The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Cryptography and Network Security (acns)
2004 (conf/acns/2004)

  1. Michael E. Locasto, Angelos D. Keromytis
    CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:1-15 [Conf]
  2. Lea Kissner, Alina Oprea, Michael K. Reiter, Dawn Xiaodong Song, Ke Yang
    Private Keyword-Based Push and Pull with Applications to Anonymous Communication. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:16-30 [Conf]
  3. Philippe Golle, Jessica Staddon, Brent R. Waters
    Secure Conjunctive Keyword Search over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:31-45 [Conf]
  4. Jens Groth
    Evaluating Security of Voting Schemes in the Universal Composability Framework. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:46-60 [Conf]
  5. Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa
    Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:61-75 [Conf]
  6. Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
    On the Security of Cryptosystems with All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:76-90 [Conf]
  7. Antti Peltonen, Teemupekka Virtanen, Esa Turtiainen
    Centralized Management of Virtual Security Zones in IP Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:91-102 [Conf]
  8. Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
    S-RIP: A Secure Distance Vector Routing Protocol. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:103-119 [Conf]
  9. Angelos Stavrou, John Ioannidis, Angelos D. Keromytis, Vishal Misra, Dan Rubenstein
    A Pay-per-Use DoS Protection Mechanism for the Web. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:120-134 [Conf]
  10. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
    Limited Verifier Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:135-148 [Conf]
  11. Willy Susilo, Yi Mu
    Deniable Ring Authentication Revisited. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:149-163 [Conf]
  12. Atsuko Miyaji, Kozue Umeda
    A Fully-Functional Group Signature Scheme over Only Known-Order Group. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:164-179 [Conf]
  13. Yunlei Zhao, Chan H. Lee, Yiming Zhao, Hong Zhu
    Some Observations on Zap and Its Applications. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:180-193 [Conf]
  14. Weiming Zhang, Shiqu Li
    Security Measurements of Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:194-204 [Conf]
  15. Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo
    X2Rep: Enhanced Trust Semantics for the XRep Protocol. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:205-219 [Conf]
  16. Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee
    One-Round Protocols for Two-Party Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:220-232 [Conf]
  17. Muxiang Zhang
    Password Authenticated Key Exchange Using Quadratic Residues. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:233-247 [Conf]
  18. Colin Boyd, Wenbo Mao, Kenneth G. Paterson
    Key Agreement Using Statically Keyed Authenticators. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:248-262 [Conf]
  19. Andrew K. Wright, John A. Kinast, Joe McCarty
    Low-Latency Cryptographic Protection for SCADA Communications. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:263-277 [Conf]
  20. InKyoung Jeun, Jongwook Park, TaeKyu Choi, SangWan Park, BaeHyo Park, ByungKwon Lee, YongSup Shin
    A Best Practice for Root CA Key Update in PKI. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:278-291 [Conf]
  21. Stephen W. Boyd, Angelos D. Keromytis
    SQLrand: Preventing SQL Injection Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:292-302 [Conf]
  22. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:303-309 [Conf]
  23. Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano
    Success Probability in Chi2-Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:310-325 [Conf]
  24. Ali Kanso
    More Generalized Clock-Controlled Alternating Step Generator. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:326-338 [Conf]
  25. Daisuke Inoue, Masahiro Kuroda
    FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:339-354 [Conf]
  26. Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
    Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:355-368 [Conf]
  27. Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi
    Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:369-382 [Conf]
  28. Katsuyuki Okeya, Tsuyoshi Takagi
    Security Analysis of CRT-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:383-397 [Conf]
  29. Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
    Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:398-413 [Conf]
  30. Shuhong Wang, Jie Wang, Maozhi Xu
    Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:414-425 [Conf]
  31. Hyung-Woo Lee
    Advanced Packet Marking Mechanism with Pushback for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:426-438 [Conf]
  32. Haiguang Lai, Shengwen Cai, Hao Huang, Junyuan Xie, Hui Li
    A Parallel Intrusion Detection System for High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:439-451 [Conf]
  33. Dong Yu, Deborah A. Frincke
    A Novel Framework for Alert Correlation and Understanding. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:452-466 [Conf]
  34. BaiJie Kuang, Yuefei Zhu, YaJuan Zhang
    An Improved Algorithm for uP + vQ Using JSF13. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:467-478 [Conf]
  35. Palash Sarkar, Pradeep Kumar Mishra, Rana Barua
    New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(pn). [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:479-493 [Conf]
  36. Riza Aditya, Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:494-508 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002