ACM SIGACT News
Strategic directions in research in theory of computing
ACM Computing Surveys (CSUR) - Special ACM 50th-anniversary issue: strategic directions in computing research
Tight Bounds on the Information Rate of Secret SharingSchemes
Designs, Codes and Cryptography
On Some Methods for Unconditionally Secure Key Distributionand Broadcast Encryption
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Journal of Experimental Algorithmics (JEA)
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
A Coding Approach for Detection of Tampering in Write-Once Optical Disks
IEEE Transactions on Computers
Watermarking techniques for intellectual property protection
DAC '98 Proceedings of the 35th annual Design Automation Conference
A fast MPEG video encryption algorithm
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
A Method of Formal Verification of Cryptographic Circuits
Journal of Electronic Testing: Theory and Applications
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
On the fly signatures based on factoring
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
An FPGA implementation and performance evaluation of the Serpent block cipher
FPGA '00 Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays
Strength of two data encryption standard implementations under timing attacks
ACM Transactions on Information and System Security (TISSEC)
iBundle: an efficient ascending price bundle auction
Proceedings of the 1st ACM conference on Electronic commerce
Information Security, Mathematics, and Public-Key Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Crossroads
Threshold-based identity recovery for privacy enhanced applications
Proceedings of the 7th ACM conference on Computer and communications security
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Tangler: a censorship-resistant publishing system based on document entanglements
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Secret sharing and visual cryptography schemes
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Improving A Solution's Quality Through Parallel Processing
The Journal of Supercomputing
Ticket-based service access scheme for mobile users
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
Applying lightweight directory access protocol service on session certification authority
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptography, trusted third parties and escrow
BT Technology Journal
Distributed Computing Attacks on Cryptographic Systems
BT Technology Journal
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
Open Authentication Model Supporting Electronic Commerce in Distributed Computing
Electronic Commerce Research
Mental poker game based on a bit commitment scheme through network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Combinatorial Bounds on Authentication Codes with Arbitration
Designs, Codes and Cryptography
On the Linear Complexity of the Power Generator
Designs, Codes and Cryptography
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
Designs, Codes and Cryptography
Lower bounds on the information rate of secret sharing schemes with homogeneous access structure
Information Processing Letters
Protocols for Watermark Verification
IEEE MultiMedia
Protecting Digital-Image Copyrights: A Framework
IEEE Computer Graphics and Applications
Access Control Mechanisms in a Distributed, Persistent Memory System
IEEE Transactions on Parallel and Distributed Systems
Digital image watermarking for joint ownership
Proceedings of the tenth ACM international conference on Multimedia
Genetic Cryptoanalysis of Two Rounds TEA
ICCS '02 Proceedings of the International Conference on Computational Science-Part III
An Interactive Cryptanalysis Algorithm for the Vigenere Cipher
ADVIS '00 Proceedings of the First International Conference on Advances in Information Systems
Generalised Cycling Attacks on RSA and Strong RSA Primes
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Fail-Stop Threshold Signature Schemes Based on Elliptic Curves
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Cheating Immune Secret Sharing
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Constructions of Cheating Immune Secret Sharing
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Security Enhancement on Mobile Commerce
Proceedings of the First International Conference on The Human Society and the Internet - Internet Related Socio-Economic Issues
Personal Information Market: Toward a Secure and Efficient Trade of Privacy
Proceedings of the First International Conference on The Human Society and the Internet - Internet Related Socio-Economic Issues
Fast DES Implementation for FPGAs and Its Application to a Universal Key-Search Machine
SAC '98 Proceedings of the Selected Areas in Cryptography
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
On Some Attacks on Multi-prime RSA
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Some Parallel Algorithms for Integer Factorisation
Euro-Par '99 Proceedings of the 5th International Euro-Par Conference on Parallel Processing
Long-Lived Broadcast Encryption
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
On the Unpredictability of Bits of the Elliptic Curve Diffie--Hellman Scheme
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
NSS: An NTRU Lattice-Based Signature Scheme
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
A Parallel Algorithm for Extending Cryptographic Hash Functions
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Cheating Prevention in Secret Sharing over GF(pt)
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
On Unconditionally Secure Robust Distributed Key Distribution Centers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Revocation Scheme with Minimal Storage at Receivers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Informatics - 10 Years Back. 10 Years Ahead.
