The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information and Communication Security (ICICS) (icics)
2004 (conf/icics/2004)

  1. Michel Abdalla, Bogdan Warinschi
    On the Minimal Assumptions of Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:1-13 [Conf]
  2. Willy Susilo, Yi Mu, Fangguo Zhang
    Perfect Concurrent Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:14-26 [Conf]
  3. Javier Herranz, Germán Sáez
    New Identity-Based Ring Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:27-39 [Conf]
  4. Jianying Zhou
    On the Security of a Multi-party Certified Email Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:40-52 [Conf]
  5. Ventzislav Nikov, Svetla Nikova, Bart Preneel
    Robust Metering Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:53-65 [Conf]
  6. Klaus Herrmann, Michael A. Jaeger
    PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:66-78 [Conf]
  7. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng
    Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:79-91 [Conf]
  8. Ratna Dutta, Rana Barua, Palash Sarkar
    Provably Secure Authenticated Tree Based Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:92-104 [Conf]
  9. Yuichi Komano, Kazuo Ohta
    Taxonomic Consideration to OAEP Variants and Their Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:105-117 [Conf]
  10. Katja Schmidt-Samoa
    Factorization-Based Fail-Stop Signatures Revisited. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:118-131 [Conf]
  11. Spyros T. Halkidis, Alexander Chatzigeorgiou, George Stephanides
    A Qualitative Evaluation of Security Patterns. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:132-144 [Conf]
  12. Yasunori Ishihara, Yumi Shimakawa, Toru Fujiwara
    Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:145-157 [Conf]
  13. Sandra Ring, Eric Cole
    Volatile Memory Computer Forensics to Detect Kernel Level Compromise. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:158-170 [Conf]
  14. Ilanit Moodahi, Ehud Gudes, Oz Lavee, Amnon Meisels
    A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:171-186 [Conf]
  15. Rakan El-Khalil, Angelos D. Keromytis
    Hydan: Hiding Information in Program Binaries. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:187-199 [Conf]
  16. Luke Hebbes, Andrew Lenaghan
    A Semi-fragile Steganographic Digital Signature for Images. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:200-210 [Conf]
  17. Marcel Fernandez, Miguel Soriano
    Identification of Traitors Using a Trellis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:211-222 [Conf]
  18. Joaquín García, Fabien Autrel, Joan Borrell, Sergio Castillo, Frédéric Cuppens, Guillermo Navarro
    Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:223-235 [Conf]
  19. Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh
    Reflector Attack Traceback System with Pushback Based iTrace Mechanism. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:236-248 [Conf]
  20. Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone Tini, Angelo Troina, Enrico Tronci
    Automatic Covert Channel Analysis of a Multilevel Secure Component. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:249-261 [Conf]
  21. Christopher Lynch, Catherine Meadows
    Sound Approximations to Diffie-Hellman Using Rewrite Rules. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:262-277 [Conf]
  22. Anton Kargl, Götz Wiesend
    On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:278-290 [Conf]
  23. Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee
    New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:291-304 [Conf]
  24. Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
    Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:305-317 [Conf]
  25. Oleksiy Mazhelis, Seppo Puuronen, Jari Veijalainen
    Modelling Dependencies Between Classifiers in Mobile Masquerader Detection. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:318-330 [Conf]
  26. Souhwan Jung, Fan Zhao, Shyhtsun Felix Wu, HyunGon Kim
    Threat Analysis on NEtwork MObility (NEMO). [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:331-342 [Conf]
  27. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
    Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:343-357 [Conf]
  28. Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
    Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV). [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:358-374 [Conf]
  29. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:375-387 [Conf]
  30. Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
    Security Analysis of the Generalized Self-shrinking Generator. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:388-400 [Conf]
  31. Bo-Yin Yang, Jiun-Ming Chen, Nicolas Courtois
    On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:401-413 [Conf]
  32. Jean Monnerat, Serge Vaudenay
    On Some Weak Extensions of AES and BES. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:414-426 [Conf]
  33. Slobodan Petrovic, Amparo Fúster-Sabater
    Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:427-439 [Conf]
  34. Mathieu Ciet, Christophe Giraud
    Transient Fault Induction Attacks on XTR. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:440-451 [Conf]
  35. Hsi-Chung Lin, Sung-Ming Yen, Guan-Ting Chen
    Adaptive-CCA on OpenPGP Revisited. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:452-464 [Conf]
  36. Nicolás González-Deleito, Olivier Markowitch, Emmanuel Dall'Olio
    A New Key-Insulated Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:465-479 [Conf]
  37. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
    Secure Hierarchical Identity Based Signature and Its Application. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:480-494 [Conf]
  38. Fabien Laguillaumie, Damien Vergnaud
    Multi-designated Verifiers Signatures. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:495-507 [Conf]
  39. Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li
    Dynamic Access Control for Multi-privileged Group Communications. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:508-519 [Conf]
  40. Kihun Hong, Souhwan Jung
    An Efficient Authentication Scheme Using Recovery Information in Signature. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:520-531 [Conf]
  41. Darren Davis, Fabian Monrose, Michael K. Reiter
    Time-Scoped Searching of Encrypted Audit Logs. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:532-545 [Conf]
  42. Habtamu Abie, Pål Spilling, Bent Foyn
    Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:546-562 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002