|
Conferences in DBLP
- Heejin Jang, Sangwook Kim
Real-Time Intruder Tracing through Self-Replication. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:1-16 [Conf]
- Taekyoung Kwon
On the Difficulty of Protecting Private Keys in Software. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:17-31 [Conf]
- John S. Baras, Maben Rabi
Intrusion Detection with Support Vector Machines and Generative Models. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:32-47 [Conf]
- Akashi Satoh, Sumio Morioka
Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:48-62 [Conf]
- Helger Lipmaa
Fast Software Implementations of SC2000. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:63-74 [Conf]
- Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:75-89 [Conf]
- Kahil Jallad, Jonathan Katz, Bruce Schneier
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:90-101 [Conf]
- Guillermo Navarro, Sergi Robles, Joan Borrell
Role-Based Access Control for E-commerce Sea-of-Data Applications. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:102-116 [Conf]
- Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno
An Access Control Model for Tree Data Structures. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:117-135 [Conf]
- Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:136-149 [Conf]
- Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:150-161 [Conf]
- Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen
Quantifying Privacy Leakage through Answering Database Queries. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:162-176 [Conf]
- Weidong Qiu, Kefei Chen, Dawu Gu
A New Offline Privacy Protecting E-cash System with Revokable Anonymity. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:177-190 [Conf]
- Masayuki Abe, Koutarou Suzuki
Receipt-Free Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:191-199 [Conf]
- Nicolás González-Deleito, Olivier Markowitch
Exclusion-Freeness in Multi-party Exchange Protocols. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:200-209 [Conf]
- Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger
A Realistic Protocol for Multi-party Certified Electronic Mail. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:210-219 [Conf]
- Shunsuke Araki
A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:220-228 [Conf]
- Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila
Comments to the UNCITRAL Model Law on Electronic Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:229-243 [Conf]
- Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai
An Anonymous Loan System Based on Group Signature Scheme. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:244-256 [Conf]
- Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai
Traceability Schemes for Signed Documents. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:257-271 [Conf]
- Emmanuel Bresson, Jacques Stern
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:272-288 [Conf]
- Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo
Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:289-299 [Conf]
- Soonhak Kwon, Heuisu Ryu
Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2m). [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:300-308 [Conf]
- Yuji Watanabe, Masayuki Numao
Conditional Cryptographic Delegation for P2P Data Sharing. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:309-321 [Conf]
- L. Chen, Keith Harrison, A. Moss, David Soldera, Nigel P. Smart
Certification of Public Keys within an Identity Based System. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:322-333 [Conf]
- Jiande Zheng
A New Public Key Cryptosystem for Constrained Hardware. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:334-341 [Conf]
- Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
A Distributed and Computationally Secure Key Distribution Scheme. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:342-356 [Conf]
- Helger Lipmaa
On Optimal Hash Tree Traversal for Interval Time-Stamping. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:357-371 [Conf]
- Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic
An Efficient Dynamic and Distributed Cryptographic Accumulator. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:372-388 [Conf]
- Katsuyuki Okeya, Kouichi Sakurai
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:389-401 [Conf]
- Bodo Möller
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:402-413 [Conf]
- Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
Automated Analysis of Some Security Mechanisms of SCEP. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:414-427 [Conf]
- José R. M. Monteiro, Ricardo Dahab
An Attack on a Protocol for Certified Delivery. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:428-436 [Conf]
- Hiroaki Kikuchi
Oblivious Counter and Majority Protocol. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:437-445 [Conf]
- Wai Han Soo, Azman Samsudin, Alwyn Goh
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:446-458 [Conf]
- Marcel Fernandez, Miguel Soriano
Fingerprinting Concatenated Codes with Efficient Identification. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:459-470 [Conf]
- Josep Domingo-Ferrer
A Provably Secure Additive and Multiplicative Privacy Homomorphism. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:471-483 [Conf]
- Yasuyuki Sakai, Kouichi Sakurai
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:484-500 [Conf]
|