Intellectual Property Metering
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Binary Arithmetic for DNA Computers
DNA8 Revised Papers from the 8th International Workshop on DNA Based Computers: DNA Computing
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
FCT '99 Proceedings of the 12th International Symposium on Fundamentals of Computation Theory
A New Undeniable Signature Scheme Using Smart Cards
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Smartcards: Hot to Put them to Use in a User-Centric System
HUC '00 Proceedings of the 2nd international symposium on Handheld and Ubiquitous Computing
Fingerprints for Copyright Software Protection
ISW '99 Proceedings of the Second International Workshop on Information Security
A Distributed and Computationally Secure Key Distribution Scheme
ISC '02 Proceedings of the 5th International Conference on Information Security
Toward Fair International Key Escrow
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Monte-Carlo Integration Using Cryptographically Secure Pseudo-random Generator
NMA '02 Revised Papers from the 5th International Conference on Numerical Methods and Applications
Secure Watermark Verification Scheme
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Smooth Orders and Cryptographic Applications
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Further Results and Considerations on Side Channel Attacks on RSA
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Implementation of a Digital Lottery Server on WWW
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Experiments in Adaptable and Secure Multimedia Database Systems (Invited Paper)
DEXA '99 Proceedings of the 10th International Conference on Database and Expert Systems Applications
Efficient Methods for Integrating Traceability and Broadcast Encryption
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Power-time flexible architecture for GF(2k) elliptic curve cryptosystem computation
Proceedings of the 13th ACM Great Lakes symposium on VLSI
Fast modular exponentiation of large numbers with large exponents
Journal of Systems Architecture: the EUROMICRO Journal
Cellular automata based authentication (CAA)
ICCC '02 Proceedings of the 15th international conference on Computer communication
One-way trap door functions based on the Boolean satisfiability problem
ICCC '02 Proceedings of the 15th international conference on Computer communication
Watermarking applications and their properties
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Linear broadcast encryption schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Generation of key predistribution schemes using secret sharing schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Payment technologies for E-commerce
Payment technologies for E-commerce
The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces
Designs, Codes and Cryptography
Public Key Infrastructures that Satisfy Security Goals
IEEE Internet Computing
Fast authenticated key establishment protocols for self-organizing sensor networks
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
Neural Networks - 2003 Special issue: Advances in neural networks research IJCNN'03
Architectural techniques for accelerating subword permutations with repetitions
IEEE Transactions on Very Large Scale Integration (VLSI) Systems - Special section on the 2001 international conference on computer design (ICCD)
Random small hamming weight products with applications to cryptography
Discrete Applied Mathematics - Special issue on the 2000 com2MaC workshop on cryptography
How to fake an RSA signature by encoding modular root finding as a SAT problem
Discrete Applied Mathematics - The renesse issue on satisfiability
A Global Ticket-Based Access Scheme for Mobile Users
Information Systems Frontiers
Anonymous access scheme for electronic-services
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Design and evaluation of a block encryption algorithm using dynamic-key mechanism
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
Randomness in secret sharing and visual cryptography schemes
Theoretical Computer Science
MPEG Video Encryption Algorithms
Multimedia Tools and Applications
Soft constraint programming to analysing security protocols
Theory and Practice of Logic Programming
Collusion attack on a multi-key secure video proxy scheme
Proceedings of the 12th annual ACM international conference on Multimedia
On perfect secret sharing schemes and coalitional game forms
TARK '01 Proceedings of the 8th conference on Theoretical aspects of rationality and knowledge
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving the trade-off between storage and communication in broadcast encryption schemes
Discrete Applied Mathematics
Authenticated key agreement in dynamic peer groups
Theoretical Computer Science
Generic Groups, Collision Resistance, and ECDSA
Designs, Codes and Cryptography
Blind sales in electronic commerce
ICEC '04 Proceedings of the 6th international conference on Electronic commerce
Implementation of the SHA-2 Hash Family Standard Using FPGAs
The Journal of Supercomputing
Foundations of Security for Hash Chains in Ad Hoc Networks
Cluster Computing
Secret sharing schemes with three or four minimal qualified subsets
Designs, Codes and Cryptography
Proceedings of the 11th annual international conference on Mobile computing and networking
Comparison of texts streams in the presence of mild adversaries
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
An Optimal Multisecret Threshold Scheme Construction
Designs, Codes and Cryptography
Jointly Verifying Ownership of an Image Using Digital Watermarking
Multimedia Tools and Applications
Design, Architecture and Performance Evaluation of the Wireless Transport Layer Security
The Journal of Supercomputing
Authentication Schemes from Highly Nonlinear Functions
Designs, Codes and Cryptography
Distributed Ring Signatures from General Dual Access Structures
Designs, Codes and Cryptography
Improved efficiency for revocation schemes via Newton interpolation
ACM Transactions on Information and System Security (TISSEC)
Some constructions of systematic authentication codes using galois rings
Designs, Codes and Cryptography
Journal of Computer Security
A unified model for unconditionally secure key distribution
Journal of Computer Security
Quantum cryptography: A survey
ACM Computing Surveys (CSUR)
A scalable signature scheme for video authentication
Multimedia Tools and Applications
