The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for secrets with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1986 (18) 1987-1991 (18) 1992-1993 (15) 1994-1995 (17) 1996-1998 (32) 1999-2000 (29) 2001 (15) 2002 (32) 2003 (30) 2004 (45) 2005 (51) 2006 (65) 2007 (63) 2008 (54) 2009 (51) 2010 (50) 2011 (16) 2012 (19) 2013 (24) 2014 (39) 2015 (31) 2016 (38) 2017 (39) 2018 (39) 2019 (39) 2020 (58) 2021 (38) 2022 (46) 2023 (74) 2024 (20)
Publication types (Num. hits)
article(448) book(16) incollection(2) inproceedings(628) phdthesis(10) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 436 occurrences of 309 keywords

Results
Found 1105 publication records. Showing 1105 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
119Noga Alon, Venkatesan Guruswami, Tali Kaufman, Madhu Sudan 0001 Guessing secrets efficiently via list decoding. Search on Bibsonomy ACM Trans. Algorithms The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ?-biased spaces, 20 questions, k-universal sets, error-correcting codes, decoding algorithms
98Marcel Fernandez, Miguel Soriano Protecting Intellectual Property by Guessing Secrets. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
98Noga Alon, Venkatesan Guruswami, Tali Kaufman, Madhu Sudan 0001 Guessing secrets efficiently via list decoding. Search on Bibsonomy SODA The full citation details ... 2002 DBLP  BibTeX  RDF
88Shao Wei-jie An Analysis to the Protection of Commercial Secrets and Strategies to Protect. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
77Marcel Fernandez, Miguel Soriano Efficient Recovery of Secrets. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
72Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai An Efficient Threshold Multi-group-Secret Sharing Scheme. Search on Bibsonomy ICFIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold
67Ruby B. Lee, Peter C. S. Kwan, John Patrick McGregor, Jeffrey S. Dwoskin, Zhenghong Wang Architecture for Protecting Critical Secrets in Microprocessors. Search on Bibsonomy ISCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Carlo Blundo, Alfredo De Santis, Ugo Vaccaro Efficient Sharing of Many Secrets. Search on Bibsonomy STACS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
60Tom Tedrick Fair Exchange of Secrets. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF Exchange of Secret Keys, Exchange of Secrets, Fractions of a Bit, Cryptographic Protocols, Oblivious Transfer, Contract Signing
57Delphine Demange, David Sands 0001 All Secrets Great and Small. Search on Bibsonomy ESOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
57Julien P. Stern A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
57Gilles Brassard, Claude Crépeau, Jean-Marc Robert 0001 All-or-Nothing Disclosure of Secrets. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
55Krister Olsson, Takashi Kawashima The king has... Search on Bibsonomy ACM Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF catharsis, secrets, slab printer, interactive, SMS
52Kai Wang, Xukai Zou, Yan Sui A Multiple Secret Sharing Scheme based on Matrix Projection. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Jeffrey S. Dwoskin, Ruby B. Lee Hardware-rooted trust for secure key management and transient trust. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hardware policy enforcement, secret protection (sp), transient trust, key management, emergency response, secure processors
52Wei Yang 0011, Liusheng Huang, Mingjun Xiao, Weiwei Jing Quantum ANDOS Protocol with Unconditional Security. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Abdulrahman Alarifi, Wenliang Du Diversify sensor nodes to improve resilience against node compromise. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor networks, reverse engineering, diversity, obfuscation
52Amihai Motro, Donald G. Marks, Sushil Jajodia Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
50Sven Laur, Helger Lipmaa A New Protocol for Conditional Disclosure of Secrets and Its Applications. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Conditional disclosure of secrets, crypto-computing, two-party computation, oblivious transfer, homomorphic encryption
46Sara Miner More, Pavel Naumov An Independence Relation for Sets of Secrets. Search on Bibsonomy WoLLIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Sara Miner More, Pavel Naumov On interdependence of secrets in collaboration networks. Search on Bibsonomy TARK The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Ronald Toegl, Georg Hofferek, Karin Greimel, Adrian Leung, Raphael Chung-Wei Phan, Roderick Bloem Formal Analysis of a TPM-Based Secrets Distribution and Storage Scheme. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Barbara Masucci Sharing Multiple Secrets: Models, Schemes and Analysis. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 62B10, AMS Classification 94A62
46Giovanni Di Crescenzo Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio. Search on Bibsonomy MFCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Multi-Secret Sharing, Cryptography, Secret Sharing
46Dennis M. Volpano, Geoffrey Smith 0001 Verifying Secrets and Relative Secrecy. Search on Bibsonomy POPL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
46Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe On Sharing Many Secrets (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
46Atin Basuchoudhary, Nicola Searle Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets. Search on Bibsonomy Comput. Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
41Matthew Canton The presence table: a reactive surface for ambient connection. Search on Bibsonomy TEI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
41Mahalingam Ramkumar Trustworthy Computing under Resource Constraints with the DOWN Policy. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Security, Mobile Computing, integrity and protection
