Conferences in DBLP
Jeff S. L. Cheng , Victor K. Wei Defenses against the Truncation of Computation Results of Free-Roaming Agents. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:1-12 [Conf ] Hai Jin , Feng Xian , Zongfen Han , Shengli Li A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:13-24 [Conf ] Changwoo Pyo , Gyungho Lee Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:25-36 [Conf ] Vadim Kuznetsov , Helena Sandström , Andrei Simkin An Evaluation of Different IP Traceback Approaches. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:37-48 [Conf ] Yasunori Ishihara , Shuichiro Ako , Toru Fujiwara Security against Inference Attacks on Negative Information in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:49-60 [Conf ] Wen-Guey Tzeng , Zhi-Jia Tzeng Robust Key-Evolving Public Key Encryption Schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:61-72 [Conf ] Toru Nakanishi , Masayuki Tao , Yuji Sugiyama A Group Signature Scheme Committing the Group. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:73-84 [Conf ] Yumiko Hanaoka , Goichiro Hanaoka , Junji Shikata , Hideki Imai Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:85-96 [Conf ] Myungsun Kim , Jongseong Kim , Kwangjo Kim Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:97-108 [Conf ] David Naccache , Alexei Tchoulkine , Christophe Tymen , Elena Trichina Reducing the Memory Complexity of Type-Inference Algorithms. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:109-121 [Conf ] Kyungah Shim The Risks of Compromising Secret Information. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:122-133 [Conf ] Jin Wook Byun , Ik Rae Jeong , Dong Hoon Lee , Chang-Seop Park Password-Authenticated Key Exchange between Clients with Different Passwords. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:134-146 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapali Viswanathan Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:147-159 [Conf ] Sami Vaarala , Antti Nuopponen , Teemupekka Virtanen Attacking Predictable IPsec ESP Initialization Vectors. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:160-172 [Conf ] Hajime Watanabe , Takashi Kitagawa An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:173-183 [Conf ] Tanmoy Kanti Das , Subhamoy Maitra A Robust Block Oriented Watermarking Scheme in Spatial Domain. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:184-196 [Conf ] Tatsuyuki Matsushita A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:197-208 [Conf ] Soonhak Kwon Low Complexity Bit Serial Systolic Multipliers over GF(2m ) for Three Classes of Finite Fields. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:209-216 [Conf ] Tetsuya Izu , Tsuyoshi Takagi Fast Elliptic Curve Multiplications with SIMD Operations. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:217-230 [Conf ] Ayineedi Venkateswarlu , Subhamoy Maitra Further Results on Multiples of Primitive Polynomials and Their Products over GF(2). [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:231-242 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu A Secure Object Sharing Scheme for Java Card. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:243-251 [Conf ] Nathan Carey , Andrew Clark , George M. Mohay IDS Interoperability and Correlation Using IDMEF and Commodity Systems. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:252-264 [Conf ] Emilie Lundin , Håkan Kvarnström , Erland Jonsson A Synthetic Fraud Data Generation Methodology. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:265-277 [Conf ] Ka-Ping Yee User Interaction Design for Secure Systems. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:278-290 [Conf ] Jesus Molina , William A. Arbaugh Using Independent Auditors as Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:291-302 [Conf ] Subhayan Sen , Chandrama Shaw , Dipanwita Roy Chowdhury , Niloy Ganguly , Parimal Pal Chaudhuri Cellular Automata Based Cryptosystem (CAC). [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:303-314 [Conf ] Alex Biryukov , Jorge Nakahara Jr. , Bart Preneel , Joos Vandewalle New Weak-Key Classes of IDEA. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:315-326 [Conf ] Soichi Furuya , Kouichi Sakurai Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:327-341 [Conf ] Eric Filiol A New Statistical Testing for Symmetric Ciphers and Hash Functions. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:342-353 [Conf ] Charles C. Y. Lam , Guang Gong , Scott A. Vanstone Message Authentication Codes with Error Correcting Capabilities. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:354-366 [Conf ] Shou-peng Li , Shi-zhong Wu , Tao Guo The Consistency of an Access Control List. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:367-373 [Conf ] Jong-Young Koh , Mi Ra Yi , Tae Ho Cho , Hyung-Jong Kim , Hong-Geun Kim Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:374-385 [Conf ] Shigeta Kuninobu , Yoshiaki Takata , Daigo Taguchi , Masayuki Nakae , Hiroyuki Seki A Specification Language for Distributed Policy Control. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:386-398 [Conf ] Javier Lopez , Antonio Mana , Ernesto Pimentel , José M. Troya , Mariemma Inmaculada Yagüe del Valle Access Control Infrastructure for Digital Objects. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:399-410 [Conf ] Cheng-Kang Chu , Wen-Guey Tzeng Distributed Key Generation as a Component of an Integrated Protocol. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:411-421 [Conf ] Xiaolin Pang , Kian-Lee Tan , Yan Wang , Jian Ren A Secure Agent-Mediated Payment Protocol. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:422-433 [Conf ] Alexander Kholosha , Henk C. A. van Tilborg Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:434-446 [Conf ] Hongjun Wu Related-Cipher Attacks. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:447-455 [Conf ] Changhoon Lee , Deukjo Hong , Sungjae Lee , Sangjin Lee , Hyungjin Yang , Jongin Lim A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:456-468 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Ideal Threshold Schemes from Orthogonal Arrays. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:469-479 [Conf ] Atsuko Miyaji , Masao Nonaka Cryptanalysis of the Reduced-Round RC6. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:480-494 [Conf ]