The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
2005 (conf/icics/2005)

  1. Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
    An Evenhanded Certified Email System for Contract Signing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:1-13 [Conf]
  2. Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou
    Efficient ID-Based Optimistic Fair Exchange with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:14-26 [Conf]
  3. J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti
    On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:27-39 [Conf]
  4. Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai
    Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:40-52 [Conf]
  5. Shuhong Wang, Feng Bao, Robert H. Deng
    Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:53-60 [Conf]
  6. Yong Li 0002, Helger Lipmaa, Dingyi Pei
    On Delegatability of Four Designated Verifier Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:61-71 [Conf]
  7. Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
    PIATS: A Partially Sanitizable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:72-83 [Conf]
  8. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    Ciphertext Comparison, a New Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:84-96 [Conf]
  9. Sven Laur, Helger Lipmaa, Taneli Mielikäinen
    Private Itemset Support Counting. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:97-111 [Conf]
  10. Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka
    Visual Cryptographic Protocols Using the Trusted Initializer. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:112-122 [Conf]
  11. Alaaeddine Fellah, John Mullins
    Admissible Interference by Typing for Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:123-135 [Conf]
  12. Raphael Chung-Wei Phan, Bok-Min Goi
    On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:136-146 [Conf]
  13. Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
    On the Security of Encryption Modes of MD4, MD5 and HAVAL. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:147-158 [Conf]
  14. Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi
    Cryptanalysis of PASS II and MiniPass. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:159-168 [Conf]
  15. Yasuyuki Sakai, Kouichi Sakurai
    Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:169-180 [Conf]
  16. Khanh Nguyen
    Asymmetric Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:181-193 [Conf]
  17. Sherman S. M. Chow, Willy Susilo
    Generic Construction of (Identity-Based) Perfect Concurrent Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:194-206 [Conf]
  18. Huafei Zhu, Feng Bao, Robert H. Deng
    Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:207-219 [Conf]
  19. Xin Li, Zhenzhou Ji, Mingzeng Hu
    Session Table Architecture for Defending SYN Flood Attack. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:220-230 [Conf]
  20. Song Huang, Ling Zhang, Shou-Ling Dong
    A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:231-242 [Conf]
  21. Lanjia Wang, Haixin Duan, Xing Li
    Port Scan Behavior Diagnosis by Clustering. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:243-255 [Conf]
  22. Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian
    Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:256-268 [Conf]
  23. Wei Wei, Xuhua Ding, Kefei Chen
    Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:269-279 [Conf]
  24. Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
    Secure Multicast Using Proxy Encryption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:280-290 [Conf]
  25. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
    Efficient and Non-interactive Timed-Release Encryption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:291-303 [Conf]
  26. Qiang Tang, Chris J. Mitchell
    Security Properties of Two Authenticated Conference Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:304-314 [Conf]
  27. Eun-Jun Yoon, Kee-Young Yoo
    Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:315-322 [Conf]
  28. Sangjin Kim, Hoonjung Lee, Heekuck Oh
    Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:323-335 [Conf]
  29. Lan Li, Xinghao Jiang, Jianhua Li
    Enforce Mandatory Access Control Policy on XML Documents. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:336-349 [Conf]
  30. Pan Wang, Peng Ning, Douglas S. Reeves
    Network Access Control for Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:350-362 [Conf]
  31. Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis
    Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:363-375 [Conf]
  32. Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou
    Authenticating Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:376-388 [Conf]
  33. Tieyan Li, Huafei Zhu, Yongdong Wu
    Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:389-401 [Conf]
  34. Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
    Batching SSL/TLS Handshake Improved. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:402-413 [Conf]
  35. Lucas Ballard, Seny Kamara, Fabian Monrose
    Achieving Efficient Conjunctive Keyword Searches over Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:414-426 [Conf]
  36. David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
    Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:427-440 [Conf]
  37. Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka
    Reversible Watermark with Large Capacity Using the Predictive Coding. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:441-453 [Conf]
  38. Hyunsang Choi, Heejo Lee
    PCAV: Internet Attack Visualization on Parallel Coordinates. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:454-466 [Conf]
  39. Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naoshi Takahashi
    Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:467-480 [Conf]
  40. Jiazhu Dai, Huaikou Miao
    D_DIPS: An Intrusion Prevention System for Database Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:481-490 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002