Providing authentication to messages signed with a smart card in hostile environments
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
Generalized Mignotte's Sequences Over Polynomial Rings
Electronic Notes in Theoretical Computer Science (ENTCS)
Distributed keyless security for correlated data with applications in visual sensor networks
Proceedings of the 9th workshop on Multimedia & security
A novel distributed privacy paradigm for visual sensor networks based on sharing dynamical systems
EURASIP Journal on Applied Signal Processing
Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks
IEEE Transactions on Dependable and Secure Computing
Integrity auditing of outsourced data
VLDB '07 Proceedings of the 33rd international conference on Very large data bases
Random-bit sequence generation from image data
Image and Vision Computing
Fast S-box security mechanism research based on the polymorphic cipher
Information Sciences: an International Journal
Lossless nibbled data embedding scheme based on difference expansion
Image and Vision Computing
Teaching cryptography with open-source software
Proceedings of the 39th SIGCSE technical symposium on Computer science education
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
Efficient anonymity schemes for clustered wireless sensor networks
International Journal of Sensor Networks
International Journal of Internet Protocol Technology
Multi-layer progressive secret image sharing
ISCGAV'07 Proceedings of the 7th WSEAS International Conference on Signal Processing, Computational Geometry & Artificial Vision
Reconfigurable solutions for very-long arithmetic with applications in cryptography
Proceedings of the 18th ACM Great Lakes symposium on VLSI
Application study on public key cryptography in mobile payment
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
A content-driven access control system
Proceedings of the 7th symposium on Identity and trust on the Internet
ICS'05 Proceedings of the 9th WSEAS International Conference on Systems
Design of secure hardware for ATM networks
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
Systematic authentication codes using additive polynomials
Designs, Codes and Cryptography
Database encryption using enhanced affine block cipher algorithm
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message
Information Security and Cryptology
Revisiting the Karnin, Greene and Hellman Bounds
ICITS '08 Proceedings of the 3rd international conference on Information Theoretic Security
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
ISC '08 Proceedings of the 11th international conference on Information Security
Fragile Watermarking Schemes for Tamperproof Web Pages
ISNN '08 Proceedings of the 5th international symposium on Neural Networks: Advances in Neural Networks, Part II
Forensic Extraction of EFS-Encrypted Files in Live System Investigation
Journal of Digital Forensic Practice
Structural signatures for tree data structures
Proceedings of the VLDB Endowment
Quantifying the security of preference-based authentication
Proceedings of the 4th ACM workshop on Digital identity management
Methods of finding multiplicative inverses in GF(28)
Computer Communications
Buyer-seller watermarking protocols with off-line trusted third parties
International Journal of Ad Hoc and Ubiquitous Computing
Cryptanalysis and improvement on a cryptosystem based on a chaotic map
Computers & Mathematics with Applications
A critical analysis and improvement of advanced access content system drive-host authentication
International Journal of Applied Cryptography
Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration
Discrete Applied Mathematics
A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Efficient Secret Sharing Schemes Based on Unauthorized Subsets
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Low-power electroencephalography sensing data RF transmission: hardware architecture and test
Proceedings of the 1st ACM international workshop on Medical-grade wireless networks
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Fundamenta Informaticae
WAV'09 Proceedings of the 3rd WSEAS international symposium on Wavelets theory and applications in applied mathematics, signal processing & modern science
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Unified OTP Cryptosystem with Authentication and Secrecy
Proceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_06
A new cryptographic algorithm for the real time applications
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Analyzing a class of pseudo-random bit generator through inductive machine learning paradigm
Intelligent Data Analysis
Modeling and Reasoning about an Attacker with Cryptanalytical Capabilities
Electronic Notes in Theoretical Computer Science (ENTCS)
Technical challenges of network anonymity
Computer Communications
On the hardware implementation of RIPEMD processor: Networking high speed hashing, up to 2Gbps
Computers and Electrical Engineering
An efficient authentication scheme for access control in mobile pay-TV systems
IEEE Transactions on Multimedia
A Coordination-based Methodology for Security Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Bit-oriented generators for Wireless Sensor Networks and low cost RFID transponders
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
IROS'09 Proceedings of the 2009 IEEE/RSJ international conference on Intelligent robots and systems
Dynamic cryptography algorithm for real-time applications DCA-RTA
ASMCSS'09 Proceedings of the 3rd International Conference on Applied Mathematics, Simulation, Modelling, Circuits, Systems and Signals
A novel image cryptosystem with multiple chaotic maps
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Wireless broadcast encryption based on smart cards
Wireless Networks
A novel CRT-based watermarking technique for authentication of multimedia contents
Digital Signal Processing
Optimum secret sharing scheme secure against cheating
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Binding ElGamal: a fraud-detectable alternative to key-escrow proposals
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Rapid demonstration of linear relations connected by boolean operators
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A cryptographic method for secure watermark detection
IH'06 Proceedings of the 8th international conference on Information hiding
Secure communication for RFIDs proactive information security within computational security
