The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for encipherment with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-1987 (19) 1988-2009 (15) 2022 (2)
Publication types (Num. hits)
article(12) inproceedings(24)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 14 occurrences of 13 keywords

Results
Found 36 publication records. Showing 36 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
167Rudolf Bayer, J. K. Metzger On the Encipherment of Search Trees and Random Access Files. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1976 DBLP  DOI  BibTeX  RDF encipherment, indexed sequential files, privacy transformation, random access files, security, privacy, cryptography, indexes, paging, protection, B-trees, search trees
90R. W. Jones User Functions for the Generation and Distribution of Encipherment Keys. Search on Bibsonomy EUROCRYPT The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
70Akihiro Shimizu, Shoji Miyaguchi Fast Data Encipherment Algorithm FEAL. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
70Donald W. Davies, Graeme I. P. Parkin The average Cycle size of the Key-Stream in Output Feedback Encipherment. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
50Kazuo Ohta, Kazumaro Aoki Linear Cryptanalysis of the Fast Data Encipherment Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
50R. W. Jones, M. S. J. Baxter The Role of Encipherment Services in Distributed Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
40Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
40Donald W. Davies, Wyn L. Price Engineering Secure Information Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
30Keagan Brewer 'I beg your grace to suppress this chapter or else to have it written in secret letters': The Emotions of Encipherment in Late-Medieval Gynaecology. Search on Bibsonomy VOY The full citation details ... 2022 DBLP  BibTeX  RDF
30Claire Bowern, Daniel Gaskell Enciphered after all? Word-level Text Metrics are Compatible with some Types of Encipherment. Search on Bibsonomy VOY The full citation details ... 2022 DBLP  BibTeX  RDF
30Jin-Kyoung Heo Distributed Object Activation for Web Application Encipherment Key. Search on Bibsonomy J. Convergence Inf. Technol. The full citation details ... 2009 DBLP  BibTeX  RDF
30JinKyoung Heo Web Application Encipherment Key Management using Distributed Object Activation. Search on Bibsonomy J. Digit. Content Technol. its Appl. The full citation details ... 2009 DBLP  BibTeX  RDF
30JinKyoung Heo Encipherment Key Management System for Massive Web Contents. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF object activation, security, distributed processing
30Sung-Yeal Im, Ki-Dong Chung A Study on the Data Encipherment Equipment with Rijndael Algorithm in ATM Network. Search on Bibsonomy Security and Management The full citation details ... 2005 DBLP  BibTeX  RDF
30Cees J. A. Jansen, Piet van der Vlist Message encipherment with minimal expansion and redundancy - doing better than ISO-10126. Search on Bibsonomy Comput. Secur. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
30Thomas Hardjono, Jennifer Seberry Search Key Substitution in the Encipherment of B-Trees. Search on Bibsonomy VLDB The full citation details ... 1990 DBLP  BibTeX  RDF
30John Linn Privacy enhancement for Internet electronic mail: Part I - message encipherment and authentication procedures. Search on Bibsonomy RFC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
30John Linn Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures. Search on Bibsonomy RFC The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
30Akihiro Shimizu, Shoji Miyaguchi FEAL - Fast Data Encipherment Algorithm. Search on Bibsonomy Syst. Comput. Jpn. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
30John Linn Privacy enhancement for Internet electronic mail: Part I: Message encipherment and authentication procedures. Search on Bibsonomy RFC The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
30Gilbert Bloch, Ralph Erskine Enigma: the Dropping of the Double Encipherment. Search on Bibsonomy Cryptologia The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
30Józef P. Pieprzyk, Dominik Rutkowski Modular design of information encipherment for computer systems. Search on Bibsonomy Comput. Secur. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
30Alan G. Konheim Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
30Donald W. Davies, Graeme I. P. Parkin The Average Cycle Size of the Key Stream in Output Feedback Encipherment. Search on Bibsonomy CRYPTO The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
30Rudolf Bayer, J. K. Metzger On the Encipherment of Search Trees and Random Access Files. Search on Bibsonomy VLDB The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
30Theodore D. Friedman, Lance J. Hoffman Execution Time Requirements for Encipherment Programs. Search on Bibsonomy Commun. ACM The full citation details ... 1974 DBLP  DOI  BibTeX  RDF
20David M. Horan, Richard A. Guinee A novel pseudorandom binary sequence generator for keystream generation. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Sabah Mohammed, Jinan Fiaidhi Developing Secure Transcoding Intermediary for SVG Medical Images within Peer-to-Peer Ubiquitous Environment. Search on Bibsonomy CNSR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF P2P Ubiquitous Environments, Image Transcoding, XML Encryption, SVG, JXTA
20Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
20Eiji Okamoto Substantial Number of Cryptographic Keys and Its Application to Encryption Designs. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
20A. R. Prieto, J. G. Tomas A model to order the encryption algorithms according to their quality. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
20Marc Girault Hash-Functions Using Modulo-N Operations. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
20Walter Fumy On the F-function of FEAL. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
20Wyn L. Price Standards for Data Security - A Change of Direction. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
20Don Coppersmith Another Birthday Attack. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
20Don Coppersmith The Real Reason for Rivest's Phenomenon. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #36 of 36 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license