The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
1998 (conf/icisc/1998)

  1. Ahto Buldas, Peeter Laud
    New linking schemes for digital time-stamping. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:3-13 [Conf]
  2. Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell
    A security architecture for third generation wireless systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:15-32 [Conf]
  3. Seong-Min Hong, Jun-Bum Shin, H. Lee-Kwang, Hyunsoo Yoon
    A new appraoch to server-aided secret computation. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:33-45 [Conf]
  4. Colin Boyd, DongGook Park
    Public key protocols for wireless communications. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:47-57 [Conf]
  5. Seungjoo Kim, Soohyun Oh, Dongho Won
    One-time self-certified public keys, revisited. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:59-69 [Conf]
  6. Luis Hernández Encinas, Fausto Montoya Vitini, Jaime Muñoz Masqué, Alberto Peinado Domínguez
    Maximal period of orbits of the BBS generator. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:71-80 [Conf]
  7. Eun Jeong Lee, Duk Soo Kim, Pil Joong Lee
    Speed-up of arithmetics in Fpm for elliptic curve cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:81-91 [Conf]
  8. Jae Woo Yoon, Sang Uk Shin, Kyung Hyune Rhee
    A secure hash function based on cellular automata. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:93-105 [Conf]
  9. William Millan
    Cryptanalysis of the alleged CAVE algorithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:107-119 [Conf]
  10. Sangwoo Park, Seongtaek Chee, Choonsik Park, Soo Hak Sung
    How to construct balanced Boolean functions with good global avalanche characteristics. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:121-130 [Conf]
  11. Yuliang Zheng, Xian-Mo Zhang
    The nonhomomorphicity of S-boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:131-145 [Conf]
  12. Ernst Georg Haffner, Thomas Engel, Christoph Meinel
    The flood-gate principle - a hybrid approach to a high security solution. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:147-160 [Conf]
  13. Jae Woo Yoon, Kyeoung Ju Ha, Chang Gu Kang, Sang Seob Song
    Development of the web security system using a cryptographic token. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:161-177 [Conf]
  14. Kazukuni Kobara, Hideki Imai
    A successive carrier-transmission model for narrow-band subliminal channels. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:179-187 [Conf]
  15. Byung Kak Lee, Cheol Won Lee, Chung Ho Park, Hong Sub Lee
    A study on appliance of role based access control model using role attributes. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:189-200 [Conf]
  16. Marc Gysin
    The discrete logarithm problem for Lucas sequences and a new class of weak RSA Moduli. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:201-209 [Conf]
  17. Sachar Paulus, Tsuyoshi Takagi
    A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:211-220 [Conf]
  18. Detlef Hühnlein, Andreas Meyer, Tsuyoshi Takagi
    Rabin and RSA analogues based on non-maximal imaginary quadratic orders. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:221-240 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002