Conferences in DBLP
Serge Vaudenay On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:1-9 [Conf ] Giovanni Di Crescenzo You Can Prove So Many Things in Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:10-27 [Conf ] Rui Zhang 0002 , Hideki Imai Improvements on Security Proofs of Some Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:28-41 [Conf ] Chunxiang Gu , Yuefei Zhu An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:42-52 [Conf ] Jian Liao , Junfang Xiao , Yinghao Qi , Peiwei Huang , Mentian Rong ID-Based Signature Scheme Without Trusted PKG. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:53-62 [Conf ] Siraj A. Shaikh , Vicky J. Bush , Steve A. Schneider Specifying Authentication Using Signal Events in CSP. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:63-74 [Conf ] Xiaolan Zhang 0003 , Brian King Modeling RFID Security. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:75-90 [Conf ] Roman Schlegel , Serge Vaudenay Enforcing Email Addresses Privacy Using Tokens. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:91-100 [Conf ] Yongdong Wu Efficient Authentication of Electronic Document Workflow. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:101-112 [Conf ] Raylin Tso , Takeshi Okamoto , Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:113-127 [Conf ] Xiangguo Cheng , Huafei Zhu , Ying Qiu , Xinmei Wang Efficient Group Signatures from Bilinear Pairing. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:128-139 [Conf ] Zuhua Shao Enhanced Aggregate Signatures from Pairings. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:140-149 [Conf ] Yuan Zhou , Zhenfu Cao , Zhenchuan Chai Constructing Secure Proxy Cryptosystem. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:150-161 [Conf ] Guang Gong , Kishan Chand Gupta , Martin Hell , Yassir Nawaz Towards a General RC4-Like Keystream Generator. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:162-174 [Conf ] Peng Wang , Dengguo Feng , Wenling Wu HCTR: A Variable-Input-Length Enciphering Mode. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:175-188 [Conf ] Jihong Teng , Shiqu Li , Xiaoying Huang The k th-Order Quasi-Generalized Bent Functions over Ring Zp . [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:189-201 [Conf ] Shimin Wei , Guolong Chen , Guozhen Xiao A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:202-209 [Conf ] Hongda Li , Bao Li An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:210-220 [Conf ] Yu Yu , Jussipekka Leiwo , Benjamin Premkumar An Improved Secure Two-Party Computation Protocol. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:221-232 [Conf ] Tianjie Cao , Dongdai Lin Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:233-241 [Conf ] Fagen Li , Juntao Gao , Yupu Hu ID-Based Threshold Unsigncryption Scheme from Pairings. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:242-253 [Conf ] Gil-Jong Mun , Yong-Min Kim , DongKook Kim , BongNam Noh Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:254-264 [Conf ] Chang-Joo Moon , Woojin Paik , Young-Gab Kim , JuHum Kwon The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:265-278 [Conf ] Jong Sou Park , Khaja Mohammad Shazzad , Dong Seong Kim Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:279-289 [Conf ] Sherman S. M. Chow , Zhengjun Cao , Joseph K. Liu Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:290-301 [Conf ] Fei Gao , Su-Juan Qin , Qiao-Yan Wen , Fu-Chen Zhu An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:302-312 [Conf ] Cheol-Min Park , Myung-Hwan Kim , Moti Yung A Remark on Implementing the Weil Pairing. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:313-323 [Conf ] Pradeep Kumar Mishra Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:324-335 [Conf ] Jong-Hyuk Roh , Kyoon-Ha Lee Key Management for Secure Overlay Multicast. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:336-345 [Conf ] Duhyun Bae , Jiho Kim , Sehyun Park , Ohyoung Song Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:346-357 [Conf ] Yongwha Chung , Daesung Moon , Sungju Lee , Seunghwan Jung , Taehae Kim , Dosung Ahn Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:358-369 [Conf ] Zhanfei Zhou Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:370-383 [Conf ] Wen Ping Ma , Fu Tai Zhang New Methods to Construct Cheating Immune Multisecret Sharing Scheme. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:384-394 [Conf ] Takayuki Furuya , Takahiro Matsuzaki , Kanta Matsuura Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:395-406 [Conf ] Hyun-Sun Kang , Chang-Seop Park MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:407-418 [Conf ]