The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Practice and Experience (ispec)
2006 (conf/ispec/2006)

  1. Yoo-Jin Baek, Mi-Jung Noh
    DPA-Resistant Finite Field Multipliers and Secure AES Design. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:1-12 [Conf]
  2. Min Feng 0002, Bin B. Zhu, Cunlai Zhao, Shipeng Li
    Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:13-24 [Conf]
  3. Wang Baocang, Hu Yupu
    Diophantine Approximation Attack on a Fast Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:25-32 [Conf]
  4. Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
    Further Security Analysis of XTR. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:33-44 [Conf]
  5. Hao Luo, Binxing Fang, Xiao-chun Yun
    A Counting-Based Method for Massive Spam Mail Classification. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:45-56 [Conf]
  6. Ping Wang, Binxing Fang, Xiao-chun Yun
    Model and Estimation of Worm Propagation Under Network Partition. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:57-66 [Conf]
  7. Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi
    Tackling Worm Detection Speed and False Alarm in Virus Throttling. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:67-77 [Conf]
  8. Feng Xie, Shuo Bai
    Using Data Field to Analyze Network Intrusions. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:78-89 [Conf]
  9. Ji Wu, Chaoqun Ye, Shiyao Jin
    Adversarial Organization Modeling for Network Attack/Defense. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:90-99 [Conf]
  10. Zhifei Tao, Hai Jin, Zongfen Han, En Cheng
    A Novel Dynamic Immunization Strategy for Computer Network Epidemics. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:100-111 [Conf]
  11. Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu
    Preventing Web-Spoofing with Automatic Detecting Security Indicator. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:112-122 [Conf]
  12. Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu
    Security Protocol Analysis with Improved Authentication Tests. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:123-133 [Conf]
  13. Xiao Li, Mingxing He
    A Protocol of Member-Join in a Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:134-141 [Conf]
  14. Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
    More on Shared-Scalar-Product Protocols. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:142-152 [Conf]
  15. Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee
    Efficient Public Key Broadcast Encryption Using Identifier of Receivers. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:153-164 [Conf]
  16. Ling Dong, Kefei Chen
    A Practical Clumped-Tree Multicast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:165-176 [Conf]
  17. Jinye Peng, Guangqiang He, Jin Xiong, Guihua Zeng
    Trojan Horse Attack Strategy on Quantum Private Communication. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:177-186 [Conf]
  18. Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
    Linkable Democratic Group Signatures. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:187-201 [Conf]
  19. Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
    Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:202-213 [Conf]
  20. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Short (Identity-Based) Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:214-225 [Conf]
  21. Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
    Identity Based Key Insulated Signature. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:226-234 [Conf]
  22. Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai
    Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:235-247 [Conf]
  23. Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou
    A Design and Implementation of Profile Based Web Application Securing Proxy. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:248-259 [Conf]
  24. Muhammad Khurram Khan, Jiashu Zhang
    An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:260-268 [Conf]
  25. Gu Su Kim, Young Ik Eom
    Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:269-277 [Conf]
  26. Yahui Lu, Li Zhang, Yinbo Liu, Jiaguang Sun
    Using pi-Calculus to Formalize Domain Administration of RBAC. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:278-289 [Conf]
  27. Fangyong Hou, Hongjun He, Zhiying Wang, Kui Dai
    An Efficient Way to Build Secure Disk. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:290-301 [Conf]
  28. Hongxia Jin, Jeffery Lotspiech
    Practical Forensic Analysis in Advanced Access Content System. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:302-313 [Conf]
  29. Tianjie Cao, Xianping Mao, Dongdai Lin
    Security Analysis of a Server-Aided RSA Key Generation Protocol. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:314-320 [Conf]
  30. Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
    Integrating Grid with Cryptographic Computing. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:321-331 [Conf]
  31. Lan Zhou, Willy Susilo, Yi Mu
    Three-Round Secret Handshakes Based on ElGamal and DSA. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:332-342 [Conf]
  32. Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun
    Securing C Programs by Dynamic Type Checking. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:343-354 [Conf]
  33. Fenlin Liu, Bin Lu, Xiangyang Luo
    A Chaos-Based Robust Software Watermarking. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:355-366 [Conf]
  34. Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
    Privately Retrieve Data from Large Databases. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:367-378 [Conf]
  35. Seok Lee, Tai-Myung Chung, Myeonggil Choi
    An Empirical Study of Quality and Cost Based Security Engineering. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:379-389 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002