The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2003 (conf/isw/2003)

  1. Paul C. van Oorschot
    Revisiting Software Protection. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:1-13 [Conf]
  2. Adrian Baldwin, Simon Shiu
    Enabling Shared Audit Data. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:14-28 [Conf]
  3. Tuomas Aura
    Cryptographically Generated Addresses (CGA). [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:29-43 [Conf]
  4. Tim Kindberg, Kan Zhang
    Validating and Securing Spontaneous Associations between Wireless Devices. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:44-53 [Conf]
  5. Andreas Pashalidis, Chris J. Mitchell
    Single Sign-On Using Trusted Platforms. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:54-68 [Conf]
  6. David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
    Easy Verifiable Primitives and Practical Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:69-83 [Conf]
  7. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Reactively Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:84-95 [Conf]
  8. Jianying Zhou, Feng Bao, Robert H. Deng
    Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:96-110 [Conf]
  9. Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto
    A Fast Signature Scheme Based on New On-line Computation. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:111-121 [Conf]
  10. Javier Herranz, Carles Padró, Germán Sáez
    Distributed RSA Signature Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:122-136 [Conf]
  11. Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
    Divisible Voting Scheme. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:137-150 [Conf]
  12. Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
    Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:151-164 [Conf]
  13. Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
    The Design and Implementation of Protocol-Based Hidden Key Recovery. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:165-179 [Conf]
  14. Ueli M. Maurer
    Intrinsic Limitations of Digital Signatures and How to Cope with Them. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:180-192 [Conf]
  15. Sigrid Gürgens, Carsten Rudolph, Holger Vogt
    On the Security of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:193-207 [Conf]
  16. Feng Bao
    Security Analysis of a Password Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:208-217 [Conf]
  17. Toru Akishita, Tsuyoshi Takagi
    Zero-Value Point Attacks on Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:218-233 [Conf]
  18. David Wagner
    Cryptanalysis of an Algebraic Privacy Homomorphism. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:234-239 [Conf]
  19. Peter J. Leadbitter, Nigel P. Smart
    Analysis of the Insecurity of ECMQV with Partially Known Nonces. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:240-251 [Conf]
  20. Akashi Satoh, Sumio Morioka
    Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:252-266 [Conf]
  21. Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
    A Note on Weak Keys of PES, IDEA, and Some Extended Variants. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:267-279 [Conf]
  22. Tomasz Tyksinski
    Foundations of Differential Cryptanalysis in Abelian Groups. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:280-294 [Conf]
  23. Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta
    Trust and Authorization in Pervasive B2E Scenarios. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:295-309 [Conf]
  24. Chun Ruan, Vijay Varadharajan, Yan Zhang
    A Logic Model for Temporal Authorization Delegation with Negation. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:310-324 [Conf]
  25. Yongdong Wu
    Zero-Distortion Authentication Watermarking. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:325-337 [Conf]
  26. Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim
    Designated Verification of Non-invertible Watermark. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:338-351 [Conf]
  27. Hongxia Jin, Jeffery Lotspiech
    Proactive Software Tampering Detection. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:352-365 [Conf]
  28. Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee
    Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:366-380 [Conf]
  29. José Luis Vivas, José A. Montenegro, Javier Lopez
    Towards a Business Process-Driven Framework for Security Engineering with the UML. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:381-395 [Conf]
  30. Yvo Desmedt, Kaoru Kurosawa, Tri Van Le
    Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:396-407 [Conf]
  31. Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
    Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:408-421 [Conf]
  32. Tri Van Le, Mike Burmester, Jiangyi Hu
    Short c-Secure Fingerprinting Codes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:422-427 [Conf]
  33. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    The Role of Arbiters in Asymmetric Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:428-441 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002