The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CISC"( http://dblp.L3S.de/Venues/CISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/cisc

Publication years (Num. hits)
2005 (36)
Publication types (Num. hits)
inproceedings(35) proceedings(1)
Venues (Conferences, Journals, ...)
CISC(36)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 39 occurrences of 34 keywords

Results
Found 36 publication records. Showing 36 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gil-Jong Mun, Yongmin Kim 0005, DongKook Kim, BongNam Noh Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim 0001 Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hyun-Sun Kang, Chang-Seop Park MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Roman Schlegel, Serge Vaudenay Enforcing Email Addresses Privacy Using Tokens. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dengguo Feng, Dongdai Lin, Moti Yung (eds.) Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tianjie Cao, Dongdai Lin Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Raylin Tso, Takeshi Okamoto, Eiji Okamoto Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CDH assumption, DDH assumption, double discrete logarithm, one-way two-party authenticated key agreement, privacy, designated verifier signature
1Cheol-Min Park, Myung-Hwan Kim, Moti Yung A Remark on Implementing the Weil Pairing. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modified Weil pairing, separable endomorphism, distortion map, Pairing-based cryptosystem, Weil pairing
1Fagen Li, Juntao Gao, Yupu Hu ID-Based Threshold Unsigncryption Scheme from Pairings. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF (t,n) threshold, signcryption, Identity-based cryptography, zero knowledge proof
1Rui Zhang 0002, Hideki Imai Improvements on Security Proofs of Some Identity Based Encryption Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong ID-Based Signature Scheme Without Trusted PKG. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhanfei Zhou Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jong-Hyuk Roh, Kyoon-Ha Lee Key Management for Secure Overlay Multicast. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key hierarchy, Key Management, Overlay Multicast, Secure Multicast
1Shimin Wei, Guolong Chen, Guozhen Xiao A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Peng Wang 0009, Dengguo Feng, Wenling Wu HCTR: A Variable-Input-Length Enciphering Mode. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher
1Fei Gao 0001, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hongda Li 0001, Bao Li 0001 An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature
1Jihong Teng, Shiqu Li, Xiaoying Huang The kth-Order Quasi-Generalized Bent Functions over Ring Zp. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo You Can Prove So Many Things in Zero-Knowledge. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yuan Zhou, Zhenfu Cao, Zhenchuan Chai Constructing Secure Proxy Cryptosystem. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Proxy cryptosystem, bilinear Diffie-Hellman, ID-based
1Chunxiang Gu, Yuefei Zhu An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF bilinear pairings, fair exchange, ID-based cryptography, verifiably encrypted signatures
1Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider Specifying Authentication Using Signal Events in CSP. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiaolan Joy Zhang, Brian King Modeling RFID Security. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz Towards a General RC4-Like Keystream Generator. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random shuffle, stream ciphers, RC4, keystream generator
1Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang Efficient Group Signatures from Bilinear Pairing. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF GDH group, Digital signature, Bilinear pairing, Group signature
1Wenping Ma 0002, Fu Tai Zhang New Methods to Construct Cheating Immune Multisecret Sharing Scheme. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing
1Yongdong Wu Efficient Authentication of Electronic Document Workflow. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Crypto-Biometric, Fuzzy Fingerprint Vault, Geometric Hashing
1Pradeep Kumar Mishra Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Montgomery ladder, simultaneous inversion, parallel algorithm, Elliptic Curve Cryptosystems, Scalar Multiplication
1Zuhua Shao Enhanced Aggregate Signatures from Pairings. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security model, random oracle model, Aggregate signature
1Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar An Improved Secure Two-Party Computation Protocol. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #36 of 36 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license