Conferences in DBLP
Kihun Hong , Souhwan Jung , Luigi Lo Iacono , Christoph Ruland Impacts of Security Protocols on Real-Time Multimedia Communications. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:1-13 [Conf ] Young Jae Choi , Soon-Ja Kim An Improvement on Privacy and Authentication in GSM. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:14-26 [Conf ] Markku-Juhani Olavi Saarinen Encrypted Watermarks and Linux Laptop Security. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:27-38 [Conf ] Chang-Joo Moon , Hoh Peter In Inconsistency Detection of Authorization Policies in Distributed Component Environment. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:39-50 [Conf ] Joseph K. Liu , Victor K. Wei , Duncan S. Wong Custodian-Hiding Verifiable Encryption. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:51-64 [Conf ] Malek Bechlaghem , Vincent Rijmen Proving Key Usage. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:65-72 [Conf ] Dong Jin Park , Kihyun Kim , Pil Joong Lee Public Key Encryption with Conjunctive Field Keyword Search. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:73-86 [Conf ] Kohei Tatara , Toshihiro Tabata , Kouichi Sakurai A Probabilistic Method for Detecting Anomalous Program Behavior. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:87-98 [Conf ] Fernando Godínez , Dieter Hutter , Raul Monroy Service Discrimination and Audit File Reduction for Effective Intrusion Detection. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:99-113 [Conf ] Kwok Ho Law , Lam For Kwok IDS False Alarm Filtering Using KNN Classifier. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:114-121 [Conf ] Hae-Yeoun Lee , Jong-Tae Kim , Heung-Kyu Lee , Young-Ho Suh Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:122-134 [Conf ] Manabu Iwanaga , Toshihiro Tabata , Kouichi Sakurai Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:135-143 [Conf ] Kui Ren , Hyunrok Lee , Kwangjo Kim , Taewhan Yoo Efficient Authenticated Key Agreement Protocol for Dynamic Groups. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:144-159 [Conf ] Jing Xu , Zhenfeng Zhang , Dengguo Feng A Ring Signature Scheme Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:160-169 [Conf ] Sherman S. M. Chow Verifiable Pairing and Its Applications. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:170-187 [Conf ] Bart Haagdorens , Tim Vermeiren , Marnix Goossens Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:188-203 [Conf ] Seok Bong Jeong , Young-Woo Choi , Sehun Kim An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:204-210 [Conf ] Yi-Yuan Huang , Kwok-Yan Lam , Siu Leung Chung , Chi-Hung Chi , Jia-Guang Sun Application of Content Computing in Honeyfarm. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:211-222 [Conf ] Cheun Ngen Chong , Bin Ren , Jeroen Doumen , Sandro Etalle , Pieter H. Hartel , Ricardo Corin License Protection with a Tamper-Resistant Token. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:223-237 [Conf ] Yinyan Yu , Zhi Tang An Adaptive Approach to Hardware Alteration for Digital Rights Management. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:238-250 [Conf ] Mira Kim , Kazukuni Kobara , Hideki Imai Dynamic Fingerprinting over Broadcast Using Revocation Scheme. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:251-263 [Conf ] Chong Hee Kim , Yong Ho Hwang , Pil Joong Lee Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:264-277 [Conf ] Sang Cheol Hwang , Dong Hoon Lee , Daewan Han , Jae-Cheol Ryou Vulnerability of a Mobile Payment System Proposed at WISA 2002. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:278-285 [Conf ] Sangjin Kim , Heekuck Oh Fair Offline Payment Using Verifiable Encryption. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:286-301 [Conf ] Supakorn Kungpisdan , Phu Dung Le , Bala Srinivasan A Limited-Used Key Generation Scheme for Internet Transactions. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:302-316 [Conf ] Kishan Chand Gupta , Palash Sarkar Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:317-331 [Conf ] Soonhak Kwon Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn ) Using a Gaussian Normal Basis of Type II. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:332-344 [Conf ] Masanobu Katagi , Izuru Kitamura , Toru Akishita , Tsuyoshi Takagi Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:345-359 [Conf ] Howon Kim , Thomas J. Wollinger , Yongje Choi , Kyoil Chung , Christof Paar Hyperelliptic Curve Coprocessors on a FPGA. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:360-374 [Conf ] Kenji Imamoto , Kouichi Sakurai Key-Exchange Protocol Using Pre-agreed Session-ID. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:375-387 [Conf ] Gang Yao , Dengguo Feng A New k-Anonymous Message Transmission Protocol. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:388-399 [Conf ] Marcin Gomulkiewicz , Marek Klonowski , Miroslaw Kutylowski Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:400-410 [Conf ] HyungSo Yoo , ChangKyun Kim , JaeCheol Ha , Sang-Jae Moon , IlHwan Park Side Channel Cryptanalysis on SEED. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:411-424 [Conf ] Elena Trichina , Lesya Korkishko Secure and Efficient AES Software Implementation for Smart Cards. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:425-439 [Conf ] Christian Rechberger , Elisabeth Oswald Practical Template Attacks. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:440-456 [Conf ] Hidema Tanaka , Osamu Takizawa , Akihiro Yamamura Evaluation and Improvement of the Tempest Fonts. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:457-469 [Conf ]