|
Conferences in DBLP
- Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
An Evenhanded Certified Email System for Contract Signing. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:1-13 [Conf]
- Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou
Efficient ID-Based Optimistic Fair Exchange with Provable Security. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:14-26 [Conf]
- J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:27-39 [Conf]
- Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:40-52 [Conf]
- Shuhong Wang, Feng Bao, Robert H. Deng
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:53-60 [Conf]
- Yong Li 0002, Helger Lipmaa, Dingyi Pei
On Delegatability of Four Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:61-71 [Conf]
- Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
PIATS: A Partially Sanitizable Signature Scheme. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:72-83 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
Ciphertext Comparison, a New Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:84-96 [Conf]
- Sven Laur, Helger Lipmaa, Taneli Mielikäinen
Private Itemset Support Counting. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:97-111 [Conf]
- Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka
Visual Cryptographic Protocols Using the Trusted Initializer. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:112-122 [Conf]
- Alaaeddine Fellah, John Mullins
Admissible Interference by Typing for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:123-135 [Conf]
- Raphael Chung-Wei Phan, Bok-Min Goi
On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:136-146 [Conf]
- Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
On the Security of Encryption Modes of MD4, MD5 and HAVAL. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:147-158 [Conf]
- Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi
Cryptanalysis of PASS II and MiniPass. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:159-168 [Conf]
- Yasuyuki Sakai, Kouichi Sakurai
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:169-180 [Conf]
- Khanh Nguyen
Asymmetric Concurrent Signatures. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:181-193 [Conf]
- Sherman S. M. Chow, Willy Susilo
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:194-206 [Conf]
- Huafei Zhu, Feng Bao, Robert H. Deng
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:207-219 [Conf]
- Xin Li, Zhenzhou Ji, Mingzeng Hu
Session Table Architecture for Defending SYN Flood Attack. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:220-230 [Conf]
- Song Huang, Ling Zhang, Shou-Ling Dong
A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:231-242 [Conf]
- Lanjia Wang, Haixin Duan, Xing Li
Port Scan Behavior Diagnosis by Clustering. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:243-255 [Conf]
- Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:256-268 [Conf]
- Wei Wei, Xuhua Ding, Kefei Chen
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:269-279 [Conf]
- Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
Secure Multicast Using Proxy Encryption. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:280-290 [Conf]
- Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
Efficient and Non-interactive Timed-Release Encryption. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:291-303 [Conf]
- Qiang Tang, Chris J. Mitchell
Security Properties of Two Authenticated Conference Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:304-314 [Conf]
- Eun-Jun Yoon, Kee-Young Yoo
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:315-322 [Conf]
- Sangjin Kim, Hoonjung Lee, Heekuck Oh
Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:323-335 [Conf]
- Lan Li, Xinghao Jiang, Jianhua Li
Enforce Mandatory Access Control Policy on XML Documents. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:336-349 [Conf]
- Pan Wang, Peng Ning, Douglas S. Reeves
Network Access Control for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:350-362 [Conf]
- Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:363-375 [Conf]
- Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou
Authenticating Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:376-388 [Conf]
- Tieyan Li, Huafei Zhu, Yongdong Wu
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:389-401 [Conf]
- Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
Batching SSL/TLS Handshake Improved. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:402-413 [Conf]
- Lucas Ballard, Seny Kamara, Fabian Monrose
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:414-426 [Conf]
- David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:427-440 [Conf]
- Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka
Reversible Watermark with Large Capacity Using the Predictive Coding. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:441-453 [Conf]
- Hyunsang Choi, Heejo Lee
PCAV: Internet Attack Visualization on Parallel Coordinates. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:454-466 [Conf]
- Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naoshi Takahashi
Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:467-480 [Conf]
- Jiazhu Dai, Huaikou Miao
D_DIPS: An Intrusion Prevention System for Database Security. [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:481-490 [Conf]
|