|
Conferences in DBLP
- Doug McGowan
International Cryptography (Abstract). [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:1- [Conf]
- Chris Hall, Ian Goldberg, Bruce Schneier
Reaction Attacks against several Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:2-12 [Conf]
- Wenling Wu, Bao Li, Dengguo Feng, Sihan Qing
Cryptanalysis of some AES Candidate Algorithms. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:13-21 [Conf]
- Michael Hitchens, Vijay Varadharajan
Issues in the Design of a Language for Role Based Access Control. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:22-38 [Conf]
- Lawrie Brown, Dan Sahlin
Extending ERLANG for Safe Mobile Code Execution. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:39-53 [Conf]
- Chris Pavlovski, Colin Boyd, Ernest Foo
Detachable Electronic Coins. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:54-70 [Conf]
- Josef Pieprzyk
Linear Secret Sharing with Divisible Shares. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:71-86 [Conf]
- Fabrice Boudot, Jacques Traoré
Efficient Publicly Verifiable Secret Sharing Schemes with Fast or Delayed Recovery. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:87-102 [Conf]
- Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:103-118 [Conf]
- Kapali Viswanathan, Colin Boyd, Ed Dawson
Signature Scheme for Controlled Environments. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:119-134 [Conf]
- Cheryl L. Beaver, Peter Gemmell, Anna M. Johnston, William D. Neumann
On the Cryptographic Value of The qth Root Problem. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:135-142 [Conf]
- Sushil Jajodia
Protecting Critical Information Systems (Abstract). [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:143- [Conf]
- Masayuki Abe, Tatsuaki Okamoto
Delegation Chains Secure up to Constant Length. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:144-156 [Conf]
- Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:157-168 [Conf]
- Shouichi Hirose, Kanta Matsuura
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:169-182 [Conf]
- Michiharu Kudo, Anish Mathuria
An Extended Logic for Analyzing Timed-Release Public-Key Protocols. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:183-198 [Conf]
- Montse Rubia, Juan Carlos Cruellas, Manuel Medina
Bringing Together X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:199-215 [Conf]
- Kazumasa Omote, Eiji Okamoto
User Identification System Based on Biometrics for Keystroke. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:216-229 [Conf]
- Constantinos Markantonakis
Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:230-243 [Conf]
- Wenbo Mao
Send Message into a Definite Future. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:244-251 [Conf]
- Tomas Sander
Efficient Accumulators without Trapdoor Extended Abstracts. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:252-262 [Conf]
- William Millan, L. Burnett, Gary Carter, Andrew Clark, Ed Dawson
Evolutionary Heuristics for Finding Cryptographically Strong S-Boxes. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:263-274 [Conf]
- Patrik Ekdahl, Ben J. M. Smeets
Incremental Authentication of Tree-Structured Documents. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:275-283 [Conf]
- Yuliang Zheng, Xian-Mo Zhang
Plateaued Functions. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:284-300 [Conf]
- Frances Griffin, Igor Shparlinski
On the Linear Complexity of the Naor-Reingold Pseudo-Random Function. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:301-308 [Conf]
- Kazukuni Kobara, Hideki Imai
On the Channel Capacity of Narrow-Band Subliminal Channels. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:309-323 [Conf]
|