|
Conferences in DBLP
- Michael K. Reiter
Security by, and for, Converged Mobile Devices. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:1- [Conf]
- Frank Stajano
Security for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:2- [Conf]
- Nicolas Courtois
Algebraic Attacks on Combiners with Memory and Several Outputs. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:3-20 [Conf]
- Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:21-32 [Conf]
- Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:33-50 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
An Efficient and Verifiable Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:51-66 [Conf]
- Bo-Yin Yang, Jiun-Ming Chen
All in the XL Family: Theory and Practice. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:67-86 [Conf]
- Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim
Efficient Broadcast Encryption Using Multiple Interpolation Methods. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:87-103 [Conf]
- Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen
On Private Scalar Product Computation for Privacy-Preserving Data Mining. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:104-120 [Conf]
- Dae Hyun Yum, Pil Joong Lee
Separable Implicit Certificate Revocation. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:121-136 [Conf]
- Bodo Möller
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:137-153 [Conf]
- Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha
Improvement on Ha-Moon Randomized Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:154-167 [Conf]
- Sanjit Chatterjee, Palash Sarkar, Rana Barua
Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:168-181 [Conf]
- Jens-Matthias Bohli, Rainer Steinwandt
On Subliminal Channels in Deterministic Signature Schemes. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:182-194 [Conf]
- Seungjoo Kim, Dongho Won
Threshold Entrusted Undeniable Signature. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:195-203 [Conf]
- Joseph K. Liu, Duncan S. Wong
On the Security Models of (Threshold) Ring Signature Schemes. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:204-217 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
Identity Based Threshold Ring Signature. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:218-232 [Conf]
- HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
Batch Verifications with ID-Based Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:233-248 [Conf]
- Yasuyuki Nogami, Yoshitaka Morikawa
A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:249-260 [Conf]
- Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis
Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:261-278 [Conf]
- Katsuyuki Takashima
New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:279-295 [Conf]
- Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:296-312 [Conf]
- Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee
On the Pseudorandomness of a Modification of KASUMI Type Permutations. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:313-329 [Conf]
- Shoichi Hirose
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:330-342 [Conf]
- Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong
Padding Oracle Attacks on Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:343-351 [Conf]
- Hua Chen, Dengguo Feng
An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:352-361 [Conf]
- Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
Identity-Based Access Control for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:362-379 [Conf]
- Marcin Gogolewski, Miroslaw Kutylowski, Tomasz Luczak
Mobile Mixing. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:380-393 [Conf]
- Minsoo Lee, Jintaek Kim, Sehyun Park, Ohyoung Song, Sungik Jun
A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:394-406 [Conf]
- Kalle Burbeck, Simin Nadjm-Tehrani
ADWICE - Anomaly Detection with Real-Time Incremental Clustering. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:407-424 [Conf]
- Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere
Steganography for Executables and Code Transformation Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:425-439 [Conf]
- Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim
On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:440-454 [Conf]
- Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao
A Block Oriented Fingerprinting Scheme in Relational Database. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:455-466 [Conf]
- Youngchan Han, Choonwoo Ryu, Jihyun Moon, Hakil Kim, H. Choi
A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:467-477 [Conf]
- Chao Li, Armando Barreto
Profile-Based 3D Face Registration and Recognition. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:478-488 [Conf]
|