Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: IJACT
    Year: 2008
    Volume: 1
    Number: 2
    DBLP: db/journals/ijact/ijact1.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 24  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Sebastian Gajek, Mark Manulis, Jörg Schwenk.
    User-aware provably secure protocols for browser-based mutual authentication.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Marko Wolf, André Osterhues, Christian Stüble.
    Secure offline superdistribution for mobile platforms.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang.
    Unconditionally secure disjointness tests for private datasets.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson.
    One-round key exchange in the standard model.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Jiayuan Sui, Douglas R. Stinson.
    A critical analysis and improvement of advanced access content system drive-host authentication.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng.
    Multiuser private queries over encrypted databases.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Alfred Menezes, Berkant Ustaoglu.
    Comparing the pre- and post-specified peer models for key agreement.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Arpita Patra, Ashish Choudhary, C. Pandu Rangan, K. Srinathan, Prasad Raghavendra.
    Perfectly reliable and secure message transmission tolerating mobile adversary.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Ivan Damgård, Martin Geisler, Mikkel Krøigaard.
    A correction to 'efficient and secure comparison for on-line auctions'.
    IJACT 2008, Volume 1 (0) 2009
    Conference paper
    Risto M. Hakala, Kaisa Nyberg.
    A multidimensional linear distinguishing attack on the Shannon cipher.
    IJACT 2008, Volume 1 (0) 2009
    Show item 1 to 10 of 24  

    Your query returned 24 matches in the database.