to video hashing
MMM'10 Proceedings of the 16th international conference on Advances in Multimedia Modeling
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Firewall mechanism in a user centric smart card ownership model
CARDIS'10 Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Foisting and stealing of keys in sensor networks
EWSN'12 Proceedings of the 9th European conference on Wireless Sensor Networks
SP 800-38A Addendum. Recommendation for Block Cipher Modes of Operation: Three Variants of Ciphertext Stealing for CBC Mode
A related-key attack on block ciphers with weak recurrent key schedules
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Formal verification of a key establishment protocol for EPC gen2 RFID systems: work in progress
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Uniqueness of medical data mining
Artificial Intelligence in Medicine
Automated monitoring of medical protocols: a secure and distributed architecture
Artificial Intelligence in Medicine
A new dynamic ID-Based remote user authentication scheme with forward secrecy
APWeb'12 Proceedings of the 14th international conference on Web Technologies and Applications
Securing digital signatures for non-repudiation
Computer Communications
A new framework for secure network management
Computer Communications
Unique file identification in the National Software Reference Library
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Energy efficiency of encryption schemes applied to wireless sensor networks
Security and Communication Networks
Information Sciences: an International Journal
Stream cipher for binary image encryption using Ant Colony Optimization based key generation
Applied Soft Computing
Combinational domain encryption for still visual data
Multimedia Tools and Applications
INVISIOS: A Lightweight, Minimally Intrusive Secure Execution Environment
ACM Transactions on Embedded Computing Systems (TECS)
Parallelization of the discrete chaotic block encryption algorithm
PPAM'11 Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part II
Security analysis of key binding biometric cryptosystems
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Concise lookup tables for IPv4 and IPv6 longest prefix matching in scalable routers
IEEE/ACM Transactions on Networking (TON)
Review: Cognitive radio network security: A survey
Journal of Network and Computer Applications
Fragmentation and encryption to enforce privacy in data storage
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
International Journal of Technology Policy and Law
The security of ciphertext stealing
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Is quantum key distribution suitable for steganography?
Quantum Information Processing
Digital signature-based authentication framework in cognitive radio networks
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Digital Image Protection using Keyed Hash Function
International Journal of Computer Vision and Image Processing
Robust image content authentication using perceptual hashing and watermarking
PCM'12 Proceedings of the 13th Pacific-Rim conference on Advances in Multimedia Information Processing
Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card
International Journal of Information Security and Privacy
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Journal of Computer and System Sciences
Attack and improvements of fair quantum blind signature schemes
Quantum Information Processing
A taxonomy of privacy-preserving record linkage techniques
Information Systems
MaD2: an ultra-performance stream cipher for pervasive data encryption
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
An efficient two-party protocol for approximate matching in private record linkage
AusDM '11 Proceedings of the Ninth Australasian Data Mining Conference - Volume 121
Chaos-based partial encryption of SPIHT coded color images
Signal Processing
A security pattern for data integrity in P2P systems
Proceedings of the 17th Conference on Pattern Languages of Programs
An analytical approach to s-box generation
Computers and Electrical Engineering
Image encryption based on the Jacobian elliptic maps
Journal of Systems and Software
When private set intersection meets big data: an efficient and scalable protocol
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Information protection systems based on universal knapsack problem
Proceedings of the 6th International Conference on Security of Information and Networks
Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis
Proceedings of the 6th International Conference on Security of Information and Networks
An approach for designing neural cryptography
ISNN'13 Proceedings of the 10th international conference on Advances in Neural Networks - Volume Part I
Journal of Systems and Software
RSAvisual: a visualization tool for the RSA cipher
Proceedings of the 45th ACM technical symposium on Computer science education
Joint watermarking and encryption for still visual data
Multimedia Tools and Applications
Secure computing with the MPEG RVC framework
Image Communication
Expert Systems with Applications: An International Journal
A Secure Ambulance Communication Protocol for VANET
Wireless Personal Communications: An International Journal
Using SPIN for automated debugging of infinite executions of Java programs
Journal of Systems and Software
An anonymous DRM scheme for sharing multimedia files in P2P networks
Multimedia Tools and Applications
Hi-index | 0.21 |