Conferences in DBLP
(iwsec) 2007 (conf/iwsec/2007)
Satoshi Hada , Kouichi Sakurai A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:1-12 [Conf ] Shinsuke Miwa , Toshiyuki Miyachi , Masashi Eto , Masashi Yoshizumi , Yoichi Shinoda Design Issues of an Isolated Sandbox Used to Analyze Malwares. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:13-27 [Conf ] Naoki Hayashi , Minoru Kuribayashi , Masakatu Morii Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:28-43 [Conf ] Toshiya Nakajima , Tetsuya Izu , Tsuyoshi Takagi Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:44-57 [Conf ] Kazumaro Aoki , Takeshi Shimoyama , Hiroki Ueda Experiments on the Linear Algebra Step in the Number Field Sieve. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:58-73 [Conf ] Patrick P. Tsang , Sherman S. M. Chow , Sean W. Smith Batch Pairing Delegation. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:74-90 [Conf ] Satoshi Kondo , Naoshi Sato Botnet Traffic Detection Techniques by C&C Session Classification Using SVM. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:91-104 [Conf ] Pino Caballero-Gil , C. Caballero-Gil A Global Authentication Scheme for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:105-120 [Conf ] Junbeom Hur , Chanil Park , Hyunsoo Yoon An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:121-136 [Conf ] Fang-Yie Leu , Kai-Wei Hu , Fuu-Cheng Jiang Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:137-152 [Conf ] Bertrand Anckaert , Mariusz H. Jakubowski , Ramarathnam Venkatesan , Koen De Bosschere Run-Time Randomization to Mitigate Tampering. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:153-168 [Conf ] Ibrahim Yakut , Huseyin Polat Privacy-Preserving Eigentaste-Based Collaborative Filtering. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:169-184 [Conf ] Alexandre Viejo , Francesc Sebé , Josep Domingo-Ferrer Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:185-198 [Conf ] Miroslaw Kutylowski , Filip Zagórski Verifiable Internet Voting Solving Secure Platform Problem. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:199-213 [Conf ] Hyung Chan Kim , R. S. Ramakrishna , Wook Shin , Kouichi Sakurai Enforcement of Integrated Security Policy in Trusted Operating Systems. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:214-229 [Conf ] Kazuhisa Suzuki , Koichi Mouri , Eiji Okubo Salvia : A Privacy-Aware Operating System for Prevention of Data Leakage. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:230-245 [Conf ] Koji Kida , Hisashi Sakamoto , Hideo Shimazu , Hiroyuki Tarumi InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:246-261 [Conf ] Mohamed Layouni Accredited Symmetrically Private Information Retrieval. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:262-277 [Conf ] Qiong Huang , Duncan S. Wong Generic Certificateless Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:278-291 [Conf ] Emmanuel Bresson , Mark Manulis , Jörg Schwenk On Security Models and Compilers for Group Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:292-307 [Conf ] Aivo Jürgenson , Jan Willemson Processing Multi-parameter Attacktrees with Estimated Parameter Values. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:308-319 [Conf ] Ahto Buldas , Triinu Mägi Practical Security Analysis of E-Voting Systems. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:320-335 [Conf ] Takuya Mishina , Sachiko Yoshihama , Michiharu Kudo Fine-Grained Sticky Provenance Architecture for Office Documents. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:336-351 [Conf ] Koji Chida , Osamu Shionoiri , Atsushi Kanai Secure Anonymous Communications with Practical Anonymity Revocation Scheme. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:352-364 [Conf ] Elias Athanasopoulos , Mema Roussopoulos , Kostas G. Anagnostakis , Evangelos P. Markatos GAS: Overloading a File Sharing Network as an Anonymizing System. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:365-379 [Conf ] Yi Ren , Min Luo , Zukai Tang , Lingqing Ye A Composite Privacy Protection Model. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:380-395 [Conf ] Dennis Y. W. Liu , Shuang Chang , Duncan S. Wong , Yi Mu Nominative Signature from Ring Signature. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:396-411 [Conf ] Chun-I Fan , Vincent Shi-Ming Huang Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:412-427 [Conf ] Kazuhiro Suzuki , Kaoru Kurosawa How to Find Many Collisions of 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:428-443 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:444-458 [Conf ]