X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
analysis (3) 3
computer science (3) 3
cryptography (3) 3
advice complexity (2) 2
asymmetric cryptography (2) 2
asymmetric string guessing (2) 2
authentication (2) 2
covering designs (2) 2
mathematics (2) 2
online algorithms (2) 2
privacy (2) 2
safety and security measures (2) 2
security (2) 2
symmetric encryption (2) 2
telecommunications (2) 2
additiv (1) 1
advice complexity class aoc (1) 1
algorithms (1) 1
allokation (1) 1
applying to entity or a message (1) 1
asymmetric encryption (1) 1
asymmetric exclusion model (1) 1
asymmetric exclusion process (1) 1
asymmetric fingerprinting (1) 1
asymmetric online covering (1) 1
asymmetric pairings (1) 1
asymmetry (1) 1
authentication in 3gpp networks (1) 1
authentifizierung (1) 1
big data (1) 1
bipartite graphs (1) 1
block cipher ‐ encrypting one block of plaintext into one block of ciphertext (1) 1
boundary-induced phase transitions (1) 1
buyer-seller watermarking (1) 1
cellular automaton (1) 1
client-side key-stretching (1) 1
cloud computing (1) 1
code (1) 1
communications engineering, networks (1) 1
complexity (1) 1
complexity class (1) 1
computer appl. in administrative data processing (1) 1
computer communication networks (1) 1
computer information security (1) 1
computer science - cryptography and security (1) 1
computer science - data structures and algorithms (1) 1
computer science, information systems (1) 1
computer science, theory & methods (1) 1
computer security (1) 1
computer systems organization and communication networks (1) 1
condensed matter - statistical mechanics (1) 1
confidentiality (1) 1
cost asymmetric secure hash (1) 1
cryptographic algorithms (1) 1
cryptographic mechanisms and cryptography ‐ science of protecting messages exchanged over public channels (1) 1
cryptography buffer (1) 1
crypts (1) 1
data encryption (1) 1
data management (1) 1
data security (1) 1
design of experiments (1) 1
design standards (1) 1
diffusion problem (1) 1
digital signature creation and verification process (1) 1
dnssec utilizing asymmetric key pair cryptographic approach ‐ for data origin authentication and end‐to‐end data integrity assurance (1) 1
dual system encryption (1) 1
e-commerce (1) 1
e-commerce/e-business (1) 1
e-medical record (1) 1
eavesdropping (1) 1
enabling sender to encrypt plaintext message into ciphertext (1) 1
engineering (1) 1
fingerabdruck (1) 1
formel (1) 1
genes (1) 1
genetic research (1) 1
global system for mobiles (1) 1
hashing (1) 1
hybrid model (1) 1
information storage and retrieval (1) 1
information technology (1) 1
infrastructure (1) 1
internet of things (1) 1
it in business (1) 1
keyword search encryption (1) 1
komplexitätstheorie (1) 1
lightweight (1) 1
location based service (1) 1
location sharing (1) 1
location-based services (1) 1
lower bounds (1) 1
management of computing and information systems (1) 1
master passwords (1) 1
mathematical and computational physics (1) 1
matrix product ansatz (1) 1
medical records (1) 1
methods (1) 1
multidisciplinary sciences (1) 1
multirooted pki organization (1) 1
non-repudiation (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Theory of Computing Systems, ISSN 1432-4350, 11/2017, Volume 61, Issue 4, pp. 1128 - 1177
Journal Article
Leibniz International Proceedings in Informatics, LIPIcs, ISSN 1868-8969, 02/2015, Volume 30, pp. 116 - 129
Conference Proceeding
Proceedings of the 11th ACM on asia conference on computer and communications security, 05/2016, pp. 165 - 176
Offline attacks on passwords are increasingly commonplace and dangerous. An offline adversary is limited only by the amount of computational resources he or... 
offline attacks | master passwords | client-side key-stretching | cost asymmetric secure hash | Master Passwords | Offline Attacks | Client-side Key-Stretching | Cost Asymmetric Secure Hash | Computer Science - Cryptography and Security
Conference Proceeding
Symmetry, ISSN 2073-8994, 2015, Volume 7, Issue 3, pp. 1176 - 1210
Information technology (IT) security has become a major concern due to the growing demand for information and massive development of client/server applications... 
Asymmetric encryption | Symmetric encryption | Hashing | Cryptography buffer | SCADA COMMUNICATION | SYSTEM | cryptography buffer | PRIVACY | asymmetric encryption | MULTIDISCIPLINARY SCIENCES | hashing | symmetric encryption | SERVICE | Infrastructure | Running | Security | Real time | Servers | Computer information security | Cryptography | Information technology
Journal Article
KSII Transactions on Internet and Information Systems, ISSN 1976-7277, 09/2017, Volume 11, Issue 9, pp. 4624 - 4640
Journal Article
Service Oriented Computing and Applications, ISSN 1863-2386, 12/2018, Volume 12, Issue 3, pp. 285 - 294
Journal Article
Proceedings of the first ACM workshop on information hiding and multimedia security, 06/2013, pp. 35 - 44
A buyer seller watermarking protocol is intended to ensure copyright protection, privacy and security for both the buyer and seller simultaneously in an... 
asymmetric fingerprinting | non-repudiation | buyer-seller watermarking
Conference Proceeding
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.