|
Conferences in DBLP
- Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:1-17 [Conf]
- Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky
Privacy Amplification Theorem for Noisy Main Channel. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:18-26 [Conf]
- Giovanni Di Crescenzo, Olga Kornievskaia
Efficient Kerberized Multicast in a Practical Distributed Setting. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:27-45 [Conf]
- Sigrid Gürgens, Javier Lopez
Suitability of a Classical Analysis Method for E-commerce Protocols. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:46-62 [Conf]
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi
Hyppocrates. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:63-80 [Conf]
- Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi
Lenient/Strict Batch Verification in Several Groups. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:81-94 [Conf]
- Dmitri Asonov, Markus Schaal, Johann Christoph Freytag
Absolute Privacy in Voting. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:95-109 [Conf]
- Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang
A Logical Model for Privacy Protection. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:110-124 [Conf]
- Enriquillo Valdez, Moti Yung
DISSECT: DIStribution for SECurity Tool. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:125-143 [Conf]
- Stanley Chow, Yuan Gu, Harold Johnson, Vladimir A. Zakharov
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:144-155 [Conf]
- Mark Chapman, George I. Davida, Marc Rennhard
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:156-165 [Conf]
- David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra
Robust New Method in Frequency Domain Watermarking. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:166-182 [Conf]
- Diana Berbecaru, Antonio Lioy, Marius Marian
On the Complexity of Public-Key Certificate Validation. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:183-203 [Conf]
- Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila
Liability of Certification Authorities: A Juridical Point of View. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:204-219 [Conf]
- Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:220-234 [Conf]
- Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro
Elliptic Curve Arithmetic Using SIMD. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:235-247 [Conf]
- Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi
On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:248-265 [Conf]
- Sheng-Bo Xu, Lejla Batina
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:266-279 [Conf]
- Rainer Steinwandt, Willi Geiselmann, Thomas Beth
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:280-293 [Conf]
- Routo Terada, Paulo G. Pinheiro
Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:294-309 [Conf]
- Ismael Jiménez Calvo, Germán Sáez
Approximate Power Roots in Zm. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:310-323 [Conf]
- Bodo Möller
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:324-334 [Conf]
- Sofia K. Tzelepi, George Pangalos
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:335-346 [Conf]
- Elisa Bertino, Barbara Carminati, Elena Ferrari
A Secure Publishing Service for Digital Libraries of XML Documents. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:347-362 [Conf]
- Olivier Markowitch, Steve Kremer
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:363-378 [Conf]
- Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia
Persistent Authenticated Dictionaries and Their Applications. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:379-393 [Conf]
- Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger
Efficient Optimistic N-Party Contract Signing Protocol. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:394-407 [Conf]
- Koji Chida, Kunio Kobayashi, Hikaru Morita
Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:408-419 [Conf]
- Francesc Sebé, Josep Domingo-Ferrer
Oblivious Image Watermarking Robust against Scaling and Geometric Distortions. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:420-432 [Conf]
- Christian Damsgaard Jensen
Fingerprinting Text in Logical Markup Languages. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:433-445 [Conf]
- Antonio Ruiz-Martínez, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Antonio F. Gómez-Skarmeta
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:446-461 [Conf]
- Ik Rae Jeong, Dong Hoon Lee, Jong In Lim
Efficient Transferable Cash with Group Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:462-474 [Conf]
- Liqun Chen, Wenbo Mao
An Auditable Metering Scheme for Web Advertisement Applications. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:475-485 [Conf]
- Jaime Delgado, Isabel Gallego, Xavier Perramon
Broker-Based Secure Negotiation of Intellectual Property Rights. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:486-496 [Conf]
- Jae Seung Lee, Sang-Choon Kim
Design of the Decision Support System for Network Security Management to Secure Enterprise Network. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:497-511 [Conf]
- Jia Wang, Insup Lee
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:512-535 [Conf]
- Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki
Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. [Citation Graph (0, 0)][DBLP] ISC, 2001, pp:536-553 [Conf]
|