The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2007 (conf/isw/2007)

  1. Thomas Raffetseder, Christopher Krügel, Engin Kirda
    Detecting System Emulators. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:1-18 [Conf]
  2. Iosif-Viorel Onut, Ali A. Ghorbani
    Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:19-36 [Conf]
  3. Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque
    E-NIPS: An Event-Based Network Intrusion Prediction System. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:37-52 [Conf]
  4. Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg
    Enabling Fairer Digital Rights Management with Trusted Computing. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:53-70 [Conf]
  5. Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
    Traitor Tracing with Optimal Transmission Rate. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:71-88 [Conf]
  6. Debra L. Cook, Moti Yung, Angelos D. Keromytis
    The Security of Elastic Block Ciphers Against Key-Recovery Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:89-103 [Conf]
  7. Jorge Nakahara Jr., Ivan Carlos Pavão
    Impossible-Differential Attacks on Large-Block Rijndael. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:104-117 [Conf]
  8. Akashi Satoh, Takeshi Sugawara, Takafumi Aoki
    High-Speed Pipelined Hardware Architecture for Galois Counter Mode. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:118-129 [Conf]
  9. Mehmet S. Kiraz, Berry Schoenmakers, José Villegas
    Efficient Committed Oblivious Transfer of Bit Strings. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:130-144 [Conf]
  10. Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao
    An Efficient Certified Email Protocol. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:145-157 [Conf]
  11. Alexander W. Dent, Qiang Tang
    Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:158-174 [Conf]
  12. Fabien Laguillaumie, Damien Vergnaud
    On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:175-188 [Conf]
  13. Cheng-Kang Chu, Wen-Guey Tzeng
    Identity-Based Proxy Re-encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:189-202 [Conf]
  14. Sherman S. M. Chow, Kim-Kwang Raymond Choo
    Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:203-220 [Conf]
  15. Yao-Dong Zhao, Wen-Feng Qi
    Small Private-Exponent Attack on RSA with Primes Sharing Bits. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:221-229 [Conf]
  16. Joo Yeon Cho, Josef Pieprzyk
    Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:230-248 [Conf]
  17. Gautham Sekar, Souradyuti Paul, Bart Preneel
    New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:249-262 [Conf]
  18. Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins
    Queue Management as a DoS Counter-Measure? [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:263-280 [Conf]
  19. Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov
    On the Concept of Software Obfuscation in Computer Security. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:281-298 [Conf]
  20. Stephen Drape, Clark D. Thomborson, Anirban Majumdar
    Specifying Imperative Data Obfuscations. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:299-314 [Conf]
  21. Sherman S. M. Chow
    Token-Controlled Public Key Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:315-332 [Conf]
  22. Guilhem Castagnos, Damien Vergnaud
    Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:333-350 [Conf]
  23. Yvo Desmedt, Kaoru Kurosawa
    A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:351-361 [Conf]
  24. Guilhem Castagnos, Benoît Chevallier-Mames
    Towards a DL-Based Additively Homomorphic Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:362-375 [Conf]
  25. Billy Bob Brumley, Kaisa Nyberg
    Differential Properties of Elliptic Curves and Blind Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:376-389 [Conf]
  26. Pradeep Kumar Mishra, Vassil Dimitrov
    Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:390-406 [Conf]
  27. Joachim Biskup, Jan-Hendrik Lochner
    Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:407-422 [Conf]
  28. George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel
    Efficient Negative Databases from Cryptographic Hash Functions. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:423-436 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002