au.\*:("Safavi-Naini, Reihanah")
Results 1 to 25 of 64
Selection :
Digital rights management (technologies, issues, challenges and systems)Safavi-Naini, Reihanah; Yung, Moti.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-35998-2, 1Vol, XI-355 p, isbn 3-540-35998-2Conference Proceedings
Call tree transformation for program obfuscation and copy protectionPRYAMIKOV, Valery.Lecture notes in computer science. 2006, pp 164-179, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 16 p.Conference Paper
Efficient primitives from exponentiation in ZpSHAOQUAN JIANG.Lecture notes in computer science. 2006, pp 259-270, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Side channel attacks against HMACs based on block-cipher based hash functionsOKEYA, Katsuyuki.Lecture notes in computer science. 2006, pp 432-443, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Statistical decoding revisitedOVERBECK, R.Lecture notes in computer science. 2006, pp 283-294, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Information security and privacy (11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006)Batten, Lynn Margaret; Safavi-Naini, Reihanah.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-35458-1, 1Vol, XII-446 p, isbn 3-540-35458-1Conference Proceedings
AVS-REL : A new right expression languageYING SHA.Lecture notes in computer science. 2006, pp 90-101, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 12 p.Conference Paper
The australian sony playstation case : How far will anti-circumvention law reach in the name of DRM?FITZGERALD, Brian.Lecture notes in computer science. 2006, pp 32-51, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 20 p.Conference Paper
Digital rights management : Merging contract, copyright and criminal lawYEE FEN LIM.Lecture notes in computer science. 2006, pp 66-74, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 9 p.Conference Paper
Enforcing regional DRM for multimedia broadcasts with and without-trusted computingGREVELER, Ulrich.Lecture notes in computer science. 2006, pp 332-340, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 9 p.Conference Paper
Efficient and provably secure multi-receiver identity-based signcryptionSHANSHAN DUAN; ZHENFU CAO.Lecture notes in computer science. 2006, pp 195-206, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Improved cryptanalysis of MAGSIMPSON, Leonie; HENRICKSEN, Matt.Lecture notes in computer science. 2006, pp 64-75, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Ensuring fast implementations of symmetric ciphers on the intel pentium 4 and beyondHENRICKSEN, Matt; DAWSON, Ed.Lecture notes in computer science. 2006, pp 52-63, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Oblivious scalar-product protocolsHUAFEI ZHU; FENG BAO.Lecture notes in computer science. 2006, pp 313-323, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper
PA in the two-key setting and a generic conversion for encryption with anonymityHAYASHI, Ryotaro; TANAKA, Keisuke.Lecture notes in computer science. 2006, pp 271-282, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Cache based power analysis attacks on AESFOURNIER, Jacques; TUNSTALL, Michael.Lecture notes in computer science. 2006, pp 17-28, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
Direct chosen-ciphertext secure identity-based key encapsulation without random oraclesKILTZ, Eike; GALINDO, David.Lecture notes in computer science. 2006, pp 336-347, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
An efficient fingerprinting scheme with secret sharingYONG, Seunglim; LEE, Sang-Ho.Lecture notes in computer science. 2006, pp 192-202, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 11 p.Conference Paper
Software tamper resistance through dynamic program monitoringBLIETZ, Brian; TYAGI, Akhilesh.Lecture notes in computer science. 2006, pp 146-163, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 18 p.Conference Paper
User-attributed rights in DRMPETKOVIC, Milan; KOSTER, R. Paul.Lecture notes in computer science. 2006, pp 75-89, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 15 p.Conference Paper
A broadcast encryption scheme with free-riders but unconditional securityADELSBACH, Andre; GREVELER, Ulrich.Lecture notes in computer science. 2006, pp 246-257, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 12 p.Conference Paper
More on stand-alone and setup-free verifiably committed signaturesHUAFEI ZHU; FENG BAO.Lecture notes in computer science. 2006, pp 148-158, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper
Secure cross-realm C2C-PAKE protocolYIN YIN; LI BAO.Lecture notes in computer science. 2006, pp 395-406, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper
A novel framework for multiple creatorship protection of digital moviesZHANG, Yu-Quan; EMMANUEL, Sabu.Lecture notes in computer science. 2006, pp 1-12, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 12 p.Conference Paper
Algorithms to watermark software through register allocationZHU, William; THOMBORSON, Clark.Lecture notes in computer science. 2006, pp 180-191, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 12 p.Conference Paper