Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Applied cryptography (2nd ed.): protocols, algorithms, and source code in CNovember 1995
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-11709-4
Published:24 November 1995
Pages:
783
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. ACM
    Fan S, Ranly P, Graner L, Vogel I and Steinebach M Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public Keys Proceedings of the 19th International Conference on Availability, Reliability and Security, (1-10)
  2. ACM
    Wang C, Zhang Y and Lin Z RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, (830-842)
  3. Gjøsteen K, Haines T and Solberg M Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study Electronic Voting, (69-86)
  4. Basit A, Toor W, Saadi M, Maroof N, Khan S and Otaibi S (2023). Reversible encryption and lossless data hiding for medical imaging aiding smart health care, Cluster Computing, 26:5, (2977-2991), Online publication date: 1-Oct-2023.
  5. Asthana A and Pradhan P (2022). Dynamic Butterfly ACM for Risk Optimization on the Real-Time Unix Operating System, International Journal of Software Innovation, 10:1, (1-16), Online publication date: 30-Sep-2022.
  6. ACM
    Ikebe K and Sakurai K Computational experimental evaluation of the time variance of cryptocurrency mining using cryptographic hash functions Proceedings of the 2022 4th Blockchain and Internet of Things Conference, (54-61)
  7. Tchórzewski J, Jakóbik A and Iacono M (2021). An Ann–Based Scalable Hashing Algorithm for Computational Clouds with Schedulers, International Journal of Applied Mathematics and Computer Science, 31:4, (697-712), Online publication date: 1-Dec-2021.
  8. Szaban M (2021). Simple method of selecting totalistic rules for pseudorandom number generator based on nonuniform cellular automaton, The Journal of Supercomputing, 77:10, (11215-11227), Online publication date: 1-Oct-2021.
  9. ACM
    Picek S and Jakobovic D Evolutionary computation and machine learning in cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1089-1118)
  10. Iovane G, Rapuano A and Di Gironimo P Blockchain-Based Iris Authentication in Order to Secure IoT Access and Digital Money Spending Pattern Recognition. ICPR International Workshops and Challenges, (427-441)
  11. Li G, Sun H, Wu P, Zhou Y, Fang X, Li Z, Li J, Huang Y, Wen G and Zhou Z (2021). A Novel TRNG Based on Traditional ADC Nonlinear Effect and Chaotic Map for IoT Security and Anticollision, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  12. Shafique A and Ahmed F (2020). Image Encryption Using Dynamic S-Box Substitution in the Wavelet Domain, Wireless Personal Communications: An International Journal, 115:3, (2243-2268), Online publication date: 1-Dec-2020.
  13. ACM
    Picek S and Jakobovic D Evolutionary computation and machine learning in cryptology Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion, (1147-1173)
  14. ACM
    Ogiela M and Ogiela L Eye Tracking Solutions in Cognitive CAPTCHA Authentication Proceedings of the 2020 12th International Conference on Computer and Automation Engineering, (173-176)
  15. Silva B, Rodrigues J, Canelo F, Lopes I and Lloret J (2019). Towards a cooperative security system for mobile-health applications, Electronic Commerce Research, 19:3, (629-654), Online publication date: 1-Sep-2019.
  16. Lambić D (2019). Security Analysis and Improvement of the Pseudo-random Number Generator Based on Piecewise Logistic Map, Journal of Electronic Testing: Theory and Applications, 35:4, (519-527), Online publication date: 1-Aug-2019.
  17. Noura H, Noura M, Chehab A, Mansour M and Couturier R (2019). Efficient and secure cipher scheme for multimedia contents, Multimedia Tools and Applications, 78:11, (14837-14866), Online publication date: 1-Jun-2019.
  18. ACM
    Christiaanse R Mobility as a Service Companion Proceedings of The 2019 World Wide Web Conference, (83-92)
  19. Dworak K and Boryczka U Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms Intelligent Information and Database Systems, (275-286)
  20. ACM
    Konashevych O and Poblet M Blockchain Anchoring of Public Registries Proceedings of the 12th International Conference on Theory and Practice of Electronic Governance, (317-323)
  21. Nkandeu Y and Tiedeu A (2019). An image encryption algorithm based on substitution technique and chaos mixing, Multimedia Tools and Applications, 78:8, (10013-10034), Online publication date: 1-Apr-2019.
  22. ACM
    Ogiela L and Ogiela M Visual Cognitive CAPTCHA Based on Expert Knowledge Proceedings of the 2019 11th International Conference on Computer and Automation Engineering, (17-20)
  23. Molaei A and Ebrahimzadeh A (2019). Optimal steganography with blind detection based on Bayesian optimization algorithm, Pattern Analysis & Applications, 22:1, (205-219), Online publication date: 1-Feb-2019.
  24. ACM
    Wirachantika W, Barmawi A and Wahyudi B Strengthening fawkescoin against double spending attack using merkle tree Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, (49-54)
  25. Sharma G, Gupta S, Dhall S and Nagpal C (2018). Publicly verifiable watermarking scheme for intellectual property protection using quantum Chaos and bit plane complexity slicing, Multimedia Tools and Applications, 77:24, (31737-31762), Online publication date: 1-Dec-2018.
  26. Farajallah M, Assad S and Deforges O (2018). Cryptanalyzing an image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion, Multimedia Tools and Applications, 77:21, (28225-28248), Online publication date: 1-Nov-2018.
  27. Wadi S and Zainal N (2018). Enhanced hybrid image security algorithms for high definition images in multiple applications, Multidimensional Systems and Signal Processing, 29:4, (1989-2012), Online publication date: 1-Oct-2018.
  28. Sheela S, Suresh K and Tandur D (2018). Image encryption based on modified Henon map using hybrid chaotic shift transform, Multimedia Tools and Applications, 77:19, (25223-25251), Online publication date: 1-Oct-2018.
  29. Hamann M, Krause M, Meier W and Zhang B (2018). Design and analysis of small-state grain-like stream ciphers, Cryptography and Communications, 10:5, (803-834), Online publication date: 1-Sep-2018.
  30. Verstegen A, Verdult R and Bokslag W Hitag 2 hell - brutally optimizing guess-and-determine attacks Proceedings of the 12th USENIX Conference on Offensive Technologies, (14-14)
  31. Ahmad M, Doja M and Beg M (2018). ABC Optimization Based Construction of Strong Substitution-Boxes, Wireless Personal Communications: An International Journal, 101:3, (1715-1729), Online publication date: 1-Aug-2018.
  32. Li C, Luo G and Li C (2018). A parallel image encryption algorithm based on chaotic Duffing oscillators, Multimedia Tools and Applications, 77:15, (19193-19208), Online publication date: 1-Aug-2018.
  33. Ogiela L and Ogiela M (2018). Towards cognitive service management and semantic information sharing in the Cloud, Multimedia Tools and Applications, 77:14, (18625-18635), Online publication date: 1-Jul-2018.
  34. ACM
    Masadeh S, Al-Sewadi H and Al-Husainy M Embedded key cryptosystem for cloud computing applications Proceedings of the 2nd International Conference on Future Networks and Distributed Systems, (1-7)
  35. ACM
    Bel O, Chang K, Bittman D, Long D, Isozaki H and Miller E Inkpack Proceedings of the 11th ACM International Systems and Storage Conference, (89-100)
  36. Ahmed M, Shi H, Chen X, Li Y, Waqas M and Jin D (2018). Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme, IEEE Transactions on Wireless Communications, 17:6, (4118-4133), Online publication date: 1-Jun-2018.
  37. Ogiela M and Ogiela L (2018). Cognitive cryptography techniques for intelligent information management, International Journal of Information Management: The Journal for Information Professionals, 40:C, (21-27), Online publication date: 1-Jun-2018.
  38. Han Q, Zhang Y and Li H (2018). Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things, Future Generation Computer Systems, 83:C, (269-277), Online publication date: 1-Jun-2018.
  39. Gutierrez C, Spafford E, Bagchi S and Yurek T (2018). Reactive redundancy for data destruction protection (R2D2), Computers and Security, 74:C, (184-201), Online publication date: 1-May-2018.
  40. Ramalingam B, Ravichandran D, Annadurai A, Rengarajan A and Rayappan J (2018). Chaos triggered image encryption - a reconfigurable security solution, Multimedia Tools and Applications, 77:10, (11669-11692), Online publication date: 1-May-2018.
  41. Ogiela U, Takizawa M and Ogiela L (2018). Cognitive Approaches for Medicine in Cloud Computing, Journal of Medical Systems, 42:4, (1-5), Online publication date: 1-Apr-2018.
  42. (2018). Efficient deterministic and non-deterministic pseudorandom number generation, Mathematics and Computers in Simulation, 143:C, (114-124), Online publication date: 1-Jan-2018.
  43. Ferrag M, Maglaras L, Argyriou A, Kosmanos D and Janicke H (2018). Security for 4G and 5G cellular networks, Journal of Network and Computer Applications, 101:C, (55-82), Online publication date: 1-Jan-2018.
  44. Kumari S, Das A, Li X, Wu F, Khan M, Jiang Q and Hafizul Islam S (2018). A provably secure biometrics-based authenticated key agreement scheme for multi-server environments, Multimedia Tools and Applications, 77:2, (2359-2389), Online publication date: 1-Jan-2018.
  45. Wu J, Liao X and Yang B (2017). Color image encryption based on chaotic systems and elliptic curve ElGamal scheme, Signal Processing, 141:C, (109-124), Online publication date: 1-Dec-2017.
  46. Ahmad M, Doja M and Beg M (2017). Cryptanalysis and Improvement of an Image Encryption Scheme Using Fourier Series, 3D Research, 8:4, (1-11), Online publication date: 1-Dec-2017.
