|
Conferences in DBLP
- Junghyun Nam, Seungjoo Kim, Dongho Won
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:1-9 [Conf]
- Je Hong Park, Bo Gyeong Kang, Sangwoo Park
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:10-24 [Conf]
- Sourav Mukhopadhyay, Palash Sarkar
Application of LFSRs in Time/Memory Trade-Off Cryptanalysis. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:25-37 [Conf]
- Moon Sun Shin, Kyeong Ja Jeong
An Alert Data Mining Framework for Network-Based Intrusion Detection System. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:38-53 [Conf]
- Urupoj Kanlayasiri, Surasak Sanguanpong
Key Factors Influencing Worm Infection in Enterprise Networks. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:54-67 [Conf]
- Marife G. Ontua, Susan Pancho-Festin
Evaluation of the Unified Modeling Language for Security Requirements Analysis. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:68-80 [Conf]
- Wen-Shenq Juang
A Simple and Efficient Conference Scheme for Mobile Communications. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:81-95 [Conf]
- Kihun Hong, Souhwan Jung, Shyhtsun Felix Wu
A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:96-107 [Conf]
- Christophe Tartary, Huaxiong Wang
Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:108-125 [Conf]
- Minsoo Lee, Sehyun Park, Ohyoung Song
Elastic Security QoS Provisioning for Telematics Applications. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:126-137 [Conf]
- Fei Guo, Jianmin Wang, Zhihao Zhang, Xiaojun Ye, Deyi Li
An Improved Algorithm to Watermark Numeric Relational Data. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:138-149 [Conf]
- Hyun-Ho Kang, Brian M. Kurkoski, Young-Ran Park, Hyejoo Lee, Sanguk Shin, Kazuhiko Yamaguchi, Kingo Kobayashi
Video Fingerprinting System Using Wavelet and Error Correcting Code. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:150-164 [Conf]
- Mitsuo Okada, Hiroaki Kikuchi
Secure Asymmetric Watermark Detection Without Secret of Modified Pixels. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:165-178 [Conf]
- Jin Ho You, Seong Chae Seo, Young Dae Kim, Jun Yong Choi, Sang Jun Lee, Byung Ki Kim
Kimchi: A Binary Rewriting Defense Against Format String Attacks. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:179-193 [Conf]
- Matias Madou, Bertrand Anckaert, Patrick Moseley, Saumya K. Debray, Bjorn De Sutter, Koen De Bosschere
Software Protection Through Dynamic Code Mutation. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:194-206 [Conf]
- Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim
Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:207-217 [Conf]
- Bo-Chao Cheng, Ching-Fu Huang, Wei-Chi Chang, Cheng-Shong Wu
Developing and Implementing IHPM on IXP 425 Network Processor Platforms. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:218-231 [Conf]
- Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:232-242 [Conf]
- Chae Hoon Lim, Tymur Korkishko
mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:243-258 [Conf]
- Katsuyuki Takashima
Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:259-270 [Conf]
- Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung
A DPA Countermeasure by Randomized Frobenius Decomposition. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:271-282 [Conf]
- Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
DPA Attack on the Improved Ha-Moon Algorithm. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:283-291 [Conf]
- Elisabeth Oswald, Kai Schramm
An Efficient Masking Scheme for AES Software Implementations. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:292-305 [Conf]
- Koutarou Suzuki, Makoto Yokoo
Secure Multi-attribute Procurement Auction. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:306-317 [Conf]
- Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim
Oblivious Conjunctive Keyword Search. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:318-327 [Conf]
- Go Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:328-342 [Conf]
- Sejong Oh
New Concept of Authority Range for Flexible Management of Role Hierarchy. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:343-353 [Conf]
- Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim
Role-Based Access Control Model for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:354-363 [Conf]
- Ho Lee, Jung Song
Designing Security Auditing Protocol with Web Browsers. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:364-376 [Conf]
|