log*-Round Game-Theoretically-Fair Leader Election. | 0 | 0.34 | 2022 |
Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers. | 0 | 0.34 | 2021 |
Proof of No-Work - How to Incentivize Individuals to Stay at Home. | 0 | 0.34 | 2020 |
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. | 0 | 0.34 | 2020 |
A Non-Repudiable Negotiation Protocol For Security Service Level Agreements | 0 | 0.34 | 2015 |
Relations Among Notions Of Privacy For Rfid Authentication Protocols | 6 | 0.49 | 2014 |
Tailored Security: Building Nonrepudiable Security Service-Level Agreements | 6 | 0.53 | 2014 |
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection. | 0 | 0.34 | 2014 |
Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme | 0 | 0.34 | 2014 |
A Forward Privacy Model for RFID Authentication Protocols. | 1 | 0.35 | 2013 |
Risk visualization and alerting system: architecture and proof-of-concept implementation | 7 | 0.50 | 2013 |
Accountable security mechanism based on security service level agreement | 0 | 0.34 | 2013 |
Toward Practical Searchable Symmetric Encryption. | 6 | 0.51 | 2013 |
PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage. | 6 | 0.43 | 2013 |
Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards? | 0 | 0.34 | 2012 |
Fair and consistent hardware evaluation of fourteen round two SHA-3 candidates | 21 | 1.63 | 2012 |
Multifactor authenticated key renewal | 0 | 0.34 | 2011 |
A study on computational formal verification for practical cryptographic protocol: the case of synchronous RFID authentication | 3 | 0.36 | 2011 |
Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII. | 22 | 2.30 | 2010 |
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility. | 0 | 0.34 | 2010 |
Leakage-resilient RFID authentication with forward-privacy | 1 | 0.36 | 2010 |
Leakage resilient strong key-insulated signatures in public channel | 1 | 0.35 | 2010 |
Prototyping platform for performance evaluation of SHA-3 candidates | 9 | 0.89 | 2010 |
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC | 9 | 0.52 | 2010 |
Classification of Hash Functions Suitable for Real-Life Systems | 0 | 0.34 | 2008 |
Efficient Divisible Voting Scheme. | 0 | 0.34 | 2005 |
On Universal Composable Security of Time-Stamping Protocols | 14 | 0.69 | 2005 |
Efficient Divisible Voting Scheme | 0 | 0.34 | 2005 |
Electronic Ticket Scheme For Its | 3 | 0.44 | 2003 |
Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer | 0 | 0.34 | 2003 |
Matching Oblivious Transfer: How To Exchange Valuable Data | 1 | 0.63 | 2003 |