  47. Irshad A, Kumari S, Li X, Wu F, Chaudhry S and Arshad H (2017). An Improved SIP Authentication Scheme Based on Server-Oriented Biometric Verification, Wireless Personal Communications: An International Journal, 97:2, (2145-2166), Online publication date: 1-Nov-2017.
  48. Dworak K and Boryczka U Genetic Algorithm as Optimization Tool for Differential Cryptanalysis of DES6 Computational Collective Intelligence, (107-116)
  49. ACM
    Picek S Evolutionary computation and cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1066-1093)
  50. Kim M, Jung Y and Song J (2017). A modified exhaustive search on a password system using SHA-1, International Journal of Information Security, 16:3, (263-269), Online publication date: 1-Jun-2017.
  51. ACM
    Anderson J and El-Ghazawi T Hardware Support for Secure Stream Processing in Cloud Environments Proceedings of the Computing Frontiers Conference, (283-286)
  52. (2017). Separable reversible data hiding in encrypted image based on pixel value ordering and additive homomorphism, Journal of Visual Communication and Image Representation, 45:C, (1-10), Online publication date: 1-May-2017.
  53. ACM
    Mansour A, Davis A, Wagner M, Bassous R, Fu H and Zhu Y Multi-asymmetric cryptographic RSA scheme Proceedings of the 12th Annual Conference on Cyber and Information Security Research, (1-8)
  54. Bhasin H and Alam N (2017). Applicability of Cellular Automata in Cryptanalysis, International Journal of Applied Metaheuristic Computing, 8:2, (38-48), Online publication date: 1-Apr-2017.
  55. Ullrich J, Zseby T, Fabini J and Weippl E (2017). Network-Based Secret Communication in Clouds: A Survey, IEEE Communications Surveys & Tutorials, 19:2, (1112-1144), Online publication date: 1-Apr-2017.
  56. Tiloca M, Gehrmann C and Seitz L (2017). On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake, International Journal of Information Security, 16:2, (173-193), Online publication date: 1-Apr-2017.
  57. Dubrova E and Hell M (2017). Espresso, Cryptography and Communications, 9:2, (273-289), Online publication date: 1-Mar-2017.
  58. Jiron I, Soto I, Azurdia-Meza C, Valencia A and Carrasco R (2017). A new DNA cryptosystem based on AG codes evaluated in gaussian channels, Telecommunications Systems, 64:2, (279-291), Online publication date: 1-Feb-2017.
  59. Meenpal T (2017). A light weight and secure video conferencing scheme utilizing public network, Multimedia Tools and Applications, 76:3, (3699-3714), Online publication date: 1-Feb-2017.
  60. Sheela S, Suresh K, Tandur D and Pakniat N (2017). A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding, Journal of Computer Networks and Communications, 2017, Online publication date: 1-Jan-2017.
  61. Krishnamoorthi R and Murali P (2017). A selective image encryption based on square-wave shuffling with orthogonal polynomials transformation suitable for mobile devices, Multimedia Tools and Applications, 76:1, (1217-1246), Online publication date: 1-Jan-2017.
  62. Hsu C, Wang S, Zhang D, Chu H and Lu N (2016). Efficient identity authentication and encryption technique for high throughput RFID system, Security and Communication Networks, 9:15, (2581-2591), Online publication date: 1-Oct-2016.
  63. Pesoshin V, Kuznetsov V and Shirshova D (2016). Generators of the equiprobable pseudorandom nonmaximal-length sequences based on linear-feedback shift registers, Automation and Remote Control, 77:9, (1622-1632), Online publication date: 1-Sep-2016.
  64. Falahati A and Sanandaji N (2016). Nested and interleaved direct sequence spread spectrum to enhance CDMA security and bit error rate performance, International Journal of Communication Systems, 29:12, (1907-1915), Online publication date: 1-Aug-2016.
  65. Wu H, Chang C and Sun C (2016). A secure authentication scheme with provable correctness for pay-TV systems, Security and Communication Networks, 9:11, (1577-1588), Online publication date: 25-Jul-2016.
  66. Manasrah A and Al-Din B (2016). Mapping private keys into one public key using binary matrices and masonic cipher, Security and Communication Networks, 9:11, (1450-1461), Online publication date: 25-Jul-2016.
  67. ACM
    Picek S Evolutionary Computation and Cryptology Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, (883-909)
  68. Kumari S and Om H (2016). Authentication protocol for wireless sensor networks applications like safety monitoring in coal mines, Computer Networks: The International Journal of Computer and Telecommunications Networking, 104:C, (137-154), Online publication date: 20-Jul-2016.
  69. Ogiela L (2016). Cryptographic techniques of strategic data splitting and secure information management, Pervasive and Mobile Computing, 29:C, (130-141), Online publication date: 1-Jul-2016.
  70. Wu X, Yang Z, Ling C and Xia X (2016). Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security, IEEE Transactions on Information Forensics and Security, 11:6, (1278-1290), Online publication date: 1-Jun-2016.
  71. Chidambaram N, Raj P, Thenmozhi K and Amirtharajan R (2016). Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique, International Journal of Digital Multimedia Broadcasting, 2016, (1), Online publication date: 1-May-2016.
  72. Zhao X, Zhu J and Yu H (2016). On More Paradigms of Steganalysis, International Journal of Digital Crime and Forensics, 8:2, (1-15), Online publication date: 1-Apr-2016.
  73. ACM
    Li J, Zheng J and Whitlock P (2016). MaD0, ACM Transactions on Modeling and Computer Simulation, 26:2, (1-19), Online publication date: 28-Jan-2016.
  74. Wang F, Zhou Y and Li D (2015). Dynamic threshold changeable multi-policy secret sharing scheme, Security and Communication Networks, 8:18, (3653-3658), Online publication date: 1-Dec-2015.
  75. Das A, Mishra D and Mukhopadhyay S (2015). An anonymous and secure biometric-based enterprise digital rights management system for mobile environment, Security and Communication Networks, 8:18, (3383-3404), Online publication date: 1-Dec-2015.
  76. ACM
    Stulman A and Stulman A Spraying Techniques for Securing Key Exchange in Large Ad-hoc Networks Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks, (29-34)
  77. Ogiela L (2015). Intelligent techniques for secure financial management in cloud computing, Electronic Commerce Research and Applications, 14:6, (456-464), Online publication date: 1-Oct-2015.
  78. ACM
    Karpate S and Barve A A Novel Encryption Algorithm Using Chaotic Lorenz Attractor and Knights Tour Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, (323-327)
  79. ACM
    Mannan M, Shahkar A, Pirouz A and Rabotka V Peace vs. Privacy Proceedings of the 2015 New Security Paradigms Workshop, (124-136)
  80. ACM
    Osipyan V Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method Proceedings of the 8th International Conference on Security of Information and Networks, (338-341)
  81. Osipyan V Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method Proceedings of the 8th International Conference on Security of Information and Networks, (338-341)
  82. Cui B, Hou T, Long B and Xu L Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language Transactions on Computational Collective Intelligence XIX - Volume 9380, (32-44)
  83. ACM
    Picek S, Miller J, Jakobovic D and Batina L Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, (1457-1458)
  84. ACM
    Felgentreff T, Pape T, Wassermann L, Hirschfeld R and Bolz C Towards reducing the need for algorithmic primitives in dynamic language VMs through a tracing JIT Proceedings of the 10th Workshop on Implementation, Compilation, Optimization of Object-Oriented Languages, Programs and Systems, (1-10)
  85. ACM
    Singh K, Saini P, Rani S and Singh A Authentication and privacy preserving message transfer scheme for vehicular ad hoc networks (VANETs) Proceedings of the 12th ACM International Conference on Computing Frontiers, (1-7)
  86. Tams B, Mihailescu P and Munk A (2015). Security Considerations in Minutiae-Based Fuzzy Vaults, IEEE Transactions on Information Forensics and Security, 10:5, (985-998), Online publication date: 1-May-2015.
  87. Karapiperis D and Verykios V (2015). An LSH-Based Blocking Approach with a Homomorphic Matching Technique for Privacy-Preserving Record Linkage, IEEE Transactions on Knowledge and Data Engineering, 27:4, (909-921), Online publication date: 1-Apr-2015.
  88. Ogiela L (2015). Advanced techniques for knowledge management and access to strategic information, International Journal of Information Management: The Journal for Information Professionals, 35:2, (154-159), Online publication date: 1-Apr-2015.
  89. Chang C, Sun C and Cheng T (2015). A dependable storage service system in cloud environment, Security and Communication Networks, 8:4, (574-588), Online publication date: 10-Mar-2015.
  90. Tsai K (2016). Robust distributed reprogramming protocol of wireless sensor, International Journal of Distributed Sensor Networks, 2015, (4-4), Online publication date: 1-Jan-2015.
  91. Khan W and Gondal M (2014). Key-Dependent Nonlinear Component for Block Cipher Encryption Algorithm, 3D Research, 5:4, (1-8), Online publication date: 1-Dec-2014.
  92. ACM
    Mondal S and Maitra S (2014). Data security-modified AES algorithm and its applications, ACM SIGARCH Computer Architecture News, 42:2, (1-8), Online publication date: 15-Sep-2014.
  93. ACM
    V.O. O Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack Proceedings of the 7th International Conference on Security of Information and Networks, (180-185)
  94. ACM
    Horng S and Tzeng S VANET-based Secure Value-Added Services Proceedings of the 2014 International Conference on Social Computing, (1-4)
  95. Cheong S, Ling H and Teh P (2014). Secure Encrypted Steganography Graphical Password scheme for Near Field Communication smartphone access control system, Expert Systems with Applications: An International Journal, 41:7, (3561-3568), Online publication date: 1-Jun-2014.
  96. (2014). Survey on VANET security challenges and possible cryptographic solutions, Vehicular Communications, 1:2, (53-66), Online publication date: 1-Apr-2014.
