The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Information Security Applications (wisa)
2008 (conf/wisa/2008)

  1. Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation. [Citation Graph (, )][DBLP]

  2. Template Attacks on ECDSA. [Citation Graph (, )][DBLP]

  3. Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool. [Citation Graph (, )][DBLP]

  4. Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. [Citation Graph (, )][DBLP]

  5. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. [Citation Graph (, )][DBLP]

  6. Securing Layer-2 Path Selection in Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  7. Public Key Authentication with Memory Tokens. [Citation Graph (, )][DBLP]

  8. Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. [Citation Graph (, )][DBLP]

  9. Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. [Citation Graph (, )][DBLP]

  10. Sanitizable and Deletable Signature. [Citation Graph (, )][DBLP]

  11. An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. [Citation Graph (, )][DBLP]

  12. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. [Citation Graph (, )][DBLP]

  13. Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. [Citation Graph (, )][DBLP]

  14. A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. [Citation Graph (, )][DBLP]

  15. A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. [Citation Graph (, )][DBLP]

  16. Image-Feature Based Human Identification Protocols on Limited Display Devices. [Citation Graph (, )][DBLP]

  17. Ternary Subset Difference Method and Its Quantitative Analysis. [Citation Graph (, )][DBLP]

  18. Data Deletion with Provable Security. [Citation Graph (, )][DBLP]

  19. A Probing Attack on AES. [Citation Graph (, )][DBLP]

  20. On Avoiding ZVP-Attacks Using Isogeny Volcanoes. [Citation Graph (, )][DBLP]

  21. Security Analysis of DRBG Using HMAC in NIST SP 800-90. [Citation Graph (, )][DBLP]

  22. Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. [Citation Graph (, )][DBLP]

  23. An Improved Distributed Key Management Scheme in Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  24. Protection Profile for Connected Interoperable DRM Framework. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002