Conferences in DBLP
Taekyoung Kwon Practical Authenticated Key Agreement Using Passwords. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:1-12 [Conf ] Muxiang Zhang Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:13-24 [Conf ] Pan Wang , Peng Ning , Douglas S. Reeves Storage-Efficient Stateless Group Key Revocation. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:25-38 [Conf ] Michael Backes , Birgit Pfitzmann , Michael Waidner Low-Level Ideal Signatures and General Integrity Idealization. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:39-51 [Conf ] Julien Cathalo , Benoît Libert , Jean-Jacques Quisquater Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:52-60 [Conf ] Michael Backes , Dennis Hofheinz How to Break and Repair a Universally Composable Signature Functionality. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:61-72 [Conf ] Craig Gentry , Zulfikar Ramzan RSA Accumulator Based Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:73-86 [Conf ] Xiaofeng Chen , Fangguo Zhang , Kwangjo Kim Chameleon Hashing Without Key Exposure. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:87-98 [Conf ] Tsuyoshi Takagi , Sung-Ming Yen , Bo-Ching Wu Radix-r Non-Adjacent Form. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:99-110 [Conf ] Raphael Chung-Wei Phan , Helena Handschuh On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:111-122 [Conf ] Guilin Wang , Robert H. Deng , Dong Jin Kwak , Sang-Jae Moon Security Analysis of Two Signcryption Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:123-133 [Conf ] Carlisle M. Adams , Guenther Kramer , Serge Mister , Robert J. Zuccherato On The Security of Key Derivation Functions. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:134-145 [Conf ] Hai Wang , Peng Liu , Lunqun Li Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:146-157 [Conf ] Michael Meier A Model for the Semantics of Attack Signatures in Misuse Detection Systems. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:158-169 [Conf ] Zouheir Trabelsi , Hamza Rahmani Detection of Sniffers in an Ethernet Network. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:170-182 [Conf ] Mark Foster , Joseph N. Wilson , Shigang Chen Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:183-194 [Conf ] Elisa Bertino , Teodoro Leggieri , Evimaria Terzi Securing DBMS: Characterizing and Detecting Query Floods. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:195-206 [Conf ] Elisa Bertino , Elena Ferrari , Giovanni Mella An XML-Based Approach to Document Flow Verification. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:207-218 [Conf ] Dimitar P. Guelev , Mark Ryan , Pierre-Yves Schobbens Model-Checking Access Control Policies. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:219-230 [Conf ] Ajay Chander , Drew Dean , John C. Mitchell A Distributed High Assurance Reference Monitor. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:231-244 [Conf ] Deholo Nali , Carlisle M. Adams , Ali Miri Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:245-256 [Conf ] Richard Bergmair , Stefan Katzenbeisser Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:257-267 [Conf ] Monica Chew , J. D. Tygar Image Recognition CAPTCHAs. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:268-279 [Conf ] Zhengyi Le , Yi Ouyang , James Ford , Fillia Makedon A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:280-291 [Conf ] Qinglin Jiang , Douglas S. Reeves , Peng Ning Certificate Recommendations to Improve the Robustness of Web of Trust. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:292-303 [Conf ] Ke Xu , Stephen R. Tate Universally Composable Secure Mobile Agent Computation. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:304-317 [Conf ] Jukka Ylitalo , Jan Melén , Pekka Nikander , Vesa Torvinen Re-thinking Security in IP Based Micro-Mobility. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:318-329 [Conf ] Qianhong Wu , Xiaofeng Chen , Changjie Wang , Yumin Wang Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:330-341 [Conf ] HongQian Karen Lu , Asad Ali Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:342-353 [Conf ] Marcin Gomulkiewicz , Marek Klonowski , Miroslaw Kutylowski Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:354-366 [Conf ] Toru Nakanishi , Mitsuaki Shiota , Yuji Sugiyama An Efficient Online Electronic Cash with Unlinkable Exact Payments. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:367-378 [Conf ] Heejae Park , Jong Kim Modifiable Digital Content Protection in P2P. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:379-390 [Conf ] William Ku , Chi-Hung Chi Survey on the Technological Aspects of Digital Rights Management. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:391-403 [Conf ] Ginger Myles , Christian S. Collberg Detecting Software Theft via Whole Program Path Birthmarks. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:404-415 [Conf ] Thitima Srivatanakul , John A. Clark , Fiona Polack Effective Security Requirements Analysis: HAZOP and Use Cases. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:416-427 [Conf ] Kelly Heffner , Christian S. Collberg The Obfuscation Executive. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:428-440 [Conf ]