The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "InfoSecu"( http://dblp.L3S.de/Venues/InfoSecu )

URL (DBLP): http://dblp.uni-trier.de/db/conf/infosecu

Publication years (Num. hits)
2004 (54)
Publication types (Num. hits)
inproceedings(53) proceedings(1)
Venues (Conferences, Journals, ...)
InfoSecu(54)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 54 publication records. Showing 54 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yan Yao, Ping Yi, Yi-Ping Zhong, Shi-Yong Zhang Gossip-based scalable and reliable group key distribution framework. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yongzhuang Wei, Yu-Pu Hu New construction of resilient functions with satisfying multiple cryptographic criteria. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1John R. White, Huanye Sheng (eds.) Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004 Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Haiyong Bao, Zhenfu Cao, Haifeng Qian Cryptanalysis of group signature scheme from ID-based signature scheme. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ming Li, Dawu Gu, Yong Wang, Yingcai Bai Research on authenticated key agreement in group settings. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Rongxing Lu, Zhenfu Cao A proxy-protected signature scheme based on conic. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tongshen Hu, Xiamin, Qingzhang Chen, Kezhen Ying Design and implement of firewall-log-based online attack detection system. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tieli Sun, Wei Zhao, Zhiyan Zhao An architecture of pattern-oriented distributed meta-search engine. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Chunxiao Ye, Yunqing Fu, Zhongfu Wu An attribute-based-delegation-model. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ke-jun Sheng, Jiqiang Liu, Xin Liu Organization structure based access control model. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yang Shi, Liming Cao, Xiaoping Wang A security scheme of electronic commerce for mobile agents uses undetachable digital signatures. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Botao Li, Junzhou Luo On timeliness of a fair non-repudiation protocol. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zuhua Shao Cryptanalysis of publicly verifiable authenticated encryption. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Wenjie Liu, Guochang Gu, Hongnan Wang Communication and recovery issues in grid environment. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Peiyu Liu 0001, Yuguo Liu Research on network information filtering model based on fuzzy set. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Qingbo Yin, Rubo Zhang, Xueyao Li An new intrusion detection method based on linear prediction. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yu Yao, Fuxiang Gao, Ge Yu Hybrid BP/CNN neural network for intrusion detection. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Shanshan Duan, Zhenfu Cao, Rongxing Lu Robust ID-based threshold signcryption scheme from pairings. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yong Zhong, Xiaolin Qin Database intrusion detection based on user query frequent itemsets mining with item constraints. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xingming Sun, Gang Luo, Huajun Huang Component-based digital watermarking of Chinese texts. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zhongwen Li, Zhongpan Qiu A new type of security and safety architecture for distributed system: models and implementation. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Degang Yang, Chun-yan Hu, Yong-hong Chen A framework of cooperating intrusion detection based on clustering analysis and expert system. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yun-Kai Zhang, Fang-Wei Wang, Yu-Qing Zhang, Jian-Feng Ma Worm propagation modeling and analysis based on quarantine. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ping Yi, Yan Yao, Yafei Hou, Yiping Zhong, Shiyong Zhang Securing ad hoc networks through mobile agent. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Tadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto Anonymous traceable disclosure scheme using pairing over elliptic curve. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yunfeng Li, Qingsheng Zhu, Yukun Cao Automatic metadata generation based on neural network. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jingsong Cui, Rong Peng, Li-Na Wang The optimized key distribution scheme in threshold RSA. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yuehua Zhao, Guixian Cai, Yunhai Du An image watermark algorithm based on discrete cosine transform block classifying. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Chunbo Ma, Jun Ao, Dake He An ID-based group signature. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yiliang Han, Xiaoyuan Yang 0002, Yupu Hu Signcryption based on elliptic curve and its multi-party schemes. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lunwei Wang, Xiangke Liao, Huaimin Wang AT-PAM: an authentication trustworthiness-based PAM. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Gang Yin, Huaimin Wang, Dian-xi Shi, Yan Jia 0001, Meng Teng A rule-based framework for role-based constrained delegation. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xin Liu, Qiu-Liang Xu, Jiu-Qing Shang A public auction scheme based on group signature. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xiao Zhang 0014, Zhanhuai Li Research on security of storage area network. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jing-Xin Wang, Zhi-Ying Wang, Kui Dai A network intrusion detection system based on the artificial neural networks. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Qianhong Wu, Bo Qin, Yumin Wang How to conduct a sealed bargain on the internet. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Bo Li, Xiao-Ping Qiu An application of machine leaning to network intrusion detection. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jiguo Li 0001, Yichen Zhang 0003, Yuelong Zhu Security analysis and improvement of some proxy signature schemes. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xiaoyuan Yang 0002, Xu An Wang 0001, Wei Zhang 0208 New multi-signature and proxy multi-signature schemes from the Weil pairings. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xiang-Yang Wang 0001, Yong-rui Cui, Hongying Yang, Hong Zhao A new content-based digital audio watermarking algorithm for copyright protection. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hailong Wen, Dawu Gu Authenticated group key agreement with admission control. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zuowen Tan, Zhuojun Liu Provably secure delegation-by-certification proxy signature schemes. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yuan Zhou, Zhenfu Cao, Rongxing Lu An efficient digital signature using self-certified public keys. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hongxia Xia, Qi Shen, Luo Zhong, Shan Feng, Rui Hao Application of data mining technology and generic algorithm to intrusion detection system. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xinpeng Zhang 0001, Shuozhong Wang A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xuelong Zhao, Jiwen Wang, Manwu Xu, Fengyu Liu High-quality pseudo-random sequence generator based on one-dimensional extended cellular automata. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jingmei Liu, Baodian Wei, Xinmei Wang New method to determine algebraic expression of Rijndael S-box. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jianhua Yang, Shou-Hsuan Stephen Huang A real-time algorithm to detect long connection chains of interactive terminal sessions. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jian Zhang, Hua-Can He, Min Zhao Hybrid detector set: detectors with different affinity. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Wenjun Luo, Xiang Li A study of secure multi-party elementary function computation protocols. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Fang Liu 0002, Kui Dai, Zhiying Wang 0003 Applying multiple criteria decision making to improve security architecture development. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zhicai Shi, Zhenzhou Ji, Mingzeng Hu A novel distributed intrusion detection model based on mobile agent. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lihua Wang 0001, Zhenfu Cao, Eiji Okamoto, Ying Miao 0001, Takeshi Okamoto Transformation-free proxy cryptosystems and their applications to electronic commerce. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Zhenchuan Chai, Zhenfu Cao, Rongxing Lu ID-based threshold decryption without random oracles and its application in key escrow. Search on Bibsonomy InfoSecu The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #54 of 54 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license