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Obfuscation for cryptographic purposes
TCC'07 Proceedings of the 4th conference on Theory of cryptography
A process-oriented model for authentication on the basis of a coloured Petri net
BPM'03 Proceedings of the 2003 international conference on Business process management
An efficient fail-stop signature scheme based on factorization
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
A format-independent architecture for run-time integrity checking of executable code
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
Color image encryption based on one-time keys and robust chaotic maps
Computers & Mathematics with Applications
Symmetric-key homomorphic encryption for encrypted data processing
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure group key agreement protocol based on chaotic Hash
Information Sciences: an International Journal
Further improvements on secret image sharing scheme
Proceedings of the 2nd ACM workshop on Multimedia in forensics, security and intelligence
Algorithms and theory of computation handbook
Optimal authentication codes from difference balanced functions
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Joint distributed compression and encryption of correlated data in sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Some observations on indifferentiability
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Cryptanalysis on an image scrambling encryption scheme based on pixel bit
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
A new public key cryptography algorithm using chaotic systems and hyperelliptic curves
ICS'06 Proceedings of the 10th WSEAS international conference on Systems
Mobile Networks and Applications
An information theoretical model for quantum secret sharing
Quantum Information & Computation
A secret sharing based privacy enforcement mechanism for untrusted social networking operators
MiFor '11 Proceedings of the 3rd international ACM workshop on Multimedia in forensics and intelligence
Dynamic threshold and cheater resistance for shamir secret sharing scheme
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
A preprocessor adding security to and improving the performances of arithmetic and huffman codings
ADVIS'04 Proceedings of the Third international conference on Advances in Information Systems
Addressing new challenges by building security protocols around graphs
Proceedings of the 11th international conference on Security Protocols
Re-identifying anonymous nodes
LoCA'06 Proceedings of the Second international conference on Location- and Context-Awareness
Secure password pocket for distributed web services
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
Securing the MPLS control plane
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
An implementation of, and attacks on, zero-knowledge watermarking
IH'04 Proceedings of the 6th international conference on Information Hiding
A new ciphering method associated with evolutionary algorithm
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
On the security and composability of the one time pad
SOFSEM'05 Proceedings of the 31st international conference on Theory and Practice of Computer Science
Static analysis of authentication
Foundations of Security Analysis and Design III
Image encryption using HC-128 and HC-256 stream ciphers
International Journal of Electronic Security and Digital Forensics
Electronic voting: starting over?
ISC'05 Proceedings of the 8th international conference on Information Security
On the power generator and its multivariate analogue
Journal of Complexity
On the satisfiability of modular arithmetic formulae
ATVA'06 Proceedings of the 4th international conference on Automated Technology for Verification and Analysis
On optimizing the security-throughput trade-off in wireless networks with adversaries
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Rateless codes for the multicast stream authentication problem
IWSEC'06 Proceedings of the 1st international conference on Security
Achieving multicast stream authentication using MDS codes
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Proactive verifiable linear integer secret sharing scheme
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A new spin on quantum cryptography: avoiding trapdoors and embracing public keys
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Research note: An on-line secret sharing scheme for multi-secrets
Computer Communications
Improved multi-server authentication protocol
Security and Communication Networks
Non-admissible tracks in Shamir's scheme
Finite Fields and Their Applications
Admissible tracks in Shamir's scheme
Finite Fields and Their Applications
Local key management in opportunistic networks
International Journal of Communication Networks and Distributed Systems
An Information-Hiding Scheme Based on Quantization-Based Embedding Technique
Fundamenta Informaticae
An authentication code against pollution attacks in network coding
IEEE/ACM Transactions on Networking (TON)
A Chinese remainder theorem oriented information hiding scheme
EGMM'04 Proceedings of the Seventh Eurographics conference on Multimedia
Remarks on the Classical Threshold Secret Sharing Schemes
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
An approach of trusted program generation for user-responsible privacy
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
A special purpose integer factorization algorithm
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Secure transmission of authenticated messages using new encoding scheme and Steganography
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
A New (t, n)-threshold scheme based on difference equations
ESCAPE'07 Proceedings of the First international conference on Combinatorics, Algorithms, Probabilistic and Experimental Methodologies
A combination of blind source separation and impulsive chaos synchronisation for encryption
International Journal of Autonomous and Adaptive Communications Systems
An efficient protection scheme of digital contents under mobile devices
Proceedings of the 2013 Research in Adaptive and Convergent Systems
Chaos-based color pathological image encryption scheme using one-time keys
Computers in Biology and Medicine
Hi-index | 0.01 |
From the Publisher:The object of the book is to produce a general, comprehensive textbook that treats all the essential core areas of cryptography.