The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Cryptography and Network Security (acns)
2003 (conf/acns/2003)

  1. Ventzislav Nikov, Svetla Nikova, Bart Preneel
    Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:1-15 [Conf]
  2. Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji
    Optimized Chi2-Attack against RC6. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:16-32 [Conf]
  3. Yuko Tamura, Atsuko Miyaji
    Anonymity-Enhanced Pseudonym System. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:33-47 [Conf]
  4. Kwong H. Yung
    Using Feedback to Improve Masquerade Detection. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:48-62 [Conf]
  5. Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
    Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:63-75 [Conf]
  6. Fan Min, Jun-yan Zhang, Guo-wie Yang
    An IP Traceback Scheme Integrating DPM and PPM. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:76-85 [Conf]
  7. Sung-Ryul Kim
    Improved Scalable Hash Chain Traversal. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:86-95 [Conf]
  8. Rui Zhang 0002, Hideki Imai
    Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:96-110 [Conf]
  9. Guilin Wang, Xiaoxi Han, Bo Zhu
    On the Security of Two Threshold Signature Schemes with Traceable Signers. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:111-122 [Conf]
  10. Mohamed Al-Ibrahim, Anton Cerný
    Proxy and Threshold One-Time Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:123-136 [Conf]
  11. Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng
    A Threshold GQ Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:137-150 [Conf]
  12. Gene Itkis, Peng Xie
    Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:151-168 [Conf]
  13. Chong-zhi Gao, Zheng-an Yao, Lei Li
    A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:169-175 [Conf]
  14. Ching Lin, Vijay Varadharajan
    Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:176-190 [Conf]
  15. Chun Ruan, Vijay Varadharajan
    An Authorization Model for E-consent Requirement in a Health Care Application. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:191-205 [Conf]
  16. Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
    PLI: A New Framework to Protect Digital Content for P2P Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:206-216 [Conf]
  17. Chunyan Bai, Gui Liang Feng
    Improved Algebraic Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:217-227 [Conf]
  18. Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang
    Common Vulnerability Markup Language. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:228-240 [Conf]
  19. Tie-Yan Li, Yongdong Wu
    Trust on Web Browser: Attack vs. Defense. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:241-253 [Conf]
  20. Luciano Rila, Chris J. Mitchell
    Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:254-264 [Conf]
  21. Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park
    Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:265-279 [Conf]
  22. Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano
    Using OCSP to Secure Certificate-Using Transactions in M-commerce. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:280-292 [Conf]
  23. Pierre Dusart, Gilles Letourneux, Olivier Vivolo
    Differential Fault Analysis on A.E.S. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:293-306 [Conf]
  24. Roman Novak
    Side-Channel Attack on Substitution Blocks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:307-318 [Conf]
  25. Yasuyuki Sakai, Kouichi Sakurai
    Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:319-330 [Conf]
  26. Sarbani Palit, Bimal K. Roy, Arindom De
    A Fast Correlation Attack for LFSR-Based Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:331-342 [Conf]
  27. Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng
    Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:343-356 [Conf]
  28. Sangwon Lee, Yongdae Kim, Kwangjo Kim, Dae-Hyun Ryu
    An Efficient Tree-Based Group Key Agreement Using Bilinear Map. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:357-371 [Conf]
  29. Taenam Cho, Sang-Ho Lee
    A Key Recovery Mechanism for Reliable Group Key Management. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:372-386 [Conf]
  30. Sandeepan Chowdhury, Subhamoy Maitra
    Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:387-402 [Conf]
  31. Dong Jin Kwak, Sang-Jae Moon
    Efficient Distributed Signcryption Scheme as Group Signcryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:403-417 [Conf]
  32. Johann Großschädl, Guy-Armand Kamendje
    Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:418-434 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002