Securing Grid Workflows with Trusted Computing
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Trusted Computing: Security and Applications
Cryptologia
Cryptanalysis of the EPBC authenticated encryption mode
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Foundations of security analysis and design IV
Cryptanalysis of two variants of PCBC mode when used for message integrity
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Error oracle attacks on CBC mode: is there a future for CBC mode encryption?
ISC'05 Proceedings of the 8th international conference on Information Security
The cramer-shoup encryption scheme is plaintext aware in the standard model
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks
Proceedings of the Fifth International Conference on Security of Information and Networks
An authentication framework for peer-to-peer cloud
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |