The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for decrypting with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1978-1999 (15) 2000-2004 (19) 2005-2006 (17) 2007-2008 (19) 2009-2016 (19) 2017-2020 (20) 2021-2022 (16) 2023-2024 (7)
Publication types (Num. hits)
article(48) incollection(1) inproceedings(78) phdthesis(5)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 82 occurrences of 70 keywords

Results
Found 132 publication records. Showing 132 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
47Xiangqian Wu 0002, David Zhang 0001, Kuanquan Wang A Palmprint Cryptosystem. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
40Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer Analyzing network traffic to detect self-decrypting exploit code. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF exploit code, static analysis, emulation, detection, polymorphic, decryption
40Nick Howgrave-Graham, Jean-Pierre Seifert Extending Wiener's Attack in the Presence of Many Decrypting Exponents. Search on Bibsonomy CQRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Manjinder Singh, Sarabjit Singh Network Security (Security in Large Networks). Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure broadcasting, secure communication channel, legal receiving principals, secure broadcasting protocol, broadcast packet size, cryptography, cryptography, protocols, network security, broadcasting, computer networks, computer networks, packet switching, telecommunication security, decrypting, large networks, packet transmission, encryption algorithm
32Changyu Dong, Giovanni Russello, Naranker Dulay Shared and Searchable Encrypted Data for Untrusted Servers. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Li Zhang, Shiming Ji, Yi Xie, Qiaoling Yuan, Yuehua Wan, Guanjun Bao Principle of Image Encrypting Algorithm Based on Magic Cube Transformation. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Weidong Shi, Hsien-Hsin S. Lee, Mrinmoy Ghosh, Chenghuai Lu, Alexandra Boldyreva High Efficiency Counter Mode Security Architecture via Prediction and Precomputation. Search on Bibsonomy ISCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Giyoon Kim, Soojin Kang, Seungjun Baek 0002, Kimoon Kim, Jongsung Kim A Method for Decrypting Data Infected with Rhysida Ransomware. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Wei-Cheng Huang, Wei-Ting Lin, Ming-Shiu Hung, Jinq-Chyi Lee, Chun-Wei Tung Decrypting orphan GPCR drug discovery via multitask learning. Search on Bibsonomy J. Cheminformatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Matheus Bichara de Assumpção, Marcelo Abdalla dos Reis, Marcos Roberto Marcondes, Pedro Monteiro da Silva Eleuterio, Victor Hugo Vieira Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI. Search on Bibsonomy Forensic Sci. Int. Digit. Investig. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Govind Lal Sidhardh, Manik Banik A Cryptography Inspired Model for Non-local Correlations: Decrypting the Enigmas. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Robin Strässer, Sebastian Schlor, Frank Allgöwer Decrypting Nonlinearity: Koopman Interpretation and Analysis of Cryptosystems. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Tudorica Radu, Rares Radu, Emil Simion A way of decrypting particular malware payloads found in MZPE files. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
24Jianfeng Wang, Zhonghao Chen, Yiming Chen, Yixin Xu, Tianyi Wang, Yao Yu, Vijaykrishnan Narayanan, Sumitha George, Huazhong Yang, Xueqing Li WeightLock: A Mixed-Grained Weight Encryption Approach Using Local Decrypting Units for Ciphertext Computing in DNN Accelerators. Search on Bibsonomy AICAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Giyoon Kim, Soram Kim, Soojin Kang, Jongsung Kim A method for decrypting data infected with Hive ransomware. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Stewart Sentanoe, Hans P. Reiser SSHkex: Leveraging virtual machine introspection for extracting SSH keys and decrypting SSH network traffic. Search on Bibsonomy Digit. Investig. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Giyoon Kim, Soram Kim, Soojin Kang, Jongsung Kim A Method for Decrypting Data Infected with Hive Ransomware. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
24Peter Alexander Earls Davis Decrypting Australia's 'Anti-Encryption' legislation: The meaning and effect of the 'systemic weakness' limitation. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Mark C. Ballandies, Marcus M. Dapp, Evangelos Pournaras Decrypting distributed ledger design - taxonomy, classification and blockchain community evaluation. Search on Bibsonomy Clust. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Marie-Judith Saint Martin, Frédérique Frouin, Caroline Malhaire, Fanny Orlhac Decrypting the information captured by MRI-radiomic features in predicting the response to neoadjuvant chemotherapy in breast cancer. Search on Bibsonomy EMBC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Florentijn van Kampen Thomson's Telegram Decrypting a Secret Message from Albania, 1914. Search on Bibsonomy HistoCrypt The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Giyoon Kim, Soram Kim, Myungseo Park, Younjai Park, Insoo Lee, Jongsung Kim Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data. Search on Bibsonomy Digit. Investig. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 (2019) 200890]. Search on Bibsonomy Digit. Investig. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Soojin Kang, Giyoon Kim, Myungseo Park, Jongsung Kim Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS. Search on Bibsonomy Digit. Investig. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Nguyen Thon Da, Ho Trung Thanh Enhancing the Time Performance of Encrypting and Decrypting Large Tabular Data. Search on Bibsonomy Appl. Artif. Intell. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Josh Rozner, Christopher Potts, Kyle Mahowald Decrypting Cryptic Crosswords: Semantically Complex Wordplay Puzzles as a Target for NLP. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
24Motiur Rahaman, Jaikrishna Komanapalli, Mandrita Mukherjee, Prasanna Kumar Byram, Sunanda Sahoo, Nishant Chakravorty Decrypting the role of predicted SARS-CoV-2 miRNAs in COVID-19 pathogenesis: A bioinformatics approach. Search on Bibsonomy Comput. Biol. Medicine The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Josh Rozner, Christopher Potts, Kyle Mahowald Decrypting Cryptic Crosswords: Semantically Complex Wordplay Puzzles as a Target for NLP. Search on Bibsonomy NeurIPS The full citation details ... 2021 DBLP  BibTeX  RDF
24Hiroki Hiraga, Hiroaki Nishi Network Transparent Decrypting of Cryptographic Stream Considering Service Provision at the Edge. Search on Bibsonomy INDIN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Sarah Scheffler Decrypting legal dilemmas Search on Bibsonomy 2021   RDF
24Anita Mehta, Jean-Marc Luck Hearings and Mishearings: Decrypting the spoken Word. Search on Bibsonomy Adv. Complex Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24R. Kuppan, L. Shobana, Ismail Naci Cangül Encrypting and decrypting algorithms using strong face graph of a tree. Search on Bibsonomy Int. J. Comput. Math. Comput. Syst. Theory The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Anita Mehta, Jean-Marc Luck Hearings and mishearings: decrypting the spoken word. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
24Mingjie Liu, Keren Zhu 0001, Jiaqi Gu, Linxiao Shen, Xiyuan Tang, Nan Sun 0001, David Z. Pan Towards Decrypting the Art of Analog Layout: Placement Quality Prediction via Transfer Learning. Search on Bibsonomy DATE The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Günter Fahrnberger The Ultimate Victory of White- over Blacklisting for the Editing of Encrypted Instant Messages Without Decrypting Nor Understanding Them. Search on Bibsonomy I4CS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
24Gabriele Partel Image and Data Analysis for Spatially Resolved Transcriptomics: Decrypting fine-scale spatial heterogeneity of tissue's molecular architecture. Search on Bibsonomy 2020   RDF
24Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim Decrypting password-based encrypted backup data for Huawei smartphones. Search on Bibsonomy Digit. Investig. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Peter McLaren, Gordon Russell 0001, William J. Buchanan, Zhiyuan Tan 0001 Decrypting live SSH traffic in virtual environments. Search on Bibsonomy Digit. Investig. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Adrian Taylor Decrypting SSL traffic: best practices for security, compliance and productivity. Search on Bibsonomy Netw. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Seyed Abolfazl Valizadeh, Robert Riener, Stefan Elmer, Lutz Jäncke Decrypting the electrophysiological individuality of the human brain: Identification of individuals based on resting-state EEG activity. Search on Bibsonomy NeuroImage The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Tamara Radivilova, Lyudmyla Kirichenko, Dmytro Ageyev, Maxim Tawalbeh, Vitalii Bulakh Decrypting SSL/TLS traffic for hidden threats detection. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
24Peter McLaren, Gordon Russell 0001, William J. Buchanan, Zhiyuan Tan 0001 Decrypting live SSH traffic in virtual environments. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
24Guang Cheng 0001, Chunsheng Guo, Yongning Tang dptCry: an approach to decrypting ransomware WannaCry based on API hooking. Search on Bibsonomy CCF Trans. Netw. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Florent Dewez, Valentin Montmirail Decrypting the Hill Cipher via a Restricted Search over the Text-Space. Search on Bibsonomy HistoCrypt The full citation details ... 2019 DBLP  BibTeX  RDF
24Günter Fahrnberger Editing Encrypted Messages Without Decrypting Nor Understanding Them. Search on Bibsonomy 2019   RDF
24Peter McLaren Investigations into decrypting live secure traffic in virtual environments. Search on Bibsonomy 2019   RDF
24Abdulla Shahid, Mohd Wahab, Nidal Rafiuddin, M. Saad Bin Arif, Hasmat Malik Decrypting wrist movement from MEG signal using SVM classifier. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Mark C. Ballandies, Marcus M. Dapp, Evangelos Pournaras Decrypting Distributed Ledger Design - Taxonomy, Classification and Blockchain Community Evaluation. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
24Song Bian 0001, Masayuki Hiromoto, Takashi Sato DWE: decrypting learning with errors with errors. Search on Bibsonomy DAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Wen-Ran Zhang Programming the mind and decrypting the universe - A bipolar quantum-neuro-fuzzy associative memory model for quantum cognition and quantum intelligence. Search on Bibsonomy IJCNN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
24Benjamin Taubmann, Christoph Frädrich, Dominik Dusold, Hans P. Reiser TLSkex: Harnessing virtual machine introspection for decrypting TLS communication. Search on Bibsonomy Digit. Investig. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Bilal Ahmed, Thomas Thesen, Karen E. Blackmon, Ruben Kuzniecky, Orrin Devinsky, Carla E. Brodley Decrypting "Cryptogenic" Epilepsy: Semi-supervised Hierarchical Conditional Random Fields For Detecting Cortical Lesions In MRI-Negative Patients. Search on Bibsonomy J. Mach. Learn. Res. The full citation details ... 2016 DBLP  BibTeX  RDF
24Aggelos Liapis, Mieke Haesen, Julia Kantorovitch, Jesús Muñoz Alcántara Decrypting the IT Needs of the Designer During the Creative Stages of the Design Process. Search on Bibsonomy Collaboration in Creative Design The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Mathy Vanhoef, Frank Piessens Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2016 DBLP  BibTeX  RDF
24Hubert Plociniczak Decrypting Local Type Inference. Search on Bibsonomy 2016   DOI  RDF
24Filip Karpísek, Ibrahim M. Baggili, Frank Breitinger WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Search on Bibsonomy Digit. Investig. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Patrik Lantz, Björn Johansson 0006, Martin Hell, Ben J. M. Smeets Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information Using Augmented Reality. Search on Bibsonomy Financial Cryptography Workshops The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Étienne André, Laure Petrucci Decrypting cryptography. Search on Bibsonomy ITHET The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Wenbo Yang, Yuanyuan Zhang 0002, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Tam V. Nguyen 0002, Si Liu 0001, Bingbing Ni, Jun Tan, Yong Rui, Shuicheng Yan Towards decrypting attractiveness via multi-modality cues. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
24Jian Chen, Jeffrey S. Rosenthal Decrypting classical cipher text using Markov chain Monte Carlo. Search on Bibsonomy Stat. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Ko-Chi Kuo, Hsun-Chia Hsu Power line communication chip design with data error detecting/correcting and data encrypting/decrypting ability. Search on Bibsonomy ISPACS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
24Wenjun Zheng, Anthony Auerbach Decrypting the Sequence of Structural Events during the Gating Transition of Pentameric Ligand-Gated Ion Channels Based on an Interpolated Elastic Network Model. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Benno Lomb, Tim Güneysu Decrypting HDCP-protected Video Streams Using Reconfigurable Hardware. Search on Bibsonomy ReConFig The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
24Natasa Zivic, Esad Kadusic, Mirko Skrbic Mathematical optimization of decrypting algorithm for soft input decryption. Search on Bibsonomy ICAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Guangyu Zeng, Min Fan, Qingbao Li, Li Zhou Research on the Algorithm of Decrypting Encrypted Synchronous Sequential Machine. Search on Bibsonomy ISCSCT (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24T. T. Sreekumar Decrypting E-Governance: Narratives, Power play and Participation in the Gyandoot Intranet. Search on Bibsonomy Electron. J. Inf. Syst. Dev. Ctries. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Sebastien Marion, Richard E. Jones, Chris Ryder Decrypting the Java gene pool. Search on Bibsonomy ISMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF micro-patterns, pretenuring, Java, garbage collection
24Hilmar-Detlef Brückner Germany's First Cryptanalysis on the Western Front: Decrypting British and French Naval Ciphers in World War I. Search on Bibsonomy Cryptologia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Thomas Werner Finding and decrypting of promoters contributes to the elucidation of gene function. Search on Bibsonomy Silico Biol. The full citation details ... 2002 DBLP  BibTeX  RDF
24Thomas Werner Finding and decrypting of promoters contributes to the elucidation of gene function. Search on Bibsonomy German Conference on Bioinformatics The full citation details ... 2001 DBLP  BibTeX  RDF
24Lei Tang Methods for Encrypting and Decrypting MPEG Video Data Efficiently. Search on Bibsonomy ACM Multimedia The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
24R. A. Bustos, Tamás D. Gedeon Decrypting Neural Network Data: A Gis Case Study. Search on Bibsonomy ICANNGA The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
24John Perry Barlow Decrypting the Puzzle Palace. Search on Bibsonomy Commun. ACM The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
24Thomas Siegenthaler Decrypting a Class of Stream Ciphers Using Ciphertext Only. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1985 DBLP  DOI  BibTeX  RDF pseudonoise generator, exhaustive trials, cryptanalysis, Correlation
24Frank Rubin Decrypting a Stream Cipher Based on j-k Flip-Flops. Search on Bibsonomy Cryptologia The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
24Frank Rubin Decrypting a Stream Cipher Based on J-K Flop-Flops. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1979 DBLP  DOI  BibTeX  RDF J?K flip-flop, linear shift register, cryptography, stream cipher, Boolean equations, code breaking
24Frank Rubin Computer Methods for Decrypting Multiplex Ciphers. Search on Bibsonomy Cryptologia The full citation details ... 1978 DBLP  DOI  BibTeX  RDF
24Frank Rubin Computer Methods for Decrypting Random Stream Ciphers. Search on Bibsonomy Cryptologia The full citation details ... 1978 DBLP  DOI  BibTeX  RDF
16Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis Deep packet anonymization. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Melissa Chase, Sherman S. M. Chow Improving privacy and security in multi-authority attribute-based encryption. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-authority, removing trusted party, privacy, attribute based encryption, anonymous credential
16Hao Yuan, Mikhail J. Atallah Efficient and secure distribution of massive geo-spatial data. Search on Bibsonomy GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF geo-spatial access control, key assignment and derivation, key management
16David Galindo Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF non-interactive proofs, standard model, public key encryption, identity-based encryption
16Murat Kantarcioglu, Wei Jiang, Ying Liu 0007, Bradley A. Malin A Cryptographic Approach to Securely Share and Query Genomic Sequences. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara Anonymous Fingerprinting for Predelivery of Contents. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wenlue Chen, Zhihua Hu A Color Digital Watermark Method Based on NAM-CTC Model. Search on Bibsonomy CSSE (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ivan Damgård, Dennis Hofheinz, Eike Kiltz, Rune Thorbek Public-Key Encryption with Non-interactive Opening. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Murat Kantarcioglu, Wei Jiang, Bradley A. Malin A Privacy-Preserving Framework for Integrating Person-Specific Databases. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Eli Biham, Yaniv Carmeli, Adi Shamir Bug Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bug attack, Pohlig-Hellman, RSA, ECC, Fault attack
16Chih-Hsu Yen, Yu-Shiang Lin, Bing-Fei Wu An efficient implementation of a low-complexity MP3 algorithm with a stream cipher. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DSP, DRM, MP3, Multimedia security, Low complexity
16Xinyang Huang, Ming Yang, Yong Tong An efficient and secure aggregation of encrypted data for wireless sensor network based on dynamic cluster. Search on Bibsonomy SpringSim (1) The full citation details ... 2007 DBLP  BibTeX  RDF wireless sensor network, aggregation, dynamic clustering, perfect security, privacy homomorphism
16Rami El Sawda, Ayman Alfalou, Habib Hamam RGB Colored Image Encryption Processes Using Several Colored Keys Images. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai Anonymous Pay-TV System with Secure Revenue Sharing. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF secure revenue sharing, anonymity, privacy preservation, homomorphic encryption, Pay-TV
16Holger Schmidt 0002, Chi-Tai Dang, Franz J. Hauck Proxy-based Security for the Session Initiation Protocol (SIP). Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Hongxia Jin, Jeffery Lotspiech Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-piracy, broadcast encryption, traitor tracing, Content protection
16Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF A5/2, SMITH, cryptanalysis, GSM, Gaussian elimination, special-purpose hardware, linear systems of equations
16José M. Rodrigues, William Puech, Adrian G. Bors Selective Encryption of Human Skin in JPEG Images. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Sun S. Chung, Gultekin Özsoyoglu Anti-Tamper Databases: Processing Aggregate Queries over Encrypted Databases. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Ravi Chandra Jammalamadaka, Sharad Mehrotra Querying Encrypted XML Documents. Search on Bibsonomy IDEAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Sunghyuck Hong, Noé Lopez-Benitez Enhanced Group Key Generation Algorithm. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 132 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license