Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona |
Region-Based Watermarking by Distribution Adjustment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 54-68, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Christian Payne |
The Role of the Development Process in Operating System Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 277-291, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | René Rosenbaum, Heidrun Schumann |
A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 30-43, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Tina Lindkvist |
Characteristics of Some Binary Codes for Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 97-107, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
watermarking, fingerprinting, copyright protection |
1 | Sung-Ming Yen, Yuliang Zheng 0001 |
Weighted One-Way Hash Chain and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 135-148, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
One-way hash chain, Portable computing device, Cryptography, Electronic commerce, Micropayment |
1 | Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson |
Linkability in Practical Electronic Cash Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 149-163, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Stephen P. Morgan, Stephen W. Neal, Melissa A. Hartman, Matthew R. Laue |
Sherlock: Commercial High Assurance Network Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 262-276, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Yuji Sugiyama |
Unlinkable Divisible Electronic Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 121-134, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Group signature, Divisibility, Electronic cash, Unlinkability |
1 | Oliver Benedens |
Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 15-29, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Willy Susilo |
Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 292-307, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Minoru Kuribayashi, Hatsukazu Tanaka |
A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 1-14, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ali Aydin Selçuk, Deepinder P. Sidhu |
Probabilistic Methods in Multicast Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 179-193, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Peter Kearney |
Exploring Fair Exchange Protocols Using Specification Animation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 209-223, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya |
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 82-96, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.) |
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![Springer, 3-540-41416-9 The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Kazumasa Omote, Atsuko Miyaji |
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 108-120, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger |
An Efficient Protocol for Certified Electronic Mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 237-248, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai |
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 224-236, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot |
Towards a Practical Secure Framework for Mobile Code Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 164-178, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
electronic right management, electronic commerce, watermarking, copyright protection, obfuscation, software piracy |
1 | DongGook Park, Colin Boyd, Ed Dawson |
Classification of Authentication Protocols: A Practical Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 194-208, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí |
Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 44-53, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Tapio Seppänen, Kaisu Mäkelä, Anja Keskinarkaus |
Hiding Information in Color Images Using Small Color Palettes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 69-81, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Xiaodong Lin 0001, Johnny W. Wong, Weidong Kou |
Performance Analysis of Secure Web Server Based on SSL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 249-261, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ron Steinfeld, Yuliang Zheng 0001 |
A Signcryption Scheme Based on Integer Factorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings, pp. 308-322, 2000, Springer, 3-540-41416-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona |
Region-Based Watermarking for Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 154-166, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Dirk Westhoff, Markus Schneider 0002, Claus Unger, Firoz Kaderali |
Methods for Protecting a Mobile Agent's Route. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 57-71, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi |
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 103-117, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park |
On the Difficulty of Key Recovery Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 207-224, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Khaled M. Khan, Jun Han 0004, Yuliang Zheng 0001 |
Security Properties of Software Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 52-56, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Component functionality, Software component, Security properties |
1 | Jorge Dávila, Javier López 0001, René Peralta 0001 |
Implementation of Virtual Private Networks at the Transport Layer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 85-102, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yuji Watanabe, Hideki Imai |
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 118-135, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Woo Lee, Jung-Eun Kim, Tai-Yun Kim |
Non-interactive Cryptosystem for Entity Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 72-84, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Marc Joye, Narn-Yih Lee, Tzonelih Hwang |
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 47-51, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Digital signatures, Group signatures |
1 | Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai |
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 259-270, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Marc Joye, Seungjoo Kim, Narn-Yih Lee |
Cryptanalysis of Two Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 271-275, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Universal forgeries, Cryptanalysis, Digital signatures, Group signatures |
1 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Undeniable Confirmer Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 235-246, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk |
Fingerprints for Copyright Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 178-190, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng 0001 |
Digital Watermarking Robust Against JPEG Compression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 167-190, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Josep Domingo-Ferrer, Jordi Herrera-Joancomartí |
Spending Programs: A Tool for Flexible Micropayments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 1-13, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Spending program, Electronic commerce, Hash functions, Hash chain, Micropayments |
