The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
1999 (conf/icics/1999)

  1. Doug McGowan
    International Cryptography (Abstract). [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:1- [Conf]
  2. Chris Hall, Ian Goldberg, Bruce Schneier
    Reaction Attacks against several Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:2-12 [Conf]
  3. Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing
    Cryptanalysis of some AES Candidate Algorithms. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:13-21 [Conf]
  4. Michael Hitchens, Vijay Varadharajan
    Issues in the Design of a Language for Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:22-38 [Conf]
  5. Lawrie Brown, Dan Sahlin
    Extending ERLANG for Safe Mobile Code Execution. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:39-53 [Conf]
  6. Chris Pavlovski, Colin Boyd, Ernest Foo
    Detachable Electronic Coins. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:54-70 [Conf]
  7. Josef Pieprzyk
    Linear Secret Sharing with Divisible Shares. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:71-86 [Conf]
  8. Fabrice Boudot, Jacques Traoré
    Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:87-102 [Conf]
  9. Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
    Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:103-118 [Conf]
  10. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Signature Scheme for Controlled Environments. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:119-134 [Conf]
  11. Cheryl L. Beaver, Peter Gemmell, Anna M. Johnston, William D. Neumann
    On the Cryptographic Value of The qth Root Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:135-142 [Conf]
  12. Sushil Jajodia
    Protecting Critical Information Systems (Abstract). [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:143- [Conf]
  13. Masayuki Abe, Tatsuaki Okamoto
    Delegation Chains Secure up to Constant Length. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:144-156 [Conf]
  14. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:157-168 [Conf]
  15. Shouichi Hirose, Kanta Matsuura
    Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:169-182 [Conf]
  16. Michiharu Kudo, Anish Mathuria
    An Extended Logic for Analyzing Timed-Release Public-Key Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:183-198 [Conf]
  17. Montse Rubia, Juan Carlos Cruellas, Manuel Medina
    Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:199-215 [Conf]
  18. Kazumasa Omote, Eiji Okamoto
    User Identification System Based on Biometrics for Keystroke. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:216-229 [Conf]
  19. Constantinos Markantonakis
    Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:230-243 [Conf]
  20. Wenbo Mao
    Send Message into a Definite Future. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:244-251 [Conf]
  21. Tomas Sander
    Efficient Accumulators without Trapdoor Extended Abstracts. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:252-262 [Conf]
  22. William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson
    Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:263-274 [Conf]
  23. Patrik Ekdahl, Ben J. M. Smeets
    Incremental Authentication of Tree-Structured Documents. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:275-283 [Conf]
  24. Yuliang Zheng, Xian-Mo Zhang
    Plateaued Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:284-300 [Conf]
  25. Frances Griffin, Igor Shparlinski
    On the Linear Complexity of the Naor-Reingold Pseudo-Random Function. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:301-308 [Conf]
  26. Kazukuni Kobara, Hideki Imai
    On the Channel Capacity of Narrow-Band Subliminal Channels. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:309-323 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002