The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
2002 (conf/icics/2002)

  1. Jeff S. L. Cheng, Victor K. Wei
    Defenses against the Truncation of Computation Results of Free-Roaming Agents. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:1-12 [Conf]
  2. Hai Jin, Feng Xian, Zongfen Han, Shengli Li
    A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:13-24 [Conf]
  3. Changwoo Pyo, Gyungho Lee
    Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:25-36 [Conf]
  4. Vadim Kuznetsov, Helena Sandström, Andrei Simkin
    An Evaluation of Different IP Traceback Approaches. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:37-48 [Conf]
  5. Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara
    Security against Inference Attacks on Negative Information in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:49-60 [Conf]
  6. Wen-Guey Tzeng, Zhi-Jia Tzeng
    Robust Key-Evolving Public Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:61-72 [Conf]
  7. Toru Nakanishi, Masayuki Tao, Yuji Sugiyama
    A Group Signature Scheme Committing the Group. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:73-84 [Conf]
  8. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:85-96 [Conf]
  9. Myungsun Kim, Jongseong Kim, Kwangjo Kim
    Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:97-108 [Conf]
  10. David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina
    Reducing the Memory Complexity of Type-Inference Algorithms. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:109-121 [Conf]
  11. Kyungah Shim
    The Risks of Compromising Secret Information. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:122-133 [Conf]
  12. Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park
    Password-Authenticated Key Exchange between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:134-146 [Conf]
  13. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:147-159 [Conf]
  14. Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen
    Attacking Predictable IPsec ESP Initialization Vectors. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:160-172 [Conf]
  15. Hajime Watanabe, Takashi Kitagawa
    An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:173-183 [Conf]
  16. Tanmoy Kanti Das, Subhamoy Maitra
    A Robust Block Oriented Watermarking Scheme in Spatial Domain. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:184-196 [Conf]
  17. Tatsuyuki Matsushita
    A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:197-208 [Conf]
  18. Soonhak Kwon
    Low Complexity Bit Serial Systolic Multipliers over GF(2m) for Three Classes of Finite Fields. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:209-216 [Conf]
  19. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications with SIMD Operations. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:217-230 [Conf]
  20. Ayineedi Venkateswarlu, Subhamoy Maitra
    Further Results on Multiples of Primitive Polynomials and Their Products over GF(2). [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:231-242 [Conf]
  21. Junqi Zhang, Vijay Varadharajan, Yi Mu
    A Secure Object Sharing Scheme for Java Card. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:243-251 [Conf]
  22. Nathan Carey, Andrew Clark, George M. Mohay
    IDS Interoperability and Correlation Using IDMEF and Commodity Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:252-264 [Conf]
  23. Emilie Lundin, Håkan Kvarnström, Erland Jonsson
    A Synthetic Fraud Data Generation Methodology. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:265-277 [Conf]
  24. Ka-Ping Yee
    User Interaction Design for Secure Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:278-290 [Conf]
  25. Jesus Molina, William A. Arbaugh
    Using Independent Auditors as Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:291-302 [Conf]
  26. Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri
    Cellular Automata Based Cryptosystem (CAC). [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:303-314 [Conf]
  27. Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
    New Weak-Key Classes of IDEA. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:315-326 [Conf]
  28. Soichi Furuya, Kouichi Sakurai
    Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:327-341 [Conf]
  29. Eric Filiol
    A New Statistical Testing for Symmetric Ciphers and Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:342-353 [Conf]
  30. Charles C. Y. Lam, Guang Gong, Scott A. Vanstone
    Message Authentication Codes with Error Correcting Capabilities. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:354-366 [Conf]
  31. Shou-peng Li, Shi-zhong Wu, Tao Guo
    The Consistency of an Access Control List. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:367-373 [Conf]
  32. Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim
    Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:374-385 [Conf]
  33. Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki
    A Specification Language for Distributed Policy Control. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:386-398 [Conf]
  34. Javier Lopez, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle
    Access Control Infrastructure for Digital Objects. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:399-410 [Conf]
  35. Cheng-Kang Chu, Wen-Guey Tzeng
    Distributed Key Generation as a Component of an Integrated Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:411-421 [Conf]
  36. Xiaolin Pang, Kian-Lee Tan, Yan Wang, Jian Ren
    A Secure Agent-Mediated Payment Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:422-433 [Conf]
  37. Alexander Kholosha, Henk C. A. van Tilborg
    Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:434-446 [Conf]
  38. Hongjun Wu
    Related-Cipher Attacks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:447-455 [Conf]
  39. Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim
    A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:456-468 [Conf]
  40. Josef Pieprzyk, Xian-Mo Zhang
    Ideal Threshold Schemes from Orthogonal Arrays. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:469-479 [Conf]
  41. Atsuko Miyaji, Masao Nonaka
    Cryptanalysis of the Reduced-Round RC6. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:480-494 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002