The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2004 (conf/isw/2004)

  1. Taekyoung Kwon
    Practical Authenticated Key Agreement Using Passwords. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:1-12 [Conf]
  2. Muxiang Zhang
    Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:13-24 [Conf]
  3. Pan Wang, Peng Ning, Douglas S. Reeves
    Storage-Efficient Stateless Group Key Revocation. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:25-38 [Conf]
  4. Michael Backes, Birgit Pfitzmann, Michael Waidner
    Low-Level Ideal Signatures and General Integrity Idealization. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:39-51 [Conf]
  5. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
    Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:52-60 [Conf]
  6. Michael Backes, Dennis Hofheinz
    How to Break and Repair a Universally Composable Signature Functionality. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:61-72 [Conf]
  7. Craig Gentry, Zulfikar Ramzan
    RSA Accumulator Based Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:73-86 [Conf]
  8. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
    Chameleon Hashing Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:87-98 [Conf]
  9. Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu
    Radix-r Non-Adjacent Form. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:99-110 [Conf]
  10. Raphael Chung-Wei Phan, Helena Handschuh
    On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:111-122 [Conf]
  11. Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon
    Security Analysis of Two Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:123-133 [Conf]
  12. Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato
    On The Security of Key Derivation Functions. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:134-145 [Conf]
  13. Hai Wang, Peng Liu, Lunqun Li
    Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:146-157 [Conf]
  14. Michael Meier
    A Model for the Semantics of Attack Signatures in Misuse Detection Systems. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:158-169 [Conf]
  15. Zouheir Trabelsi, Hamza Rahmani
    Detection of Sniffers in an Ethernet Network. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:170-182 [Conf]
  16. Mark Foster, Joseph N. Wilson, Shigang Chen
    Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:183-194 [Conf]
  17. Elisa Bertino, Teodoro Leggieri, Evimaria Terzi
    Securing DBMS: Characterizing and Detecting Query Floods. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:195-206 [Conf]
  18. Elisa Bertino, Elena Ferrari, Giovanni Mella
    An XML-Based Approach to Document Flow Verification. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:207-218 [Conf]
  19. Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobbens
    Model-Checking Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:219-230 [Conf]
  20. Ajay Chander, Drew Dean, John C. Mitchell
    A Distributed High Assurance Reference Monitor. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:231-244 [Conf]
  21. Deholo Nali, Carlisle M. Adams, Ali Miri
    Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:245-256 [Conf]
  22. Richard Bergmair, Stefan Katzenbeisser
    Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:257-267 [Conf]
  23. Monica Chew, J. D. Tygar
    Image Recognition CAPTCHAs. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:268-279 [Conf]
  24. Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
    A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:280-291 [Conf]
  25. Qinglin Jiang, Douglas S. Reeves, Peng Ning
    Certificate Recommendations to Improve the Robustness of Web of Trust. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:292-303 [Conf]
  26. Ke Xu, Stephen R. Tate
    Universally Composable Secure Mobile Agent Computation. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:304-317 [Conf]
  27. Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen
    Re-thinking Security in IP Based Micro-Mobility. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:318-329 [Conf]
  28. Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang
    Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:330-341 [Conf]
  29. HongQian Karen Lu, Asad Ali
    Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:342-353 [Conf]
  30. Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
    Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:354-366 [Conf]
  31. Toru Nakanishi, Mitsuaki Shiota, Yuji Sugiyama
    An Efficient Online Electronic Cash with Unlinkable Exact Payments. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:367-378 [Conf]
  32. Heejae Park, Jong Kim
    Modifiable Digital Content Protection in P2P. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:379-390 [Conf]
  33. William Ku, Chi-Hung Chi
    Survey on the Technological Aspects of Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:391-403 [Conf]
  34. Ginger Myles, Christian S. Collberg
    Detecting Software Theft via Whole Program Path Birthmarks. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:404-415 [Conf]
  35. Thitima Srivatanakul, John A. Clark, Fiona Polack
    Effective Security Requirements Analysis: HAZOP and Use Cases. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:416-427 [Conf]
  36. Kelly Heffner, Christian S. Collberg
    The Obfuscation Executive. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:428-440 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002