The SCEAS System
Navigation Menu

Conferences in DBLP

Cryptology and Network Security (cans)
2006 (conf/cans/2006)

  1. Jaimee Brown, Juan Manuel González Nieto, Colin Boyd
    Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:1-18 [Conf]
  2. Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
    Efficient Identity-Based Encryption with Tight Security Reduction. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:19-36 [Conf]
  3. Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee
    A Diffie-Hellman Key Exchange Protocol Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:37-54 [Conf]
  4. Liming Wang, Chuan-Kun Wu
    Authenticated Group Key Agreement for Multicast. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:55-72 [Conf]
  5. Hongsong Shi, Mingxing He, Zhiguang Qin
    Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:73-89 [Conf]
  6. Sven Laur, Kaisa Nyberg
    Efficient Mutual Data Authentication Using Manually Authenticated Strings. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:90-107 [Conf]
  7. Christophe Tartary, Huaxiong Wang
    Achieving Multicast Stream Authentication Using MDS Codes. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:108-125 [Conf]
  8. Sujing Zhou, Dongdai Lin
    Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:126-143 [Conf]
  9. Feng Cao, Zhenfu Cao
    Security Model of Proxy-Multi Signature Schemes. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:144-152 [Conf]
  10. Rongxing Lu, Zhenfu Cao, Xiaolei Dong
    Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:153-167 [Conf]
  11. Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
    Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:168-181 [Conf]
  12. Guan Jie, Zhang Zhongya
    Improved Collision Attack on Reduced Round Camellia. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:182-190 [Conf]
  13. Zbigniew Golebiewski, Miroslaw Kutylowski, Filip Zagórski
    Stealing Secrets with SSL/TLS and SSH - Kleptographic Attacks. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:191-202 [Conf]
  14. Chester Rebeiro, A. David Selvakumar, A. S. L. Devi
    Bitslice Implementation of AES. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:203-212 [Conf]
  15. Jianqin Zhou, Qiang Zheng
    A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3). [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:213-223 [Conf]
  16. Zugen Liu, Lingdi Ping, Jian Chen, Jimin Wang, Xuezeng Pan
    Steganalysis Based on Differential Statistics. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:224-240 [Conf]
  17. Qutaiba Albluwi, Ibrahim Kamel
    Watermarking Essential Data Structures for Copyright Protection. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:241-258 [Conf]
  18. Xiyong Zhang, Hua Guo, Jinjiang Yuan
    A Note of Perfect Nonlinear Functions. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:259-269 [Conf]
  19. Xiaomin Wang, Jiashu Zhang, Wenfang Zhang
    Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:270-285 [Conf]
  20. Nathalie Dagorn
    Cooperative Intrusion Detection for Web Applications. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:286-302 [Conf]
  21. Jianhua Yang, Byong Lee, Yongzhong Zhang
    Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:303-317 [Conf]
  22. Chih-Chiang Wu, Sung-Hua Wen, Nen-Fu Huang
    Smart Architecture for High-Speed Intrusion Detection and Prevention Systems. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:318-328 [Conf]
  23. Xianxian Li, Lijun Liu
    A Multi-agent Cooperative Model and System for Integrated Security Monitoring. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:329-341 [Conf]
  24. Jian Kang, Yuan Zhang, Jiu-bin Ju
    Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:342-353 [Conf]
  25. Jinquan Zeng, XiaoJie Liu, Tao Li, Feixian Sun, Lingxi Peng, Caiming Liu
    An Immune-Based Model for Service Survivability. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:354-363 [Conf]
  26. Lan Yu, Willy Susilo, Reihaneh Safavi-Naini
    X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:364-380 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002