The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptology and Network Security (cans)
2005 (conf/cans/2005)

  1. Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
    The Second-Preimage Attack on MD4. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:1-12 [Conf]
  2. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    On the Security of Certificateless Signature Schemes from Asiacrypt 2003. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:13-25 [Conf]
  3. Haiyong Bao, Zhenfu Cao, Haifeng Qian
    On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:26-34 [Conf]
  4. Wen Tao Zhu
    Cryptanalysis of Two Group Key Management Protocols for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:35-48 [Conf]
  5. Kyung-Ah Shim, Seung-Hyun Seo
    Security Analysis of Password-Authenticated Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:49-58 [Conf]
  6. Tao Li, XiaoJie Liu, Hongbin Li
    An Immune-Based Model for Computer Virus Detection. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:59-71 [Conf]
  7. Tao Li, XiaoJie Liu, Hongbin Li
    A New Model for Dynamic Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:72-84 [Conf]
  8. Ruo Ando, Yoshiyasu Takefuji
    Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:85-95 [Conf]
  9. Wei Lu, Issa Traoré
    A New Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-Time. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:96-109 [Conf]
  10. Jing Xu, Zhenfeng Zhang, Dengguo Feng
    ID-Based Aggregate Signatures from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:110-119 [Conf]
  11. Zhenjie Huang, Kefei Chen, Yumin Wang
    Efficient Identity-Based Signatures and Blind Signatures. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:120-133 [Conf]
  12. Chong-zhi Gao, Zheng-an Yao
    How to Authenticate Real Time Streams Using Improved Online/Offline Signatures. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:134-146 [Conf]
  13. Eun-Jun Yoon, Kee-Young Yoo
    New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:147-160 [Conf]
  14. Qin Wang, Zhenfu Cao
    Two Proxy Signcryption Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:161-171 [Conf]
  15. Yuan Zhou, Zhenfu Cao, Rongxing Lu
    Constructing Secure Warrant-Based Proxy Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:172-185 [Conf]
  16. Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
    Design and Implementation of an Inline Certified E-mail Service. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:186-199 [Conf]
  17. Zhenfeng Zhang, Jing Xu, Dengguo Feng
    Efficient Identity-Based Protocol for Fair Certified E-mail Delivery. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:200-210 [Conf]
  18. Yuh-Hua Hu, Lih-Chung Wang, Chun-yen Chou, Feipei Lai
    Similar Keys of Multivariate Quadratic Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:211-222 [Conf]
  19. Fanyu Kong, Daxing Li
    A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:223-235 [Conf]
  20. Pin-Hui Ke, Tai-Lin Liu, Qiao-Yan Wen
    Constructions of Almost Resilient Functions. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:236-246 [Conf]
  21. Kun Peng, Ed Dawson, Juanma González Nieto, Eiji Okamoto, Javier Lopez
    A Novel Method to Maintain Privacy in Mobile Agent Applications. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:247-260 [Conf]
  22. Lasse Øverlier, Tønnes Brekne, André Årnes
    Non-expanding Transaction Specific Pseudonymization for IP Traffic Monitoring. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:261-273 [Conf]
  23. Limin Gu, Yanmei Fang, Jiwu Huang
    Revaluation of Error Correcting Coding in Watermarking Channel. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:274-287 [Conf]
  24. Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese
    On the Performance and Analysis of DNS Security Extensions. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:288-303 [Conf]
  25. Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo
    On Securing RTP-Based Streaming Content with Firewalls. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:304-319 [Conf]
  26. Yang Xiang, Wanlei Zhou
    Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:320-333 [Conf]
  27. Xian Zhu, Shaobin Wang, Fan Hong, Junguo Liao
    Distributed Credential Chain Discovery in Trust-Management with Parameterized Roles. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:334-348 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002