The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ISW"( http://dblp.L3S.de/Venues/ISW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/isw

Publication years (Num. hits)
1997 (31) 1998 (1) 1999 (24) 2000 (24)
Publication types (Num. hits)
inproceedings(77) proceedings(3)
Venues (Conferences, Journals, ...)
ISW(80)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 27 occurrences of 18 keywords

Results
Found 80 publication records. Showing 80 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona Region-Based Watermarking by Distribution Adjustment. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Christian Payne The Role of the Development Process in Operating System Security. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1René Rosenbaum, Heidrun Schumann A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Tina Lindkvist Characteristics of Some Binary Codes for Fingerprinting. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF watermarking, fingerprinting, copyright protection
1Sung-Ming Yen, Yuliang Zheng 0001 Weighted One-Way Hash Chain and Its Applications. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF One-way hash chain, Portable computing device, Cryptography, Electronic commerce, Micropayment
1Greg Maitland, Jason Reid, Ernest Foo, Colin Boyd, Ed Dawson Linkability in Practical Electronic Cash Design. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Stephen P. Morgan, Stephen W. Neal, Melissa A. Hartman, Matthew R. Laue Sherlock: Commercial High Assurance Network Computing. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Yuji Sugiyama Unlinkable Divisible Electronic Cash. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Group signature, Divisibility, Electronic cash, Unlinkability
1Oliver Benedens Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Willy Susilo Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Minoru Kuribayashi, Hatsukazu Tanaka A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ali Aydin Selçuk, Deepinder P. Sidhu Probabilistic Methods in Multicast Key Management. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Colin Boyd, Peter Kearney Exploring Fair Exchange Protocols Using Specification Animation. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hideaki Goto, Masahiro Mambo, Kenjiro Matsumura, Hiroki Shizuya An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry (eds.) Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Kazumasa Omote, Atsuko Miyaji An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger An Efficient Protocol for Certified Electronic Mail. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Gaël Hachez, Laurent Den Hollander, Mehrdad Jalali, Jean-Jacques Quisquater, Christophe Vasserot Towards a Practical Secure Framework for Mobile Code Commerce. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF electronic right management, electronic commerce, watermarking, copyright protection, obfuscation, software piracy
1DongGook Park, Colin Boyd, Ed Dawson Classification of Authentication Protocols: A Practical Approach. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Tapio Seppänen, Kaisu Mäkelä, Anja Keskinarkaus Hiding Information in Color Images Using Small Color Palettes. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Xiaodong Lin 0001, Johnny W. Wong, Weidong Kou Performance Analysis of Secure Web Server Based on SSL. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ron Steinfeld, Yuliang Zheng 0001 A Signcryption Scheme Based on Integer Factorization. Search on Bibsonomy ISW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogunbona Region-Based Watermarking for Images. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Dirk Westhoff, Markus Schneider 0002, Claus Unger, Firoz Kaderali Methods for Protecting a Mobile Agent's Route. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Seungjoo Kim, Insoo Lee, Masahiro Mambo, Sungjun Park On the Difficulty of Key Recovery Systems. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004, Yuliang Zheng 0001 Security Properties of Software Components. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Component functionality, Software component, Security properties
1Jorge Dávila, Javier López 0001, René Peralta 0001 Implementation of Virtual Private Networks at the Transport Layer. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yuji Watanabe, Hideki Imai Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Hyung-Woo Lee, Jung-Eun Kim, Tai-Yun Kim Non-interactive Cryptosystem for Entity Authentication. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Marc Joye, Narn-Yih Lee, Tzonelih Hwang On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Cryptanalysis, Digital signatures, Group signatures
1Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Marc Joye, Seungjoo Kim, Narn-Yih Lee Cryptanalysis of Two Group Signature Schemes. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Universal forgeries, Cryptanalysis, Digital signatures, Group signatures
1Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan Undeniable Confirmer Signature. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk Fingerprints for Copyright Software Protection. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Hye-Joo Lee, Ji-Hwan Park, Yuliang Zheng 0001 Digital Watermarking Robust Against JPEG Compression. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Josep Domingo-Ferrer, Jordi Herrera-Joancomartí Spending Programs: A Tool for Flexible Micropayments. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Spending program, Electronic commerce, Hash functions, Hash chain, Micropayments
1Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto An Improvement on a Practical Secret Voting Scheme. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Takeshi Okamoto, Mitsuru Tada, Eiji Okamoto Extended Proxy Signatures for Smart Cards. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Sang-Uk Shin, Kyeong Seop Sim, Kyung Hyune Rhee A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Tim Ebringer, Peter Thorne Engineering an eCash System. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Shouhuai Xu, Moti Yung, Gendu Zhang, Hong Zhu 0004 Money Conservation via Atomicity in Fair Off-Line E-Cash. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Nobuaki Haruna, Yuji Sugiyama Unlinkable Electronic Coupon Protocol with Anonymity Control. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Chun-Shien Lu, Hong-Yuan Mark Liao, Shih-Kun Huang, Chwen-Jye Sze Highly Robust Image Watermarking Using Complementary Modulations. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Tomas Sander, Amnon Ta-Shma On Anonymous Electronic Cash and Crime. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Masahiro Mambo, Yuliang Zheng 0001 (eds.) Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Eiji Okamoto, George I. Davida, Masahiro Mambo (eds.) Information Security, First International Workshop, ISW '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings Search on Bibsonomy ISW The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
1Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jussipekka Leiwo, Yuliang Zheng 0001 A Framework for the Management of Information Security. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Constantinos Markantonakis The Case for a Secure Multi-Application Smart Card Operating System. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Akashi Satoh, Yoshinao Kobayashi, Hideto Niijima, Nobuyuki Ooba, Seiji Munetoh, Sadamichi Sone A High-Speed Small RSA Encryption LSI with Low Power Dissipation. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Andreas Fuchsberger An Incremental Payment Method for Internet Based Streaming Real-Time Media. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Robert H. Deng, Xiang Gao, Yoshihide Igarashi Modified Finite Automata Public Key Cryptosystem. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Kan Zhang On Rough Sets and Inference Analysis. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Mihir Bellare Practice-Oriented Provable-Security. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Yoshiki Sameshima A Key Escrow System of the RSA Cryptosystem. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Daisuke Nakamura, Kunikatsu Kobayashi Modified ElGamal Cryptosystem. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001 Signcryption and Its Applications in Efficient Public Key Solutions. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1G. R. Blakley, I. Borosh A General Theory of Codes, II: Paradigms and Homomorphisms. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Bart Preneel Cryptanalysis of Message Authentication Codes. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Jean-Marie Kabasele-Tenday Specifying Security in a Composite System. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Kouichi Yamazaki, Masao Osaki, Osamu Hirota On Reconciliation of Discrepant Sequences Shared through Quantum Mechanical Channels. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1George I. Davida, René Peralta 0001 High-Speed Cryptography. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue A Key Escrow System with Protecting User's Privacy by Blind Decoding. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Hidenori Kuwadako, Hatsukazu Tanaka Fast Algorithm for Finding a Small Root of a Quadratic Modular Equation. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Shahrokh Saeednia, Reihaneh Safavi-Naini A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Tzonelih Hwang, Chih-Hung Wang Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Kazuo Ohta Remarks on Blind Decryption. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Seungjoo Kim, Sangjoon Park, Dongho Won Group Signatures for Hierarchical Multigroups. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo The Application of ID-Based Key Distribution Systems to an Elliptic Curve. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1John Kelsey, Bruce Schneier, Chris Hall, David A. Wagner 0001 Secure Applications of Low-Entropy Keys. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Kan Zhang Threshold Proxy Signature Schemes. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Xun Yi, Kwok-Yan Lam, Shixin Cheng, Xiaohu You 0001 A New Byte-Oriented Block Cipher. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Yvo Desmedt Some Recent Research Aspects of Threshold Cryptography. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1R. Balasubramanian, S. V. Nagaraj The Least Witness of a Composite Number. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Kenji Koyama, Routo Terada An Augmented Family of Cryptographic Parity Circuits. Search on Bibsonomy ISW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #80 of 80 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license