1 | Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto |
An Improvement on a Practical Secret Voting Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 225-234, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Okamoto, Mitsuru Tada, Eiji Okamoto |
Extended Proxy Signatures for Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 247-258, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Sang-Uk Shin, Kyeong Seop Sim, Kyung Hyune Rhee |
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 191-201, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Tim Ebringer, Peter Thorne |
Engineering an eCash System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 32-36, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu 0004 |
Money Conservation via Atomicity in Fair Off-Line E-Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 14-31, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Nobuaki Haruna, Yuji Sugiyama |
Unlinkable Electronic Coupon Protocol with Anonymity Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 37-46, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze |
Highly Robust Image Watermarking Using Complementary Modulations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 136-153, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Tomas Sander, Amnon Ta-Shma |
On Anonymous Electronic Cash and Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 202-206, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Masahiro Mambo, Yuliang Zheng 0001 (eds.) |
Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![Springer, 3-540-66695-8 The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Eiji Okamoto, George I. Davida, Masahiro Mambo (eds.) |
Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![Springer, 3-540-64382-6 The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
1 | Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko |
An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 43-54, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jussipekka Leiwo, Yuliang Zheng 0001 |
A Framework for the Management of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 232-245, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Constantinos Markantonakis |
The Case for a Secure Multi-Application Smart Card Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 188-197, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Akashi Satoh, Yoshinao Kobayashi, Hideto Niijima, Nobuyuki Ooba, Seiji Munetoh, Sadamichi Sone |
A High-Speed Small RSA Encryption LSI with Low Power Dissipation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 174-187, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Fuchsberger |
An Incremental Payment Method for Internet Based Streaming Real-Time Media. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 321-327, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, Robert H. Deng, Xiang Gao, Yoshihide Igarashi |
Modified Finite Automata Public Key Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 82-95, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Kan Zhang |
On Rough Sets and Inference Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 256-265, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Mihir Bellare |
Practice-Oriented Provable-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 221-231, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Yoshiki Sameshima |
A Key Escrow System of the RSA Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 135-146, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 313-320, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Daisuke Nakamura, Kunikatsu Kobayashi |
Modified ElGamal Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 96-108, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001 |
Signcryption and Its Applications in Efficient Public Key Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 291-312, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | G. R. Blakley, I. Borosh |
A General Theory of Codes, II: Paradigms and Homomorphisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 1-31, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel |
Cryptanalysis of Message Authentication Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 55-65, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Marie Kabasele-Tenday |
Specifying Security in a Composite System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 246-255, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Kouichi Yamazaki, Masao Osaki, Osamu Hirota |
On Reconciliation of Discrepant Sequences Shared through Quantum Mechanical Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 345-356, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | George I. Davida, René Peralta 0001 |
High-Speed Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 116-120, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue |
A Key Escrow System with Protecting User's Privacy by Blind Decoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 147-157, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Hidenori Kuwadako, Hatsukazu Tanaka |
Fast Algorithm for Finding a Small Root of a Quadratic Modular Equation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 75-81, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Shahrokh Saeednia, Reihaneh Safavi-Naini |
A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 328-334, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Tzonelih Hwang, Chih-Hung Wang |
Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 266-272, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko |
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 32-42, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Kazuo Ohta |
Remarks on Blind Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 109-115, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Seungjoo Kim, Sangjoon Park, Dongho Won |
Group Signatures for Hierarchical Multigroups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 273-281, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo |
The Application of ID-Based Key Distribution Systems to an Elliptic Curve. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 335-344, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | John Kelsey, Bruce Schneier, Chris Hall, David A. Wagner 0001 |
Secure Applications of Low-Entropy Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 121-134, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Kan Zhang |
Threshold Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 282-290, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Xun Yi, Kwok-Yan Lam, Shixin Cheng, Xiaohu You 0001 |
A New Byte-Oriented Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 209-220, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt |
Some Recent Research Aspects of Threshold Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 158-173, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | R. Balasubramanian, S. V. Nagaraj |
The Least Witness of a Composite Number. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 66-74, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
1 | Kenji Koyama, Routo Terada |
An Augmented Family of Cryptographic Parity Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings, pp. 198-208, 1997, Springer, 3-540-64382-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|