Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Universal one-way hash functions and their cryptographic applications
STOC '89 Proceedings of the twenty-first annual ACM symposium on Theory of computing
On the design of provably-secure cryptographic hash functions
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Digital certificates: a survey of revocation methods
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Using Cryptographic and Watermarking Algorithms
IEEE MultiMedia
On Computing Logarithms Over Finite Fields
CRYPTO '85 Advances in Cryptology
How to Time-Stamp a Digital Document
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Hash Functions Based on Block Ciphers: A Synthetic Approach
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Improving Cost, Performance, and Security of Memory Encryption and Authentication
Proceedings of the 33rd annual international symposium on Computer Architecture
A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Scalable security for large, high performance storage systems
Proceedings of the second ACM workshop on Storage security and survivability
Scratch & vote: self-contained paper-based cryptographic voting
Proceedings of the 5th ACM workshop on Privacy in electronic society
Safety and consistency in policy-based authorization systems
Proceedings of the 13th ACM conference on Computer and communications security
A survey of recent developments in cryptographic algorithms for smart cards
Computer Networks: The International Journal of Computer and Telecommunications Networking
Data Discovery and Dissemination with DIP
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems
ACM Transactions on Information and System Security (TISSEC)
A fast real-time memory authentication protocol
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Access Control Friendly Query Verification for Outsourced Data Publishing
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Quantum resistant public key cryptography: a survey
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Proceedings of the 22nd Annual Symposium on Integrated Circuits and System Design: Chip on the Dunes
Public Key Signatures and Lightweight Security Solutions in a Wireless Environment
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
MAC Precomputation with Applications to Secure Memory
ISC '09 Proceedings of the 12th International Conference on Information Security
Proceedings of the 5th international conference on Emerging networking experiments and technologies
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
An (almost) constant-effort solution-verification proof-of-work protocol based on Merkle trees
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Brief announcement: distributed trust management and revocation
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Towards a data-centric view of cloud security
CloudDB '10 Proceedings of the second international workshop on Cloud data management
A novel cryptoprocessor architecture for chained Merkle signature scheme
Microprocessors & Microsystems
The ForwardDiffsig scheme for multicast authentication
IEEE/ACM Transactions on Networking (TON)
Security design for an inter-domain publish/subscribe architecture
The future internet
Thialfi: a client notification service for internet-scale applications
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Verifying computations with streaming interactive proofs
Proceedings of the VLDB Endowment
Implementing a tamper-evident database system
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
The universality of iterated hashing over variable-length strings
Discrete Applied Mathematics
Genetic algorithms evolving quasigroups with good pseudorandom properties
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part III
Proving properties of incremental merkle trees
CADE' 20 Proceedings of the 20th international conference on Automated Deduction
Horus: fine-grained encryption-based security for high performance petascale storage
Proceedings of the sixth workshop on Parallel Data Storage
Auditable privacy: on tamper-evident mix networks
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Simple and flexible revocation checking with privacy
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Authenticating operation-based history in collaborative systems
Proceedings of the 17th ACM international conference on Supporting group work
Privacy-preserving revocation checking with modified CRLs
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Cooperative security in distributed networks
Computer Communications
Multi-user wireless channel probing for shared key generation with a fuzzy controller
Computer Networks: The International Journal of Computer and Telecommunications Networking
Horus: fine-grained encryption-based security for large-scale storage
FAST'13 Proceedings of the 11th USENIX conference on File and Storage Technologies
Hi-index | 0.00 |