Conferences in DBLP
Hongbo Yu , Gaoli Wang , Guoyan Zhang , Xiaoyun Wang The Second-Preimage Attack on MD4. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:1-12 [Conf ] Xinyi Huang , Willy Susilo , Yi Mu , Futai Zhang On the Security of Certificateless Signature Schemes from Asiacrypt 2003. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:13-25 [Conf ] Haiyong Bao , Zhenfu Cao , Haifeng Qian On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:26-34 [Conf ] Wen Tao Zhu Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:35-48 [Conf ] Kyung-Ah Shim , Seung-Hyun Seo Security Analysis of Password-Authenticated Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:49-58 [Conf ] Tao Li , XiaoJie Liu , Hongbin Li An Immune-Based Model for Computer Virus Detection. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:59-71 [Conf ] Tao Li , XiaoJie Liu , Hongbin Li A New Model for Dynamic Intrusion Detection. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:72-84 [Conf ] Ruo Ando , Yoshiyasu Takefuji Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:85-95 [Conf ] Wei Lu , Issa Traoré A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:96-109 [Conf ] Jing Xu , Zhenfeng Zhang , Dengguo Feng ID-Based Aggregate Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:110-119 [Conf ] Zhenjie Huang , Kefei Chen , Yumin Wang Efficient Identity-Based Signatures and Blind Signatures. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:120-133 [Conf ] Chong-zhi Gao , Zheng-an Yao How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:134-146 [Conf ] Eun-Jun Yoon , Kee-Young Yoo New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:147-160 [Conf ] Qin Wang , Zhenfu Cao Two Proxy Signcryption Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:161-171 [Conf ] Yuan Zhou , Zhenfu Cao , Rongxing Lu Constructing Secure Warrant-Based Proxy Signcryption Schemes. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:172-185 [Conf ] Stelvio Cimato , Clemente Galdi , Raffaella Giordano , Barbara Masucci , Gildo Tomasco Design and Implementation of an Inline Certified E-mail Service. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:186-199 [Conf ] Zhenfeng Zhang , Jing Xu , Dengguo Feng Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:200-210 [Conf ] Yuh-Hua Hu , Lih-Chung Wang , Chun-yen Chou , Feipei Lai Similar Keys of Multivariate Quadratic Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:211-222 [Conf ] Fanyu Kong , Daxing Li A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:223-235 [Conf ] Pin-Hui Ke , Tai-Lin Liu , Qiao-Yan Wen Constructions of Almost Resilient Functions. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:236-246 [Conf ] Kun Peng , Ed Dawson , Juanma González Nieto , Eiji Okamoto , Javier Lopez A Novel Method to Maintain Privacy in Mobile Agent Applications. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:247-260 [Conf ] Lasse Øverlier , Tønnes Brekne , André Årnes Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:261-273 [Conf ] Limin Gu , Yanmei Fang , Jiwu Huang Revaluation of Error Correcting Coding in Watermarking Channel. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:274-287 [Conf ] Reza Curtmola , Aniello Del Sorbo , Giuseppe Ateniese On the Performance and Analysis of DNS Security Extensions. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:288-303 [Conf ] Liang Lu , Reihaneh Safavi-Naini , Jeffrey Horton , Willy Susilo On Securing RTP-Based Streaming Content with Firewalls. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:304-319 [Conf ] Yang Xiang , Wanlei Zhou Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:320-333 [Conf ] Xian Zhu , Shaobin Wang , Fan Hong , Junguo Liao Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:334-348 [Conf ]