The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2001 (conf/isw/2001)

  1. Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
    Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:1-17 [Conf]
  2. Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky
    Privacy Amplification Theorem for Noisy Main Channel. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:18-26 [Conf]
  3. Giovanni Di Crescenzo, Olga Kornievskaia
    Efficient Kerberized Multicast in a Practical Distributed Setting. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:27-45 [Conf]
  4. Sigrid Gürgens, Javier Lopez
    Suitability of a Classical Analysis Method for E-commerce Protocols. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:46-62 [Conf]
  5. Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
    Hyppocrates. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:63-80 [Conf]
  6. Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi
    Lenient/Strict Batch Verification in Several Groups. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:81-94 [Conf]
  7. Dmitri Asonov, Markus Schaal, Johann Christoph Freytag
    Absolute Privacy in Voting. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:95-109 [Conf]
  8. Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
    A Logical Model for Privacy Protection. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:110-124 [Conf]
  9. Enriquillo Valdez, Moti Yung
    DISSECT: DIStribution for SECurity Tool. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:125-143 [Conf]
  10. Stanley Chow, Yuan Gu, Harold Johnson, Vladimir A. Zakharov
    An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:144-155 [Conf]
  11. Mark Chapman, George I. Davida, Marc Rennhard
    A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:156-165 [Conf]
  12. David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra
    Robust New Method in Frequency Domain Watermarking. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:166-182 [Conf]
  13. Diana Berbecaru, Antonio Lioy, Marius Marian
    On the Complexity of Public-Key Certificate Validation. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:183-203 [Conf]
  14. Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila
    Liability of Certification Authorities: A Juridical Point of View. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:204-219 [Conf]
  15. Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott
    Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:220-234 [Conf]
  16. Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro
    Elliptic Curve Arithmetic Using SIMD. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:235-247 [Conf]
  17. Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi
    On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:248-265 [Conf]
  18. Sheng-Bo Xu, Lejla Batina
    Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:266-279 [Conf]
  19. Rainer Steinwandt, Willi Geiselmann, Thomas Beth
    A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:280-293 [Conf]
  20. Routo Terada, Paulo G. Pinheiro
    Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:294-309 [Conf]
  21. Ismael Jiménez Calvo, Germán Sáez
    Approximate Power Roots in Zm. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:310-323 [Conf]
  22. Bodo Möller
    Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:324-334 [Conf]
  23. Sofia K. Tzelepi, George Pangalos
    A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:335-346 [Conf]
  24. Elisa Bertino, Barbara Carminati, Elena Ferrari
    A Secure Publishing Service for Digital Libraries of XML Documents. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:347-362 [Conf]
  25. Olivier Markowitch, Steve Kremer
    An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:363-378 [Conf]
  26. Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia
    Persistent Authenticated Dictionaries and Their Applications. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:379-393 [Conf]
  27. Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger
    Efficient Optimistic N-Party Contract Signing Protocol. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:394-407 [Conf]
  28. Koji Chida, Kunio Kobayashi, Hikaru Morita
    Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:408-419 [Conf]
  29. Francesc Sebé, Josep Domingo-Ferrer
    Oblivious Image Watermarking Robust against Scaling and Geometric Distortions. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:420-432 [Conf]
  30. Christian Damsgaard Jensen
    Fingerprinting Text in Logical Markup Languages. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:433-445 [Conf]
  31. Antonio Ruiz-Martínez, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta
    SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:446-461 [Conf]
  32. Ik Rae Jeong, Dong Hoon Lee, Jong In Lim
    Efficient Transferable Cash with Group Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:462-474 [Conf]
  33. Liqun Chen, Wenbo Mao
    An Auditable Metering Scheme for Web Advertisement Applications. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:475-485 [Conf]
  34. Jaime Delgado, Isabel Gallego, Xavier Perramon
    Broker-Based Secure Negotiation of Intellectual Property Rights. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:486-496 [Conf]
  35. Jae Seung Lee, Sang-Choon Kim
    Design of the Decision Support System for Network Security Management to Secure Enterprise Network. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:497-511 [Conf]
  36. Jia Wang, Insup Lee
    Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:512-535 [Conf]
  37. Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki
    Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:536-553 [Conf]
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002