The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2008 (conf/isw/2008)


  1. Property-Based TPM Virtualization. [Citation Graph (, )][DBLP]


  2. A Demonstrative Ad Hoc Attestation System. [Citation Graph (, )][DBLP]


  3. Property-Based Attestation without a Trusted Third Party. [Citation Graph (, )][DBLP]


  4. The Reduced Address Space (RAS) for Application Memory Authentication. [Citation Graph (, )][DBLP]


  5. An Efficient PIR Construction Using Trusted Hardware. [Citation Graph (, )][DBLP]


  6. Athos: Efficient Authentication of Outsourced File Systems. [Citation Graph (, )][DBLP]


  7. BotTracer: Execution-Based Bot-Like Malware Detection. [Citation Graph (, )][DBLP]


  8. Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. [Citation Graph (, )][DBLP]


  9. Distinguishing between FE and DDoS Using Randomness Check. [Citation Graph (, )][DBLP]


  10. Antisocial Networks: Turning a Social Network into a Botnet. [Citation Graph (, )][DBLP]


  11. Compromising Anonymity Using Packet Spinning. [Citation Graph (, )][DBLP]


  12. Behavior-Based Network Access Control: A Proof-of-Concept. [Citation Graph (, )][DBLP]


  13. Path-Based Access Control for Enterprise Networks. [Citation Graph (, )][DBLP]


  14. Cryptanalysis of Rabbit. [Citation Graph (, )][DBLP]


  15. Algebraic Attack on HFE Revisited. [Citation Graph (, )][DBLP]


  16. Revisiting Wiener's Attack - New Weak Keys in RSA. [Citation Graph (, )][DBLP]


  17. Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. [Citation Graph (, )][DBLP]


  18. Proxy Re-signatures in the Standard Model. [Citation Graph (, )][DBLP]


  19. An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. [Citation Graph (, )][DBLP]


  20. Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]


  21. Improved Impossible Differential Attacks on Large-Block Rijndael. [Citation Graph (, )][DBLP]


  22. A Five-Round Algebraic Property of the Advanced Encryption Standard. [Citation Graph (, )][DBLP]


  23. Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. [Citation Graph (, )][DBLP]


  24. Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. [Citation Graph (, )][DBLP]


  25. Collisions for RC4-Hash. [Citation Graph (, )][DBLP]


  26. New Applications of Differential Bounds of the SDS Structure. [Citation Graph (, )][DBLP]


  27. HAPADEP: Human-Assisted Pure Audio Device Pairing. [Citation Graph (, )][DBLP]


  28. One-Time Password Access to Any Server without Changing the Server. [Citation Graph (, )][DBLP]


  29. Can "Something You Know" Be Saved?. [Citation Graph (, )][DBLP]


  30. New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. [Citation Graph (, )][DBLP]


  31. A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. [Citation Graph (, )][DBLP]


  32. Strong Accumulators from Collision-Resistant Hashing. [Citation Graph (, )][DBLP]


  33. A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002