Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yan Yao, Ping Yi, Yi-Ping Zhong, Shi-Yong Zhang |
Gossip-based scalable and reliable group key distribution framework. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yongzhuang Wei, Yu-Pu Hu |
New construction of resilient functions with satisfying multiple cryptographic criteria. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | John R. White, Huanye Sheng (eds.) |
Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004 |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Haiyong Bao, Zhenfu Cao, Haifeng Qian |
Cryptanalysis of group signature scheme from ID-based signature scheme. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ming Li, Dawu Gu, Yong Wang, Yingcai Bai |
Research on authenticated key agreement in group settings. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Rongxing Lu, Zhenfu Cao |
A proxy-protected signature scheme based on conic. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tongshen Hu, Xiamin, Qingzhang Chen, Kezhen Ying |
Design and implement of firewall-log-based online attack detection system. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tieli Sun, Wei Zhao, Zhiyan Zhao |
An architecture of pattern-oriented distributed meta-search engine. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Chunxiao Ye, Yunqing Fu, Zhongfu Wu |
An attribute-based-delegation-model. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ke-jun Sheng, Jiqiang Liu, Xin Liu |
Organization structure based access control model. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yang Shi, Liming Cao, Xiaoping Wang |
A security scheme of electronic commerce for mobile agents uses undetachable digital signatures. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Botao Li, Junzhou Luo |
On timeliness of a fair non-repudiation protocol. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Zuhua Shao |
Cryptanalysis of publicly verifiable authenticated encryption. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Wenjie Liu, Guochang Gu, Hongnan Wang |
Communication and recovery issues in grid environment. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Peiyu Liu 0001, Yuguo Liu |
Research on network information filtering model based on fuzzy set. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Qingbo Yin, Rubo Zhang, Xueyao Li |
An new intrusion detection method based on linear prediction. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yu Yao, Fuxiang Gao, Ge Yu |
Hybrid BP/CNN neural network for intrusion detection. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Shanshan Duan, Zhenfu Cao, Rongxing Lu |
Robust ID-based threshold signcryption scheme from pairings. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yong Zhong, Xiaolin Qin |
Database intrusion detection based on user query frequent itemsets mining with item constraints. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xingming Sun, Gang Luo, Huajun Huang |
Component-based digital watermarking of Chinese texts. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Zhongwen Li, Zhongpan Qiu |
A new type of security and safety architecture for distributed system: models and implementation. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Degang Yang, Chun-yan Hu, Yong-hong Chen |
A framework of cooperating intrusion detection based on clustering analysis and expert system. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yun-Kai Zhang, Fang-Wei Wang, Yu-Qing Zhang, Jian-Feng Ma |
Worm propagation modeling and analysis based on quarantine. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ping Yi, Yan Yao, Yafei Hou, Yiping Zhong, Shiyong Zhang |
Securing ad hoc networks through mobile agent. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto |
Anonymous traceable disclosure scheme using pairing over elliptic curve. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yunfeng Li, Qingsheng Zhu, Yukun Cao |
Automatic metadata generation based on neural network. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jingsong Cui, Rong Peng, Li-Na Wang |
The optimized key distribution scheme in threshold RSA. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yuehua Zhao, Guixian Cai, Yunhai Du |
An image watermark algorithm based on discrete cosine transform block classifying. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Chunbo Ma, Jun Ao, Dake He |
An ID-based group signature. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yiliang Han, Xiaoyuan Yang 0002, Yupu Hu |
Signcryption based on elliptic curve and its multi-party schemes. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Lunwei Wang, Xiangke Liao, Huaimin Wang |
AT-PAM: an authentication trustworthiness-based PAM. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Gang Yin, Huaimin Wang, Dian-xi Shi, Yan Jia 0001, Meng Teng |
A rule-based framework for role-based constrained delegation. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xin Liu, Qiu-Liang Xu, Jiu-Qing Shang |
A public auction scheme based on group signature. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Zhang 0014, Zhanhuai Li |
Research on security of storage area network. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jing-Xin Wang, Zhi-Ying Wang, Kui Dai |
A network intrusion detection system based on the artificial neural networks. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Qianhong Wu, Bo Qin, Yumin Wang |
How to conduct a sealed bargain on the internet. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Bo Li, Xiao-Ping Qiu |
An application of machine leaning to network intrusion detection. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jiguo Li 0001, Yichen Zhang 0003, Yuelong Zhu |
Security analysis and improvement of some proxy signature schemes. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyuan Yang 0002, Xu An Wang 0001, Wei Zhang 0208 |
New multi-signature and proxy multi-signature schemes from the Weil pairings. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xiang-Yang Wang 0001, Yong-rui Cui, Hongying Yang, Hong Zhao |
A new content-based digital audio watermarking algorithm for copyright protection. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hailong Wen, Dawu Gu |
Authenticated group key agreement with admission control. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Zuowen Tan, Zhuojun Liu |
Provably secure delegation-by-certification proxy signature schemes. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Zhou, Zhenfu Cao, Rongxing Lu |
An efficient digital signature using self-certified public keys. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Xia, Qi Shen, Luo Zhong, Shan Feng, Rui Hao |
Application of data mining technology and generic algorithm to intrusion detection system. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xinpeng Zhang 0001, Shuozhong Wang |
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xuelong Zhao, Jiwen Wang, Manwu Xu, Fengyu Liu |
High-quality pseudo-random sequence generator based on one-dimensional extended cellular automata. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jingmei Liu, Baodian Wei, Xinmei Wang |
New method to determine algebraic expression of Rijndael S-box. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jianhua Yang, Shou-Hsuan Stephen Huang |
A real-time algorithm to detect long connection chains of interactive terminal sessions. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jian Zhang, Hua-Can He, Min Zhao |
Hybrid detector set: detectors with different affinity. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Wenjun Luo, Xiang Li |
A study of secure multi-party elementary function computation protocols. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Fang Liu 0002, Kui Dai, Zhiying Wang 0003 |
Applying multiple criteria decision making to improve security architecture development. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Zhicai Shi, Zhenzhou Ji, Mingzeng Hu |
A novel distributed intrusion detection model based on mobile agent. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Lihua Wang 0001, Zhenfu Cao, Eiji Okamoto, Ying Miao 0001, Takeshi Okamoto |
Transformation-free proxy cryptosystems and their applications to electronic commerce. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Zhenchuan Chai, Zhenfu Cao, Rongxing Lu |
ID-based threshold decryption without random oracles and its application in key escrow. |
InfoSecu |
2004 |
DBLP DOI BibTeX RDF |
|