Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Safavi-Naini, Reihanah")

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 43

  • Page / 2
Export

Selection :

  • and

Call tree transformation for program obfuscation and copy protectionPRYAMIKOV, Valery.Lecture notes in computer science. 2006, pp 164-179, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 16 p.Conference Paper

Efficient primitives from exponentiation in ZpSHAOQUAN JIANG.Lecture notes in computer science. 2006, pp 259-270, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Digital rights management : Merging contract, copyright and criminal lawYEE FEN LIM.Lecture notes in computer science. 2006, pp 66-74, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 9 p.Conference Paper

Enforcing regional DRM for multimedia broadcasts with and without-trusted computingGREVELER, Ulrich.Lecture notes in computer science. 2006, pp 332-340, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 9 p.Conference Paper

Efficient and provably secure multi-receiver identity-based signcryptionSHANSHAN DUAN; ZHENFU CAO.Lecture notes in computer science. 2006, pp 195-206, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Improved cryptanalysis of MAGSIMPSON, Leonie; HENRICKSEN, Matt.Lecture notes in computer science. 2006, pp 64-75, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Ensuring fast implementations of symmetric ciphers on the intel pentium 4 and beyondHENRICKSEN, Matt; DAWSON, Ed.Lecture notes in computer science. 2006, pp 52-63, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Oblivious scalar-product protocolsHUAFEI ZHU; FENG BAO.Lecture notes in computer science. 2006, pp 313-323, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

PA in the two-key setting and a generic conversion for encryption with anonymityHAYASHI, Ryotaro; TANAKA, Keisuke.Lecture notes in computer science. 2006, pp 271-282, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Cache based power analysis attacks on AESFOURNIER, Jacques; TUNSTALL, Michael.Lecture notes in computer science. 2006, pp 17-28, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Direct chosen-ciphertext secure identity-based key encapsulation without random oraclesKILTZ, Eike; GALINDO, David.Lecture notes in computer science. 2006, pp 336-347, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

A novel framework for multiple creatorship protection of digital moviesZHANG, Yu-Quan; EMMANUEL, Sabu.Lecture notes in computer science. 2006, pp 1-12, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 12 p.Conference Paper

Algorithms to watermark software through register allocationZHU, William; THOMBORSON, Clark.Lecture notes in computer science. 2006, pp 180-191, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 12 p.Conference Paper

TIVA : Trusted integrity verification architectureGOMATHISANKARAN, Mahadevan; TYAGI, Akhilesh.Lecture notes in computer science. 2006, pp 13-31, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 19 p.Conference Paper

Augmented certificate revocation listsLAKSHMINARAYANAN, A; LIM, T. L.Lecture notes in computer science. 2006, pp 87-98, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Online/offline signatures and multisignatures for AODV and DSR routing securitySHIDI XU; YI MU; SUSILO, Willy et al.Lecture notes in computer science. 2006, pp 99-110, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

A novel privacy and copyright protection enforced peer-to-peer networkXIAOMING WANG; BIN ZHU; SHIPENG LI et al.Lecture notes in computer science. 2006, pp 298-310, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 13 p.Conference Paper

Distinguishing attack on SOBER-128 with linear maskingJOO YEON CHO; PIEPRZYK, Josef.Lecture notes in computer science. 2006, pp 29-39, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

Security weaknesses of certain broadcast encryption schemesMIHALJEVIC, Miodrag J; FOSSORIER, Marc P. C; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 228-245, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 18 p.Conference Paper

Tag-KEM from set partial domain one-way permutationsABE, Masayuki; YANG CUI; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 360-370, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 11 p.Conference Paper

The role of the self-defending object concept in developing distributed security-aware applicationsHOLFORD, John W; CAELLI, William J.Lecture notes in computer science. 2006, pp 183-194, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Towards provable security for ubiquitous applicationsBURMESTER, Mike; VAN LE, Tri; DE MEDEIROS, Breno et al.Lecture notes in computer science. 2006, pp 295-312, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 18 p.Conference Paper

A novel broadcast encryption based on time-bound cryptographic keysMIHALJEVIC, Miodrag J; FOSSORIER, Marc P. C; IMAI, Hideki et al.Lecture notes in computer science. 2006, pp 258-276, issn 0302-9743, isbn 3-540-35998-2, 1Vol, 19 p.Conference Paper

An extension to bellare and rogaway (1993) model : Resetting compromised long-term keysBOYD, Colin; RAYMOND CHOO, Kim-Kwang; MATHURIA, Anish et al.Lecture notes in computer science. 2006, pp 371-382, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 12 p.Conference Paper

Constructing secure hash functions by enhancing merkle-damgård constructionGAURAVARAM, Praveen; MILLAN, William; DAWSON, Ed et al.Lecture notes in computer science. 2006, pp 407-420, issn 0302-9743, isbn 3-540-35458-1, 1Vol, 14 p.Conference Paper

  • Page / 2