The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
2009 (conf/icics/2009)


  1. How to Steal a Botnet and What Can Happen When You Do. [Citation Graph (, )][DBLP]


  2. A User-Mode-Kernel-Mode Co-operative Architecture for Trustable Computing. [Citation Graph (, )][DBLP]


  3. Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. [Citation Graph (, )][DBLP]


  4. Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher. [Citation Graph (, )][DBLP]


  5. The rakaposhi Stream Cipher. [Citation Graph (, )][DBLP]


  6. Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes. [Citation Graph (, )][DBLP]


  7. Hardware/Software Co-design of Public-Key Cryptography for SSL Protocol Execution in Embedded Systems. [Citation Graph (, )][DBLP]


  8. Online/Offline Ring Signature Scheme. [Citation Graph (, )][DBLP]


  9. Policy-Controlled Signatures. [Citation Graph (, )][DBLP]


  10. Public Key Encryption without Random Oracle Made Truly Practical. [Citation Graph (, )][DBLP]


  11. A Public-Key Traitor Tracing Scheme with an Optimal Transmission Rate. [Citation Graph (, )][DBLP]


  12. Computationally Secure Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  13. Enabling Secure Secret Updating for Unidirectional Key Distribution in RFID-Enabled Supply Chains. [Citation Graph (, )][DBLP]


  14. Biometric-Based Non-transferable Anonymous Credentials. [Citation Graph (, )][DBLP]


  15. Secure Remote Execution of Sequential Computations. [Citation Graph (, )][DBLP]


  16. Architecture- and OS-Independent Binary-Level Dynamic Test Generation. [Citation Graph (, )][DBLP]


  17. Measuring Information Flow in Reactive Processes. [Citation Graph (, )][DBLP]


  18. Trusted Isolation Environment: An Attestation Architecture with Usage Control Model. [Citation Graph (, )][DBLP]


  19. Denial-of-Service Attacks on Host-Based Generic Unpackers. [Citation Graph (, )][DBLP]


  20. Predictive Pattern Matching for Scalable Network Intrusion Detection. [Citation Graph (, )][DBLP]


  21. Deterministic Finite Automata Characterization for Memory-Based Pattern Matching. [Citation Graph (, )][DBLP]


  22. A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold. [Citation Graph (, )][DBLP]


  23. User-Assisted Host-Based Detection of Outbound Malware Traffic. [Citation Graph (, )][DBLP]


  24. Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence. [Citation Graph (, )][DBLP]


  25. Using the (Open) Solaris Service Management Facility as a Building Block for System Security. [Citation Graph (, )][DBLP]


  26. IntFinder: Automatically Detecting Integer Bugs in x86 Binary Program. [Citation Graph (, )][DBLP]


  27. A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper]. [Citation Graph (, )][DBLP]


  28. Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining. [Citation Graph (, )][DBLP]


  29. GUC-Secure Join Operator in Distributed Relational Database. [Citation Graph (, )][DBLP]


  30. TSM-Trust: A Time-Cognition Based Computational Model for Trust Dynamics. [Citation Graph (, )][DBLP]


  31. Bring Efficient Connotation Expressible Policies to Trust Management. [Citation Graph (, )][DBLP]


  32. A User Trust-Based Collaborative Filtering Recommendation Algorithm. [Citation Graph (, )][DBLP]


  33. Fingerprinting Attack on the Tor Anonymity System. [Citation Graph (, )][DBLP]


  34. Proactive Verifiable Linear Integer Secret Sharing Scheme. [Citation Graph (, )][DBLP]


  35. A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach. [Citation Graph (, )][DBLP]


  36. Digital Audio Watermarking Technique Using Pseudo-Zernike Moments. [Citation Graph (, )][DBLP]


  37. An Image Sanitizing Scheme Using Digital Watermarking. [Citation Graph (, )][DBLP]


  38. Adaptive and Composable Oblivious Transfer Protocols (Short Paper). [Citation Graph (, )][DBLP]


  39. Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002