The SCEAS System
Navigation Menu

Conferences in DBLP

Workshop on Information Security Applications (wisa)
2009 (conf/wisa/2009)

  1. Protecting IPTV Service Network against Malicious Rendezvous Point. [Citation Graph (, )][DBLP]

  2. Design and Implementation of SIP-aware Security Management System. [Citation Graph (, )][DBLP]

  3. Application Management Framework in User Centric Smart Card Ownership Model. [Citation Graph (, )][DBLP]

  4. When Compromised Readers Meet RFID. [Citation Graph (, )][DBLP]

  5. Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? [Citation Graph (, )][DBLP]

  6. Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. [Citation Graph (, )][DBLP]

  7. EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. [Citation Graph (, )][DBLP]

  8. Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. [Citation Graph (, )][DBLP]

  9. Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity. [Citation Graph (, )][DBLP]

  10. Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. [Citation Graph (, )][DBLP]

  11. ID-Based Adaptive Oblivious Transfer. [Citation Graph (, )][DBLP]

  12. Unknown Plaintext Template Attacks. [Citation Graph (, )][DBLP]

  13. On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices. [Citation Graph (, )][DBLP]

  14. You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation. [Citation Graph (, )][DBLP]

  15. A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. [Citation Graph (, )][DBLP]

  16. Finding Collisions for a 45-Step Simplified HAS-V. [Citation Graph (, )][DBLP]

  17. Non-linear Error Detection for Finite State Machines. [Citation Graph (, )][DBLP]

  18. Quadratic Equations from a Kind of S-boxes. [Citation Graph (, )][DBLP]

  19. Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure. [Citation Graph (, )][DBLP]

  20. Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. [Citation Graph (, )][DBLP]

  21. A Selectable k-Times Relaxed Anonymous Authentication Scheme. [Citation Graph (, )][DBLP]

  22. PUF-Based Authentication Protocols - Revisited. [Citation Graph (, )][DBLP]

  23. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. [Citation Graph (, )][DBLP]

  24. Securing Remote Access Inside Wireless Mesh Networks. [Citation Graph (, )][DBLP]

  25. Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. [Citation Graph (, )][DBLP]

  26. USN Middleware Security Model. [Citation Graph (, )][DBLP]

  27. Practical Broadcast Authentication Using Short-Lived Signatures in WSNs. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002