|
Conferences in DBLP
- Michel Abdalla, Bogdan Warinschi
On the Minimal Assumptions of Group Signature Schemes. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:1-13 [Conf]
- Willy Susilo, Yi Mu, Fangguo Zhang
Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:14-26 [Conf]
- Javier Herranz, Germán Sáez
New Identity-Based Ring Signature Schemes. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:27-39 [Conf]
- Jianying Zhou
On the Security of a Multi-party Certified Email Protocol. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:40-52 [Conf]
- Ventzislav Nikov, Svetla Nikova, Bart Preneel
Robust Metering Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:53-65 [Conf]
- Klaus Herrmann, Michael A. Jaeger
PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:66-78 [Conf]
- Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:79-91 [Conf]
- Ratna Dutta, Rana Barua, Palash Sarkar
Provably Secure Authenticated Tree Based Group Key Agreement. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:92-104 [Conf]
- Yuichi Komano, Kazuo Ohta
Taxonomic Consideration to OAEP Variants and Their Security. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:105-117 [Conf]
- Katja Schmidt-Samoa
Factorization-Based Fail-Stop Signatures Revisited. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:118-131 [Conf]
- Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
A Qualitative Evaluation of Security Patterns. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:132-144 [Conf]
- Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:145-157 [Conf]
- Sandra Ring, Eric Cole
Volatile Memory Computer Forensics to Detect Kernel Level Compromise. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:158-170 [Conf]
- Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels
A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:171-186 [Conf]
- Rakan El-Khalil, Angelos D. Keromytis
Hydan: Hiding Information in Program Binaries. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:187-199 [Conf]
- Luke Hebbes, Andrew Lenaghan
A Semi-fragile Steganographic Digital Signature for Images. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:200-210 [Conf]
- Marcel Fernandez, Miguel Soriano
Identification of Traitors Using a Trellis. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:211-222 [Conf]
- Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:223-235 [Conf]
- Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh
Reflector Attack Traceback System with Pushback Based iTrace Mechanism. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:236-248 [Conf]
- Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci
Automatic Covert Channel Analysis of a Multilevel Secure Component. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:249-261 [Conf]
- Christopher Lynch, Catherine Meadows
Sound Approximations to Diffie-Hellman Using Rewrite Rules. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:262-277 [Conf]
- Anton Kargl, Götz Wiesend
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:278-290 [Conf]
- Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:291-304 [Conf]
- Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:305-317 [Conf]
- Oleksiy Mazhelis, Seppo Puuronen, Jari Veijalainen
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:318-330 [Conf]
- Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim
Threat Analysis on NEtwork MObility (NEMO). [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:331-342 [Conf]
- Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:343-357 [Conf]
- Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:358-374 [Conf]
- Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:375-387 [Conf]
- Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
Security Analysis of the Generalized Self-shrinking Generator. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:388-400 [Conf]
- Bo-Yin Yang, Jiun-Ming Chen, Nicolas Courtois
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:401-413 [Conf]
- Jean Monnerat, Serge Vaudenay
On Some Weak Extensions of AES and BES. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:414-426 [Conf]
- Slobodan Petrovic, Amparo Fúster-Sabater
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:427-439 [Conf]
- Mathieu Ciet, Christophe Giraud
Transient Fault Induction Attacks on XTR. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:440-451 [Conf]
- Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen
Adaptive-CCA on OpenPGP Revisited. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:452-464 [Conf]
- Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio
A New Key-Insulated Signature Scheme. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:465-479 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
Secure Hierarchical Identity Based Signature and Its Application. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:480-494 [Conf]
- Fabien Laguillaumie, Damien Vergnaud
Multi-designated Verifiers Signatures. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:495-507 [Conf]
- Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
Dynamic Access Control for Multi-privileged Group Communications. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:508-519 [Conf]
- Kihun Hong, Souhwan Jung
An Efficient Authentication Scheme Using Recovery Information in Signature. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:520-531 [Conf]
- Darren Davis, Fabian Monrose, Michael K. Reiter
Time-Scoped Searching of Encrypted Audit Logs. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:532-545 [Conf]
- Habtamu Abie, Pål Spilling, Bent Foyn
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:546-562 [Conf]
|