The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
2001 (conf/icics/2001)

  1. Claus-Peter Schnorr
    Security of Blind Discrete Log Signatures against Interactive Attacks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:1-12 [Conf]
  2. Dongxi Liu, Xiaoyong Li, Yingcai Bai
    An Intelligent Intruder Model for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:13-22 [Conf]
  3. Kishan Chand Gupta, Subhamoy Maitra
    Primitive Polynomials over GF(2) - A Cryptologic Approach. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:23-34 [Conf]
  4. Bo Yang, Shixiong Zhu, Yumin Wang
    Unconditionally-Secure Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:35-41 [Conf]
  5. Chin-Chen Chang, Iuon-Chang Lin
    Cryptanalysis of the Improved User Efficient Blind Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:42-46 [Conf]
  6. Chin-Chen Chang, Kuo-Feng Hwang
    Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:47-51 [Conf]
  7. Xiaochen Bo, Lincheng Shen, Wensen Chang
    Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:52-61 [Conf]
  8. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
    A Cyclic Window Algorithm for ECC Defined over Extension Fields. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:62-73 [Conf]
  9. Fangguo Zhang, Futai Zhang, Yumin Wang
    Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:74-83 [Conf]
  10. Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou
    Attacks on Two Digital Signature Schemes Based on Error Correcting Codes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:84-89 [Conf]
  11. Kanta Matsuura
    A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:90-94 [Conf]
  12. Young-Chul Shim
    A New Approach for Secure Multicast Routing in a Large Scale Network. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:95-106 [Conf]
  13. Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim
    A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:107-118 [Conf]
  14. Sungbaek Cho, Zbigniew Ciechanowicz
    Dealing with Uncertainties in Risk Analysis Using Belief Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:119-130 [Conf]
  15. Michael Hitchens, Vijay Varadharajan
    RBAC for XML Document Stores. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:131-143 [Conf]
  16. Xian-Mo Zhang, Josef Pieprzyk
    Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:144-149 [Conf]
  17. Gideon Samid
    Encryption Sticks (Randomats). [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:150-154 [Conf]
  18. Zhimin Song, Sihan Qing
    Applying NCP Logic to the Analysis of SSL 3.0. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:155-166 [Conf]
  19. Ian Herwono, Ingo Liebhardt
    Performance of WTLS and Its Impact on an M-commerce Transaction. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:167-171 [Conf]
  20. Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
    Enforcing Obligation with Security Monitors. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:172-176 [Conf]
  21. Peng Ning, Yiqun Lisa Yin
    Efficient Software Implementation for Finite Field Multiplication in Normal Basis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:177-188 [Conf]
  22. Jianying Zhou, Chunfu Tan
    Playing Lottery on the Internet. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:189-201 [Conf]
  23. Feng Bao, Robert H. Deng
    Privacy Protection for Transactions of Digital Goods. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:202-213 [Conf]
  24. Jie-lü Xu, Han-liang Xu, Yan Wang, Shuwang Lü
    Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:214-220 [Conf]
  25. Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou
    Threshold Undeniable RSA Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:221-232 [Conf]
  26. Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
    Two Simple Batch Verifying Multiple Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:233-237 [Conf]
  27. Yeping He, Sihan Qing
    Square Attack on Reduced Camellia Cipher. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:238-245 [Conf]
  28. Lin You, Yi Xian Yang, Chun Qi Zhang
    Generalization of Elliptic Curve Digital Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:246-250 [Conf]
  29. Bruno Crispo, Giancarlo Ruffo
    Reasoning about Accountability within Delegation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:251-260 [Conf]
  30. Gang Pan, Yijun Wu, Zhaohui Wu
    A Novel Data Hiding Method for Two-Color Images. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:261-270 [Conf]
  31. Chan H. Lee, Xiaotie Deng, Huafei Zhu
    An Identification Scheme Provably Secure against Reset Attack. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:271-279 [Conf]
  32. Sanna Kunnari
    Estimating the Scalability of the Internet Key Exchange. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:280-291 [Conf]
  33. Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
    An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:292-303 [Conf]
  34. Baoqing Ye
    Defeating Denial-of-Service Attacks on the Internet. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:304-315 [Conf]
  35. Dianlong Zhang, Harald Lukhaub, Werner Zorn
    A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:316-327 [Conf]
  36. Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas
    A Unified Methodology for Verification and Synthesis of Firewall Configurations. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:328-339 [Conf]
  37. Yan Chen, Adam W. Bargteil, David Bindel, Randy H. Katz, John Kubiatowicz
    Quantifying Network Denial of Service: A Location Service Case Study. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:340-351 [Conf]
  38. Juan Manuel González Nieto, Colin Boyd, Ed Dawson
    A Public Key Cryptosystem Based on the Subgroup Membership Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:352-363 [Conf]
  39. Ki-Yoong Hong, Chul Kim
    On a Network Security Model for the Secure Information Flow on Multilevel Secure Network. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:364-370 [Conf]
  40. Wenjian Luo, Xianbin Cao, Xufa Wang
    NIDS Research Based on Artificial Immunology. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:371-375 [Conf]
  41. Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta
    AMBAR Protocol: Access Management Based on Authorization Reduction. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:376-380 [Conf]
  42. Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
    Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:381-385 [Conf]
  43. Yan Wang, Kian-Lee Tan
    Dispatching Mobile Agents with Secure Routes in Parallel. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:386-397 [Conf]
  44. Yu Chen, Qian Fang, Zhihui Du, Zhenchun Huang, Sanli Li
    TH-SMS: Security Management System in Advanced Computational Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:398-407 [Conf]
  45. Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
    Cryptography and Middleware Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:408-418 [Conf]
  46. Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
    Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:419-428 [Conf]
  47. Eric Disson, Danielle Boulanger, Gilles Dubois
    A Role-Based Model for Access Control in Database Federations. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:429-440 [Conf]
  48. Hongpei Li, Lianli Chang, Xinmei Wang
    A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:441-450 [Conf]
  49. Hee-Un Park, Im-Yeong Lee
    A Digital Nominative Proxy Signature Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:451-455 [Conf]
  50. Mi Ra Yi, Tae Ho Cho
    Hierarchical Simulation Model with Animation for Large Network Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:456-460 [Conf]
  51. Greg Maitland, Colin Boyd
    Fair Electronic Cash Based on a Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:461-465 [Conf]
  52. Chuan-Kun Wu, Vijay Varadharajan
    Fair Exchange of Digital Signatures with Offline Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:466-470 [Conf]
  53. Jong Sou Park, Jang-Se Lee, Hwan Kuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi
    SECUSIM: A Tool for the Cyber-Attack Simulation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:471-475 [Conf]
  54. Yifa Li
    A New Semantics of Authentication Logic. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:476-482 [Conf]
  55. Ji-Hwan Park, Sook Ee Jeong, Chang Soo Kim
    Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:483-494 [Conf]
  56. Seenil Gram
    Redundancy, Obscurity, Self-Containment & Independence. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:495-502 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002