The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2002 (conf/icisc/2002)

  1. Serge Lefranc, David Naccache
    Cut-&-Paste Attacks with JAVA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:1-15 [Conf]
  2. Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim
    Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:16-34 [Conf]
  3. Jun-Bum Shin, Kwangsu Lee, Kyungah Shim
    New DSA-Verifiable Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:35-47 [Conf]
  4. Yuh-Dauh Lyuu, Ming-Luen Wu
    Convertible Group Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:48-61 [Conf]
  5. Willy Susilo, Reihaneh Safavi-Naini
    An Efficient Fail-Stop Signature Scheme Based on Factorization. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:62-74 [Conf]
  6. Guilin Wang
    On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:75-89 [Conf]
  7. Hyungjong Kim
    System Specification Based Network Modeling for Survivability Testing Simulation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:90-106 [Conf]
  8. Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han
    A Risk-Sensitive Intrusion Detection Model. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:107-117 [Conf]
  9. Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen
    Applet Verification Strategiesfor RAM-Constrained Devices. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:118-137 [Conf]
  10. Raphael Chung-Wei Phan, Soichi Furuya
    Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:138-148 [Conf]
  11. Beomsik Song, Jennifer Seberry
    Consistent Differential Patterns of Rijndael. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:149-163 [Conf]
  12. Lu Xiao, Howard M. Heys
    Hardware Design and Analysisof Block Cipher Components. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:164-181 [Conf]
  13. Nicolas Courtois
    Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:182-199 [Conf]
  14. Erik Zenner
    On the Efficiency of theClock Control Guessing Attack. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:200-212 [Conf]
  15. Se Ah Choi, Kyeongcheol Yang
    Balanced Shrinking Generators. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:213-225 [Conf]
  16. Tetsu Iwata, Kaoru Kurosawa
    On the Universal Hash Functionsin Luby-Rackoff Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:226-236 [Conf]
  17. Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild
    Threshold MACs. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:237-252 [Conf]
  18. Josef Pieprzyk, Xian-Mo Zhang
    Ideal Threshold Schemes from MDS Codes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:253-263 [Conf]
  19. Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
    New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:264-282 [Conf]
  20. Tetsuya Izu, Tsuyoshi Takagi
    Efficient Computations of the Tate Pairingfor the Large MOV Degrees. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:283-297 [Conf]
  21. Bodo Möller
    Improved Techniques for Fast Exponentiation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:298-312 [Conf]
  22. Hyun-Gyu Kim, Hyeong-Cheol Oh
    Efficient Hardware Multiplicative Inverters. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:313-326 [Conf]
  23. Régis Bevan, Erik Knudsen
    Ways to Enhance Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:327-342 [Conf]
  24. Stefan Mangard
    A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:343-358 [Conf]
  25. Kouichi Sakurai, Tsuyoshi Takagi
    A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:359-373 [Conf]
  26. Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
    Hardware Fault Attackon RSA with CRT Revisited. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:374-388 [Conf]
  27. Byoungcheon Lee, Kwangjo Kim
    Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:389-406 [Conf]
  28. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Non-interactive Auction Schemewith Strong Privacy. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:407-420 [Conf]
  29. Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim
    An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:421-432 [Conf]
  30. Yaron Sella
    Speeding Up Secure Sessions Establishment on the Internet. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:433-450 [Conf]
  31. Olivier Markowitch, Dieter Gollmann, Steve Kremer
    On Fairness in Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:451-464 [Conf]
  32. Jaeil Lee, Taekyoung Kwon, Sanghoon Song, JooSeok Song
    A Model for Embedding and Authorizing Digital Signatures in Printed Documents. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:465-477 [Conf]
  33. Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang
    A Dynamic Group Key Distribution Scheme with Flexible User Join. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:478-496 [Conf]
  34. Ju Hee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park
    Efficient Multicast Key Management for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:497-509 [Conf]
  35. Youn-Hee Gil, Daesung Moon, Sung Bum Pan, Yongwha Chung
    Fingerprint Verification System Involving Smart Card. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:510-524 [Conf]
  36. Choonwoo Ryu, Hakil Kim
    A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:525-533 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002