|
Conferences in DBLP
- Kyoil Kim, Jacob A. Abraham, Jayanta Bhadra
Model Checking of Security Protocols with Pre-configuration. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:1-15 [Conf]
- Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii
Remote Access VPN with Port Protection Function by Mobile Codes. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:16-26 [Conf]
- Sung-Do Chi, Jong Sou Park, Jang-Se Lee
A Role of DEVS Simulation for Information Assurance. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:27-41 [Conf]
- Kwok-Yan Lam, Xi-Bin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun
Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:42-54 [Conf]
- Hyun Suk Lee, Hyeog Man Kwon, Young Ik Eom
Reliable Cascaded Delegation Scheme for Mobile Agent Environments. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:55-68 [Conf]
- SuGil Choi, Kwangjo Kim, ByeongGon Kim
Practical Solution for Location Privacy in Mobile IPv6. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:69-83 [Conf]
- Jin Suk Kim, Hohn Gyu Lee, Sungbo Seo, Keun Ho Ryu
CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:84-96 [Conf]
- Ja-Min Koo, Sung-Bae Cho
Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:97-110 [Conf]
- Renaud Bidou, Julien Bourgeois, François Spies
Towards a Global Security Architecture for Intrusion Detection and Reaction Management. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:111-123 [Conf]
- Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee
Intrusion-Tolerant System Design for Web Server Survivability. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:124-134 [Conf]
- Paulo S. Pagliusi, Chris J. Mitchell
PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:135-149 [Conf]
- Jaehoon Nah, Hyeokchan Kwon, Sungwon Sohn, Cheehang Park, Chimoon Han
An Automatic Security Evaluation System for IPv6 Network. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:150-161 [Conf]
- Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park
A Location Privacy Protection Mechanism for Smart Space. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:162-173 [Conf]
- Byoung-Joon Min, Sung Ki Kim, Joong-Sup Choi
Secure System Architecture Based on Dynamic Resource Reallocation. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:174-187 [Conf]
- Gildas Avoine, Serge Vaudenay
Optimal Fair Exchange with Guardian Angels. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:188-202 [Conf]
- Roman Novak
Sign-Based Differential Power Analysis. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:203-216 [Conf]
- Geun-Sil Song, Mi-Ae Kim, Won-Hyung Lee
Asymmetric Watermarking Scheme Using Permutation Braids. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:217-226 [Conf]
- Johann Großschädl, Guy-Armand Kamendje
Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2m). [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:227-243 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:244-256 [Conf]
- Navapot Prakobpol, Yongyuth Permpoontanalarp
Multi-dimensional Hash Chain For Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:257-271 [Conf]
- Ming Yao, Ernest Foo, Kun Peng, Ed Dawson
An Improved Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:272-285 [Conf]
- Ahmad-Reza Sadeghi, Christian Stüble
Taming "Trusted Platforms" by Operating System Design. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:286-302 [Conf]
- Kazuhide Fukushima, Kouichi Sakurai
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:303-316 [Conf]
- Tomoyuki Asano
Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:317-332 [Conf]
- Hwanjong Song, Ukil Yang, Kwanghoon Sohn
3D Face Recognition under Pose Varying Environments. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:333-347 [Conf]
- H. Kang, Y. Han, H. Kim, W. Choi, Y. Chung
An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:348-354 [Conf]
- Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park
Fingerprint-Based Authentication for USB Token Systems. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:355-364 [Conf]
- Byungjun Son, Gyundo Kee, Yillbyung Lee
Iris Recognition System Using Wavelet Packet and Support Vector Machines. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:365-379 [Conf]
- Hyeonjoon Moon, Jaihie Kim
Biometrics Identification and Verification Using Projection-Based Face Recognition System. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:380-394 [Conf]
- Suyoung Chi, Jaeyeon Lee, Jung Soh, Dohyung Kim, Weongeun Oh, Changhun Kim
Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:395-409 [Conf]
- Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
E-MHT. An Efficient Protocol for Certificate Status Checking. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:410-424 [Conf]
- Brian King
A Comment on Group Independent Threshold Sharing. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:425-441 [Conf]
- Taekyoung Kwon, Seongan Lim
Automation-Considered Logic of Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:442-457 [Conf]
- Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle
The MESH Block Ciphers. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:458-473 [Conf]
- Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:474-488 [Conf]
- Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song
Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:489-503 [Conf]
|