The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Practice and Experience (ispec)
2009 (conf/ispec/2009)


  1. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Citation Graph (, )][DBLP]


  2. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. [Citation Graph (, )][DBLP]


  3. RSA-Based Certificateless Public Key Encryption. [Citation Graph (, )][DBLP]


  4. Strongly Unforgeable ID-Based Signatures without Random Oracles. [Citation Graph (, )][DBLP]


  5. On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. [Citation Graph (, )][DBLP]


  6. An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. [Citation Graph (, )][DBLP]


  7. Reconstructing a Packed DLL Binary for Static Analysis. [Citation Graph (, )][DBLP]


  8. Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. [Citation Graph (, )][DBLP]


  9. Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge. [Citation Graph (, )][DBLP]


  10. New Constructions for Reusable, Non-erasure and Universally Composable Commitments. [Citation Graph (, )][DBLP]


  11. Certificateless Hybrid Signcryption. [Citation Graph (, )][DBLP]


  12. On Non-representable Secret Sharing Matroids. [Citation Graph (, )][DBLP]


  13. A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization. [Citation Graph (, )][DBLP]


  14. Defending against the Pirate Evolution Attack. [Citation Graph (, )][DBLP]


  15. Security Specification for Conversion Technologies of Heterogeneous DRM Systems. [Citation Graph (, )][DBLP]


  16. Analysing Protocol Implementations. [Citation Graph (, )][DBLP]


  17. Measuring Anonymity. [Citation Graph (, )][DBLP]


  18. A Hybrid E-Voting Scheme. [Citation Graph (, )][DBLP]


  19. A Framework for Authenticated Key Exchange in the Standard Model. [Citation Graph (, )][DBLP]


  20. Secret Handshake: Strong Anonymity Definition and Construction. [Citation Graph (, )][DBLP]


  21. An Extended Authentication and Key Agreement Protocol of UMTS. [Citation Graph (, )][DBLP]


  22. Hash-Based Key Management Schemes for MPEG4-FGS. [Citation Graph (, )][DBLP]


  23. Twister- A Framework for Secure and Fast Hash Functions. [Citation Graph (, )][DBLP]


  24. Preimage Attack on Hash Function RIPEMD. [Citation Graph (, )][DBLP]


  25. Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. [Citation Graph (, )][DBLP]


  26. Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher. [Citation Graph (, )][DBLP]


  27. Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. [Citation Graph (, )][DBLP]


  28. Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. [Citation Graph (, )][DBLP]


  29. On the Correctness of an Approach against Side-Channel Attacks. [Citation Graph (, )][DBLP]


  30. Ranking Attack Graphs with Graph Neural Networks. [Citation Graph (, )][DBLP]


  31. Implementing IDS Management on Lock-Keeper. [Citation Graph (, )][DBLP]


  32. Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. [Citation Graph (, )][DBLP]


  33. Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. [Citation Graph (, )][DBLP]


  34. Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002