|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 107 occurrences of 90 keywords
|
|
|
Results
Found 359 publication records. Showing 359 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere |
Run-Time Randomization to Mitigate Tampering. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design Issues of an Isolated Sandbox Used to Analyze Malwares. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Aivo Jürgenson, Jan Willemson |
Processing Multi-parameter Attacktrees with Estimated Parameter Values. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yi Ren, Min Luo, Zukai Tang, Lingqing Ye |
A Composite Privacy Protection Model. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Privacy Data Model, Privacy Database, Deputy Mechanism, Privacy Protection |
1 | Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (eds.) |
Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai |
Enforcement of Integrated Security Policy in Trusted Operating Systems. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Hada, Kouichi Sakurai |
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda |
Experiments on the Linear Algebra Step in the Number Field Sieve. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
block Lanczos, parallel computation, ethernet, integer factoring, number field sieve |
1 | Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos |
GAS: Overloading a File Sharing Network as an Anonymizing System. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Security, Anonymity, P2P, Gnutella |
1 | Qiong Huang 0001, Duncan S. Wong |
Generic Certificateless Encryption in the Standard Model. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Alexandre Viejo, Francesc Sebé, Josep Domingo-Ferrer |
Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Advertisement dissemination, Security, Privacy, Mobile ad hoc network, Incentive, M-Commerce |
1 | Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith |
Batch Pairing Delegation. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Triinu Mägi |
Practical Security Analysis of E-Voting Systems. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu 0001 |
Nominative Signature from Ring Signature. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim Yakut, Huseyin Polat 0001 |
Privacy-Preserving Eigentaste-Based Collaborative Filtering. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Junbeom Hur, Chanil Park, Hyunsoo Yoon |
An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff |
1 | Chun-I Fan, Vincent Shi-Ming Huang |
Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication |
1 | Kazuhiro Suzuki, Kaoru Kurosawa |
How to Find Many Collisions of 3-Pass HAVAL. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
hash function, collision, differential attack, HAVAL |
1 | Miroslaw Kutylowski, Filip Zagórski |
Verifiable Internet Voting Solving Secure Platform Problem. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
vote selling, anonymity, electronic voting, coercion resistance |
1 | Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi |
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
reduction optimal trinomial, finite field, pairing, irreducible polynomial, software implementation, characteristic three |
1 | Emmanuel Bresson, Mark Manulis, Jörg Schwenk |
On Security Models and Compilers for Group Key Exchange Protocols. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang |
Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Forensic Features, Identifying Users, Data Mining, Intrusion Detection |
1 | Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii |
Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Kondo, Naoshi Sato |
Botnet Traffic Detection Techniques by C&C Session Classification Using SVM. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo |
Fine-Grained Sticky Provenance Architecture for Office Documents. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Koji Kida, Hisashi Sakamoto, Hideo Shimazu, Hiroyuki Tarumi |
InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
Secure Office, Information Leakage Countemesure, Operation Monitoring, Knowledge Base, Log Analysis |
1 | Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo |
Salvia : A Privacy-Aware Operating System for Prevention of Data Leakage. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Seung Geol Choi, Kunsoo Park, Moti Yung |
Short Traceable Signatures Based on Bilinear Pairings. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures |
1 | Reijo Savola |
A Requirement Centric Framework for Information Security Evaluation. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
Information security evaluation, security modeling, security metrics, security testing |
1 | Sang-Hyun Park, Hoon Choi, Sang-Han Lee, Taejoo Chang |
The High-Speed Packet Cipher System Suitable for Small Sized Data. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
Packet Cipher, SoC(System on Chip), Cryptographic module, Security API |
1 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
On the Effectiveness of TMTO and Exhaustive Search Attacks. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, one-way function |
1 | Mooseop Kim, Jaecheol Ryou 0001, YongJe Choi, Sungik Jun |
Low Power AES Hardware Architecture for Radio Frequency Identification. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Qianhong Wu, Willy Susilo, Yi Mu 0001, Fangguo Zhang |
Ad Hoc Group Signatures. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry |
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
secure address proxy, SEND, multi-key cryptographically generated address, Mobile IPv6, ring signature |
1 | Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs 0001, Martijn Oostdijk, Ronny Wichers Schreur |
Crossing Borders: Security and Privacy Issues of the European e-Passport. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Satoshi Hada, Kouichi Sakurai |
Ciphertext-Auditable Public Key Encryption. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Anna V. Álvarez, Karen A. García, Raúl Monroy, Luis A. Trejo, Jesús Vázquez |
A Tool for Managing Security Policies in Organisations. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Zouheir Trabelsi, Hesham El-Sayed, Lilia Frikha, Tamer Rabie |
Traceroute Based IP Channel for Sending Hidden Short Messages. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
IP header Record route option, Steganalysis, Covert channel, Traceroute, Hidden information |
1 | Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim |
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
computer architecture, computer security, buffer overflow attack |
1 | Christophe Tartary, Huaxiong Wang |
Rateless Codes for the Multicast Stream Authentication Problem. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
rateless codes, stream authentication, polynomial reconstruction |
1 | Toru Nakanishi 0001, Nobuo Funabiki |
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
backward unlinkability, DLDH assumption, group signature, revocation, bilinear maps |
1 | Sang-Kyun Noh, DongKook Kim, Yongmin Kim 0005, Bong-Nam Noh |
Modeling of Network Intrusions Based on the Multiple Transition Probability. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
Network-based intrusion detection, multiple transition probability, Ergodic model, probability-based modeling, likelihood measure |
1 | In Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee |
Real-Time Watermark Embedding for High Resolution Video Watermarking. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Dranger, Robert H. Sloan, Jon A. Solworth |
The Complexity of Discretionary Access Control. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa |
A Model-Based Method for Security Configuration Verification. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yi Shi, Xinyu Yang, Huijun Zhu |
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Chik How Tan |
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear map |
1 | Young Chul Kwon, Sang Won Lee, Songchun Moon |
Personal Computer Privacy: Analysis for Korean PC Users. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
data forensics, privacy |
1 | Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu |
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Junji Onishi, Tsukasa Ono |
A Study of Detection Method of Printed Image Alteration Using Digital Watermark. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Michael Tunstall, Constantinos Markantonakis, Keith Mayes |
Inhibiting Card Sharing Attacks. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Flavio D. Garcia, Peter van Rossum |
Sound Computational Interpretation of Symbolic Hashes in the Standard Model. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura (eds.) |
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong |
ID-Based Ring Signature Scheme Secure in the Standard Model. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hai Jin 0001, Zhensong Liao, Deqing Zou, Weizhong Qiang |
A New Approach to Hide Policy for Automated Trust Negotiation. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Willy Susilo, Duncan S. Wong |
Ring Signature with Designated Linkability. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
linkable ring signature, spontaneous group signature, ring signature |
1 | Yi-Ming Chen 0008, Yung-Wei Kao |
Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
information flow, security policy, Colored Petri Nets, SELinux |
Displaying result #301 - #359 of 359 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4] |
|