The SCEAS System
Navigation Menu

Conferences in DBLP

(iwsec)
2007 (conf/iwsec/2007)

  1. Satoshi Hada, Kouichi Sakurai
    A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:1-12 [Conf]
  2. Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda
    Design Issues of an Isolated Sandbox Used to Analyze Malwares. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:13-27 [Conf]
  3. Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii
    Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:28-43 [Conf]
  4. Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi
    Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:44-57 [Conf]
  5. Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda
    Experiments on the Linear Algebra Step in the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:58-73 [Conf]
  6. Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith
    Batch Pairing Delegation. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:74-90 [Conf]
  7. Satoshi Kondo, Naoshi Sato
    Botnet Traffic Detection Techniques by C&C Session Classification Using SVM. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:91-104 [Conf]
  8. Pino Caballero-Gil, C. Caballero-Gil
    A Global Authentication Scheme for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:105-120 [Conf]
  9. Junbeom Hur, Chanil Park, Hyunsoo Yoon
    An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:121-136 [Conf]
  10. Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang
    Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:137-152 [Conf]
  11. Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere
    Run-Time Randomization to Mitigate Tampering. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:153-168 [Conf]
  12. Ibrahim Yakut, Huseyin Polat
    Privacy-Preserving Eigentaste-Based Collaborative Filtering. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:169-184 [Conf]
  13. Alexandre Viejo, Francesc Sebé, Josep Domingo-Ferrer
    Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:185-198 [Conf]
  14. Miroslaw Kutylowski, Filip Zagórski
    Verifiable Internet Voting Solving Secure Platform Problem. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:199-213 [Conf]
  15. Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai
    Enforcement of Integrated Security Policy in Trusted Operating Systems. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:214-229 [Conf]
  16. Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo
    Salvia : A Privacy-Aware Operating System for Prevention of Data Leakage. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:230-245 [Conf]
  17. Koji Kida, Hisashi Sakamoto, Hideo Shimazu, Hiroyuki Tarumi
    InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:246-261 [Conf]
  18. Mohamed Layouni
    Accredited Symmetrically Private Information Retrieval. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:262-277 [Conf]
  19. Qiong Huang, Duncan S. Wong
    Generic Certificateless Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:278-291 [Conf]
  20. Emmanuel Bresson, Mark Manulis, Jörg Schwenk
    On Security Models and Compilers for Group Key Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:292-307 [Conf]
  21. Aivo Jürgenson, Jan Willemson
    Processing Multi-parameter Attacktrees with Estimated Parameter Values. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:308-319 [Conf]
  22. Ahto Buldas, Triinu Mägi
    Practical Security Analysis of E-Voting Systems. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:320-335 [Conf]
  23. Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo
    Fine-Grained Sticky Provenance Architecture for Office Documents. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:336-351 [Conf]
  24. Koji Chida, Osamu Shionoiri, Atsushi Kanai
    Secure Anonymous Communications with Practical Anonymity Revocation Scheme. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:352-364 [Conf]
  25. Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos
    GAS: Overloading a File Sharing Network as an Anonymizing System. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:365-379 [Conf]
  26. Yi Ren, Min Luo, Zukai Tang, Lingqing Ye
    A Composite Privacy Protection Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:380-395 [Conf]
  27. Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu
    Nominative Signature from Ring Signature. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:396-411 [Conf]
  28. Chun-I Fan, Vincent Shi-Ming Huang
    Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:412-427 [Conf]
  29. Kazuhiro Suzuki, Kaoru Kurosawa
    How to Find Many Collisions of 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:428-443 [Conf]
  30. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:444-458 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002