The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
1999 (conf/isw/1999)

  1. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Spending Programs: A Tool for Flexible Micropayments. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:1-13 [Conf]
  2. Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu
    Money Conservation via Atomicity in Fair Off-Line E-Cash. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:14-31 [Conf]
  3. Tim Ebringer, Peter Thorne
    Engineering an eCash System. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:32-36 [Conf]
  4. Toru Nakanishi, Nobuaki Haruna, Yuji Sugiyama
    Unlinkable Electronic Coupon Protocol with Anonymity Control. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:37-46 [Conf]
  5. Marc Joye, Narn-Yih Lee, Tzonelih Hwang
    On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:47-51 [Conf]
  6. Khaled M. Khan, Jun Han, Yuliang Zheng
    Security Properties of Software Components. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:52-56 [Conf]
  7. Dirk Westhoff, Markus Schneider II, Claus Unger, Firoz Kaderali
    Methods for Protecting a Mobile Agent's Route. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:57-71 [Conf]
  8. Hyung-Woo Lee, Jung-Eun Kim, Tai-Yun Kim
    Non-interactive Cryptosystem for Entity Authentication. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:72-84 [Conf]
  9. Jorge Davila, Javier Lopez, René Peralta
    Implementation of Virtual Private Networks at the Transport Layer. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:85-102 [Conf]
  10. Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi
    Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:103-117 [Conf]
  11. Yuji Watanabe, Hideki Imai
    Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:118-135 [Conf]
  12. Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze
    Highly Robust Image Watermarking Using Complementary Modulations. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:136-153 [Conf]
  13. Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona
    Region-Based Watermarking for Images. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:154-166 [Conf]
  14. Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng
    Digital Watermarking Robust Against JPEG Compression. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:167-190 [Conf]
  15. Josef Pieprzyk
    Fingerprints for Copyright Software Protection. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:178-190 [Conf]
  16. Sang Uk Shin, Kyeong Seop Sim, Kyung Hyune Rhee
    A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:191-201 [Conf]
  17. Tomas Sander, Amnon Ta-Shma
    On Anonymous Electronic Cash and Crime. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:202-206 [Conf]
  18. Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park
    On the Difficulty of Key Recovery Systems. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:207-224 [Conf]
  19. Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto
    An Improvement on a Practical Secret Voting Scheme. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:225-234 [Conf]
  20. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Undeniable Confirmer Signature. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:235-246 [Conf]
  21. Takeshi Okamoto, Mitsuru Tada, Eiji Okamoto
    Extended Proxy Signatures for Smart Cards. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:247-258 [Conf]
  22. Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai
    A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:259-270 [Conf]
  23. Marc Joye, Seungjoo Kim, Narn-Yih Lee
    Cryptanalysis of Two Group Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:271-275 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002