The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Information Security Applications (wisa)
2005 (conf/wisa/2005)

  1. Junghyun Nam, Seungjoo Kim, Dongho Won
    Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:1-9 [Conf]
  2. Je Hong Park, Bo Gyeong Kang, Sangwoo Park
    Cryptanalysis of Some Group-Oriented Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:10-24 [Conf]
  3. Sourav Mukhopadhyay, Palash Sarkar
    Application of LFSRs in Time/Memory Trade-Off Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:25-37 [Conf]
  4. Moon Sun Shin, Kyeong Ja Jeong
    An Alert Data Mining Framework for Network-Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:38-53 [Conf]
  5. Urupoj Kanlayasiri, Surasak Sanguanpong
    Key Factors Influencing Worm Infection in Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:54-67 [Conf]
  6. Marife G. Ontua, Susan Pancho-Festin
    Evaluation of the Unified Modeling Language for Security Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:68-80 [Conf]
  7. Wen-Shenq Juang
    A Simple and Efficient Conference Scheme for Mobile Communications. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:81-95 [Conf]
  8. Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu
    A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:96-107 [Conf]
  9. Christophe Tartary, Huaxiong Wang
    Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:108-125 [Conf]
  10. Minsoo Lee, Sehyun Park, Ohyoung Song
    Elastic Security QoS Provisioning for Telematics Applications. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:126-137 [Conf]
  11. Fei Guo, Jianmin Wang, Zhihao Zhang, Xiaojun Ye, Deyi Li
    An Improved Algorithm to Watermark Numeric Relational Data. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:138-149 [Conf]
  12. Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi
    Video Fingerprinting System Using Wavelet and Error Correcting Code. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:150-164 [Conf]
  13. Mitsuo Okada, Hiroaki Kikuchi
    Secure Asymmetric Watermark Detection Without Secret of Modified Pixels. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:165-178 [Conf]
  14. Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim
    Kimchi: A Binary Rewriting Defense Against Format String Attacks. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:179-193 [Conf]
  15. Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere
    Software Protection Through Dynamic Code Mutation. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:194-206 [Conf]
  16. Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim
    Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:207-217 [Conf]
  17. Bo-Chao Cheng, Ching-Fu Huang, Wei-Chi Chang, Cheng-Shong Wu
    Developing and Implementing IHPM on IXP 425 Network Processor Platforms. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:218-231 [Conf]
  18. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama
    Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:232-242 [Conf]
  19. Chae Hoon Lim, Tymur Korkishko
    mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:243-258 [Conf]
  20. Katsuyuki Takashima
    Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:259-270 [Conf]
  21. Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung
    A DPA Countermeasure by Randomized Frobenius Decomposition. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:271-282 [Conf]
  22. Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
    DPA Attack on the Improved Ha-Moon Algorithm. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:283-291 [Conf]
  23. Elisabeth Oswald, Kai Schramm
    An Efficient Masking Scheme for AES Software Implementations. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:292-305 [Conf]
  24. Koutarou Suzuki, Makoto Yokoo
    Secure Multi-attribute Procurement Auction. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:306-317 [Conf]
  25. Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Oblivious Conjunctive Keyword Search. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:318-327 [Conf]
  26. Go Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama
    Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:328-342 [Conf]
  27. Sejong Oh
    New Concept of Authority Range for Flexible Management of Role Hierarchy. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:343-353 [Conf]
  28. Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim
    Role-Based Access Control Model for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:354-363 [Conf]
  29. Ho Lee, Jung Song
    Designing Security Auditing Protocol with Web Browsers. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:364-376 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002