  97. ACM
    Tao J, Ma J, Keranen M, Mayo J, Shene C and Wang C RSAvisual Proceedings of the 45th ACM technical symposium on Computer science education, (635-640)
  98. ACM
    Babenko L and Ishchukova E Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis Proceedings of the 6th International Conference on Security of Information and Networks, (352-355)
  99. ACM
    Osipyan V Information protection systems based on universal knapsack problem Proceedings of the 6th International Conference on Security of Information and Networks, (343-346)
  100. ACM
    Dong C, Chen L and Wen Z When private set intersection meets big data Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (789-800)
  101. Zhang X and Wang X (2013). Chaos-based partial encryption of SPIHT coded color images, Signal Processing, 93:9, (2422-2431), Online publication date: 1-Sep-2013.
  102. Behnia S, Akhavan A, Akhshani A and Samsudin A (2013). Image encryption based on the Jacobian elliptic maps, Journal of Systems and Software, 86:9, (2429-2438), Online publication date: 1-Sep-2013.
  103. Verykios V and Christen P (2013). Privacy-preserving record linkage, Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 3:5, (321-332), Online publication date: 1-Sep-2013.
  104. Qiu M, Zhang L, Ming Z, Chen Z, Qin X and Yang L (2013). Security-aware optimization for ubiquitous computing systems with SEAT graph approach, Journal of Computer and System Sciences, 79:5, (518-529), Online publication date: 1-Aug-2013.
  105. Mu N and Liao X An approach for designing neural cryptography Proceedings of the 10th international conference on Advances in Neural Networks - Volume Part I, (99-108)
  106. Gao F, Liu B, Zhang W, Wen Q and Chen H (2013). Is quantum key distribution suitable for steganography?, Quantum Information Processing, 12:1, (625-630), Online publication date: 1-Jan-2013.
  107. Weng L, Darazi R, Preneel B, Macq B and Dooms A Robust image content authentication using perceptual hashing and watermarking Proceedings of the 13th Pacific-Rim conference on Advances in Multimedia Information Processing, (315-326)
  108. ACM
    Parvin S, Hussain F and Hussain O Digital signature-based authentication framework in cognitive radio networks Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, (136-142)
  109. Zheng J and Li J MARC Proceedings of the 5th international conference on Foundations and Practice of Security, (33-44)
  110. Li J and Zheng J MaD2 Proceedings of the 5th international conference on Foundations and Practice of Security, (1-17)
  111. ACM
    Arora D, Aaraj N, Raghunathan A and Jha N (2012). INVISIOS, ACM Transactions on Embedded Computing Systems, 11:3, (1-20), Online publication date: 1-Sep-2012.
  112. Lafkih M, Mikram M, Ghouzali S and El Haziti M Security analysis of key binding biometric cryptosystems Proceedings of the 5th international conference on Image and Signal Processing, (269-281)
  113. Ma C, Wang D, Zhao P and Wang Y A new dynamic ID-Based remote user authentication scheme with forward secrecy Proceedings of the 14th international conference on Web Technologies and Applications, (199-211)
  114. Rogaway P, Wooding M and Zhang H The security of ciphertext stealing Proceedings of the 19th international conference on Fast Software Encryption, (180-195)
  115. ACM
    Tao J, Ma J, Keranen M, Mayo J and Shene C ECvisual Proceedings of the 43rd ACM technical symposium on Computer Science Education, (571-576)
  116. Wang P and Ravishankar C Foisting and stealing of keys in sensor networks Proceedings of the 9th European conference on Wireless Sensor Networks, (49-64)
  117. Trono J (2012). Security enhancements for the additive cryptosystem, Journal of Computing Sciences in Colleges, 27:3, (88-94), Online publication date: 1-Jan-2012.
  118. Vatsalan D, Christen P and Verykios V An efficient two-party protocol for approximate matching in private record linkage Proceedings of the Ninth Australasian Data Mining Conference - Volume 121, (125-136)
  119. Lee J and Hsieh M (2011). An interactive mobile SMS confirmation method using secret sharing technique, Computers and Security, 30:8, (830-839), Online publication date: 1-Nov-2011.
  120. Gorawski M and Siedlecki Z Implementation, optimization and performance tests of privacy preserving mechanisms in homogeneous collaborative association rules mining Proceedings of the 2011th Confederated international conference on On the move to meaningful internet systems - Volume Part I, (347-366)
  121. Tao J, Ma J, Mayo J, Shene C and Keranen M (2011). DESvisual, Journal of Computing Sciences in Colleges, 27:1, (81-89), Online publication date: 1-Oct-2011.
  122. Burak D and Chudzik M Parallelization of the discrete chaotic block encryption algorithm Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part II, (323-332)
  123. Pudovkina M A related-key attack on block ciphers with weak recurrent key schedules Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security, (90-101)
  124. Tounsi W, Cuppens-Boulahia N, Cuppens F and Garcia-Alfaro J Formal verification of a key establishment protocol for EPC gen2 RFID systems Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security, (242-251)
  125. Yoon E and Yoo K (2011). A secure broadcasting cryptosystem and its application to grid computing, Future Generation Computer Systems, 27:5, (620-626), Online publication date: 1-May-2011.
  126. Boja C, Pocatilu P and Zamfiroiu A Secure SMS communications for M-learning services Proceedings of the 5th European conference on European computing conference, (480-484)
  127. Stallings W (2011). Ciphers, WIREs Computational Statistics, 3:3, (239-250), Online publication date: 4-Apr-2011.
  128. Albergante L (2011). Automatic management of forums via artificial immune systems, International Journal of Autonomous and Adaptive Communications Systems, 4:2, (145-163), Online publication date: 1-Apr-2011.
  129. ACM
    Teat C and Peltsverger S The security of cryptographic hashes Proceedings of the 49th annual ACM Southeast Conference, (103-108)
  130. Wei M, Grupp L, Spada F and Swanson S Reliably erasing data from flash-based solid state drives Proceedings of the 9th USENIX conference on File and stroage technologies, (8-8)
  131. Isobe T A single-key attack on the full GOST block cipher Proceedings of the 18th international conference on Fast software encryption, (290-305)
  132. ACM
    Sau S, Pal C and Chakrabarti A Design and implementation of real time secured RS232 link for multiple FPGA communication Proceedings of the 2011 International Conference on Communication, Computing & Security, (391-396)
  133. Bernardini R, Fabbro R and Rinaldo R (2011). Group-based reduction schemes for streaming applications, ISRN Communications and Networking, 2011, (1-10), Online publication date: 1-Jan-2011.
  134. ACM
    Malkani Y, Chalmers D and Wakeman I A framework for secure device pairing by demonstration of physical proximity Proceedings of the 8th International Conference on Frontiers of Information Technology, (1-6)
  135. Allam A and Abbas H (2010). On the improvement of neural cryptography using erroneous transmitted information with error prediction, IEEE Transactions on Neural Networks, 21:12, (1915-1924), Online publication date: 1-Dec-2010.
  136. Lin H, Fei Y, Guan X and Shi Z (2010). Architectural enhancement and system software support for program code integrity monitoring in application-specific instruction-set processors, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:11, (1519-1532), Online publication date: 1-Nov-2010.
  137. ACM
    Schleinzer B and Yoshioka N A security pattern for data integrity in P2P systems Proceedings of the 17th Conference on Pattern Languages of Programs, (1-5)
  138. ACM
    Di Crescenzo G and Zhang T Efficient CRL search in vehicular network PKIS Proceedings of the 6th ACM workshop on Digital identity management, (17-26)
  139. Li C and Lo K Cryptanalysis of an image encryption scheme using cellular automata substitution and SCAN Proceedings of the 11th Pacific Rim conference on Advances in multimedia information processing: Part I, (601-610)
  140. ACM
    Shen C, Nahum E, Schulzrinne H and Wright C The impact of TLS on SIP server performance Principles, Systems and Applications of IP Telecommunications, (59-70)
  141. Chen J, Shieh M and Lin W (2010). A high-performance unified-field reconfigurable cryptographic processor, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 18:8, (1145-1158), Online publication date: 1-Aug-2010.
  142. Dubrova E (2010). Finding matching initial states for equivalent NLFSRs in the Fibonacci and the Galois configurations, IEEE Transactions on Information Theory, 56:6, (2961-2966), Online publication date: 1-Jun-2010.
  143. Lee J, Lin P and Chang C (2010). Lightweight Secure Roaming Mechanism Between GPRS/UMTS and Wireless LANs, Wireless Personal Communications: An International Journal, 53:4, (569-580), Online publication date: 1-Jun-2010.
  144. ACM
    Bulusu S, Arazi B, Arel I, Davis A and Bitar G A data security protocol for the Trusted Truck® system Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, (1-4)
  145. Akram R, Markantonakis K and Mayes K Firewall mechanism in a user centric smart card ownership model Proceedings of the 9th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Application, (118-132)
  146. Backes W and Cordasco J MoteAODV – an AODV implementation for TinyOS 2.0 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices, (154-169)
  147. ACM
    Hyytiä E, Gojmerac I, Teofili S and Bianchi G Key escrow schemes with sliding window for privacy-aware anomaly detection system Proceedings of the 2010 EDBT/ICDT Workshops, (1-8)
  148. Xiao S, Gong W and Towsley D Secure wireless communication with dynamic secrets Proceedings of the 29th conference on Information communications, (1568-1576)
  149. Wang L, Liang J, Naiguang Z, Jinhui X and Peiyu G A content authentication method for digital television Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 1, (445-447)
  150. Weng L and Preneel B From image hashing to video hashing Proceedings of the 16th international conference on Advances in Multimedia Modeling, (662-668)
  151. Weir J and Yan W Secure masks for visual cryptography Transactions on data hiding and multimedia security V, (106-128)
  152. Wong K, Carter G and Dawson E An analysis of the RC4 family of stream ciphers against algebraic attacks Proceedings of the Eighth Australasian Conference on Information Security - Volume 105, (67-74)
  153. Rjoub A, Mousameh M and Koufopavlou O (2010). Full custom low-power/high performance DDP-based Cobra-H64 cipher, Computers and Electrical Engineering, 36:1, (88-99), Online publication date: 1-Jan-2010.
