A formal treatment of remotely keyed encryption
Proceedings of the tenth annual ACM-SIAM symposium on Discrete algorithms
A methodology for analyzing the performance of authentication protocols
ACM Transactions on Information and System Security (TISSEC)
How to Make a Digital Whiteboard Secure - Using Java-Cards for Multimedia Applications
IDMS '00 Proceedings of the 7th International Workshop on Interactive Distributed Multimedia Systems and Telecommunication Services
On the Security Properties of OAEP as an All-or-Nothing Transform
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Security on Your Hand: Secure Filesystems with a ``Non-Cryptographic'' JAVA-Ring
JavaCard '00 Revised Papers from the First International Workshop on Java on Smart Cards: Programming and Security
On Perfect and Adaptive Security in Exposure-Resilient Cryptography
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Accelerated Remotely Keyed Encruption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Proceedings of the 10th ACM conference on Computer and communications security
Protecting cryptographic keys and computations via virtual secure coprocessing
ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
Architecture for Protecting Critical Secrets in Microprocessors
Proceedings of the 32nd annual international symposium on Computer Architecture
Speeding up Exponentiation using an Untrusted Computational Resource
Designs, Codes and Cryptography
Extending tamper-proof hardware security to untrusted execution environments
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
Secure deletion for a versioning file system
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
SC-CFS: smartcard secured cryptographic file system
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Hand-held computers can be better smart cards
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Remotely keyed encryption using non-encrypting smart cards
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
Breaking the Shin--Shin--Rhee remotely keyed encryption schemes
Information Processing Letters
Securing bulk content almost for free
Computer Communications
Concealment and its applications to authenticated encryption
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
The design and the security concept of a collaborative whiteboard
Computer Communications
Hi-index | 0.00 |