On Weaknesses of Non–surjective Round Functions
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Low power scalable encryption for wireless systems
Wireless Networks - Special issue VLSI in wireless networks
Designing encryption algorithms for real people
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
An architecture for a secure service discovery service
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Coimbra: secure Web access to multimedia content
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
A new paradigm hidden in steganography
Proceedings of the 2000 workshop on New security paradigms
An architecture for secure wide-area service discovery
Wireless Networks - Selected Papers from Mobicom'99
The development of a distributed capability system for VLOS
CRPIT '02 Proceedings of the seventh Asia-Pacific conference on Computer systems architecture
Executing SQL over encrypted data in the database-service-provider model
Proceedings of the 2002 ACM SIGMOD international conference on Management of data
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
A composable framework for secure multi-modal access to internet services from Post-PC devices
Mobile Networks and Applications
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
Key-Dependent S-Boxes and Differential Cryptanalysis
Designs, Codes and Cryptography
Strengthening the Key Schedule of the AES
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Key-Schedule Cryptanalysis of DEAL
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers
ECMAST '99 Proceedings of the 4th European Conference on Multimedia Applications, Services and Techniques
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Design of a VPN Software Solution Integrating TCP and UDP Services
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Joint Hardware / Software Design of a Fast Stream Cipher
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Higher Order Differential Attak of CAST Cipher
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Implementation of Virtual Private Networks at the Transport Layer
ISW '99 Proceedings of the Second International Workshop on Information Security
Transparent Harddisk Encryption
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Technology and Health Care
Journal of Systems Architecture: the EUROMICRO Journal
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
A unified security framework for networked applications
Proceedings of the 2003 ACM symposium on Applied computing
DISP: Practical, efficient, secure and fault-tolerant distributed data storage
ACM Transactions on Storage (TOS)
Labels and event processes in the asbestos operating system
Proceedings of the twentieth ACM symposium on Operating systems principles
Pvault: a client server system providing mobile access to personal data
Proceedings of the 2005 ACM workshop on Storage security and survivability
Survey and benchmark of block ciphers for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
NPCryptBench: a cryptographic benchmark suite for network processors
MEDEA '05 Proceedings of the 2005 workshop on MEmory performance: DEaling with Applications , systems and architecture
Pattern puzzle: a metaphor for visualizing software complexity measures
APVis '06 Proceedings of the 2006 Asia-Pacific Symposium on Information Visualisation - Volume 60
Protecting file systems with transient authentication
Wireless Networks
Mobile Device Security Using Transient Authentication
IEEE Transactions on Mobile Computing
Exploring confusion in product ciphers through regression analysis
Information Sciences: an International Journal
Rendezvous-based access control for medical records in the pre-hospital environment
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers
IEEE Transactions on Computers
Cryptographic support for secure logs on untrusted machines
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
A future-adaptive password scheme
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Cryptography in OpenBSD: an overview
ATEC '99 Proceedings of the annual conference on USENIX Annual Technical Conference
Voice biometrics over the internet in the framework of COST action 275
EURASIP Journal on Applied Signal Processing
A secure voip conference system: architecture analysis and design issues
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Labels and event processes in the Asbestos operating system
ACM Transactions on Computer Systems (TOCS)
Implementation of secure applications in self-reconfigurable systems
Microprocessors & Microsystems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Reflection Cryptanalysis of Some Ciphers
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Security evaluation of ES&S voting machines and election management system
EVT'08 Proceedings of the conference on Electronic voting technology
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
CCproc: A Custom VLIW Cryptography Co-processor for Symmetric-Key Ciphers
ARC '09 Proceedings of the 5th International Workshop on Reconfigurable Computing: Architectures, Tools and Applications
Statistical Strength of a Hybrid Cryptosystem on 2-D Cellular Automata with Nonaffine Rotations
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Query Integrity Assurance of Location-Based Services Accessing Outsourced Spatial Databases
SSTD '09 Proceedings of the 11th International Symposium on Advances in Spatial and Temporal Databases
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems
A New Steganography Based on Χ2 Technic
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
The implementation of a secure and pervasive multimodal Web system architecture
Information and Software Technology
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
ICCS'03 Proceedings of the 2003 international conference on Computational science
A linear analysis of Blowfish and Khufu
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
An ASIC implementation of low power and high throughput blowfish crypto algorithm
Microelectronics Journal
SCOB, a soft-core for the blowfish cryptographic algorithm
SBCCI'99 Proceedings of the XIIth conference on Integrated circuits and systems design
PRINTcipher: a block cipher for IC-printing
CHES'10 Proceedings of the 12th international conference on Cryptographic hardware and embedded systems
GPU random numbers via the tiny encryption algorithm
Proceedings of the Conference on High Performance Graphics
On the information security using Fibonacci series
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Differential cryptanalysis of round-reduced PRINTCIPHER: computing roots of permutations
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Cryptanalysis of PRESENT-like ciphers with secret S-boxes
FSE'11 Proceedings of the 18th international conference on Fast software encryption
A single-key attack on the full GOST block cipher
FSE'11 Proceedings of the 18th international conference on Fast software encryption
A data masking technique for data warehouses
Proceedings of the 15th Symposium on International Database Engineering & Applications
Security through amnesia: a software-based solution to the cold boot attack on disk encryption
Proceedings of the 27th Annual Computer Security Applications Conference
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Secure communication using identity based encryption
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Absolute pwnage: a short paper about the security risks of remote administration tools
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Efficient and optimally secure key-length extension for block ciphers via randomized cascading
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
The design and the security concept of a collaborative whiteboard
Computer Communications
A new class of weak keys for blowfish
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Local Shannon entropy measure with statistical tests for image randomness
Information Sciences: an International Journal
GPU-Acceleration of block ciphers in the OpenSSL cryptographic library
ISC'12 Proceedings of the 15th international conference on Information Security
A fully homomorphic crypto-processor design: correctness of a secret computer
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Randomized symmetric block encryption
Proceedings of the First International Conference on Security of Internet of Things
MrCrypt: static analysis for secure cloud computations
Proceedings of the 2013 ACM SIGPLAN international conference on Object oriented programming systems languages & applications
Smart lock and smart alarm: alert and protect your lost USB flash drive
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication
Secure computing with the MPEG RVC framework
Image Communication
Design of image cipher using latin squares
Information Sciences: an International Journal
Hi-index | 0.00 |