  154. Stefan D Hardware framework for the rabbit stream cipher Proceedings of the 5th international conference on Information security and cryptology, (230-247)
  155. Yin R, Yuan J, Yang Q, Shan X and Wang X Gemstone Proceedings of the 5th international conference on Information security and cryptology, (198-214)
  156. Amirtharajan R and Balaguru R Tri-layer stego for enhanced security Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications, (217-222)
  157. ACM
    Tootoonchian A, Saroiu S, Ganjali Y and Wolman A Lockr Proceedings of the 5th international conference on Emerging networking experiments and technologies, (169-180)
  158. Hassan A, Hasan Y, Al-Hamadi A, Wahab M and Michaelis B A novel public key self-embedding fragile watermarking technique for image authentication Proceedings of the 16th IEEE international conference on Image processing, (1253-1256)
  159. Dubrova E (2009). A transformation from the Fibonacci to the Galois NLFSRs, IEEE Transactions on Information Theory, 55:11, (5263-5271), Online publication date: 1-Nov-2009.
  160. Muhaya F, Usama M and Khan M Modified AES using chaotic key generator for satellite imagery encryption Proceedings of the 5th international conference on Emerging intelligent computing technology and applications, (1014-1024)
  161. Gergely V and Fehér G Enhancing Progressive Encryption for Scalable Video Streams Proceedings of the 15th Open European Summer School and IFIP TC6.6 Workshop on The Internet of the Future, (51-58)
  162. Salajegheh M, Clark S, Ransford B, Fu K and Juels A CCCP Proceedings of the 18th conference on USENIX security symposium, (215-230)
  163. Deepthi P, Sathidevi P and Lakshmi V (2009). A new hardware efficient stream cipher based on hash functions, International Journal of Communication Networks and Distributed Systems, 3:4, (340-361), Online publication date: 1-Aug-2009.
  164. Serrano M, Meer S, Strassner J, Paoli S, Kerr A and Storni C Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications Proceedings of the 6th International Conference on Autonomic and Trusted Computing, (249-267)
  165. ACM
    Stini M and Mauve M Enabling fair offline trading Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (973-978)
  166. ACM
    Siniagina N, Aleksandrov B and Kochevski P Distributed secret on the basis of the linear correcting codes Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, (1-5)
  167. Watfa M, El-Ghali M and Halabi H (2009). A hybrid security protocol for sensor networks, International Journal of Communication Networks and Distributed Systems, 3:2, (116-145), Online publication date: 1-Jun-2009.
  168. Chang C and Cheng T (2009). An efficient proxy raffle protocol with anonymity-preserving, Computer Standards & Interfaces, 31:4, (772-778), Online publication date: 1-Jun-2009.
  169. Lin S and Liu D (2009). An incentive-based electronic payment scheme for digital content transactions over the Internet, Journal of Network and Computer Applications, 32:3, (589-598), Online publication date: 1-May-2009.
  170. Staab E and Engel T Formalizing Excusableness of Failures in Multi-Agent Systems Agent Computing and Multi-Agent Systems, (122-133)
  171. Dubrova E How to speed-up your NLFSR-based stream cipher Proceedings of the Conference on Design, Automation and Test in Europe, (878-881)
  172. Heather J and Lundin D The Append-Only Web Bulletin Board Formal Aspects in Security and Trust, (242-256)
  173. Han S, Dillon T, Chang E and Tian B (2009). Secure web services using two-way authentication and three-party key establishment for service delivery, Journal of Systems Architecture: the EUROMICRO Journal, 55:4, (233-242), Online publication date: 1-Apr-2009.
  174. ACM
    Narendula R, Miklós Z and Aberer K Towards access control aware P2P data management systems Proceedings of the 2009 EDBT/ICDT Workshops, (10-17)
  175. ACM
    Saroiu S and Wolman A Enabling new mobile applications with location proofs Proceedings of the 10th workshop on Mobile Computing Systems and Applications, (1-6)
  176. Mioc M Simulation study of the functioning of LFSR for grade 4 irreducible polynomials Proceedings of the 8th WSEAS International Conference on Software engineering, parallel and distributed systems, (27-32)
  177. ACM
    Chen R, Hsieh C and Huang Y A new method for intrusion detection on hierarchical wireless sensor networks Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, (238-245)
  178. Lindskog S and Brunstrom A The design and implementation of secure socket SCTP Transactions on Computational Science VI, (180-199)
  179. Cheng C, Wang S and Liang T (2009). The anatomy study of server-initial agreement for general hierarchy wired/wireless networks, Computer Standards & Interfaces, 31:1, (219-226), Online publication date: 1-Jan-2009.
  180. Rahouma K and Nasr K Design of the host guard firewall for network protection Proceedings of the 7th WSEAS international conference on Information security and privacy, (61-72)
  181. ACM
    Atallah M, Bryant E, Korb J and Rice J Binding software to specific native hardware in a VM environment Proceedings of the 1st ACM workshop on Virtual machine security, (45-48)
  182. Mioc M (2008). A complete analyze of using shift registers in cryptosystems for grade 4, 8 and 16 irreducible polynomials, WSEAS Transactions on Computers, 7:10, (1805-1817), Online publication date: 1-Oct-2008.
  183. ACM
    Tootoonchian A, Gollu K, Saroiu S, Ganjali Y and Wolman A Lockr Proceedings of the first workshop on Online social networks, (43-48)
  184. Maximov A and Khovratovich D New State Recovery Attack on RC4 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology, (297-316)
  185. Ricci R and Duerig J Securing the Frisbee multicast disk loader Proceedings of the conference on Cyber security experimentation and test, (1-6)
  186. Seppänen K A fast and secure method for anonymizing packet traffic and call traces Proceedings of the 12th WSEAS international conference on Communications, (340-346)
  187. ACM
    Sharp R, Madhavapeddy A, Want R and Pering T Enhancing web browsing security on public terminals using mobile composition Proceedings of the 6th international conference on Mobile systems, applications, and services, (94-105)
  188. Su S, Cai Y and Shen C The Banknote Anti-forgery System Based on Digital Signature Algorithms Proceedings of the IEEE ISI 2008 PAISI, PACCF, and SOCO international workshops on Intelligence and Security Informatics, (44-49)
  189. Petry A, Soares S, Marchioro G and De Franceschi A A distributed speaker authentication system Proceedings of the WSEAS International Conference on Applied Computing Conference, (262-267)
  190. Toma C, Popa M, Boja C and Vasilache M Secure mobile electronic card used in medical services Proceedings of the WSEAS International Conference on Applied Computing Conference, (124-130)
  191. Petry A, Soares S, Marchioro G and De Franceschi A (2008). Speaker recognition techniques for remote authentication of users in computer networks, WSEAS TRANSACTIONS on SYSTEMS, 7:5, (590-599), Online publication date: 1-May-2008.
  192. ACM
    Kapoor V, Abraham V and Singh R (2008). Elliptic curve cryptography, Ubiquity, 2008:May, (1-8), Online publication date: 1-May-2008.
  193. ACM
    Sasamoto H, Christin N and Hayashi E Undercover Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (183-192)
  194. ACM
    Lenders V, Koukoumidis E, Zhang P and Martonosi M Location-based trust for mobile user-generated content Proceedings of the 9th workshop on Mobile computing systems and applications, (60-64)
  195. ACM
    Chang C, Lee J and Cheng T Security design for three-party encrypted key exchange protocol using smart cards Proceedings of the 2nd international conference on Ubiquitous information management and communication, (329-333)
  196. Aguirre J, Álvarez R, Tortosa L and Zamora A Fast pseudorandom generator based on packed matrices Proceedings of the 6th WSEAS international conference on Information security and privacy, (98-101)
  197. Maximov A On large distributions for linear cryptanalysis Proceedings of the 10th international conference on Information security and cryptology, (89-101)
  198. Maximov A On Large Distributions for Linear Cryptanalysis Information Security and Cryptology - ICISC 2007, (89-101)
  199. Fan C and Huang V Anonymous authentication protocols with credit-based chargeability and fair privacy for mobile communications Proceedings of the Security 2nd international conference on Advances in information and computer security, (412-427)
  200. Lee M and Kim E (2007). A Comprehensive Framework for Enhancing Security in InfiniBand Architecture, IEEE Transactions on Parallel and Distributed Systems, 18:10, (1393-1406), Online publication date: 1-Oct-2007.
  201. Haleem M, Mathur C, Chandramouli R and Subbalakshmi K (2007). Opportunistic Encryption, IEEE Transactions on Dependable and Secure Computing, 4:4, (313-324), Online publication date: 1-Oct-2007.
