The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
2003 (conf/icics/2003)

  1. Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa
    A Fast Square Root Computation Using the Frobenius Mapping. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:1-10 [Conf]
  2. Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim
    A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:11-21 [Conf]
  3. Yan Wang, Chi-Hung Chi, Tie-Yan Li
    Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:22-33 [Conf]
  4. Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei
    On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:34-46 [Conf]
  5. Ricardo Nabhen, Edgard Jamhour, Carlos Maziero
    A Policy Based Framework for Access Control. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:47-59 [Conf]
  6. Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine
    Trading-Off Type-Inference Memory Complexity against Communication. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:60-71 [Conf]
  7. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Security Remarks on a Group Signature Scheme with Member Deletion. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:72-83 [Conf]
  8. Hongjun Wu, Feng Bao, Robert H. Deng
    An Efficient Known Plaintext Attack on FEA-M. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:84-87 [Conf]
  9. Jianying Zhou, Feng Bao, Robert H. Deng
    An Efficient Public-Key Framework. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:88-99 [Conf]
  10. Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee
    ROCEM: Robust Certified E-mail System Based on Server-Supported Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:100-111 [Conf]
  11. Jose Antonio Onieva, Jianying Zhou, Javier Lopez
    Practical Service Charge for P2P Content Distribution. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:112-123 [Conf]
  12. Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma
    ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:124-135 [Conf]
  13. Yongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu
    A Lattice Based General Blind Watermark Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:136-144 [Conf]
  14. Gregory Saunders, Michael Hitchens, Vijay Varadharajan
    Role-Based Access Control and the Access Control Matrix. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:145-157 [Conf]
  15. Miodrag J. Mihaljevic
    Broadcast Encryption Schemes Based on the Sectioned Key Tree. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:158-169 [Conf]
  16. Gang Li, Jie Yang
    Research on the Collusion Estimation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:170-178 [Conf]
  17. Mohsen Ashourian, Yo-Sung Ho
    Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:179-190 [Conf]
  18. Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné
    Protocols for Malicious Host Revocation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:191-201 [Conf]
  19. Pat Pik-Wah Chan, Michael R. Lyu
    A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:202-213 [Conf]
  20. Tie-Yan Li, Huafei Zhu, Kwok-Yan Lam
    A Novel Two-Level Trust Model for Grid. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:214-225 [Conf]
  21. Qian-Hong Wu, Jian-Hong Zhang, Yu-Min Wang
    Practical t-out-n Oblivious Transfer and Its Applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:226-237 [Conf]
  22. Yongdong Wu, Robert H. Deng
    Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:238-248 [Conf]
  23. Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
    ID-Based Distributed "Magic Ink" Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:249-259 [Conf]
  24. Yan Wang, Shuwang Lü, Zhenhua Liu
    A Simple Anonymous Fingerprinting Scheme Based on Blind Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:260-268 [Conf]
  25. Yang Cui, Kazukuni Kobara, Hideki Imai
    Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:269-279 [Conf]
  26. Xiaodong Yi, Xuejun Yang
    A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:280-291 [Conf]
  27. Jianhong Zhang, Qianhong Wu, Yumin Wang
    A Novel Efficient Group Signature Scheme with Forward Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:292-300 [Conf]
  28. Feng Bao, Robert H. Deng, Huafei Zhu
    Variations of Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:301-312 [Conf]
  29. Taeshik Shon, Jung-Taek Seo, Jongsub Moon
    A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:313-324 [Conf]
  30. Min Luo, Lina Wang, Huanguo Zhang, Jin Chen
    A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:325-336 [Conf]
  31. Zhen Xu, Dengguo Feng, Lan Li, Hua Chen
    UC-RBAC: A Usage Constrained Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:337-347 [Conf]
  32. Mathieu Ciet, Marc Joye
    (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:348-359 [Conf]
  33. Xiaoqiang Li, Xiangyang Xue, Wei Li
    An Optimized Multi-bits Blind Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:360-369 [Conf]
  34. Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han
    A Compound Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:370-381 [Conf]
  35. Hui-Feng Huang, Chin-Chen Chang
    An Efficient Convertible Authenticated Encryption Scheme and Its Variant. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:382-392 [Conf]
  36. Meng Zhang, Jiubin Ju
    Space-Economical Reassembly for Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:393-404 [Conf]
  37. J. Krishna Murthy
    A Functional Decomposition of Virus and Worm Programs. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:405-414 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002