Conferences in DBLP
(iwsec) 2006 (conf/iwsec/2006)
Man Ho Au , Joseph K. Liu , Tsz Hon Yuen , Duncan S. Wong ID-Based Ring Signature Scheme Secure in the Standard Model. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:1-16 [Conf ] Toru Nakanishi , Nobuo Funabiki A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:17-32 [Conf ] Flavio D. Garcia , Peter van Rossum Sound Computational Interpretation of Symbolic Hashes in the Standard Model. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:33-47 [Conf ] Reijo Savola A Requirement Centric Framework for Information Security Evaluation. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:48-59 [Conf ] Hiroshi Sakaki , Kazuo Yanoo , Ryuichi Ogawa A Model-Based Method for Security Configuration Verification. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:60-75 [Conf ] Young Chul Kwon , Sang Won Lee , Songchun Moon Personal Computer Privacy: Analysis for Korean PC Users. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:76-87 [Conf ] Seung Geol Choi , Kunsoo Park , Moti Yung Short Traceable Signatures Based on Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:88-103 [Conf ] Joseph K. Liu , Willy Susilo , Duncan S. Wong Ring Signature with Designated Linkability. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:104-119 [Conf ] Qianhong Wu , Willy Susilo , Yi Mu , Fangguo Zhang Ad Hoc Group Signatures. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:120-135 [Conf ] Christophe Tartary , Huaxiong Wang Rateless Codes for the Multicast Stream Authentication Problem. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:136-151 [Conf ] Jaap-Henk Hoepman , Engelbert Hubbers , Bart Jacobs , Martijn Oostdijk , Ronny Wichers Schreur Crossing Borders: Security and Privacy Issues of the European e-Passport. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:152-167 [Conf ] Hai Jin , Zhensong Liao , Deqing Zou , Weizhong Qiang A New Approach to Hide Policy for Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:168-178 [Conf ] Xinwen Zhang , Francesco Parisi-Presicce , Ravi S. Sandhu Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:179-195 [Conf ] James Kempf , Jonathan Wood , Zulfikar Ramzan , Craig Gentry IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:196-211 [Conf ] Junji Onishi , Tsukasa Ono A Study of Detection Method of Printed Image Alteration Using Digital Watermark. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:212-226 [Conf ] In Koo Kang , Dong-Hyuck Im , Young-Ho Suh , Heung-Kyu Lee Real-Time Watermark Embedding for High Resolution Video Watermarking. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:227-238 [Conf ] Michael Tunstall , Constantinos Markantonakis , Keith Mayes Inhibiting Card Sharing Attacks. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:239-251 [Conf ] Yi Shi , Xinyu Yang , Huijun Zhu A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:252-267 [Conf ] Yongsu Park , Younho Lee , Heeyoul Kim , Gil-Joo Lee , Il-Hee Kim Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:268-277 [Conf ] Sang-Kyun Noh , DongKook Kim , Yong-Min Kim , Bong-Nam Noh Modeling of Network Intrusions Based on the Multiple Transition Probability. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:278-291 [Conf ] Chik How Tan Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:292-307 [Conf ] Satoshi Hada , Kouichi Sakurai Ciphertext-Auditable Public Key Encryption. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:308-321 [Conf ] Jeong Ok Kwon , Ik Rae Jeong , Dong Hoon Lee Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:322-336 [Conf ] Sourav Mukhopadhyay , Palash Sarkar On the Effectiveness of TMTO and Exhaustive Search Attacks. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:337-352 [Conf ] Mooseop Kim , Jaecheol Ryou , Yongje Choi , Sungik Jun Low Power AES Hardware Architecture for Radio Frequency Identification. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:353-363 [Conf ] Sang-Hyun Park , Hoon Choi , Sang-Han Lee , TaeJoo Chang The High-Speed Packet Cipher System Suitable for Small Sized Data. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:364-377 [Conf ] Anna V. Álvarez , Karen A. García , Raul Monroy , Luis A. Trejo , Jesús Vázquez A Tool for Managing Security Policies in Organisations. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:378-388 [Conf ] Yi-Ming Chen , Yung-Wei Kao Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:389-404 [Conf ] Stephen Dranger , Robert H. Sloan , Jon A. Solworth The Complexity of Discretionary Access Control. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:405-420 [Conf ] Zouheir Trabelsi , Hesham El-Sayed , Lilia Frikha , Tamer F. Rabie Traceroute Based IP Channel for Sending Hidden Short Messages. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:421-436 [Conf ]