  202. Ciriani V, De Capitani Di Vimercati S, Foresti S, Jajodia S, Paraboschi S and Samarati P Fragmentation and encryption to enforce privacy in data storage Proceedings of the 12th European conference on Research in Computer Security, (171-186)
  203. Sion R, Bajaj S, Carbunar B and Katzenbeisser S NS2 Proceedings of the 33rd international conference on Very large data bases, (1342-1345)
  204. Kitsos P and Koufopavlou O An FPGA-based implementation of the Pomaranch stream cipher Proceedings of the 3rd international conference on Mobile multimedia communications, (1-4)
  205. Rjoub A, Musameh M and Koufopavlou O An optimal low-power/high performance DDP-based Cobra-H64 cipher Proceedings of the 3rd international conference on Mobile multimedia communications, (1-5)
  206. Izquierdo A, Torres J, Sierra J and Carbonell M Using adaptative encryption for ubiquitous environments Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II, (540-548)
  207. Cao Z, Deng H, Ma Y and Hu P Integrating identity based cryptography with cryptographically generated addresses in mobile IPv6 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II, (514-525)
  208. ACM
    Danjean V, Gillard R, Guelton S, Roch J and Roche T Adaptive loops with kaapi on multicore and grid Proceedings of the 2007 international workshop on Parallel symbolic computation, (33-42)
  209. Adamson G The technologist and internet security and privacy practices Proceedings of the 2nd international conference on Usability and internationalization, (295-304)
  210. ACM
    Singh R, Bhargava P and Kain S (2007). Cell phone cloning, Ubiquity, 2007:July, (1-8), Online publication date: 1-Jul-2007.
  211. ACM
    Antonov P and Antonova V Development of the attack against RSA with low public exponent and related messages Proceedings of the 2007 international conference on Computer systems and technologies, (1-8)
  212. ACM
    Rothe J (2007). Review of "Complexity and Cryptography: An Introduction by John Talbot and Dominic Welsh", Cambridge University Press, 2006, 292 pages, ACM SIGACT News, 38:2, (16-20), Online publication date: 1-Jun-2007.
  213. Arora D, Raghunathan A, Ravi S, Sankaradass M, Jha N and Chakradhar S (2007). Exploring software partitions for fast security processing on a multiprocessor mobile SoC, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 15:6, (699-710), Online publication date: 1-Jun-2007.
  214. Shi-Hui P, Yong-Zhe Z and Hong-Wei Z Construct public key encryption scheme using ergodic matrices over GF(2) Proceedings of the 4th international conference on Theory and applications of models of computation, (181-188)
  215. ACM
    Singh S, Cabraal A, Demosthenous C, Astbrink G and Furlong M Password sharing Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (895-904)
  216. Fei Y and Shi Z Microarchitectural support for program code integrity monitoring in application-specific instruction set processors Proceedings of the conference on Design, automation and test in Europe, (815-820)
  217. Chiang K and Lloyd L A case study of the rustock rootkit and spam bot Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, (10-10)
  218. ACM
    Ansari F and Sathyanath A (2007). STEM, ACM SIGMOBILE Mobile Computing and Communications Review, 11:2, (1-13), Online publication date: 1-Apr-2007.
  219. Potlapally N, Raghunathan A, Ravi S, Jha N and Lee R (2007). Aiding side-channel attacks on cryptographic software with satisfiability-based analysis, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 15:4, (465-470), Online publication date: 1-Apr-2007.
  220. Chang T and Hwang G A processing model for the optimal querying of encrypted XML documents in XQuery Proceedings of the eighteenth conference on Australasian database - Volume 63, (43-51)
  221. Lee J and Chung T (2007). Performance evaluation of distributed multiple home agents with HAHA protocol, International Journal of Network Management, 17:2, (107-115), Online publication date: 1-Mar-2007.
  222. Shi L, Carbunar B and Sion R Conditional E-cash Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, (15-28)
  223. Marković M On secure e-health systems Proceedings of the 2006 CENEX-SDC project international conference on Privacy in Statistical Databases, (360-374)
  224. Wang X, Zhang J and Zhang W Chaotic keystream generator using coupled NDFs with parameter perturbing Proceedings of the 5th international conference on Cryptology and Network Security, (270-285)
  225. Arora D, Ravi S, Raghunathan A and Jha N (2006). Hardware-assisted run-time monitoring for secure program execution on embedded processors, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 14:12, (1295-1308), Online publication date: 1-Dec-2006.
  226. Huang Y, Lin H and Wang T (2006). Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme, Journal of Computer Science and Technology, 21:6, (997-1011), Online publication date: 1-Nov-2006.
  227. ACM
    Cooper A and Martin A Towards an open, trusted digital rights management platform Proceedings of the ACM workshop on Digital rights management, (79-88)
  228. Chandershekarapuram A, Vogiatzis D, Vassilaras S and Yovanof G Architecture framework for device single sign on in personal area networks Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II, (1367-1379)
  229. Haleem M, Mathur C and Subbalakshmi K Joint distributed compression and encryption of correlated data in sensor networks Proceedings of the 2006 IEEE conference on Military communications, (1236-1242)
  230. Yoon E and Yoo K An optimizing authenticated key exchange protocol for self-organizing sensor networks Proceedings of the Third international conference on Ubiquitous Computing Systems, (537-546)
  231. ACM
    Fehér G Enhancing wireless video streaming using lightweight approximate authentication Proceedings of the 2nd ACM international workshop on Quality of service & security for wireless and mobile networks, (9-16)
  232. Gonzalez J and Paxson V Enhancing network intrusion detection with integrated sampling and filtering Proceedings of the 9th international conference on Recent Advances in Intrusion Detection, (272-289)
  233. Manzanares A, Sierra Camara J and Marquez J (2006). On the implementation of security policies with adaptative encryption, Computer Communications, 29:15, (2750-2758), Online publication date: 1-Sep-2006.
  234. Torres J, Sarriegi J, Santos J and Serrano N Managing information systems security Proceedings of the 9th international conference on Information Security, (530-545)
  235. Pan J, Chen T and Chen T A novel key management and access control scheme for mobile agent Proceedings of the 2006 international conference on Intelligent computing: Part II, (334-345)
  236. Sun B, Li C, Wu K and Xiao Y (2006). A lightweight secure protocol for wireless sensor networks, Computer Communications, 29:13-14, (2556-2568), Online publication date: 1-Aug-2006.
  237. Lee S and Cho Y Efficient batch verification for RSA-Type digital signatures in a ubiquitous environment Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing, (336-344)
  238. ACM
    Arora D, Raghunathan A, Ravi S, Sankaradass M, Jha N and Chakradhar S Software architecture exploration for high-performance security processing on a multiprocessor mobile SoC Proceedings of the 43rd annual Design Automation Conference, (496-501)
  239. ACM
    Zhang W, Qian X, Wang Y, Zang B and Zhu C (2006). Optimizing compiler for shared-memory multiple SIMD architecture, ACM SIGPLAN Notices, 41:7, (199-208), Online publication date: 12-Jul-2006.
  240. Craver S An improved asymmetric watermarking system using matrix embedding Proceedings of the 8th international conference on Information hiding, (15-25)
  241. ACM
    Zhang W, Qian X, Wang Y, Zang B and Zhu C Optimizing compiler for shared-memory multiple SIMD architecture Proceedings of the 2006 ACM SIGPLAN/SIGBED conference on Language, compilers, and tool support for embedded systems, (199-208)
  242. Haleem M, Mathur C, Chandramouli R and Subbalakshmi K On optimizing the security-throughput trade-off in wireless networks with adversaries Proceedings of the 4th international conference on Applied Cryptography and Network Security, (448-458)
  243. Chen G, Tan F and Yang D A novel cryptographic scheme based on wavelet neural networks Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III, (326-331)
  244. Yoon E and Yoo K An improved popescu's authenticated key agreement protocol Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V, (276-283)
  245. Lee H Highly reliable synchronous stream cipher system for link encryption Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III, (269-278)
  246. ACM
    Chandramouli R, Bapatla S, Subbalakshmi K and Uma R (2006). Battery power-aware encryption, ACM Transactions on Information and System Security, 9:2, (162-180), Online publication date: 1-May-2006.
  247. Sion R, Atallah M and Prabhakar S (2006). Rights Protection for Discrete Numeric Streams, IEEE Transactions on Knowledge and Data Engineering, 18:5, (699-714), Online publication date: 1-May-2006.
  248. Chaves R, Kuzmanov G, Vassiliadis S and Sousa L Reconfigurable memory based AES co-processor Proceedings of the 20th international conference on Parallel and distributed processing, (192-192)
  249. Bakdi I Towards a secure and practical multifunctional smart card Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, (16-31)
  250. Peng J, He G, Xiong J and Zeng G Trojan horse attack strategy on quantum private communication Proceedings of the Second international conference on Information Security Practice and Experience, (177-186)
  251. Kim S, Park W, Kim S, Ahn S and Han S Integration of a cryptographic file system and access control Proceedings of the 2006 international conference on Intelligence and Security Informatics, (139-151)
  252. ACM
    Tzeng W A secure system for data access based on anonymous authentication and time-dependent hierarchical keys Proceedings of the 2006 ACM Symposium on Information, computer and communications security, (223-230)
  253. Potlapally N, Raghunathan A, Ravi S, Jha N and Lee R Satisfiability-based framework for enabling side-channel attacks on cryptographic software Proceedings of the conference on Design, automation and test in Europe: Designers' forum, (18-23)
  254. Potlapally N, Ravi S, Raghunathan A and Jha N (2006). A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols, IEEE Transactions on Mobile Computing, 5:2, (128-143), Online publication date: 1-Feb-2006.
  255. Li C, Li S, Lou D and Zhang D (2006). On the security of the Yen-Guo's domino signal encryption algorithm (DSEA), Journal of Systems and Software, 79:2, (253-258), Online publication date: 1-Feb-2006.
  256. Kesdogan D and Palmer C (2006). Technical challenges of network anonymity, Computer Communications, 29:3, (306-324), Online publication date: 1-Feb-2006.
  257. Benachenhou L and Pierre S (2006). Protection of a mobile agent with a reference clone, Computer Communications, 29:2, (268-278), Online publication date: 1-Jan-2006.
  258. Yoon E and Yoo K A new simple authenticated key agreement and protected password change protocol Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing, (955-964)
  259. Shen J, Jin X and Zhou C A color image encryption algorithm based on magic cube transformation and modular arithmetic operation Proceedings of the 6th Pacific-Rim conference on Advances in Multimedia Information Processing - Volume Part II, (270-280)
  260. Sun Q and Chang S (2005). A Robust and Secure Media Signature Scheme for JPEG Images, Journal of VLSI Signal Processing Systems, 41:3, (305-317), Online publication date: 1-Nov-2005.
