|
Conferences in DBLP
- Yoo-Jin Baek, Mi-Jung Noh
DPA-Resistant Finite Field Multipliers and Secure AES Design. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:1-12 [Conf]
- Min Feng 0002, Bin B. Zhu, Cunlai Zhao, Shipeng Li
Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:13-24 [Conf]
- Wang Baocang, Hu Yupu
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:25-32 [Conf]
- Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
Further Security Analysis of XTR. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:33-44 [Conf]
- Hao Luo, Binxing Fang, Xiao-chun Yun
A Counting-Based Method for Massive Spam Mail Classification. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:45-56 [Conf]
- Ping Wang, Binxing Fang, Xiao-chun Yun
Model and Estimation of Worm Propagation Under Network Partition. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:57-66 [Conf]
- Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi
Tackling Worm Detection Speed and False Alarm in Virus Throttling. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:67-77 [Conf]
- Feng Xie, Shuo Bai
Using Data Field to Analyze Network Intrusions. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:78-89 [Conf]
- Ji Wu, Chaoqun Ye, Shiyao Jin
Adversarial Organization Modeling for Network Attack/Defense. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:90-99 [Conf]
- Zhifei Tao, Hai Jin, Zongfen Han, En Cheng
A Novel Dynamic Immunization Strategy for Computer Network Epidemics. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:100-111 [Conf]
- Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu
Preventing Web-Spoofing with Automatic Detecting Security Indicator. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:112-122 [Conf]
- Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu
Security Protocol Analysis with Improved Authentication Tests. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:123-133 [Conf]
- Xiao Li, Mingxing He
A Protocol of Member-Join in a Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:134-141 [Conf]
- Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
More on Shared-Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:142-152 [Conf]
- Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee
Efficient Public Key Broadcast Encryption Using Identifier of Receivers. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:153-164 [Conf]
- Ling Dong, Kefei Chen
A Practical Clumped-Tree Multicast Encryption Scheme. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:165-176 [Conf]
- Jinye Peng, Guangqiang He, Jin Xiong, Guihua Zeng
Trojan Horse Attack Strategy on Quantum Private Communication. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:177-186 [Conf]
- Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
Linkable Democratic Group Signatures. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:187-201 [Conf]
- Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:202-213 [Conf]
- Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
Short (Identity-Based) Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:214-225 [Conf]
- Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
Identity Based Key Insulated Signature. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:226-234 [Conf]
- Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:235-247 [Conf]
- Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou
A Design and Implementation of Profile Based Web Application Securing Proxy. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:248-259 [Conf]
- Muhammad Khurram Khan, Jiashu Zhang
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:260-268 [Conf]
- Gu Su Kim, Young Ik Eom
Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:269-277 [Conf]
- Yahui Lu, Li Zhang, Yinbo Liu, Jiaguang Sun
Using pi-Calculus to Formalize Domain Administration of RBAC. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:278-289 [Conf]
- Fangyong Hou, Hongjun He, Zhiying Wang, Kui Dai
An Efficient Way to Build Secure Disk. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:290-301 [Conf]
- Hongxia Jin, Jeffery Lotspiech
Practical Forensic Analysis in Advanced Access Content System. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:302-313 [Conf]
- Tianjie Cao, Xianping Mao, Dongdai Lin
Security Analysis of a Server-Aided RSA Key Generation Protocol. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:314-320 [Conf]
- Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
Integrating Grid with Cryptographic Computing. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:321-331 [Conf]
- Lan Zhou, Willy Susilo, Yi Mu
Three-Round Secret Handshakes Based on ElGamal and DSA. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:332-342 [Conf]
- Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun
Securing C Programs by Dynamic Type Checking. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:343-354 [Conf]
- Fenlin Liu, Bin Lu, Xiangyang Luo
A Chaos-Based Robust Software Watermarking. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:355-366 [Conf]
- Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
Privately Retrieve Data from Large Databases. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:367-378 [Conf]
- Seok Lee, Tai-Myung Chung, Myeonggil Choi
An Empirical Study of Quality and Cost Based Security Engineering. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:379-389 [Conf]
|