41Runhua Shi, Liusheng Huang, Yonglong Luo, Hong Zhong 0001 A Threshold Multi-secret Sharing Scheme. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Mohammad Mannan, Paul C. van Oorschot Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Yi-Chun Wang, Justie Su-tzu Juan Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio. Search on Bibsonomy SUTC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Bezawada Bruhadeshwar, Sandeep S. Kulkarni User Revocation in Secure Adhoc Networks. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Secure Adhoc Networks, Secret Instantiation Protocols, Group Key Management Protocols, User Revocation
41Gene Itkis Cryptographic tamper evidence. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF evolving cryptosystems, key evolution, tamper evidence, digital signatures, exposures
41Marc Joye, Sung-Ming Yen One-Way Cross-Trees and Their Applications. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Amos Beimel, Benny Chor Universally Ideal Secret Sharing Schemes (Preliminary Version). Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
40George L. Sicherman, Wiebren de Jonge, Reind P. van de Riet Answering Queries Without Revealing Secrets. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1983 DBLP  DOI  BibTeX  RDF keeping secrets, refusal to answer, strategy
36Shafi Goldwasser Cryptography without (Hardly Any) Secrets ? Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Yevgeniy Dodis, Daniel Wichs Non-malleable extractors and symmetric key cryptography from weak secrets. Search on Bibsonomy STOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bounded retrieval model, information reconcilliation, authentication, encryption, information theoretic security, randomness extractors, privacy amplification, authenticated key agreement
36Paul E. Sevinç, Mario Strasser, David A. Basin Securing the Distribution and Storage of Secrets with Trusted Platform Modules. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Lein Harn, Hung-Yu Lin On Oblivious Transfer Protocol and Its Application for the Exchange of Secrets. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
31Christophe Tartary, Josef Pieprzyk, Huaxiong Wang Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme
31Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang A new multi-stage secret sharing scheme using one-way function. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-stage, cryptography, secret sharing, one-way function, threshold scheme
31Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme. Search on Bibsonomy WAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Stefan Brands Rapid Demonstration of Linear Relations Connected by Boolean Operators. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
31Benny Chor, Eyal Kushilevitz Secret Sharing Over Infinite Domains (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
31Subhasish Mazumdar, David W. Stemple, Tim Sheard Resolving the Tension between Integrity and Security Using a Theorem Prover. Search on Bibsonomy SIGMOD Conference The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
31Jane Fedorowicz Comments on Price/Performance Patterns of U.S. Computer Systems. Search on Bibsonomy Commun. ACM The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
31Chris Christensen Review of No More Secrets: My Part in Codebreaking at Bletchley Park and the Pentagon by Betty WebbWebb, Betty. No More Secrets: My Part in codebreaking at Bletchley Park and the Pentagon, London: Mardle Books. 2023. 212+x pages, Paperback, £9.99. ISBN 9781837700219. Search on Bibsonomy Cryptologia The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
31Isuru Ranawaka, Nuwan Goonasekera, Enis Afgan, Jim Basney, Suresh Marru, Marlon E. Pierce Custos Secrets: a Service for Managing User-Provided Resource Credential Secrets for Science Gateways. Search on Bibsonomy PEARC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
31Latifa Al-Abdulkarim, Katie Atkinson, Trevor J. M. Bench-Capon ANGELIC Secrets: Bridging from Factors to Facts in US Trade Secrets. Search on Bibsonomy JURIX The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Shlomi Dolev, Juan A. Garay, Niv Gilboa, Vladimir Kolesnikov Brief announcement: swarming secrets. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF strongly oblivious tm, swarm, multi-party computation
26Tamir Tassa, Jorge L. Villar On proper secrets, ( t , k )-bases and linear codes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 68R01, 51E20, 15A03
26Lifeng Sang, Anish Arora A Wireless Security Framework without Shared Secrets. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Michel Simatic, Isabelle Astic, Coline Aunis, Annie Gentes, Aude Guyot-Mbodji, Camille Jutant, Emmanuel Zaza "Plug: Secrets of the Museum": A Pervasive Game Taking Place in a Museum. Search on Bibsonomy ICEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs Secrets and lies in computer-mediated interaction: theory, methods and design. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, privacy, design, deception, secrecy
26Éric Badouel, Marek A. Bednarczyk, Andrzej M. Borzyszkowski, Benoît Caillaud, Philippe Darondeau Concurrent Secrets. Search on Bibsonomy Discret. Event Dyn. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Concurrency, Computer security, Automata, Supervisory control, Opacity
26Chun-Hsiang Huang, Yu-Feng Kuo, Ja-Ling Wu Digital invisible ink: revealing true secrets via attacking. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DII watermarking, digital invisible ink, hiding watermark in watermark, steganography
26Marcel Fernandez, Miguel Soriano, Josep Cotrina Navau Tracing Traitors by Guessing Secrets. The q-Ary Case. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Bruce Christianson, Michael Roe, David Wheeler Secure Sessions from Weak Secrets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Nils Klarlund, Anders Møller, Michael I. Schwartzbach MONA Implementation Secrets. Search on Bibsonomy CIAA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Edwina L. Rissland, Kevin D. Ashley A Case-Based System for Trade Secrets Law. Search on Bibsonomy ICAIL The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