  261. Sudarshan T, Mir R and Vijayalakshmi S DRIL– a flexible architecture for blowfish encryption using dynamic reconfiguration, replication, inner-loop pipelining, loop folding techniques Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture, (625-639)
  262. Benachenhou L and Pierre S A new protocol for protecting a mobile agent using a reference clone Proceedings of the Second international conference on Mobility Aware Technologies and Applications, (364-373)
  263. Li J, Zhu Y, Pan H and Wei D A new public key certificate revocation scheme based on one-way hash chain Proceedings of the 6th international conference on Advances in Web-Age Information Management, (670-675)
  264. ACM
    Hsin W Teaching cryptography to undergraduate students in small liberal art schools Proceedings of the 2nd annual conference on Information security curriculum development, (38-42)
  265. Zou X, Li Q, Sun S and Niu X The research on information hiding based on command sequence of FTP protocol Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III, (1079-1085)
  266. Sklavos N and Koufopavlou O (2005). On the hardware implementation of RIPEMD processor, Computers and Electrical Engineering, 31:6, (361-379), Online publication date: 1-Sep-2005.
  267. Sion R Query execution assurance for outsourced databases Proceedings of the 31st international conference on Very large data bases, (601-612)
  268. Wang Y and Liu R A print-scan resistable digital seal system Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II, (761-770)
  269. Costa R, Leitão M and Verde I Electronic voting Proceedings of the 4th international conference on Electronic Government, (309-316)
  270. Yoon E and Yoo K New Efficient Simple Authenticated Key Agreement Protocol Proceedings of the 11th Annual International Conference on Computing and Combinatorics - Volume 3595, (945-954)
  271. ACM
    Wen J, Zhang M and Li X The study on the application of BAN logic in formal analysis of authentication protocols Proceedings of the 7th international conference on Electronic commerce, (744-747)
  272. ACM
    Liu M, Sun S and Xing M Study on security based on PKI for e-commerce of statistics information system Proceedings of the 7th international conference on Electronic commerce, (729-732)
  273. ACM
    Yu C and Lu C Robust non-interactive zero-knowledge watermarking scheme against cheating prover Proceedings of the 7th workshop on Multimedia and security, (103-110)
  274. ACM
    Koushanfar F, Hong I and Potkonjak M (2005). Behavioral synthesis techniques for intellectual property protection, ACM Transactions on Design Automation of Electronic Systems, 10:3, (523-545), Online publication date: 1-Jul-2005.
  275. Sion R, Atallah M and Prabhakar S (2005). Rights Protection for Categorical Data, IEEE Transactions on Knowledge and Data Engineering, 17:7, (912-926), Online publication date: 1-Jul-2005.
  276. ACM
    But J and Armitage G Implementing encrypted streaming video in a distributed server environment Proceedings of the 2005 ACM SIGCHI International Conference on Advances in computer entertainment technology, (322-325)
  277. Goodrich M, Atallah M and Tamassia R Indexing information for data forensics Proceedings of the Third international conference on Applied Cryptography and Network Security, (206-221)
  278. ACM
    Frikken K, Atallah M and Zhang C Privacy-preserving credit checking Proceedings of the 6th ACM conference on Electronic commerce, (147-154)
  279. Deng S, Zhang L and Xiao D Image encryption scheme based on chaotic neural system Proceedings of the Second international conference on Advances in neural networks - Volume Part II, (868-872)
  280. Zhang W, Peng J, Yang H and Wei P A digital image encryption scheme based on the hybrid of cellular neural network and logistic map Proceedings of the Second international conference on Advances in neural networks - Volume Part II, (860-867)
  281. Li C, Li S, Zhang D and Chen G Chosen-plaintext cryptanalysis of a clipped-neural-network-based chaotic cipher Proceedings of the Second international conference on Advances in neural networks - Volume Part II, (630-636)
  282. Saputra H, Ozturk O, Vijaykrishnan N, Kandemir M and Brooks R A Data-Driven Approach for Embedded Security Proceedings of the IEEE Computer Society Annual Symposium on VLSI: New Frontiers in VLSI Design, (104-109)
  283. Phan R and Goi B On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV, (1065-1074)
  284. Phan R and Goi B On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I, (488-497)
  285. Jiang Y, Lin C, Shen X and Shi M Mutual authentication and key exchange protocols with anonymity property for roaming services Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, (114-125)
  286. Cai L, Yang X and Chen C Architecture of a server-aided signature service (SASS) for mobile networks Proceedings of the 4th international conference on Networking - Volume Part II, (819-826)
  287. Lee M, Kim E and Yousif M Security Enhancement in InfiniBand Architecture Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
  288. Gabrijelčič D, Blaič B and Tasič J (2005). Future active Ip networks security architecture, Computer Communications, 28:6, (688-701), Online publication date: 1-Apr-2005.
  289. ACM
    McNear C and Pettey C A free, readily upgradeable, interactive tool for teaching encryption algorithms Proceedings of the 43rd annual ACM Southeast Conference - Volume 1, (280-285)
  290. ACM
    Kanamori Y, Yoo S and Al-Shurman M A quantum no-key protocol for secure data communication Proceedings of the 43rd annual ACM Southeast Conference - Volume 2, (92-93)
  291. Majeed J Design of secure hardware for ATM networks Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics, (1-9)
  292. Arora D, Ravi S, Raghunathan A and Jha N Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring Proceedings of the conference on Design, Automation and Test in Europe - Volume 1, (178-183)
  293. Yang S, Wolf W, Vijaykrishnan N, Serpanos D and Xie Y Power Attack Resistant Cryptosystem Design Proceedings of the conference on Design, Automation and Test in Europe - Volume 3, (64-69)
  294. Elbaz R, Torres L, Sassatelli G, Guillemin P, Anguille C, Bardouillet M, Buatois C and Rigaud J Hardware Engines for Bus Encryption Proceedings of the conference on Design, Automation and Test in Europe - Volume 3, (40-45)
  295. Ohsaki H and Takai T (2005). ACTAS, Electronic Notes in Theoretical Computer Science (ENTCS), 124:1, (97-111), Online publication date: 2-Mar-2005.
  296. Zúquete A (2005). An efficient high quality random number generator for multi-programmed systems, Journal of Computer Security, 13:2, (243-263), Online publication date: 1-Mar-2005.
  297. Sklavos N and Koufopavlou O (2005). Implementation of the SHA-2 Hash Family Standard Using FPGAs, The Journal of Supercomputing, 31:3, (227-248), Online publication date: 1-Mar-2005.
  298. Atallah M, Frikken K, Goodrich M and Tamassia R Secure biometric authentication for weak computational devices Proceedings of the 9th international conference on Financial Cryptography and Data Security, (357-371)
  299. Frikken K and Atallah M Achieving fairness in private contract negotiation Proceedings of the 9th international conference on Financial Cryptography and Data Security, (270-284)
  300. Maximov A Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers Proceedings of the 12th international conference on Fast Software Encryption, (342-358)
  301. Jochinger D and Pichler F A new pseudo-random generator based on gollmann cascades of baker-register-machines Proceedings of the 10th international conference on Computer Aided Systems Theory, (311-316)
  302. Jackiewicz M and Kuriata E Analysis of non-linear pseudo-noise sequences Enhanced methods in computer security, biometric and artificial intelligence systems, (93-102)
  303. Beletskyy V and Burak D Parallelization of the data encryption standard(DES) algorithm Enhanced methods in computer security, biometric and artificial intelligence systems, (23-33)
  304. Li C, Li S, Chen G, Chen G and Hu L (2005). Cryptanalysis of a new signal security system for multimedia data transmission, EURASIP Journal on Advances in Signal Processing, 2005, (1277-1288), Online publication date: 1-Jan-2005.
  305. ACM
    Scott D, Sharp R, Madhavapeddy A and Upton E (2005). Using visual tags to bypass Bluetooth device discovery, ACM SIGMOBILE Mobile Computing and Communications Review, 9:1, (41-53), Online publication date: 1-Jan-2005.
  306. Li C, Li S, Zhang D and Chen G Cryptanalysis of a chaotic neural network based multimedia encryption scheme Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III, (418-425)
  307. Phan R and Ling H Flaws in generic watermarking protocols based on zero-knowledge proofs Proceedings of the Third international conference on Digital Watermarking, (184-191)
  308. ACM
    Corndorf E, Liang C, Kanter G, Kumar P and Yuen H (2004). Quantum-noise, ACM SIGCOMM Computer Communication Review, 34:5, (21-30), Online publication date: 15-Oct-2004.
  309. ACM
    Schlesinger R A cryptography course for non-mathematicians Proceedings of the 1st annual conference on Information security curriculum development, (94-98)
  310. ACM
    Song J, Wong V and Leung V A framework of secure location service for position-based ad hoc routing Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, (99-106)
  311. ACM
    Hauser C Mobility management meets privacy Proceedings of the second international workshop on Mobility management & wireless access protocols, (122-124)
  312. ACM
    Grimm R and Aichroth P Privacy protection for signed media files Proceedings of the 2004 workshop on Multimedia and security, (93-99)
  313. Sion R, Atallah M and Prabhakar S Resilient rights protection for sensor streams Proceedings of the Thirtieth international conference on Very large data bases - Volume 30, (732-743)
  314. Sieka B, Kshemkalyani A and Singhal M On the Security of Polling Protocols in Peer-to-Peer Systems Proceedings of the Fourth International Conference on Peer-to-Peer Computing, (36-44)
  315. ACM
    Ravi S, Raghunathan A, Kocher P and Hattangady S (2004). Security in embedded systems, ACM Transactions on Embedded Computing Systems, 3:3, (461-491), Online publication date: 1-Aug-2004.
