The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2004 (conf/icisc/2004)

  1. Michael K. Reiter
    Security by, and for, Converged Mobile Devices. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:1- [Conf]
  2. Frank Stajano
    Security for Ubiquitous Computing. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:2- [Conf]
  3. Nicolas Courtois
    Algebraic Attacks on Combiners with Memory and Several Outputs. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:3-20 [Conf]
  4. Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim
    New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:21-32 [Conf]
  5. Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
    Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:33-50 [Conf]
  6. Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
    An Efficient and Verifiable Solution to the Millionaire Problem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:51-66 [Conf]
  7. Bo-Yin Yang, Jiun-Ming Chen
    All in the XL Family: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:67-86 [Conf]
  8. Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim
    Efficient Broadcast Encryption Using Multiple Interpolation Methods. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:87-103 [Conf]
  9. Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen
    On Private Scalar Product Computation for Privacy-Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:104-120 [Conf]
  10. Dae Hyun Yum, Pil Joong Lee
    Separable Implicit Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:121-136 [Conf]
  11. Bodo Möller
    Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:137-153 [Conf]
  12. Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha
    Improvement on Ha-Moon Randomized Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:154-167 [Conf]
  13. Sanjit Chatterjee, Palash Sarkar, Rana Barua
    Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:168-181 [Conf]
  14. Jens-Matthias Bohli, Rainer Steinwandt
    On Subliminal Channels in Deterministic Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:182-194 [Conf]
  15. Seungjoo Kim, Dongho Won
    Threshold Entrusted Undeniable Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:195-203 [Conf]
  16. Joseph K. Liu, Duncan S. Wong
    On the Security Models of (Threshold) Ring Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:204-217 [Conf]
  17. Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
    Identity Based Threshold Ring Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:218-232 [Conf]
  18. HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
    Batch Verifications with ID-Based Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:233-248 [Conf]
  19. Yasuyuki Nogami, Yoshitaka Morikawa
    A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:249-260 [Conf]
  20. Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis
    Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:261-278 [Conf]
  21. Katsuyuki Takashima
    New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:279-295 [Conf]
  22. Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi
    Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:296-312 [Conf]
  23. Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee
    On the Pseudorandomness of a Modification of KASUMI Type Permutations. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:313-329 [Conf]
  24. Shoichi Hirose
    Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:330-342 [Conf]
  25. Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong
    Padding Oracle Attacks on Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:343-351 [Conf]
  26. Hua Chen, Dengguo Feng
    An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:352-361 [Conf]
  27. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Identity-Based Access Control for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:362-379 [Conf]
  28. Marcin Gogolewski, Miroslaw Kutylowski, Tomasz Luczak
    Mobile Mixing. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:380-393 [Conf]
  29. Minsoo Lee, Jintaek Kim, Sehyun Park, Ohyoung Song, Sungik Jun
    A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:394-406 [Conf]
  30. Kalle Burbeck, Simin Nadjm-Tehrani
    ADWICE - Anomaly Detection with Real-Time Incremental Clustering. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:407-424 [Conf]
  31. Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere
    Steganography for Executables and Code Transformation Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:425-439 [Conf]
  32. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim
    On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:440-454 [Conf]
  33. Siyuan Liu, Shuhong Wang, Robert H. Deng, Weizhong Shao
    A Block Oriented Fingerprinting Scheme in Relational Database. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:455-466 [Conf]
  34. Youngchan Han, Choonwoo Ryu, Jihyun Moon, Hakil Kim, H. Choi
    A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:467-477 [Conf]
  35. Chao Li, Armando Barreto
    Profile-Based 3D Face Registration and Recognition. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:478-488 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002