The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Information Security and Cryptology (cisc)
2006 (conf/cisc/2006)

  1. Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun
    Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:1-12 [Conf]
  2. Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li
    Identity-Based Key-Insulated Signature with Secure Key-Updates. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:13-26 [Conf]
  3. Benoît Libert, Jean-Jacques Quisquater, Moti Yung
    Efficient Intrusion-Resilient Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:27-41 [Conf]
  4. Xin Tong, Jie Zhang, Qiao-Yan Wen
    New Constructions of Large Binary Sequences Family with Low Correlation. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:42-53 [Conf]
  5. Xuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li
    On the Rate of Coincidence of Two Clock-Controlled Combiners. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:54-65 [Conf]
  6. Yuan-man Tong, Zhiying Wang, Kui Dai, Hongyi Lu
    Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:66-77 [Conf]
  7. Dayin Wang, Dongdai Lin, Wenling Wu
    OPMAC: One-Key Poly1305 MAC. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:78-87 [Conf]
  8. Debrup Chakraborty, Palash Sarkar
    A General Construction of Tweakable Block Ciphers and Different Modes of Operations. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:88-102 [Conf]
  9. Christophe Tartary, Huaxiong Wang
    Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:103-117 [Conf]
  10. Changshe Ma
    Efficient Short Signcryption Scheme with Public Verifiability. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:118-129 [Conf]
  11. Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kutylowski
    A Revocation Scheme Preserving Privacy. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:130-143 [Conf]
  12. Shi Yi, Yang Xinyu, Li Ning, Qi Yong
    Deterministic Packet Marking with Link Signatures for IP Traceback. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:144-152 [Conf]
  13. You Chen, Yang Li, Xueqi Cheng, Li Guo
    Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:153-167 [Conf]
  14. Chenghua Tang, Shuping Yao, Zhongjie Cui, Limin Mao
    A Network Security Policy Model and Its Realization Mechanism. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:168-181 [Conf]
  15. Gaeil An, Joon S. Park
    Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:182-195 [Conf]
  16. Chunyang Yuan, Yeping He, Jianbo He, Zhouyi Zhou
    A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:196-210 [Conf]
  17. SeongKi Kim, EunKyung Jin, YoungJin Song, Sang-Yong Han
    Design and Implementation of Fast Access Control That Supports the Separation of Duty. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:211-224 [Conf]
  18. Liuying Tang, Sihan Qing
    A Practical Alternative to Domain and Type Enforcement Integrity Formal Models. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:225-237 [Conf]
  19. Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hong
    Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:238-252 [Conf]
  20. Zhan Wang, Yoshiaki Hori, Kouichi Sakurai
    Application and Evaluation of Bayesian Filter for Chinese Spam. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:253-263 [Conf]
  21. Yongdong Wu, Feng Bao
    Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:264-278 [Conf]
  22. Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon, Jin Gi Choe, Yu Kang
    An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:279-288 [Conf]
  23. Marcel Fernandez, Josep Cotrina Navau
    Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:289-303 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002