24Enric Serradell-López, Victor Cavaller Cultural Aspects of Secrecy in Global Economy. Search on Bibsonomy WSKS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secrets, management of the secret, innovation, patents
24Berkant Ustaoglu Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF leaking ephemeral secrets, postponed ephemeral key derivation, pseudo-static keys, Key agreement protocols
24Helger Lipmaa New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Computationally-private information retrieval, conditional disclosure of secrets, oblivious transfer, homomorphic encryption
24Joachim Biskup, Jan-Hendrik Lochner Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF potential secrets, Access control, relational databases, policy, information flow, confidentiality, database security, inference control
24Jeffrey H. Matsuura An Overview of Leading Current Legal Issues Affecting Information Technology Professionals. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DMCA, antitrust, privacy, HIPAA, trade secrets
24Sreekanth Malladi, Jim Alves-Foss What are Multi-Protocol Guessing Attacks and How to Prevent Them. Search on Bibsonomy WETICE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Multi-protocol guessing attacks, weak secrets, mixed strand spaces, EKE
24Manuel Blum 0001 How to Exchange (Secret) Keys Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1983 DBLP  DOI  BibTeX  RDF secrets, transaction protection protocols, security, cryptography, protocols, factorization, public key encryption
24John F. Banzhaf When your computer needs a lawyer. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF constacts, criminals, evidence copying, income tax, lawyer, liabilty, negligence, record keeping records, slander of credit, standard of care, torts, warrantees, simulation, accounting, regulations, copyrights, evidence, law, patents, legal, copying, guarantees, crime, trade secrets
21Keith B. Frikken, Marina Blanton, Mikhail J. Atallah Robust Authentication Using Physically Unclonable Functions. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Alexander Lux, Heiko Mantel Declassification with Explicit Reference Points. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Amos Beimel, Noam Livne On Matroids and Nonideal Secret Sharing. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Hung-Min Sun, King-Hang Wang Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Emmanuel Bresson, Mark Manulis Securing group key exchange against strong corruptions. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authenticated group key exchange, strong corruptions, mutual authentication, contributiveness, insider attacks
21Amos Beimel, Noam Livne, Carles Padró Matroids Can Be Far from Ideal Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21SeongHan Shin, Kazukuni Kobara, Hideki Imai A security framework for personal networks. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Julien Bringer, Hervé Chabanne, Thomas Icart Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tree-Based Hash Protocol, POK, Privacy, RFID tags, PUF
21Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands 0001 Termination-Insensitive Noninterference Leaks More Than Just a Bit. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson On Unconditionally Secure Distributed Oblivious Transfer. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Takashi Nishide, Kazuo Ohta Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bitwise Sharing, Secret Sharing, Multiparty Computation
21Peter C. S. Kwan, Glenn Durfee Practical Uses of Virtual Machines for Protection of Sensitive User Data. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Maciej Liskiewicz Multiparty Computations in Non-private Environments. Search on Bibsonomy GTIT-C The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Amos Beimel, Noam Livne On Matroids and Non-ideal Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Li Bai A Strong Ramp Secret Sharing Scheme Using Matrix Projection. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Alejandro Russo, John Hughes 0001, David A. Naumann, Andrei Sabelfeld Closing Internal Timing Channels by Transformation. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Chao-Yong Hsu, Chun-Shien Lu, Soo-Chang Pei Joint Screening Halftoning and Visual Cryptography for Image Protection. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Cheng-Kang Chu, Wen-Guey Tzeng Conditional Oblivious Cast. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF oblivious cast, conditional oblivious transfer, secure computation
21Zhanfei Zhou Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21David Molnar, Andrea Soppera, David A. Wagner 0001 Privacy for RFID through trusted computing. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privacy, RFID, trusted computing, audit
21Gene Itkis, Robert McNerney, Scott Russell Intrusion-Resilient Secure Channels. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Mingqiao Wu, Zhongliang Zhu, Shiyao Jin Detection of Hiding in the LSB of DCT Coefficients. Search on Bibsonomy ICIC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21SeongHan Shin, Kazukuni Kobara, Hideki Imai A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang A New (t, n)-Threshold Multi-secret Sharing Scheme. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia Identifying Sensitive Associations in Databases for Release Control. Search on Bibsonomy Secure Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Marius-Calin Silaghi Meeting Scheduling Guaranteeing n/2-Privacy and Resistant to Statistical Analysis (Applicable to any DisCSP). Search on Bibsonomy Web Intelligence The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Martin Fowler Data Access Routines. Search on Bibsonomy IEEE Softw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21SeongHan Shin, Kazukuni Kobara, Hideki Imai Leakage-Resilient Authenticated Key Establishment Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Douglas R. Stinson New Results on Unconditionally Secure Distributed Oblivious Transfer. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1105 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license