Conferences in DBLP
William J. Caelli Application Security - Myth Or Reality? [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:1-10 [Conf ] Lucas Chi Kwong Hui , K. P. Chow , Siu-Ming Yiu Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:11-19 [Conf ] Jorge Nakahara Jr. A Linear Analysis of Blowfish and Khufu. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:20-32 [Conf ] Gaoli Wang Related-Key Rectangle Attack on 43-Round SHACAL-2. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:33-42 [Conf ] Zhenglin Liu , Xu Guo , Yi-Cheng Chen , Yu Han , Xuecheng Zou On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:43-50 [Conf ] Tetsuya Izu , Noboru Kunihiro , Kazuo Ohta , Masahiko Takenaka , Takashi Yoshioka A Sanitizable Signature Scheme with Aggregation. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:51-64 [Conf ] Jianhong Zhang , Jian Mao A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:65-78 [Conf ] Man Ho Au , Joseph K. Liu , Willy Susilo , Tsz Hon Yuen Certificate Based (Linkable) Ring Signature. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:79-92 [Conf ] Saeran Kwon , Sang-Ho Lee An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:93-104 [Conf ] Zuhua Shao On the Sequentiality of Three Optimal Structured Multisignature Schemes. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:105-115 [Conf ] Di Ma Secure Feedback Service in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:116-128 [Conf ] Zhen Cao , Zhi Guan , Zhong Chen , Jian-bin Hu , Liyong Tang An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:129-144 [Conf ] Peter C. S. Kwan , Glenn Durfee Practical Uses of Virtual Machines for Protection of Sensitive User Data. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:145-161 [Conf ] Jung-Hwa Chae , Nematollaah Shiri Formalization of RBAC Policy with Object Class Hierarchy. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:162-176 [Conf ] Yanjiang Yang , Robert H. Deng , Feng Bao Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:177-192 [Conf ] Chunhua Su , Jianying Zhou , Feng Bao , Tsuyoshi Takagi , Kouichi Sakurai Two-Party Privacy-Preserving Agglomerative Document Clustering. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:193-208 [Conf ] Kun Peng , Ed Dawson Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:209-224 [Conf ] Yoo-Jin Baek , Ihor Vasyltsov How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:225-237 [Conf ] Dong-Guk Han , Sung-Kyoung Kim , Howon Kim , Kyoil Chung , Jongin Lim Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:238-253 [Conf ] Masaaki Shirase , Tsuyoshi Takagi , Eiji Okamoto Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:254-268 [Conf ] Pradeep Kumar Mishra , Pinakpani Pal , Palash Sarkar Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:269-283 [Conf ] Robert H. Deng , Yanjiang Yang Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:284-300 [Conf ] Minghui Zheng , Guohua Cui , Muxiang Yang , Jun Li Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:301-313 [Conf ] Jiyong Jang , Taekyoung Kwon , JooSeok Song A Time-Based Key Management Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:314-328 [Conf ] Shengli Liu , Kefei Chen , Weidong Qiu Identity-Based Threshold Decryption Revisited. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:329-343 [Conf ] Miyuki Uno , M. Kano Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:344-359 [Conf ]