The SCEAS System
Navigation Menu

Conferences in DBLP

Communications and Multimedia Security (cms)
2002 (conf/cms/2002)

  1. Chris J. Mitchell, Namhyun Hur
    On the security of a structural proven signer ordering multisignature scheme. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:1-8 [Conf]
  2. Sattam S. Al-Riyami, Chris J. Mitchell
    Renewing crytographic timestamps. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:9-16 [Conf]
  3. Wolfgang Bauer
    Implementing elliptic curve cryptography. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:17-28 [Conf]
  4. Yan Wang, Shuwang Lü, Zhenhua Liu
    A new asymmetric fingerprinting framework based on secret sharing. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:29-40 [Conf]
  5. Mohamed Al-Ibrahim, Josef Pieprzyk
    Authentication of transit flows and k-siblings one-time signature. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:41-55 [Conf]
  6. Andre Zuquete
    Improving the functionality of syn cookies. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:57-77 [Conf]
  7. Tadauchi Masaharu, Ishii Tatsuei, Itoh Susumu
    A mac-layer security architecture for cable networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:79-90 [Conf]
  8. Edgar Weippl, Wolfgang Eßmayr, F. Gruber, W. Stockner, T. Trenker
    Towards authentication using mobile devices. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:91-105 [Conf]
  9. Pietro Michiardi, Refik Molva
    Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:107-121 [Conf]
  10. Yves Roudier, Olivier Fouache, Pierre Vannel, Refik Molva
    Enabling adaptive and secure extranets. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:123-135 [Conf]
  11. Alain Pannetrat, Refik Molva
    Multiple layer encryption for multicast groups. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:137-153 [Conf]
  12. Bogdan C. Popescu, Chandana Gamage, Andrew S. Tanenbaum
    Access control, reverse access control and replication control in a world wide distributed system. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:155-167 [Conf]
  13. Dimitris Raptis, Theodosis Dimitrakos, Bjørn Axel Gran, Ketil Stølen
    The coras approach for model-based risk management applied to e-commerce domain. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:169-181 [Conf]
  14. Dusan Gabrijelcic, Arso Savanovic, Borka Jerman-Blazic
    Towards security architecture for future active IP networks. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:183-195 [Conf]
  15. Martin Steinebach, Jana Dittmann, Eva Saar
    Combined fingerprinting attacks against digital audio watermarking: methods, results and solutions. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:197-212 [Conf]
  16. Champskud J. Skrepth, Andreas Uhl
    Selective encryption of visual data. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:213-226 [Conf]
  17. Václav Matyás Jr., Zdenek Ríha
    Biometric authentication - security and usability. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:227-239 [Conf]
  18. Arno Hollosi, Udo Payer, Reinhard Posch
    Automatic authentication based on the Austrian citizen card. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:241-253 [Conf]
  19. Arno Hollosi, Herbert Leitold, Reinhard Posch
    An open interface enabling secure e-government. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:255-266 [Conf]
  20. Gasper Lavrencic, Borka Jerman-Blazic, Aleksej Jerman Blazic
    Cadenus security considerations. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:267-278 [Conf]
  21. Karl Scheibelhofer
    Validation of long-term signatures. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:279-292 [Conf]
  22. K. Kain, Sean W. Smith, R. Asokan
    Digital signatures and electronic documents: a cautionary tale. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2002, pp:293-308 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002