The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Information Security and Cryptology (cisc)
2005 (conf/cisc/2005)

  1. Serge Vaudenay
    On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:1-9 [Conf]
  2. Giovanni Di Crescenzo
    You Can Prove So Many Things in Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:10-27 [Conf]
  3. Rui Zhang 0002, Hideki Imai
    Improvements on Security Proofs of Some Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:28-41 [Conf]
  4. Chunxiang Gu, Yuefei Zhu
    An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:42-52 [Conf]
  5. Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong
    ID-Based Signature Scheme Without Trusted PKG. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:53-62 [Conf]
  6. Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider
    Specifying Authentication Using Signal Events in CSP. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:63-74 [Conf]
  7. Xiaolan Zhang 0003, Brian King
    Modeling RFID Security. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:75-90 [Conf]
  8. Roman Schlegel, Serge Vaudenay
    Enforcing Email Addresses Privacy Using Tokens. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:91-100 [Conf]
  9. Yongdong Wu
    Efficient Authentication of Electronic Document Workflow. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:101-112 [Conf]
  10. Raylin Tso, Takeshi Okamoto, Eiji Okamoto
    Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:113-127 [Conf]
  11. Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang
    Efficient Group Signatures from Bilinear Pairing. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:128-139 [Conf]
  12. Zuhua Shao
    Enhanced Aggregate Signatures from Pairings. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:140-149 [Conf]
  13. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    Constructing Secure Proxy Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:150-161 [Conf]
  14. Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz
    Towards a General RC4-Like Keystream Generator. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:162-174 [Conf]
  15. Peng Wang, Dengguo Feng, Wenling Wu
    HCTR: A Variable-Input-Length Enciphering Mode. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:175-188 [Conf]
  16. Jihong Teng, Shiqu Li, Xiaoying Huang
    The kth-Order Quasi-Generalized Bent Functions over Ring Zp. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:189-201 [Conf]
  17. Shimin Wei, Guolong Chen, Guozhen Xiao
    A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:202-209 [Conf]
  18. Hongda Li, Bao Li
    An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:210-220 [Conf]
  19. Yu Yu, Jussipekka Leiwo, Benjamin Premkumar
    An Improved Secure Two-Party Computation Protocol. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:221-232 [Conf]
  20. Tianjie Cao, Dongdai Lin
    Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:233-241 [Conf]
  21. Fagen Li, Juntao Gao, Yupu Hu
    ID-Based Threshold Unsigncryption Scheme from Pairings. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:242-253 [Conf]
  22. Gil-Jong Mun, Yong-Min Kim, DongKook Kim, BongNam Noh
    Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:254-264 [Conf]
  23. Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon
    The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:265-278 [Conf]
  24. Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim
    Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:279-289 [Conf]
  25. Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu
    Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:290-301 [Conf]
  26. Fei Gao, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu
    An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:302-312 [Conf]
  27. Cheol-Min Park, Myung-Hwan Kim, Moti Yung
    A Remark on Implementing the Weil Pairing. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:313-323 [Conf]
  28. Pradeep Kumar Mishra
    Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:324-335 [Conf]
  29. Jong-Hyuk Roh, Kyoon-Ha Lee
    Key Management for Secure Overlay Multicast. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:336-345 [Conf]
  30. Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song
    Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:346-357 [Conf]
  31. Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn
    Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:358-369 [Conf]
  32. Zhanfei Zhou
    Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:370-383 [Conf]
  33. Wen Ping Ma, Fu Tai Zhang
    New Methods to Construct Cheating Immune Multisecret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:384-394 [Conf]
  34. Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura
    Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:395-406 [Conf]
  35. Hyun-Sun Kang, Chang-Seop Park
    MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:407-418 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002