|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6 occurrences of 6 keywords
|
|
|
Results
Found 15 publication records. Showing 15 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
111 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Insider Attacks, Key Compromise Impersonation |
83 | Meng-Hui Lim, Sanggon Lee, Youngho Park 0005, Hoonjae Lee 0001 |
An Enhanced ID-Based Deniable Authentication Protocol on Pairings. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
56 | Wei Wei, Roger E. Goldman, Nabil Simaan, Howard F. Fine, Stanley Chang |
Design and Theoretical Evaluation of Micro-Surgical Manipulators for Orbital Manipulation and Intraocular Dexterity. |
ICRA |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling |
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Rabiah Alnashwan, Prosanta Gope, Benjamin Dowling |
UniHand: Privacy-preserving Universal Handover for Small-Cell Networks in 5G-enabled Mobile Communication with KCI Resilience. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
34 | N. V. S. Lakshmipathi Raju, Vankamamidi Srinivasa Naresh |
Dynamic distributed KCi-slice data publishing model with multiple sensitive attributes. |
Concurr. Comput. Pract. Exp. |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Anuli Ndubuisi, Rubaina Khan, Elham Marzi, Oluwatobi Edun |
A KCI Approach to Promote Intercultural Competencies for International Virutal Engineering Student Teams (InVEST). |
FIE |
2020 |
DBLP DOI BibTeX RDF |
|
34 | Clemens Hlauschek, Markus Gruber, Florian Fankhauser, Christian Schanes |
Prying Open Pandora's Box: KCI Attacks against TLS. |
WOOT |
2015 |
DBLP BibTeX RDF |
|
34 | Young Man Ko, Ji Young Park |
An index for evaluating journals in a small domestic citation index database whose citation rate is generally very low: A test based on the Korea Citation Index (KCI) database. |
J. Informetrics |
2013 |
DBLP DOI BibTeX RDF |
|
34 | |
Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
34 | Eun-Kyung Ryu, Hyunsung Kim 0001, Kee-Young Yoo |
KCI-resilient anonymous wireless link-layer authentication protocols. |
Math. Comput. Model. |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Qiang Tang 0001, Liqun Chen 0002 |
Extended KCI attack against two-party key establishment protocols. |
Inf. Process. Lett. |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Young Man Ko, Soo-Ryun Cho, Yong Seok Park |
A study on the optimization of KCI-based index (Kor-Factor) in evaluating Korean journals. |
Scientometrics |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Liang Hu 0001, Hongtu Li, Jianfen Chu, Hongwei Li, Wei Yan |
Registration and Private Key Distribution Protocol Based on IBE. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
private key distribution, private key replacing, KCI, authentication, Identity-Based Encryption |
33 | Chengyu Fan, Shijie Zhou, Fagen Li |
An Identity-Based Restricted Deniable Authentication Protocol. |
ISPA |
2009 |
DBLP DOI BibTeX RDF |
restricted deniability, KCI attack, Bilinear pairings |
Displaying result #1 - #15 of 15 (100 per page; Change: )
|
|