X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (192) 192
Conference Proceeding (88) 88
Dissertation (15) 15
Publication (8) 8
Book Chapter (5) 5
Book / eBook (1) 1
Magazine Article (1) 1
Newspaper Article (1) 1
Paper (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
perfect forward secrecy (115) 115
perfect secrecy (87) 87
authentication (57) 57
engineering, electrical & electronic (57) 57
cryptography (56) 56
security (55) 55
computer science, information systems (52) 52
telecommunications (35) 35
computer science, theory & methods (34) 34
protocols (28) 28
computer science (27) 27
encryption (27) 27
analysis (23) 23
cryptographic protocols (20) 20
network security (20) 20
authenticated key exchange (18) 18
information theory (18) 18
channels (17) 17
key agreement (17) 17
public key (17) 17
information security (16) 16
secrecy (16) 16
geheimhaltung (15) 15
privacy (15) 15
authenticated key agreement (14) 14
cryptanalysis (14) 14
algorithms (13) 13
data encryption (13) 13
mathematics (13) 13
mutual authentication (13) 13
public key cryptography (13) 13
random variables (13) 13
receivers (13) 13
computer information security (12) 12
e-mail (12) 12
encoding (12) 12
entropy (12) 12
identity-based encryption (12) 12
resilience (12) 12
studies (12) 12
computer science, hardware & architecture (11) 11
networks (11) 11
perfect security (11) 11
physical layer security (11) 11
mathematics, applied (10) 10
verschlüsselung (10) 10
wireless sensor networks (10) 10
computer security (9) 9
exchange (9) 9
key exchange (9) 9
mathematical analysis (9) 9
messages (9) 9
perfect (9) 9
servers (9) 9
smart cards (9) 9
wireless communication (9) 9
coding and information theory (8) 8
communication (8) 8
data security (8) 8
electronic mail (8) 8
elliptic curve cryptography (8) 8
engineering (8) 8
identity-based cryptography (8) 8
information (8) 8
internet (8) 8
optimization (8) 8
unconditional security (8) 8
usage (8) 8
anonymity (7) 7
coding (7) 7
combinatorics (7) 7
communications engineering, networks (7) 7
diffie-hellman (7) 7
discrete mathematics in computer science (7) 7
dos attack (7) 7
eavesdropping (7) 7
electrical engineering (7) 7
password (7) 7
protocol (7) 7
randomness (7) 7
research (7) 7
secure (7) 7
sensors (7) 7
smart card (7) 7
transmitters (7) 7
wireless networks (7) 7
authentifizierung (6) 6
codes (6) 6
computer communication networks (6) 6
computer science, software engineering (6) 6
construction (6) 6
data structures, cryptology and information theory (6) 6
diffie-hellman key exchange (6) 6
indexes (6) 6
information and communication, circuits (6) 6
information theoretic security (6) 6
interference (6) 6
mathematical models (6) 6
network coding (6) 6
probability (6) 6
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2012, Volume 7412, pp. 1 - 13
Conference Proceeding
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 08/2016, Volume 11, Issue 8, pp. 1875 - 1887
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 12/2010, Volume 56, Issue 12, pp. 6490 - 6500
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 02/2016, Volume 11, Issue 2, pp. 388 - 399
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 06/2009, Volume 4, Issue 2, pp. 242 - 256
Journal Article
IEEE Transactions on Automatic Control, ISSN 0018-9286, 05/2020, Volume 65, Issue 5, pp. 2001 - 2015
In this paper, we study the problem of remote state estimation, in the presence of a passive eavesdropper. An authorized user estimates the state of an... 
perfect secrecy | Kalman filtering | State-Secrecy Codes | Eavesdropping | CYBERPHYSICAL SECURITY | LAYER | AUTOMATION & CONTROL SYSTEMS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
KSII Transactions on Internet and Information Systems (TIIS), ISSN 1976-7277, 2016, Volume 10, Issue 11, pp. 5639 - 5653
Security models for key exchange protocols have been researched for years, however, lots of them only focus on what secret can be compromised but they do not... 
forward secrecy | ephemeral key reveal | one round | key exchange | Forward secrecy | One round | Ephemeral key reveal | Key exchange | PERFECT | COMPUTER SCIENCE, INFORMATION SYSTEMS | TELECOMMUNICATIONS | Data security | Computer network protocols | Authentication | Methods | 컴퓨터학
Journal Article
Security and Communication Networks, ISSN 1939-0114, 12/2015, Volume 8, Issue 18, pp. 3356 - 3371
Journal Article
International Journal of Security and Networks, ISSN 1747-8405, 08/2012, Volume 7, Issue 1, pp. 1 - 5
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 12/2008, Volume 3, Issue 4, pp. 786 - 791
Journal Article
EURASIP Journal on Wireless Communications and Networking, ISSN 1687-1472, 12/2012, Volume 2012, Issue 1, pp. 1 - 10
Journal Article
IEEE Transactions on Information Theory, ISSN 0018-9448, 11/2017, Volume 63, Issue 11, pp. 7382 - 7395
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2014, Volume 8792, pp. 435 - 447
Conference Proceeding
SCIENTIA IRANICA, ISSN 1026-3098, 05/2019, Volume 26, Issue 3, pp. 1749 - 1761
This study considers a secure network coding problem in which some secret keys are shared among legitimate nodes, and there exists an eavesdropper that is able... 
Wireline networks | Random binning | ENGINEERING, MULTIDISCIPLINARY | Strong secrecy | Zero-error decoding | Perfect secrecy | epsilon-error decoding | Weak secrecy
Journal Article
IEEE Transactions on Industrial Informatics, ISSN 1551-3203, 12/2019, pp. 1 - 1
Industrial Internet-of-Things (IIoT) is the basis of Industry 4.0, which extends Internet connectivity beyond traditional computing devices like computers and... 
Perfect Forward Secrecy | Industrial Internet-of-Things | Dynamic Authentication Credential | Authenticated Key Agreement
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.