The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
1997 (conf/icics/1997)

  1. Mihir Bellare, Phillip Rogaway
    Minimizing the use of random oracles in authenticated encryption schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:1-16 [Conf]
  2. Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung
    Zero-knowledge proofs of decision power: new protocols and optimal round-complexity. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:17-27 [Conf]
  3. Takeshi Koshiba
    Computational learning theoretic cryptanalysis of language theoretic cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:28-38 [Conf]
  4. Yun Bai, Vijay Varadharajan
    A language for specifying sequences of authorization transformations and its applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:39-49 [Conf]
  5. Hung-Min Sun, Bor-Liang Chen
    On the decomposition constructions for perfect secret sharing schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:50-60 [Conf]
  6. Ingrid Biehl, Susanne Wetzel
    Traceable visual cryptography. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:61-71 [Conf]
  7. Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini
    Remarks on the multiple assignment secret sharing scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:72-80 [Conf]
  8. Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini
    Secret sharing in hierarchical groups. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:81-86 [Conf]
  9. Tuomas Aura, Pekka Nikander
    Stateless connections. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:87-97 [Conf]
  10. Rakman Choi, Jung-Chan Na, Kwonil Lee, Eunmi Kim, Wooyong Han
    Design of a security platform for CORBA based application. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:98-108 [Conf]
  11. Antonio Lioy, Fabio Maino, Marco Mezzalama
    Secure document management and distribution in an open network environment. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:109-117 [Conf]
  12. Satoshi Obana, Kaoru Kurosawa
    A2-code = Affine resolvable = BIBD. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:118-129 [Conf]
  13. Keith M. Martin, Reihaneh Safavi-Naini
    Multisender authentication systems with unconditional security. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:130-143 [Conf]
  14. Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo
    Proposal of user identification scheme using mouse. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:144-148 [Conf]
  15. William Millan, Andrew Clark, Ed Dawson
    An effective genetic algorithm for finding highly nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:149-158 [Conf]
  16. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
    Duality of Boolean functions and its cryptographic significance. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:159-169 [Conf]
  17. Ed Dawson, Chuan-Kun Wu
    Construction of correlation immune Boolean functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:170-180 [Conf]
  18. Miodrag J. Mihaljevic
    An improved key stream generator based on the programmable cellular automata. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:181-191 [Conf]
  19. Audun Jøsang
    A Trust policy framework. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:192-202 [Conf]
  20. LiWu Chang, Ira S. Moskowitz
    Critical analysis of security in voice hiding techniques. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:203-216 [Conf]
  21. Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won
    Two efficient RSA multisignature schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:217-222 [Conf]
  22. Seungjoo Kim, Sangjoon Park, Dongho Won
    Proxy signatures, Revisited. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:223-232 [Conf]
  23. John Kelsey, Bruce Schneier, David Wagner
    Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:233-246 [Conf]
  24. Feng Zhu, Bao-An Guo
    A multiplication-addition structure against differential attack. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:247-257 [Conf]
  25. Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta
    On strict estimation method of provable security against differential and linear cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:258-268 [Conf]
  26. Takeshi Shimoyama, Seiichi Amada, Shiho Moriai
    Improved fast software implementation of block ciphers. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:269-273 [Conf]
  27. Mohssen Alabbadi
    Security comments on the Hwang-Chen algebraic-code cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:274-281 [Conf]
  28. Atsuko Miyaji, Takatoshi Ono, Henri Cohen
    Efficient elliptic curve exponentiation. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:282-291 [Conf]
  29. Jinhui Chao, Nori Matsuda, Shigeo Tsujii
    Efficient construction of secure hyperelliptic discrete logarithm problems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:292-301 [Conf]
  30. Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater
    A new and optimal chosen-message attack on RSA-type cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:302-313 [Conf]
  31. Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka
    On weak RSA-keys produced from Pretty Good Privacy. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:314-324 [Conf]
  32. Kazukuni Kobara, Hideki Imai
    Self-synchronized message randomization methods for subliminal channels. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:325-334 [Conf]
  33. Mark Chapman, George I. Davida
    Hiding the Hidden: A software system for concealing ciphertext as innocuous text. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:335-345 [Conf]
  34. Colin Boyd
    Digital signature and public key cryptosystems in a prime order subgroup of Zn*. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:346-355 [Conf]
  35. Jacques Patarin, Louis Goubin
    Trapdoor one-way permutations and multivariate polynominals. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:356-368 [Conf]
  36. Jacques Patarin, Louis Goubin
    Asymmetric cryptography with S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:369-380 [Conf]
  37. Paul Camion, Hervé Chabanne
    On the powerline system. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:381-385 [Conf]
  38. Jacques Traoré
    Making unfair a "fair" blind signature scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:386-397 [Conf]
  39. Colin Boyd
    Enforcing traceability in software. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:398-408 [Conf]
  40. Wenbo Mao
    Publicly verifiable partial key escrow. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:409-413 [Conf]
  41. Hajime Watanabe, Tadao Kasami
    A secure code for recipient watermarking against conspiracy attacks by all users. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:414-423 [Conf]
  42. James W. Gray III, Kin Fai Epsilon Ip
    Protocols for issuing public-key certificates over the Internet. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:424-434 [Conf]
  43. André Postma, Thijs Krol, Egbert Molenkamp
    Distributed cryptographic function application protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:435-439 [Conf]
  44. Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani
    Fault tolerant anonymous channel. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:440-444 [Conf]
  45. Josep Domingo-Ferrer, Ricardo X. Sanchez del Castillo
    An implementable scheme for secure delegation of computing and data. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:445-451 [Conf]
  46. Jacobus E. van der Merwe, Sebastiaan H. von Solms
    Electronic commerce with secure intelligent trade agent. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:452-462 [Conf]
  47. Holger Peterson, Guillaume Poupard
    Efficient scalable fair cash with off-line extortion prevention. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:463-477 [Conf]
  48. Liqun Chen, Chris J. Mitchell
    An anonymous and undeniable payment scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:478-482 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002