The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Information Security Applications (wisa)
2007 (conf/wisa/2007)


  1. Universal etaT Pairing Algorithm over Arbitrary Extension Degree. [Citation Graph (, )][DBLP]


  2. Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. [Citation Graph (, )][DBLP]


  3. Secret Signatures: How to Achieve Business Privacy Efficiently? [Citation Graph (, )][DBLP]


  4. Implementation of BioAPI Conformance Test Suite Using BSP Testing Model. [Citation Graph (, )][DBLP]


  5. Information Hiding in Software with Mixed Boolean-Arithmetic Transforms. [Citation Graph (, )][DBLP]


  6. Geometrically Invariant Image Watermarking in the DWT Domain. [Citation Graph (, )][DBLP]


  7. Implementation of LSM-Based RBAC Module for Embedded System. [Citation Graph (, )][DBLP]


  8. Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. [Citation Graph (, )][DBLP]


  9. A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. [Citation Graph (, )][DBLP]


  10. Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure OS and Virtual Machine. [Citation Graph (, )][DBLP]


  11. An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks. [Citation Graph (, )][DBLP]


  12. Detecting Motifs in System Call Sequences. [Citation Graph (, )][DBLP]


  13. Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. [Citation Graph (, )][DBLP]


  14. Breaking 104 Bit WEP in Less Than 60 Seconds. [Citation Graph (, )][DBLP]


  15. Efficient Implementation of the Pairing on Mobilephones Using BREW. [Citation Graph (, )][DBLP]


  16. Security Analysis of MISTY1. [Citation Graph (, )][DBLP]


  17. A Generic Method for Secure SBox Implementation. [Citation Graph (, )][DBLP]


  18. On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences. [Citation Graph (, )][DBLP]


  19. Authorization Constraints Specification of RBAC. [Citation Graph (, )][DBLP]


  20. Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. [Citation Graph (, )][DBLP]


  21. A Compositional Multiple Policies Operating System Security Model. [Citation Graph (, )][DBLP]


  22. Longer Randomly Blinded RSA Keys May Be Weaker Than Shorter Ones. [Citation Graph (, )][DBLP]


  23. Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. [Citation Graph (, )][DBLP]


  24. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. [Citation Graph (, )][DBLP]


  25. Risk & Distortion Based K-Anonymity. [Citation Graph (, )][DBLP]


  26. Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System. [Citation Graph (, )][DBLP]


  27. ICRep: An Incentive Compatible Reputation Mechanism for P2P Systems. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002