The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2002 (conf/isw/2002)

  1. Heejin Jang, Sangwook Kim
    Real-Time Intruder Tracing through Self-Replication. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:1-16 [Conf]
  2. Taekyoung Kwon
    On the Difficulty of Protecting Private Keys in Software. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:17-31 [Conf]
  3. John S. Baras, Maben Rabi
    Intrusion Detection with Support Vector Machines and Generative Models. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:32-47 [Conf]
  4. Akashi Satoh, Sumio Morioka
    Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:48-62 [Conf]
  5. Helger Lipmaa
    Fast Software Implementations of SC2000. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:63-74 [Conf]
  6. Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott
    Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:75-89 [Conf]
  7. Kahil Jallad, Jonathan Katz, Bruce Schneier
    Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:90-101 [Conf]
  8. Guillermo Navarro, Sergi Robles, Joan Borrell
    Role-Based Access Control for E-commerce Sea-of-Data Applications. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:102-116 [Conf]
  9. Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno
    An Access Control Model for Tree Data Structures. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:117-135 [Conf]
  10. Ed Dawson, Javier Lopez, José A. Montenegro, Eiji Okamoto
    A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:136-149 [Conf]
  11. Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye
    Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:150-161 [Conf]
  12. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen
    Quantifying Privacy Leakage through Answering Database Queries. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:162-176 [Conf]
  13. Weidong Qiu, Kefei Chen, Dawu Gu
    A New Offline Privacy Protecting E-cash System with Revokable Anonymity. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:177-190 [Conf]
  14. Masayuki Abe, Koutarou Suzuki
    Receipt-Free Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:191-199 [Conf]
  15. Nicolás González-Deleito, Olivier Markowitch
    Exclusion-Freeness in Multi-party Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:200-209 [Conf]
  16. Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger
    A Realistic Protocol for Multi-party Certified Electronic Mail. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:210-219 [Conf]
  17. Shunsuke Araki
    A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:220-228 [Conf]
  18. Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila
    Comments to the UNCITRAL Model Law on Electronic Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:229-243 [Conf]
  19. Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai
    An Anonymous Loan System Based on Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:244-256 [Conf]
  20. Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    Traceability Schemes for Signed Documents. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:257-271 [Conf]
  21. Emmanuel Bresson, Jacques Stern
    Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:272-288 [Conf]
  22. Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo
    Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:289-299 [Conf]
  23. Soonhak Kwon, Heuisu Ryu
    Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2m). [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:300-308 [Conf]
  24. Yuji Watanabe, Masayuki Numao
    Conditional Cryptographic Delegation for P2P Data Sharing. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:309-321 [Conf]
  25. L. Chen, Keith Harrison, A. Moss, David Soldera, Nigel P. Smart
    Certification of Public Keys within an Identity Based System. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:322-333 [Conf]
  26. Jiande Zheng
    A New Public Key Cryptosystem for Constrained Hardware. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:334-341 [Conf]
  27. Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
    A Distributed and Computationally Secure Key Distribution Scheme. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:342-356 [Conf]
  28. Helger Lipmaa
    On Optimal Hash Tree Traversal for Interval Time-Stamping. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:357-371 [Conf]
  29. Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic
    An Efficient Dynamic and Distributed Cryptographic Accumulator. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:372-388 [Conf]
  30. Katsuyuki Okeya, Kouichi Sakurai
    A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:389-401 [Conf]
  31. Bodo Möller
    Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:402-413 [Conf]
  32. Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
    Automated Analysis of Some Security Mechanisms of SCEP. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:414-427 [Conf]
  33. José R. M. Monteiro, Ricardo Dahab
    An Attack on a Protocol for Certified Delivery. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:428-436 [Conf]
  34. Hiroaki Kikuchi
    Oblivious Counter and Majority Protocol. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:437-445 [Conf]
  35. Wai Han Soo, Azman Samsudin, Alwyn Goh
    Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:446-458 [Conf]
  36. Marcel Fernandez, Miguel Soriano
    Fingerprinting Concatenated Codes with Efficient Identification. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:459-470 [Conf]
  37. Josep Domingo-Ferrer
    A Provably Secure Additive and Multiplicative Privacy Homomorphism. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:471-483 [Conf]
  38. Yasuyuki Sakai, Kouichi Sakurai
    Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:484-500 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002