The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2000 (conf/isw/2000)

  1. Minoru Kuribayashi, Hatsukazu Tanaka
    A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:1-14 [Conf]
  2. Oliver Benedens
    Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:15-29 [Conf]
  3. René Rosenbaum, Heidrun Schumann
    A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:30-43 [Conf]
  4. Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:44-53 [Conf]
  5. Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona
    Region-Based Watermarking by Distribution Adjustment. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:54-68 [Conf]
  6. Tapio Seppänen, Kaisu Mäkelä, Anja Keskinarkaus
    Hiding Information in Color Images Using Small Color Palettes. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:69-81 [Conf]
  7. Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya
    An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:82-96 [Conf]
  8. Tina Lindkvist
    Characteristics of Some Binary Codes for Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:97-107 [Conf]
  9. Kazumasa Omote, Atsuko Miyaji
    An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:108-120 [Conf]
  10. Toru Nakanishi, Yuji Sugiyama
    Unlinkable Divisible Electronic Cash. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:121-134 [Conf]
  11. Sung-Ming Yen, Yuliang Zheng
    Weighted One-Way Hash Chain and Its Applications. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:135-148 [Conf]
  12. Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson
    Linkability in Practical Electronic Cash Design. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:149-163 [Conf]
  13. Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot
    Towards a Practical Secure Framework for Mobile Code Commerce. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:164-178 [Conf]
  14. Ali Aydin Selçuk, Deepinder P. Sidhu
    Probabilistic Methods in Multicast Key Management. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:179-193 [Conf]
  15. DongGook Park, Colin Boyd, Ed Dawson
    Classification of Authentication Protocols: A Practical Approach. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:194-208 [Conf]
  16. Colin Boyd, Peter Kearney
    Exploring Fair Exchange Protocols Using Specification Animation. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:209-223 [Conf]
  17. Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai
    A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:224-236 [Conf]
  18. Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger
    An Efficient Protocol for Certified Electronic Mail. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:237-248 [Conf]
  19. Xiaodong Lin, Johnny W. Wong, Weidong Kou
    Performance Analysis of Secure Web Server Based on SSL. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:249-261 [Conf]
  20. Stephen P. Morgan, Stephen W. Neal, Melissa A. Hartman, Matthew R. Laue
    Sherlock: Commercial High Assurance Network Computing. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:262-276 [Conf]
  21. Christian Payne
    The Role of the Development Process in Operating System Security. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:277-291 [Conf]
  22. Reihaneh Safavi-Naini, Willy Susilo
    Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:292-307 [Conf]
  23. Ron Steinfeld, Yuliang Zheng
    A Signcryption Scheme Based on Integer Factorization. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:308-322 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002