|
Conferences in DBLP
- Thomas Raffetseder, Christopher Krügel, Engin Kirda
Detecting System Emulators. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:1-18 [Conf]
- Iosif-Viorel Onut, Ali A. Ghorbani
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:19-36 [Conf]
- Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque
E-NIPS: An Event-Based Network Intrusion Prediction System. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:37-52 [Conf]
- Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg
Enabling Fairer Digital Rights Management with Trusted Computing. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:53-70 [Conf]
- Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
Traitor Tracing with Optimal Transmission Rate. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:71-88 [Conf]
- Debra L. Cook, Moti Yung, Angelos D. Keromytis
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:89-103 [Conf]
- Jorge Nakahara Jr., Ivan Carlos Pavão
Impossible-Differential Attacks on Large-Block Rijndael. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:104-117 [Conf]
- Akashi Satoh, Takeshi Sugawara, Takafumi Aoki
High-Speed Pipelined Hardware Architecture for Galois Counter Mode. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:118-129 [Conf]
- Mehmet S. Kiraz, Berry Schoenmakers, José Villegas
Efficient Committed Oblivious Transfer of Bit Strings. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:130-144 [Conf]
- Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao
An Efficient Certified Email Protocol. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:145-157 [Conf]
- Alexander W. Dent, Qiang Tang
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:158-174 [Conf]
- Fabien Laguillaumie, Damien Vergnaud
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:175-188 [Conf]
- Cheng-Kang Chu, Wen-Guey Tzeng
Identity-Based Proxy Re-encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:189-202 [Conf]
- Sherman S. M. Chow, Kim-Kwang Raymond Choo
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:203-220 [Conf]
- Yao-Dong Zhao, Wen-Feng Qi
Small Private-Exponent Attack on RSA with Primes Sharing Bits. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:221-229 [Conf]
- Joo Yeon Cho, Josef Pieprzyk
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:230-248 [Conf]
- Gautham Sekar, Souradyuti Paul, Bart Preneel
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:249-262 [Conf]
- Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins
Queue Management as a DoS Counter-Measure? [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:263-280 [Conf]
- Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov
On the Concept of Software Obfuscation in Computer Security. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:281-298 [Conf]
- Stephen Drape, Clark D. Thomborson, Anirban Majumdar
Specifying Imperative Data Obfuscations. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:299-314 [Conf]
- Sherman S. M. Chow
Token-Controlled Public Key Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:315-332 [Conf]
- Guilhem Castagnos, Damien Vergnaud
Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:333-350 [Conf]
- Yvo Desmedt, Kaoru Kurosawa
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:351-361 [Conf]
- Guilhem Castagnos, Benoît Chevallier-Mames
Towards a DL-Based Additively Homomorphic Encryption Scheme. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:362-375 [Conf]
- Billy Bob Brumley, Kaisa Nyberg
Differential Properties of Elliptic Curves and Blind Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:376-389 [Conf]
- Pradeep Kumar Mishra, Vassil Dimitrov
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:390-406 [Conf]
- Joachim Biskup, Jan-Hendrik Lochner
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:407-422 [Conf]
- George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel
Efficient Negative Databases from Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:423-436 [Conf]
|