The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
2007 (conf/icics/2007)

  1. Charalampos Papamanthou, Roberto Tamassia
    Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:1-15 [Conf]
  2. Lan Zhou, Willy Susilo, Yi Mu
    New Construction of Group Secret Handshakes Based on Pairings. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:16-30 [Conf]
  3. Zhiguo Wan, Robert H. Deng, Feng Bao, Bart Preneel
    n PAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:31-43 [Conf]
  4. Haimin Jin, Duncan S. Wong, Yinlong Xu
    An Efficient Password-Only Two-Server Authenticated Key Exchange System. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:44-56 [Conf]
  5. Dennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo
    Formal Definition and Construction of Nominative Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:57-68 [Conf]
  6. Xiaohui Liang, Zhenfu Cao, Jun Shao, Huang Lin
    Short Group Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:69-82 [Conf]
  7. Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
    (Convertible) Undeniable Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:83-97 [Conf]
  8. Peishun Wang, Huaxiong Wang, Josef Pieprzyk
    A New Dynamic Accumulator for Batch Updates. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:98-112 [Conf]
  9. Zhengyi Le, Yi Ouyang, Yurong Xu, James Ford, Fillia Makedon
    Preventing Unofficial Information Propagation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:113-125 [Conf]
  10. B. John Oommen, Ebaa Fayyoumi
    A Novel Method for Micro-Aggregation in Secure Statistical Databases Using Association and Interaction. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:126-140 [Conf]
  11. Zhen Li, Xiaojun Ye
    Privacy Protection on Multiple Sensitive Attributes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:141-152 [Conf]
  12. Xiaoming Zhang, Xiong Yin
    Audio Watermarking Algorithm Based on Centroid and Statistical Features. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:153-163 [Conf]
  13. Chin-Chen Chang, Yung-Chen Chou, Tzu-Chuen Lu
    A Semi-blind Watermarking Based on Discrete Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:164-176 [Conf]
  14. Qianli Zhang, Jilong Wang, Xing Li
    On the Design of Fast Prefix-Preserving IP Address Anonymization Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:177-188 [Conf]
  15. Abdulah Abdulah Zadeh
    High Speed Modular Divider Based on GCD Algorithm. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:189-200 [Conf]
  16. Zongwei Zhou, Yibo Xue, Junda Liu, Wei Zhang, Jun Li
    MDH: A High Speed Multi-phase Dynamic Hash String Matching Algorithm for Large-Scale Pattern Set. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:201-215 [Conf]
  17. Babak Zakeri, Mahmoud Salmasizadeh, Amir Moradi, Mahmoud Tabandeh, Mohammad T. Manzuri Shalmani
    Compact and Secure Design of Masked AES S-Box. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:216-229 [Conf]
  18. Zhengjun Cao, Lihua Liu
    Boudot's Range-Bounded Commitment Scheme Revisited. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:230-238 [Conf]
  19. Rui Xue, Dengguo Feng
    Toward Practical Anonymous Rerandomizable RCCA Secure Encryptions. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:239-253 [Conf]
  20. Kun Peng
    Secure Multiparty Computation of DNF. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:254-268 [Conf]
  21. Duo Lei, Chao Li, Keqin Feng
    Square Like Attack on Camellia. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:269-283 [Conf]
  22. Hua Chen, Wenling Wu, Dengguo Feng
    Differential Fault Analysis on CLEFIA. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:284-295 [Conf]
  23. Scott Contini, Krystian Matusiewicz, Josef Pieprzyk
    Extending FORK-256 Attack to the Full Hash Function. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:296-305 [Conf]
  24. Jiqiang Lu
    Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:306-318 [Conf]
  25. David Nowak
    A Framework for Game-Based Security Proofs. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:319-333 [Conf]
  26. Xiaowei Huang, Li Jiao, Weiming Lu
    What Semantic Equivalences Are Suitable for Non-interference Properties in Computer Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:334-349 [Conf]
  27. Masayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta
    Modeling Agreement Problems in the Universal Composability Framework. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:350-361 [Conf]
  28. Patrick Röder, Omid Tafreschi, Fredrik Mellgren, Claudia M. Eckert
    A System Architecture for History-Based Access Control for XML Documents. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:362-374 [Conf]
  29. Mooseop Kim, Jaecheol Ryou
    Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:375-385 [Conf]
  30. Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantzel, Elisa Bertino, Alexei B. Czeksis
    Auth-SL - A System for the Specification and Enforcement of Quality-Based Authentication Policies. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:386-397 [Conf]
  31. Yan Wen, Jinjing Zhao, Huaimin Wang
    A Novel Approach for Untrusted Code Execution. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:398-411 [Conf]
  32. Chang-Hsien Tsai, Shih-Kun Huang
    Detection and Diagnosis of Control Interception. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:412-426 [Conf]
  33. ZhenLiu Zhou, Rongsheng Xu
    BIOS Security Analysis and a Kind of Trusted BIOS. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:427-437 [Conf]
  34. Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou
    Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:438-451 [Conf]
  35. Liying Li, Jianying Zhou, Ning Xiao
    DDoS Attack Detection Algorithms Based on Entropy Computing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:452-466 [Conf]
  36. Ying Qiu, Feng Bao, Jianying Zhou
    Firewall for Dynamic IP Address in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:467-479 [Conf]
  37. James J. Treinen, Ramakrishna Thurimella
    Application of the PageRank Algorithm to Alarm Graphs. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:480-494 [Conf]
  38. Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
    Drive-By Pharming. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:495-506 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002