The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Practice and Experience (ispec)
2007 (conf/ispec/2007)

  1. William J. Caelli
    Application Security - Myth Or Reality? [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:1-10 [Conf]
  2. Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
    Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:11-19 [Conf]
  3. Jorge Nakahara Jr.
    A Linear Analysis of Blowfish and Khufu. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:20-32 [Conf]
  4. Gaoli Wang
    Related-Key Rectangle Attack on 43-Round SHACAL-2. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:33-42 [Conf]
  5. Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou
    On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:43-50 [Conf]
  6. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
    A Sanitizable Signature Scheme with Aggregation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:51-64 [Conf]
  7. Jianhong Zhang, Jian Mao
    A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:65-78 [Conf]
  8. Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
    Certificate Based (Linkable) Ring Signature. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:79-92 [Conf]
  9. Saeran Kwon, Sang-Ho Lee
    An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:93-104 [Conf]
  10. Zuhua Shao
    On the Sequentiality of Three Optimal Structured Multisignature Schemes. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:105-115 [Conf]
  11. Di Ma
    Secure Feedback Service in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:116-128 [Conf]
  12. Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang
    An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:129-144 [Conf]
  13. Peter C. S. Kwan, Glenn Durfee
    Practical Uses of Virtual Machines for Protection of Sensitive User Data. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:145-161 [Conf]
  14. Jung-Hwa Chae, Nematollaah Shiri
    Formalization of RBAC Policy with Object Class Hierarchy. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:162-176 [Conf]
  15. Yanjiang Yang, Robert H. Deng, Feng Bao
    Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:177-192 [Conf]
  16. Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai
    Two-Party Privacy-Preserving Agglomerative Document Clustering. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:193-208 [Conf]
  17. Kun Peng, Ed Dawson
    Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:209-224 [Conf]
  18. Yoo-Jin Baek, Ihor Vasyltsov
    How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:225-237 [Conf]
  19. Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim
    Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:238-253 [Conf]
  20. Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
    Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:254-268 [Conf]
  21. Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar
    Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:269-283 [Conf]
  22. Robert H. Deng, Yanjiang Yang
    Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:284-300 [Conf]
  23. Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li
    Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:301-313 [Conf]
  24. Jiyong Jang, Taekyoung Kwon, JooSeok Song
    A Time-Based Key Management Protocol for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:314-328 [Conf]
  25. Shengli Liu, Kefei Chen, Weidong Qiu
    Identity-Based Threshold Decryption Revisited. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:329-343 [Conf]
  26. Miyuki Uno, M. Kano
    Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:344-359 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002