  316. ACM
    Miklau G and Suciu D A formal analysis of information disclosure in data exchange Proceedings of the 2004 ACM SIGMOD international conference on Management of data, (575-586)
  317. ACM
    Kocher P, Lee R, McGraw G, Raghunathan A and Ravi S Security as a new dimension in embedded system design Proceedings of the 41st annual Design Automation Conference, (753-760)
  318. ACM
    Wedde H and Lischka M Role-based access control in ambient and remote space Proceedings of the ninth ACM symposium on Access control models and technologies, (21-30)
  319. ACM
    Branovic I, Giorgi R and Martinelli E (2003). A workload characterization of elliptic curve cryptography methods in embedded environments, ACM SIGARCH Computer Architecture News, 32:3, (27-34), Online publication date: 1-Jun-2004.
  320. Atallah M and Li J Secure outsourcing of sequence comparisons Proceedings of the 4th international conference on Privacy Enhancing Technologies, (63-78)
  321. Craver S, Liu B and Wolf W An implementation of, and attacks on, zero-knowledge watermarking Proceedings of the 6th international conference on Information Hiding, (1-12)
  322. Gupta A, Tung Y and Marsden J (2004). Digital signature, Information and Management, 41:5, (561-575), Online publication date: 1-May-2004.
  323. Sion R Proving Ownership over Categorical Data Proceedings of the 20th International Conference on Data Engineering
  324. ACM
    He L and Zhang N A new signature scheme Proceedings of the 2004 ACM symposium on Applied computing, (807-812)
  325. Simitopoulos D, Tsaftaris S, Boulgouris N, Briassouli A and Strintzis M (2004). Fast watermarking of MPEG-1/2 streams using compressed-domain perceptual embedding and a generalized correlator detector, EURASIP Journal on Advances in Signal Processing, 2004, (1088-1106), Online publication date: 1-Jan-2004.
  326. He D, Sun Q and Tian Q (2004). A secure and robust object-based video authentication system, EURASIP Journal on Advances in Signal Processing, 2004, (2185-2200), Online publication date: 1-Jan-2004.
  327. Burmester M, Magkos E and Chrissikopoulos V (2004). Uncoercible e-Bidding Games, Electronic Commerce Research, 4:1-2, (113-125), Online publication date: 1-Jan-2004.
  328. Beidas R and Zhu J Performance Efficiency of Context-Flow System-on-Chip Platform Proceedings of the 2003 IEEE/ACM international conference on Computer-aided design
  329. Key Management for Encrypted Data Storage in Distributed Systems Proceedings of the Second IEEE International Security in Storage Workshop
  330. ACM
    Frikken K and Atallah M Privacy preserving electronic surveillance Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (45-52)
  331. ACM
    Atallah M, Kerschbaum F and Du W Secure and private sequence comparisons Proceedings of the 2003 ACM workshop on Privacy in the electronic society, (39-44)
  332. ACM
    Nicolakis T, Pizano C, Prumo B and Webb M Protecting digital archives at the Greek Orthodox Archdiocese of America Proceedings of the 3rd ACM workshop on Digital rights management, (13-26)
  333. ACM
    Branovic I, Giorgi R and Martinelli E A workload characterization of elliptic curve cryptography methods in embedded environments Proceedings of the 2003 workshop on MEmory performance: DEaling with Applications , systems and architecture, (27-34)
  334. Premasathian N and Thainimit S Structure free highway toll collection using non-repudiated tickets Proceedings of the 1st international symposium on Information and communication technologies, (341-344)
  335. ACM
    Rafaeli S and Hutchison D (2003). A survey of key management for secure group communication, ACM Computing Surveys, 35:3, (309-329), Online publication date: 1-Sep-2003.
  336. ACM
    Potlapally N, Ravi S, Raghunathan A and Jha N Analyzing the energy consumption of security protocols Proceedings of the 2003 international symposium on Low power electronics and design, (30-35)
  337. ACM
    Ali A Security design for a new local area network AULWLAN Proceedings of the 4th international conference conference on Computer systems and technologies: e-Learning, (19-25)
  338. Kemmerer R and Vigna G Internet security and intrusion detection Proceedings of the 25th International Conference on Software Engineering, (748-749)
  339. ACM
    Atallah M and Lonardi S Authentication of LZ-77 compressed data Proceedings of the 2003 ACM symposium on Applied computing, (282-287)
  340. Raghunathan A, Ravi S, Hattangady S and Quisquater J Securing Mobile Appliances Proceedings of the conference on Design, Automation and Test in Europe - Volume 1
  341. Panato A, Barcelos M and Reis R A Low Device Occupation IP to Implement Rijndael Algorithm Proceedings of the conference on Design, Automation and Test in Europe: Designers' Forum - Volume 2
  342. Cilardo A, Mazzeo A, Romano L, Saggese G and Cattaneo G (2003). A web services based architecture for digital time stamping, Journal of Web Engineering, 2:3, (148-175), Online publication date: 1-Feb-2003.
  343. Ravi S, Raghunathan A and Chakradhar S Embedding Security in Wireless Embedded Systems Proceedings of the 16th International Conference on VLSI Design
  344. Ravi S, Raghunathan A, Quisquater J and Hattangady S Emerging challenges in designing secure mobile appliances Ambient intelligence, (103-127)
  345. Reilly E Password Encyclopedia of Computer Science, (1374-1375)
  346. Kitsos P, Sklavos N, Papadomanolakis K and Koufopavlou O (2003). Hardware Implementation of Bluetooth Security, IEEE Pervasive Computing, 2:1, (21-29), Online publication date: 1-Jan-2003.
  347. Kim H (2003). A Novel Optimal Load Distribution Algorithm for Divisible Loads, Cluster Computing, 6:1, (41-46), Online publication date: 1-Jan-2003.
  348. Sklavos N and Koufopavlou O (2002). Architectures and VLSI Implementations of the AES-Proposal Rijndael, IEEE Transactions on Computers, 51:12, (1454-1459), Online publication date: 1-Dec-2002.
  349. ACM
    Di Pietro R, Mancini L and Jajodia S Efficient and secure keys management for wireless mobile communications Proceedings of the second ACM international workshop on Principles of mobile computing, (66-73)
  350. ACM
    Ravi S, Raghunathan A and Potlapally N Securing wireless data Proceedings of the 15th international symposium on System Synthesis, (195-200)
  351. ACM
    Ravi S, Raghunathan A, Potlapally N and Sankaradass M System design methodologies for a wireless security processing platform Proceedings of the 39th annual Design Automation Conference, (777-782)
  352. ACM
    Fontoura M, Ionescu M and Minsky N Law-governed peer-to-peer auctions Proceedings of the 11th international conference on World Wide Web, (109-116)
  353. Karpoff W Creating a National Lab Shared Storage Infrastructure Proceedings of the 16th International Parallel and Distributed Processing Symposium
  354. Markiewicz M, Lucena C and Cowan D (2002). Taming access control security, Software—Practice & Experience, 32:4, (341-358), Online publication date: 10-Apr-2002.
  355. ACM
    Chu H, Qiao L, Nahrstedt K, Wang H and Jain R (2002). A secure multicast protocol with copyright protection, ACM SIGCOMM Computer Communication Review, 32:2, (42-60), Online publication date: 1-Apr-2002.
  356. Tzeng W (2002). A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, IEEE Transactions on Knowledge and Data Engineering, 14:1, (182-188), Online publication date: 1-Jan-2002.
  357. Martin P (2001). A Hardware Implementation of a Genetic Programming System Using FPGAs and Handel-C, Genetic Programming and Evolvable Machines, 2:4, (317-343), Online publication date: 1-Dec-2001.
  358. ACM
    Peuhkuri M A method to compress and anonymize packet traces Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (257-261)
  359. ACM
    Grimm R Security requirements for internet voting Proceedings of the 2001 workshop on Multimedia and security: new challenges, (56-59)
  360. ACM
    Dawu G and Yi W (2001). On the techniques of enhancing the security of block ciphers, ACM SIGOPS Operating Systems Review, 35:4, (94-96), Online publication date: 1-Oct-2001.
  361. ACM
    Basagni S, Herrin K, Bruschi D and Rosti E Secure pebblenets Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, (156-163)
  362. ACM
    Carlucci Aiello L and Massacci F (2001). Verifying security protocols as planning in logic programming, ACM Transactions on Computational Logic, 2:4, (542-580), Online publication date: 1-Oct-2001.
  363. ACM
    Du W and Atallah M Secure multi-party computation problems and their applications Proceedings of the 2001 workshop on New security paradigms, (13-22)
  364. Silva A, Romão A, Deugo D and Da Silva M (2001). Towards a Reference Model for Surveying Mobile Agent Systems, Autonomous Agents and Multi-Agent Systems, 4:3, (187-231), Online publication date: 1-Sep-2001.
  365. ACM
    Borisov N, Goldberg I and Wagner D Intercepting mobile communications Proceedings of the 7th annual international conference on Mobile computing and networking, (180-189)
  366. Akl S and Bruda S (2001). Improving A Solution's Quality Through Parallel Processing, The Journal of Supercomputing, 19:2, (221-233), Online publication date: 9-Jun-2001.
  367. Szczepański J and Kotulski Z (2001). Pseudorandom Number Generators Based on Chaotic Dynamical Systems, Open Systems & Information Dynamics, 8:2, (137-146), Online publication date: 1-Jun-2001.
  368. ACM
    Robles S, Borrell J, Bigham J, Tokarchuk L and Cuthbert L Design of a trust model for a secure multi-agent marketplace Proceedings of the fifth international conference on Autonomous agents, (77-78)
  369. ACM
    Abadi M and Fournet C (2001). Mobile values, new names, and secure communication, ACM SIGPLAN Notices, 36:3, (104-115), Online publication date: 1-Mar-2001.
