Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,294 papers from all fields of science
Search
Sign In
Create Free Account
Applied Cryptography and Network Security
ACNS is an annual conference concentrating on current developments that advance the areas of applied cryptography and its application to systems and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Cryptography
List of computer science conferences
List of cryptology conferences
Network security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Applied Cryptography and Network Security
Bart Preneel
,
F. Vercauteren
Lecture Notes in Computer Science
2018
Corpus ID: 47008714
WireGuard (Donenfeld, NDSS 2017) is a recently proposed secure network tunnel operating at layer 3. WireGuard aims to replace…
Expand
2014
2014
Channel Equalization for Side Channel Attacks
C. O'Flynn
,
Z. Chen
IACR Cryptology ePrint Archive
2014
Corpus ID: 11279077
This paper introduces the use of channel equalization as a method of reducing the computational complexity of side channel…
Expand
Review
2012
Review
2012
Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
Acns
,
F. Bao
,
P. Samarati
,
Jianying Zhou
International Conference on Applied Cryptography…
2012
Corpus ID: 58797028
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security…
Expand
Review
2011
Review
2011
Applied cryptography and network security : 9th international conference, ACNS 2011, Nerja, Spain, June 7-10, 2011 : proceedings
Acns
,
Javier Lopez
,
G. Tsudik
2011
Corpus ID: 262295795
This book constitutes the refereed proceedings of the 9th International Conference on Applied Cryptography and Network Security…
Expand
2007
2007
Applied cryptography and network security : 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007 : proceedings
Acns
,
Jonathan Katz
,
M. Yung
2007
Corpus ID: 262295801
Signature Schemes I.- Generic Transformation to Strongly Unforgeable Signatures.- Efficient Generic On-Line/Off-Line Signatures…
Expand
2007
2007
Insider attacks on multi-proxy multi-signature schemes
Lifeng Guo
,
Guilin Wang
Computers & electrical engineering
2007
Corpus ID: 663855
2006
2006
New Media for Teaching Applied Cryptography and Network Security
Ji Hu
,
Dirk Cordel
,
C. Meinel
European Conference on Technology Enhanced…
2006
Corpus ID: 18438091
Considering that security education needs to train students to deal with security problems in real environments, we developed new…
Expand
2006
2006
Applied cryptography and network security : 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings
Acns
,
Jianying Zhou
,
M. Yung
,
F. Bao
2006
Corpus ID: 62533818
Intrusion Avoidance and Detection.- Adaptive Detection of Local Scanners.- Probabilistic Proof of an Algorithm to Compute TCP…
Expand
Review
2006
Review
2006
A secure extension of the Kwak-Moon group signcryption scheme
Dong Jin Kwak
,
S. Moon
,
Guilin Wang
,
R. Deng
Computers & security
2006
Corpus ID: 18424446
2004
2004
Applied cryptography and network security : second International Conference, ACNS 2004, Yellow Mountain, China, June, 8-11, 2004 : proceedings
Acns
,
M. Jakobsson
,
M. Yung
,
Jianying Zhou
2004
Corpus ID: 60931616
Security and Storage.- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap.- Private…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE