The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Practice and Experience (ispec)
2010 (conf/ispec/2010)


  1. Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. [Citation Graph (, )][DBLP]


  2. Integral Attacks on Reduced-Round ARIA Block Cipher. [Citation Graph (, )][DBLP]


  3. A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. [Citation Graph (, )][DBLP]


  4. On the Security of NOEKEON against Side Channel Cube Attacks. [Citation Graph (, )][DBLP]


  5. On Fast and Approximate Attack Tree Computations. [Citation Graph (, )][DBLP]


  6. Width-3 Joint Sparse Form. [Citation Graph (, )][DBLP]


  7. Accelerating Inverse of GF(2n) with Precomputation. [Citation Graph (, )][DBLP]


  8. Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis. [Citation Graph (, )][DBLP]


  9. The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups. [Citation Graph (, )][DBLP]


  10. A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. [Citation Graph (, )][DBLP]


  11. Host-Based Security Sensor Integrity in Multiprocessing Environments. [Citation Graph (, )][DBLP]


  12. Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. [Citation Graph (, )][DBLP]


  13. Rate-Based Watermark Traceback: A New Approach. [Citation Graph (, )][DBLP]


  14. Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. [Citation Graph (, )][DBLP]


  15. Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk. [Citation Graph (, )][DBLP]


  16. A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . [Citation Graph (, )][DBLP]


  17. A Trustworthy ID Management Mechanism in Open Market. [Citation Graph (, )][DBLP]


  18. BioID: Biometric-Based Identity Management. [Citation Graph (, )][DBLP]


  19. Privacy Preserving of Trust Management Credentials Based on Trusted Computing. [Citation Graph (, )][DBLP]


  20. Mitigating the Malicious Trust Expansion in Social Network Service. [Citation Graph (, )][DBLP]


  21. An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. [Citation Graph (, )][DBLP]


  22. Certificateless KEM and Hybrid Signcryption Schemes Revisited. [Citation Graph (, )][DBLP]


  23. A Deniable Group Key Establishment Protocol in the Standard Model. [Citation Graph (, )][DBLP]


  24. Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. [Citation Graph (, )][DBLP]


  25. Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis. [Citation Graph (, )][DBLP]


  26. Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. [Citation Graph (, )][DBLP]


  27. Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. [Citation Graph (, )][DBLP]


  28. Protection Profile for Secure E-Voting Systems. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002