The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2005 (conf/icisc/2005)

  1. David Naccache
    National Security, Forensics and Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:1- [Conf]
  2. Shigeo Tsujii
    Information Security as Interdisciplinary Science Based on Ethics. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:2- [Conf]
  3. Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
    A Timed-Release Key Management Scheme for Backward Recovery. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:3-14 [Conf]
  4. André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi
    Property-Based Broadcast Encryption for Multi-level Security Policies. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:15-31 [Conf]
  5. Felix Brandt
    Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:32-47 [Conf]
  6. Woong-Sik Kim, Weon-Hee Yoo, Jang-Hyun Park, Bok-Ki Kim
    An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:48-55 [Conf]
  7. Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon
    Trust Management for Resilient Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:56-68 [Conf]
  8. Vipul Goyal, Abhishek Jain 0002, Jean-Jacques Quisquater
    Improvements to Mitchell's Remote User Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:69-80 [Conf]
  9. Shaoquan Jiang, Guang Gong
    Efficient Authenticators with Application to Key Exchange. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:81-91 [Conf]
  10. Jacques Patarin, Audrey Montreuil
    Benes and Butterfly Schemes Revisited. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:92-116 [Conf]
  11. Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha
    Relative Doubling Attack Against Montgomery Ladder. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:117-128 [Conf]
  12. Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
    Improved Collision Attack on MD4 with Probability Almost 1. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:129-145 [Conf]
  13. Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho
    Finding Collision on 45-Step HAS-160. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:146-155 [Conf]
  14. David Molnar, Matt Piotrowski, David Schultz, David Wagner
    The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:156-168 [Conf]
  15. Chang-da Wang, Shiguang Ju
    The Dilemma of Covert Channels Searching. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:169-174 [Conf]
  16. Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik
    A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:175-185 [Conf]
  17. Sjouke Mauw, Martijn Oostdijk
    Foundations of Attack Trees. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:186-198 [Conf]
  18. Nicolas Courtois, Louis Goubin
    An Algebraic Masking Method to Protect AES Against Power Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:199-209 [Conf]
  19. Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic
    Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:210-228 [Conf]
  20. Wenling Wu, Wentao Zhang, Dengguo Feng
    Integral Cryptanalysis of Reduced FOX Block Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:229-241 [Conf]
  21. Kazuhiko Minematsu, Yukiyasu Tsunoo
    Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:242-260 [Conf]
  22. Nicolas Courtois
    Cryptanalysis of Sfinks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:261-269 [Conf]
  23. Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang
    Weaknesses of COSvd (2, 128) Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:270-283 [Conf]
  24. Kazuhiko Minematsu, Yukiyasu Tsunoo
    Expanding Weak PRF with Small Key Size. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:284-298 [Conf]
  25. Jacques Patarin
    On Linear Systems of Equations with Distinct Variables and Small Block Size. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:299-321 [Conf]
  26. Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez
    An FPGA Implementation of CCM Mode Using AES. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:322-334 [Conf]
  27. Soonhak Kwon, Taekyoung Kwon, Young-Ho Park
    New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:335-351 [Conf]
  28. Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song
    An Efficient Design of CCMP for Robust Security Network. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:352-361 [Conf]
  29. Gisle Grimen, Christian Mönch, Roger Midtstraum
    Software-Based Copy Protection for Temporal Media During Dissemination and Playback. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:362-377 [Conf]
  30. Grace C.-W. Ting
    Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:378-388 [Conf]
  31. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu
    Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:389-409 [Conf]
  32. Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu
    An Efficient Static Blind Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:410-423 [Conf]
  33. Sanjit Chatterjee, Palash Sarkar
    Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:424-440 [Conf]
  34. Duc-Liem Vo, Kwangjo Kim
    Yet Another Forward Secure Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:441-455 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002