Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Li, Ninghui")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 25

  • Page / 1
Export

Selection :

  • and

Information and communications security (8th International conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006)Ning, Peng; Li, Ninghui; Qing, Sihan et al.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-49496-0, 1 vol.(XIV-558 p.), isbn 3-540-49496-0Conference Proceedings

Left-to-right signed-bit τ-adic representations of n integers (short paper)BRUMLEY, Billy Bob.Lecture notes in computer science. 2006, pp 469-478, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

A construction for general and efficient oblivious commitment based envelope protocolsJIANGTAO LI; NINGHUI LI.Lecture notes in computer science. 2006, pp 122-138, issn 0302-9743, isbn 3-540-49496-0, 17 p.Conference Paper

An identity-based proxy signature scheme from pairingsSHIM, Kyung-Ah.Lecture notes in computer science. 2006, pp 60-71, issn 0302-9743, isbn 3-540-49496-0, 12 p.Conference Paper

Quantifying information leakage in tree-based hash protocols (short paper)NOHL, Karsten; EVANS, David.Lecture notes in computer science. 2006, pp 228-237, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

A security analysis of the precise time protocol (short paper)TSANG, Jeanette; BEZNOSOV, Konstantin.Lecture notes in computer science. 2006, pp 50-59, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

A topological condition for solving fair exchange in byzantine environmentsGARBINATO, Benoit; RICKEBUSCH, Ian.Lecture notes in computer science. 2006, pp 30-49, issn 0302-9743, isbn 3-540-49496-0, 20 p.Conference Paper

Finding compact reliable broadcast in unknown fixed-identity networks (short paper)HUAFEI ZHU; JIANYING ZHOU.Lecture notes in computer science. 2006, pp 72-81, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

Seifert's RSA fault attack : Simplified analysis and generalizationsMUIR, James A.Lecture notes in computer science. 2006, pp 420-434, issn 0302-9743, isbn 3-540-49496-0, 15 p.Conference Paper

Hierarchical key assignment for black-box tracing with efficient ciphertext sizeMATSUSHITA, Tatsuyuki; IMAI, Hideki.Lecture notes in computer science. 2006, pp 92-111, issn 0302-9743, isbn 3-540-49496-0, 20 p.Conference Paper

Hardware-and-software-based security architecture for broadband router (short paper)GU XIAOZHUO; LI YUFENG; YANG JIANZU et al.Lecture notes in computer science. 2006, pp 546-555, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

A wireless covert channel on smart cardsDYRKOLBOTN, Geir Olav; SNEKKENES, Einar.Lecture notes in computer science. 2006, pp 249-259, issn 0302-9743, isbn 3-540-49496-0, 11 p.Conference Paper

Threshold implementations against side-channel attacks and glitchesNIKOVA, Svetla; RECHBERGER, Christian; RIJMEN, Vincent et al.Lecture notes in computer science. 2006, pp 529-545, issn 0302-9743, isbn 3-540-49496-0, 17 p.Conference Paper

An operating system design for the security architecture for microprocessorsPLATTE, Jörg; DURAN DIAZ, Raul; NAROSKA, Edwin et al.Lecture notes in computer science. 2006, pp 174-189, issn 0302-9743, isbn 3-540-49496-0, 16 p.Conference Paper

Defining and measuring policy coverage in testing access control policiesMARTIN, Evan; TAO XIE; TING YU et al.Lecture notes in computer science. 2006, pp 139-158, issn 0302-9743, isbn 3-540-49496-0, 20 p.Conference Paper

A fast RSA implementation on itanium 2 processorFURUKAWA, Kazuyoshi; TAKENAKA, Masahiko; ITOH, Kouichi et al.Lecture notes in computer science. 2006, pp 507-518, issn 0302-9743, isbn 3-540-49496-0, 12 p.Conference Paper

A robust and secure RFID-based pedigree system (short paper)TAN, Chiu C; QUN LI.Lecture notes in computer science. 2006, pp 21-29, issn 0302-9743, isbn 3-540-49496-0, 9 p.Conference Paper

Distributed credential chain discovery in trust management with parameterized roles and constraintsZIQING MAO; NINGHUI LI; WINSBOROUGH, William H et al.Lecture notes in computer science. 2006, pp 159-173, issn 0302-9743, isbn 3-540-49496-0, 15 p.Conference Paper

Efficient protocols for privacy preserving matching against distributed datasetsYINGPENG SANG; HONG SHEN; YASUO TAN et al.Lecture notes in computer science. 2006, pp 210-227, issn 0302-9743, isbn 3-540-49496-0, 18 p.Conference Paper

Strong and robust RFID authentication enabling perfect ownership transferCHAE HOON LIM; KWON, Taekyoung.Lecture notes in computer science. 2006, pp 1-20, issn 0302-9743, isbn 3-540-49496-0, 20 p.Conference Paper

Trace-driven cache attacks on AES (short paper)ACUCMEZ, Onur; KOC, Qetin Kaya.Lecture notes in computer science. 2006, pp 112-121, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

Point-based trust : Define how much privacy is worthDANFENG YAO; FDKKEN, Keith B; ATALLAH, Mikhail J et al.Lecture notes in computer science. 2006, pp 190-209, issn 0302-9743, isbn 3-540-49496-0, 20 p.Conference Paper

Provably correct runtime enforcement of non-interference propertiesVENKATAKRISHNAN, V. N; WEI XU; DUVARNEY, Daniel C et al.Lecture notes in computer science. 2006, pp 332-351, issn 0302-9743, isbn 3-540-49496-0, 20 p.Conference Paper

Mathematical foundations for the design of a low-rate DoS attack to iterative servers (short paper)MACIA-FERNANDEZ, Gabriel; DIAZ-VERDEJO, Jesus E; GARCIA-TEODORO, Pedro et al.Lecture notes in computer science. 2006, pp 282-291, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

Formal analysis and systematic construction of two-factor authentication scheme (short paper)GUOMIN YANG; WONG, Duncan S; HUAXIONG WANG et al.Lecture notes in computer science. 2006, pp 82-91, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

  • Page / 1