The SCEAS System
Navigation Menu

Conferences in DBLP

(iwsec)
2006 (conf/iwsec/2006)

  1. Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
    ID-Based Ring Signature Scheme Secure in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:1-16 [Conf]
  2. Toru Nakanishi, Nobuo Funabiki
    A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:17-32 [Conf]
  3. Flavio D. Garcia, Peter van Rossum
    Sound Computational Interpretation of Symbolic Hashes in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:33-47 [Conf]
  4. Reijo Savola
    A Requirement Centric Framework for Information Security Evaluation. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:48-59 [Conf]
  5. Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa
    A Model-Based Method for Security Configuration Verification. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:60-75 [Conf]
  6. Young Chul Kwon, Sang Won Lee, Songchun Moon
    Personal Computer Privacy: Analysis for Korean PC Users. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:76-87 [Conf]
  7. Seung Geol Choi, Kunsoo Park, Moti Yung
    Short Traceable Signatures Based on Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:88-103 [Conf]
  8. Joseph K. Liu, Willy Susilo, Duncan S. Wong
    Ring Signature with Designated Linkability. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:104-119 [Conf]
  9. Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang
    Ad Hoc Group Signatures. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:120-135 [Conf]
  10. Christophe Tartary, Huaxiong Wang
    Rateless Codes for the Multicast Stream Authentication Problem. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:136-151 [Conf]
  11. Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur
    Crossing Borders: Security and Privacy Issues of the European e-Passport. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:152-167 [Conf]
  12. Hai Jin, Zhensong Liao, Deqing Zou, Weizhong Qiang
    A New Approach to Hide Policy for Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:168-178 [Conf]
  13. Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu
    Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:179-195 [Conf]
  14. James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry
    IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:196-211 [Conf]
  15. Junji Onishi, Tsukasa Ono
    A Study of Detection Method of Printed Image Alteration Using Digital Watermark. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:212-226 [Conf]
  16. In Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee
    Real-Time Watermark Embedding for High Resolution Video Watermarking. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:227-238 [Conf]
  17. Michael Tunstall, Constantinos Markantonakis, Keith Mayes
    Inhibiting Card Sharing Attacks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:239-251 [Conf]
  18. Yi Shi, Xinyu Yang, Huijun Zhu
    A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:252-267 [Conf]
  19. Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim
    Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:268-277 [Conf]
  20. Sang-Kyun Noh, DongKook Kim, Yong-Min Kim, Bong-Nam Noh
    Modeling of Network Intrusions Based on the Multiple Transition Probability. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:278-291 [Conf]
  21. Chik How Tan
    Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:292-307 [Conf]
  22. Satoshi Hada, Kouichi Sakurai
    Ciphertext-Auditable Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:308-321 [Conf]
  23. Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee
    Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:322-336 [Conf]
  24. Sourav Mukhopadhyay, Palash Sarkar
    On the Effectiveness of TMTO and Exhaustive Search Attacks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:337-352 [Conf]
  25. Mooseop Kim, Jaecheol Ryou, Yongje Choi, Sungik Jun
    Low Power AES Hardware Architecture for Radio Frequency Identification. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:353-363 [Conf]
  26. Sang-Hyun Park, Hoon Choi, Sang-Han Lee, TaeJoo Chang
    The High-Speed Packet Cipher System Suitable for Small Sized Data. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:364-377 [Conf]
  27. Anna V. Álvarez, Karen A. García, Raul Monroy, Luis A. Trejo, Jesús Vázquez
    A Tool for Managing Security Policies in Organisations. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:378-388 [Conf]
  28. Yi-Ming Chen, Yung-Wei Kao
    Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:389-404 [Conf]
  29. Stephen Dranger, Robert H. Sloan, Jon A. Solworth
    The Complexity of Discretionary Access Control. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:405-420 [Conf]
  30. Zouheir Trabelsi, Hesham El-Sayed, Lilia Frikha, Tamer F. Rabie
    Traceroute Based IP Channel for Sending Hidden Short Messages. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:421-436 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002