|
Conferences in DBLP
- Paul C. van Oorschot
Revisiting Software Protection. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:1-13 [Conf]
- Adrian Baldwin, Simon Shiu
Enabling Shared Audit Data. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:14-28 [Conf]
- Tuomas Aura
Cryptographically Generated Addresses (CGA). [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:29-43 [Conf]
- Tim Kindberg, Kan Zhang
Validating and Securing Spontaneous Associations between Wireless Devices. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:44-53 [Conf]
- Andreas Pashalidis, Chris J. Mitchell
Single Sign-On Using Trusted Platforms. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:54-68 [Conf]
- David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
Easy Verifiable Primitives and Practical Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:69-83 [Conf]
- Michael Backes, Birgit Pfitzmann, Michael Waidner
Reactively Secure Signature Schemes. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:84-95 [Conf]
- Jianying Zhou, Feng Bao, Robert H. Deng
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:96-110 [Conf]
- Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto
A Fast Signature Scheme Based on New On-line Computation. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:111-121 [Conf]
- Javier Herranz, Carles Padró, Germán Sáez
Distributed RSA Signature Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:122-136 [Conf]
- Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
Divisible Voting Scheme. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:137-150 [Conf]
- Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:151-164 [Conf]
- Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
The Design and Implementation of Protocol-Based Hidden Key Recovery. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:165-179 [Conf]
- Ueli M. Maurer
Intrinsic Limitations of Digital Signatures and How to Cope with Them. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:180-192 [Conf]
- Sigrid Gürgens, Carsten Rudolph, Holger Vogt
On the Security of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:193-207 [Conf]
- Feng Bao
Security Analysis of a Password Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:208-217 [Conf]
- Toru Akishita, Tsuyoshi Takagi
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:218-233 [Conf]
- David Wagner
Cryptanalysis of an Algebraic Privacy Homomorphism. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:234-239 [Conf]
- Peter J. Leadbitter, Nigel P. Smart
Analysis of the Insecurity of ECMQV with Partially Known Nonces. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:240-251 [Conf]
- Akashi Satoh, Sumio Morioka
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:252-266 [Conf]
- Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
A Note on Weak Keys of PES, IDEA, and Some Extended Variants. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:267-279 [Conf]
- Tomasz Tyksinski
Foundations of Differential Cryptanalysis in Abelian Groups. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:280-294 [Conf]
- Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta
Trust and Authorization in Pervasive B2E Scenarios. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:295-309 [Conf]
- Chun Ruan, Vijay Varadharajan, Yan Zhang
A Logic Model for Temporal Authorization Delegation with Negation. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:310-324 [Conf]
- Yongdong Wu
Zero-Distortion Authentication Watermarking. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:325-337 [Conf]
- Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim
Designated Verification of Non-invertible Watermark. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:338-351 [Conf]
- Hongxia Jin, Jeffery Lotspiech
Proactive Software Tampering Detection. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:352-365 [Conf]
- Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:366-380 [Conf]
- José Luis Vivas, José A. Montenegro, Javier Lopez
Towards a Business Process-Driven Framework for Security Engineering with the UML. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:381-395 [Conf]
- Yvo Desmedt, Kaoru Kurosawa, Tri Van Le
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:396-407 [Conf]
- Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:408-421 [Conf]
- Tri Van Le, Mike Burmester, Jiangyi Hu
Short c-Secure Fingerprinting Codes. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:422-427 [Conf]
- Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
The Role of Arbiters in Asymmetric Authentication Schemes. [Citation Graph (0, 0)][DBLP] ISC, 2003, pp:428-441 [Conf]
|