Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012
    DBLP: db/conf/secrypt/secrypt2012.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 66  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Mikko Kiviharju.
    Towards Pervasive Cryptographic Access Control Models.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Sufian Hameed, Tobias Kloht, Xiaoming Fu 0001.
    iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Seungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang.
    Defense Against TCP Flooding Attack.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Martin Schütte, Thomas Scheffler, Bettina Schnor.
    Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Harris E. Michail, George Athanasiou, Andreas Gregoriades, George Theodoridis, Constantinos E. Goutis.
    On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Matt Henricksen.
    Two Dragons - A Family of Fast Word-based Stream Ciphers.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr..
    Key Management as a Service.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga.
    Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Julien Bringer, Hervé Chabanne, Alain Patey.
    An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Conference paper
    Nicolas Courtois, Theodosis Mourouzis, Pho V. Le.
    Extension of de Weger's Attack on RSA with Large Public Keys.
    SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2012 (0) 2012
    Show item 1 to 10 of 66  

    Your query returned 66 matches in the database.