  370. ACM
    Abadi M and Fournet C Mobile values, new names, and secure communication Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (104-115)
  371. Fernández-Gómez S, Rodríguez-Andina J and Mandado E Concurrent Error Detection in Block Ciphers Proceedings of the 2000 IEEE International Test Conference
  372. ACM
    Serrano M, Bordawekar R, Midkiff S and Gupta M (2000). Quicksilver, ACM SIGPLAN Notices, 35:10, (66-82), Online publication date: 1-Oct-2000.
  373. ACM
    Serrano M, Bordawekar R, Midkiff S and Gupta M Quicksilver Proceedings of the 15th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, (66-82)
  374. Fast Subword Permutation Instructions Using Omega and Flip Network Stages Proceedings of the 2000 IEEE International Conference on Computer Design: VLSI in Computers & Processors
  375. Devanbu P (2000). Desert Island Column, Automated Software Engineering, 7:3, (305-308), Online publication date: 1-Jul-2000.
  376. ACM
    Faraboschi P, Brown G, Fisher J, Desoli G and Homewood F Lx Proceedings of the 27th annual international symposium on Computer architecture, (203-213)
  377. ACM
    Faraboschi P, Brown G, Fisher J, Desoli G and Homewood F (2000). Lx, ACM SIGARCH Computer Architecture News, 28:2, (203-213), Online publication date: 1-May-2000.
  378. ACM
    Landau S (2000). Technical opinion: designing cryptography for the new century, Communications of the ACM, 43:5, (115-120), Online publication date: 1-May-2000.
  379. ACM
    Zhou J and Deng R (2000). On the validity of digital signatures, ACM SIGCOMM Computer Communication Review, 30:2, (29-34), Online publication date: 1-Apr-2000.
  380. Blake-Wilson S (2000). Information Security, Mathematics, and Public-Key Cryptography, Designs, Codes and Cryptography, 19:2-3, (77-99), Online publication date: 1-Mar-2000.
  381. ACM
    Kim H and Mangione-Smith W Factoring large numbers with programmable hardware Proceedings of the 2000 ACM/SIGDA eighth international symposium on Field programmable gate arrays, (41-48)
  382. Ba S, Whinston A and Zhang H (2000). The Dynamics of the Electronic Market, Information Systems Frontiers, 2:1, (31-40), Online publication date: 11-Jan-2000.
  383. Saxena N, Fernandez-Gomez S, Huang W, Mitra S, Yu S and McCluskey E (2000). Dependable Computing and Online Testing in Adaptive and Configurable Systems, IEEE Design & Test, 17:1, (29-41), Online publication date: 1-Jan-2000.
  384. Kin J, Gupta M and Mangione-Smith W (2000). Filtering Memory References to Increase Energy Efficiency, IEEE Transactions on Computers, 49:1, (1-15), Online publication date: 1-Jan-2000.
  385. Bentley D, Rose G and Whalen T ssmail: Opportunistic Encryption in sendmail Proceedings of the 13th USENIX conference on System administration, (1-8)
  386. Zöllner J Gateways to Overcome Incompatibilities of Security Mechanisms Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
  387. Massacci F Using Walk-SAT and Rel-SAT for cryptographic key search Proceedings of the 16th international joint conference on Artifical intelligence - Volume 1, (290-295)
  388. Praun E, Hoppe H and Finkelstein A Robust mesh watermarking Proceedings of the 26th annual conference on Computer graphics and interactive techniques, (49-56)
  389. ACM
    Lach J, Mangione-Smith W and Potkonjak M Robust FPGA intellectual property protection through multiple small watermarks Proceedings of the 36th annual ACM/IEEE Design Automation Conference, (831-836)
  390. Kastrup B, Bink A and Hoogerbrugge J ConCISe Proceedings of the Seventh Annual IEEE Symposium on Field-Programmable Custom Computing Machines
  391. ACM
    Lach J, Mangione-Smith W and Potkonjak M Signature hiding techniques for FPGA intellectual property protection Proceedings of the 1998 IEEE/ACM international conference on Computer-aided design, (186-189)
  392. ACM
    You C, Zhou J and Lam K (1998). On the efficient implementation of fair non-repudiation, ACM SIGCOMM Computer Communication Review, 28:5, (50-60), Online publication date: 1-Oct-1998.
  393. ACM
    Joye M and Yen S (1998). ID-based secret-key cryptography, ACM SIGOPS Operating Systems Review, 32:4, (33-39), Online publication date: 1-Oct-1998.
  394. O'Gorman L and Rabinovich I (1998). Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography, IEEE Transactions on Pattern Analysis and Machine Intelligence, 20:10, (1097-1102), Online publication date: 1-Oct-1998.
  395. Tygar J Atomicity versus Anonymity Proceedings of the 24rd International Conference on Very Large Data Bases, (1-12)
  396. ACM
    Kahng A, Mantik S, Markov I, Potkonjak M, Tucker P, Wang H and Wolfe G Robust IP watermarking methodologies for physical design Proceedings of the 35th annual Design Automation Conference, (782-787)
  397. Blaum M, Bruck J, Rubin K and Lenth W (1998). A Coding Approach for Detection of Tampering in Write-Once Optical Disks, IEEE Transactions on Computers, 47:1, (120-125), Online publication date: 1-Jan-1998.
  398. Lee C, Potkonjak M and Mangione-Smith W MediaBench Proceedings of the 30th annual ACM/IEEE international symposium on Microarchitecture, (330-335)
  399. Al Jabri A (1997). A symmetric version of the McEliece public-key cryptosystem, International Journal of Network Management, 7:6, (316-323), Online publication date: 1-Nov-1997.
  400. Makris L, Argiriou N and Strintzis M Network Access and Data Security Design for Telemedicine Applications Proceedings of the 2nd IEEE Symposium on Computers and Communications (ISCC '97)
  401. Anderson R and Roe M The GCHQ protocol and its problems Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques, (134-148)
  402. ACM
    Oppliger R (1997). Internet security, Communications of the ACM, 40:5, (92-102), Online publication date: 1-May-1997.
  403. ACM
    Abadi M and Gordon A A calculus for cryptographic protocols Proceedings of the 4th ACM conference on Computer and communications security, (36-47)
  404. Abadi M (1997). Explicit Communication Revisited, IEEE Transactions on Software Engineering, 23:3, (185-186), Online publication date: 1-Mar-1997.
  405. Klapper A and Goresky M (1997). Feedback shift registers, 2-adic span, and combiners with memory, Journal of Cryptology, 10:2, (111-147), Online publication date: 1-Mar-1997.
  406. Dole B, Lodin S and Spafford E Misplaced Trust Proceedings of the 1997 Symposium on Network and Distributed System Security
  407. Bellovin S Probable Plaintext Cryptanalysis of the IP Security Protocols Proceedings of the 1997 Symposium on Network and Distributed System Security
  408. Brackin S An Interface Specification Language For Automatically Analyzing Cryptographic Protocols Proceedings of the 1997 Symposium on Network and Distributed System Security
  409. Schaffer T, Glaser A, Rao S and Franzon P A Flip-Chip Implementation of the Data Encryption Standard (DES) Proceedings of the 1997 Conference on IEEE Multi-Chip Module Conference
  410. Atkinson R (1997). Toward a More Secure Internet, Computer, 30:1, (57-61), Online publication date: 1-Jan-1997.
  411. Anderson R and Kuhn M Tamper resistance Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2, (1-1)
  412. ACM
    Tygar J Atomicity in electronic commerce Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing, (8-26)
  413. ACM
    Neumann P (1996). Inside risks, Communications of the ACM, 39:4, (122), Online publication date: 1-Apr-1996.
  414. ACM
    Ganesan R (1996). The Yaksha security system, Communications of the ACM, 39:3, (55-60), Online publication date: 1-Mar-1996.
  415. ACM
    Steiner M, Tsudik G and Waidner M Diffie-Hellman key distribution extended to group communication Proceedings of the 3rd ACM conference on Computer and communications security, (31-37)
  416. ACM
    Baeza-Yates R (1995). Teaching algorithms, ACM SIGACT News, 26:4, (51-59), Online publication date: 1-Dec-1995.
  417. Cox B, Tygar J and Sirbu M NetBill security and transaction protocol Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1, (6-6)
  418. ACM
    Hoffman L, Ali F, Heckler S and Huybrechts A (1994). Cryptography policy, Communications of the ACM, 37:9, (109-117), Online publication date: 1-Sep-1994.
Contributors

Reviews

Ernst L. Leiss

Cryptography is an area of steadily increasing commercial importance in computing, especially in data transmission and storage. Because of its obvious military interest (witness, for instance, that the US government considers cryptographic methods to be “munitions” and attempts to subject them to severe and highly unrealistic export restrictions), few books cover the subject from a practical point of view, and even fewer provide source code for some of the more important algorithms. Schneier's book, now in its second edition, does all this and more. It gives a useful overview of the theory underlying the methods and provides concrete hints that improve security. While much of this could be found elsewhere, it would not be in one place or in as readable a form. Equally important, the book discusses many of the legal and ethical issues surrounding cryptographic methods and schemes, some of which have recently attracted a good deal of public attention, much of it negative (such as the Clipper chip proposal). Finally, the C source code for some algorithms (whose publication in this book is protected by the First Amendment and is thus not subject to export restrictions pertaining to munitions) should prove useful in custom programs. While the book is much too comprehensive to be used as an introduction to cryptography, it should serve nicely as an indispensable encyclopedia on the subject. Moreover, it is written in an accessible style. This second edition incorporates recent information on cryptographic methods and protocols, and more details on key management.

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Recommendations