The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Information Security Applications (wisa)
2004 (conf/wisa/2004)

  1. Kihun Hong, Souhwan Jung, Luigi Lo Iacono, Christoph Ruland
    Impacts of Security Protocols on Real-Time Multimedia Communications. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:1-13 [Conf]
  2. Young Jae Choi, Soon-Ja Kim
    An Improvement on Privacy and Authentication in GSM. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:14-26 [Conf]
  3. Markku-Juhani Olavi Saarinen
    Encrypted Watermarks and Linux Laptop Security. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:27-38 [Conf]
  4. Chang-Joo Moon, Hoh Peter In
    Inconsistency Detection of Authorization Policies in Distributed Component Environment. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:39-50 [Conf]
  5. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    Custodian-Hiding Verifiable Encryption. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:51-64 [Conf]
  6. Malek Bechlaghem, Vincent Rijmen
    Proving Key Usage. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:65-72 [Conf]
  7. Dong Jin Park, Kihyun Kim, Pil Joong Lee
    Public Key Encryption with Conjunctive Field Keyword Search. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:73-86 [Conf]
  8. Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai
    A Probabilistic Method for Detecting Anomalous Program Behavior. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:87-98 [Conf]
  9. Fernando Godínez, Dieter Hutter, Raul Monroy
    Service Discrimination and Audit File Reduction for Effective Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:99-113 [Conf]
  10. Kwok Ho Law, Lam For Kwok
    IDS False Alarm Filtering Using KNN Classifier. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:114-121 [Conf]
  11. Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, Young-Ho Suh
    Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:122-134 [Conf]
  12. Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai
    Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:135-143 [Conf]
  13. Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo
    Efficient Authenticated Key Agreement Protocol for Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:144-159 [Conf]
  14. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    A Ring Signature Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:160-169 [Conf]
  15. Sherman S. M. Chow
    Verifiable Pairing and Its Applications. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:170-187 [Conf]
  16. Bart Haagdorens, Tim Vermeiren, Marnix Goossens
    Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:188-203 [Conf]
  17. Seok Bong Jeong, Young-Woo Choi, Sehun Kim
    An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:204-210 [Conf]
  18. Yi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun
    Application of Content Computing in Honeyfarm. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:211-222 [Conf]
  19. Cheun Ngen Chong, Bin Ren, Jeroen Doumen, Sandro Etalle, Pieter H. Hartel, Ricardo Corin
    License Protection with a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:223-237 [Conf]
  20. Yinyan Yu, Zhi Tang
    An Adaptive Approach to Hardware Alteration for Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:238-250 [Conf]
  21. Mira Kim, Kazukuni Kobara, Hideki Imai
    Dynamic Fingerprinting over Broadcast Using Revocation Scheme. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:251-263 [Conf]
  22. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:264-277 [Conf]
  23. Sang Cheol Hwang, Dong Hoon Lee, Daewan Han, Jae-Cheol Ryou
    Vulnerability of a Mobile Payment System Proposed at WISA 2002. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:278-285 [Conf]
  24. Sangjin Kim, Heekuck Oh
    Fair Offline Payment Using Verifiable Encryption. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:286-301 [Conf]
  25. Supakorn Kungpisdan, Phu Dung Le, Bala Srinivasan
    A Limited-Used Key Generation Scheme for Internet Transactions. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:302-316 [Conf]
  26. Kishan Chand Gupta, Palash Sarkar
    Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:317-331 [Conf]
  27. Soonhak Kwon
    Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:332-344 [Conf]
  28. Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi
    Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:345-359 [Conf]
  29. Howon Kim, Thomas J. Wollinger, Yongje Choi, Kyoil Chung, Christof Paar
    Hyperelliptic Curve Coprocessors on a FPGA. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:360-374 [Conf]
  30. Kenji Imamoto, Kouichi Sakurai
    Key-Exchange Protocol Using Pre-agreed Session-ID. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:375-387 [Conf]
  31. Gang Yao, Dengguo Feng
    A New k-Anonymous Message Transmission Protocol. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:388-399 [Conf]
  32. Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
    Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:400-410 [Conf]
  33. HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park
    Side Channel Cryptanalysis on SEED. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:411-424 [Conf]
  34. Elena Trichina, Lesya Korkishko
    Secure and Efficient AES Software Implementation for Smart Cards. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:425-439 [Conf]
  35. Christian Rechberger, Elisabeth Oswald
    Practical Template Attacks. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:440-456 [Conf]
  36. Hidema Tanaka, Osamu Takizawa, Akihiro Yamamura
    Evaluation and Improvement of the Tempest Fonts. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:457-469 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002