The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Information Security Applications (wisa)
2003 (conf/wisa/2003)

  1. Kyoil Kim, Jacob A. Abraham, Jayanta Bhadra
    Model Checking of Security Protocols with Pre-configuration. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:1-15 [Conf]
  2. Yoshiaki Shiraishi, Youji Fukuta, Masakatu Morii
    Remote Access VPN with Port Protection Function by Mobile Codes. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:16-26 [Conf]
  3. Sung-Do Chi, Jong Sou Park, Jang-Se Lee
    A Role of DEVS Simulation for Information Assurance. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:27-41 [Conf]
  4. Kwok-Yan Lam, Xi-Bin Zhao, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:42-54 [Conf]
  5. Hyun Suk Lee, Hyeog Man Kwon, Young Ik Eom
    Reliable Cascaded Delegation Scheme for Mobile Agent Environments. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:55-68 [Conf]
  6. SuGil Choi, Kwangjo Kim, ByeongGon Kim
    Practical Solution for Location Privacy in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:69-83 [Conf]
  7. Jin Suk Kim, Hohn Gyu Lee, Sungbo Seo, Keun Ho Ryu
    CTAR: Classification Based on Temporal Class-Association Rules for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:84-96 [Conf]
  8. Ja-Min Koo, Sung-Bae Cho
    Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:97-110 [Conf]
  9. Renaud Bidou, Julien Bourgeois, François Spies
    Towards a Global Security Architecture for Intrusion Detection and Reaction Management. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:111-123 [Conf]
  10. Dae-Sik Choi, Eul-Gyu Im, Cheol Won Lee
    Intrusion-Tolerant System Design for Web Server Survivability. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:124-134 [Conf]
  11. Paulo S. Pagliusi, Chris J. Mitchell
    PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:135-149 [Conf]
  12. Jaehoon Nah, Hyeokchan Kwon, Sungwon Sohn, Cheehang Park, Chimoon Han
    An Automatic Security Evaluation System for IPv6 Network. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:150-161 [Conf]
  13. Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park
    A Location Privacy Protection Mechanism for Smart Space. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:162-173 [Conf]
  14. Byoung-Joon Min, Sung Ki Kim, Joong-Sup Choi
    Secure System Architecture Based on Dynamic Resource Reallocation. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:174-187 [Conf]
  15. Gildas Avoine, Serge Vaudenay
    Optimal Fair Exchange with Guardian Angels. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:188-202 [Conf]
  16. Roman Novak
    Sign-Based Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:203-216 [Conf]
  17. Geun-Sil Song, Mi-Ae Kim, Won-Hyung Lee
    Asymmetric Watermarking Scheme Using Permutation Braids. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:217-226 [Conf]
  18. Johann Großschädl, Guy-Armand Kamendje
    Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2m). [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:227-243 [Conf]
  19. Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan
    Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:244-256 [Conf]
  20. Navapot Prakobpol, Yongyuth Permpoontanalarp
    Multi-dimensional Hash Chain For Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:257-271 [Conf]
  21. Ming Yao, Ernest Foo, Kun Peng, Ed Dawson
    An Improved Forward Integrity Protocol for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:272-285 [Conf]
  22. Ahmad-Reza Sadeghi, Christian Stüble
    Taming "Trusted Platforms" by Operating System Design. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:286-302 [Conf]
  23. Kazuhide Fukushima, Kouichi Sakurai
    A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:303-316 [Conf]
  24. Tomoyuki Asano
    Reducing Storage at Receivers in SD and LSD Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:317-332 [Conf]
  25. Hwanjong Song, Ukil Yang, Kwanghoon Sohn
    3D Face Recognition under Pose Varying Environments. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:333-347 [Conf]
  26. H. Kang, Y. Han, H. Kim, W. Choi, Y. Chung
    An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:348-354 [Conf]
  27. Daesung Moon, Youn-Hee Gil, Dosung Ahn, Sung Bum Pan, Yongwha Chung, Chee-Hang Park
    Fingerprint-Based Authentication for USB Token Systems. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:355-364 [Conf]
  28. Byungjun Son, Gyundo Kee, Yillbyung Lee
    Iris Recognition System Using Wavelet Packet and Support Vector Machines. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:365-379 [Conf]
  29. Hyeonjoon Moon, Jaihie Kim
    Biometrics Identification and Verification Using Projection-Based Face Recognition System. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:380-394 [Conf]
  30. Suyoung Chi, Jaeyeon Lee, Jung Soh, Dohyung Kim, Weongeun Oh, Changhun Kim
    Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:395-409 [Conf]
  31. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    E-MHT. An Efficient Protocol for Certificate Status Checking. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:410-424 [Conf]
  32. Brian King
    A Comment on Group Independent Threshold Sharing. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:425-441 [Conf]
  33. Taekyoung Kwon, Seongan Lim
    Automation-Considered Logic of Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:442-457 [Conf]
  34. Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle
    The MESH Block Ciphers. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:458-473 [Conf]
  35. Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee
    Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:474-488 [Conf]
  36. Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song
    Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:489-503 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002