Conferences in DBLP
Haeryong Park , Zhengjun Cao , Lihua Liu , Seongan Lim , Ikkwon Yie , Kilsoo Chun Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:1-12 [Conf ] Jian Weng , Shengli Liu , Kefei Chen , Xiangxue Li Identity-Based Key-Insulated Signature with Secure Key-Updates. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:13-26 [Conf ] Benoît Libert , Jean-Jacques Quisquater , Moti Yung Efficient Intrusion-Resilient Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:27-41 [Conf ] Xin Tong , Jie Zhang , Qiao-Yan Wen New Constructions of Large Binary Sequences Family with Low Correlation. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:42-53 [Conf ] Xuexian Hu , Yongtao Ming , Wenfen Liu , Shiqu Li On the Rate of Coincidence of Two Clock-Controlled Combiners. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:54-65 [Conf ] Yuan-man Tong , Zhiying Wang , Kui Dai , Hongyi Lu Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:66-77 [Conf ] Dayin Wang , Dongdai Lin , Wenling Wu OPMAC: One-Key Poly1305 MAC. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:78-87 [Conf ] Debrup Chakraborty , Palash Sarkar A General Construction of Tweakable Block Ciphers and Different Modes of Operations. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:88-102 [Conf ] Christophe Tartary , Huaxiong Wang Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:103-117 [Conf ] Changshe Ma Efficient Short Signcryption Scheme with Public Verifiability. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:118-129 [Conf ] Lukasz Krzywiecki , Przemyslaw Kubiak , Miroslaw Kutylowski A Revocation Scheme Preserving Privacy. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:130-143 [Conf ] Shi Yi , Yang Xinyu , Li Ning , Qi Yong Deterministic Packet Marking with Link Signatures for IP Traceback. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:144-152 [Conf ] You Chen , Yang Li , Xueqi Cheng , Li Guo Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:153-167 [Conf ] Chenghua Tang , Shuping Yao , Zhongjie Cui , Limin Mao A Network Security Policy Model and Its Realization Mechanism. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:168-181 [Conf ] Gaeil An , Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:182-195 [Conf ] Chunyang Yuan , Yeping He , Jianbo He , Zhouyi Zhou A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:196-210 [Conf ] SeongKi Kim , EunKyung Jin , YoungJin Song , Sang-Yong Han Design and Implementation of Fast Access Control That Supports the Separation of Duty. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:211-224 [Conf ] Liuying Tang , Sihan Qing A Practical Alternative to Domain and Type Enforcement Integrity Formal Models. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:225-237 [Conf ] Deok Jin Kim , Tae Hyung Kim , Jong Kim , Sung Je Hong Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:238-252 [Conf ] Zhan Wang , Yoshiaki Hori , Kouichi Sakurai Application and Evaluation of Bayesian Filter for Chinese Spam. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:253-263 [Conf ] Yongdong Wu , Feng Bao Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:264-278 [Conf ] Yoonsun Lim , Myung Kim , Kwang Hee Seo , Ho-Kun Moon , Jin Gi Choe , Yu Kang An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:279-288 [Conf ] Marcel Fernandez , Josep Cotrina Navau Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. [Citation Graph (0, 0)][DBLP ] Inscrypt, 2006, pp:289-303 [Conf ]