The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "IWSEC"( http://dblp.L3S.de/Venues/IWSEC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iwsec

Publication years (Num. hits)
2006 (31) 2007 (31) 2008 (20) 2009 (15) 2010 (25) 2011 (15) 2012 (17) 2013 (21) 2014 (22) 2015 (22) 2016 (20) 2017 (15) 2018 (21) 2019 (24) 2020 (17) 2021 (15) 2022-2023 (28)
Publication types (Num. hits)
inproceedings(341) proceedings(18)
Venues (Conferences, Journals, ...)
IWSEC(359)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 107 occurrences of 90 keywords

Results
Found 359 publication records. Showing 359 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere Run-Time Randomization to Mitigate Tampering. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda Design Issues of an Isolated Sandbox Used to Analyze Malwares. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Aivo Jürgenson, Jan Willemson Processing Multi-parameter Attacktrees with Estimated Parameter Values. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yi Ren, Min Luo, Zukai Tang, Lingqing Ye A Composite Privacy Protection Model. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy Data Model, Privacy Database, Deputy Mechanism, Privacy Protection
1Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (eds.) Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai Enforcement of Integrated Security Policy in Trusted Operating Systems. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Satoshi Hada, Kouichi Sakurai A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda Experiments on the Linear Algebra Step in the Number Field Sieve. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF block Lanczos, parallel computation, ethernet, integer factoring, number field sieve
1Elias Athanasopoulos, Mema Roussopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos GAS: Overloading a File Sharing Network as an Anonymizing System. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Anonymity, P2P, Gnutella
1Qiong Huang 0001, Duncan S. Wong Generic Certificateless Encryption in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Alexandre Viejo, Francesc Sebé, Josep Domingo-Ferrer Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Advertisement dissemination, Security, Privacy, Mobile ad hoc network, Incentive, M-Commerce
1Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith Batch Pairing Delegation. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ahto Buldas, Triinu Mägi Practical Security Analysis of E-Voting Systems. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu 0001 Nominative Signature from Ring Signature. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ibrahim Yakut, Huseyin Polat 0001 Privacy-Preserving Eigentaste-Based Collaborative Filtering. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Junbeom Hur, Chanil Park, Hyunsoo Yoon An Efficient Pre-authentication Scheme for IEEE 802.11-Based Vehicular Networks. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proactive key distribution, pre-authentication, IEEE 802.11 network, vehicular network, fast handoff
1Chun-I Fan, Vincent Shi-Ming Huang Anonymous Authentication Protocols with Credit-Based Chargeability and Fair Privacy for Mobile Communications. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fair Privacy, Ubiquitous Computing, Cryptography, Anonymity, Mobile Networks, Mutual Authentication
1Kazuhiro Suzuki, Kaoru Kurosawa How to Find Many Collisions of 3-Pass HAVAL. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, collision, differential attack, HAVAL
1Miroslaw Kutylowski, Filip Zagórski Verifiable Internet Voting Solving Secure Platform Problem. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vote selling, anonymity, electronic voting, coercion resistance
1Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reduction optimal trinomial, finite field, pairing, irreducible polynomial, software implementation, characteristic three
1Emmanuel Bresson, Mark Manulis, Jörg Schwenk On Security Models and Compilers for Group Key Exchange Protocols. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensic Features, Identifying Users, Data Mining, Intrusion Detection
1Naoki Hayashi, Minoru Kuribayashi, Masakatu Morii Collusion-Resistant Fingerprinting Scheme Based on the CDMA-Technique. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Satoshi Kondo, Naoshi Sato Botnet Traffic Detection Techniques by C&C Session Classification Using SVM. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1SeongHan Shin, Kazukuni Kobara, Hideki Imai A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Takuya Mishina, Sachiko Yoshihama, Michiharu Kudo Fine-Grained Sticky Provenance Architecture for Office Documents. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Koji Kida, Hisashi Sakamoto, Hideo Shimazu, Hiroyuki Tarumi InfoCage: A Development and Evaluation of Confidential File Lifetime Monitoring Technology by Analyzing Events from File Systems and GUIs. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure Office, Information Leakage Countemesure, Operation Monitoring, Knowledge Base, Log Analysis
1Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo Salvia : A Privacy-Aware Operating System for Prevention of Data Leakage. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Seung Geol Choi, Kunsoo Park, Moti Yung Short Traceable Signatures Based on Bilinear Pairings. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures
1Reijo Savola A Requirement Centric Framework for Information Security Evaluation. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Information security evaluation, security modeling, security metrics, security testing
1Sang-Hyun Park, Hoon Choi, Sang-Han Lee, Taejoo Chang The High-Speed Packet Cipher System Suitable for Small Sized Data. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Packet Cipher, SoC(System on Chip), Cryptographic module, Security API
1Sourav Mukhopadhyay, Palash Sarkar 0001 On the Effectiveness of TMTO and Exhaustive Search Attacks. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, one-way function
1Mooseop Kim, Jaecheol Ryou 0001, YongJe Choi, Sungik Jun Low Power AES Hardware Architecture for Radio Frequency Identification. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Qianhong Wu, Willy Susilo, Yi Mu 0001, Fangguo Zhang Ad Hoc Group Signatures. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure address proxy, SEND, multi-key cryptographically generated address, Mobile IPv6, ring signature
1Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs 0001, Martijn Oostdijk, Ronny Wichers Schreur Crossing Borders: Security and Privacy Issues of the European e-Passport. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Satoshi Hada, Kouichi Sakurai Ciphertext-Auditable Public Key Encryption. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Anna V. Álvarez, Karen A. García, Raúl Monroy, Luis A. Trejo, Jesús Vázquez A Tool for Managing Security Policies in Organisations. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zouheir Trabelsi, Hesham El-Sayed, Lilia Frikha, Tamer Rabie Traceroute Based IP Channel for Sending Hidden Short Messages. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IP header Record route option, Steganalysis, Covert channel, Traceroute, Hidden information
1Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow attack
1Christophe Tartary, Huaxiong Wang Rateless Codes for the Multicast Stream Authentication Problem. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF rateless codes, stream authentication, polynomial reconstruction
1Toru Nakanishi 0001, Nobuo Funabiki A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF backward unlinkability, DLDH assumption, group signature, revocation, bilinear maps
1Sang-Kyun Noh, DongKook Kim, Yongmin Kim 0005, Bong-Nam Noh Modeling of Network Intrusions Based on the Multiple Transition Probability. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network-based intrusion detection, multiple transition probability, Ergodic model, probability-based modeling, likelihood measure
1In Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee Real-Time Watermark Embedding for High Resolution Video Watermarking. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Stephen Dranger, Robert H. Sloan, Jon A. Solworth The Complexity of Discretionary Access Control. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa A Model-Based Method for Security Configuration Verification. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yi Shi, Xinyu Yang, Huijun Zhu A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chik How Tan Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear map
1Young Chul Kwon, Sang Won Lee, Songchun Moon Personal Computer Privacy: Analysis for Korean PC Users. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data forensics, privacy
1Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Junji Onishi, Tsukasa Ono A Study of Detection Method of Printed Image Alteration Using Digital Watermark. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee 0001 Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael Tunstall, Constantinos Markantonakis, Keith Mayes Inhibiting Card Sharing Attacks. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Flavio D. Garcia, Peter van Rossum Sound Computational Interpretation of Symbolic Hashes in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura (eds.) Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong ID-Based Ring Signature Scheme Secure in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hai Jin 0001, Zhensong Liao, Deqing Zou, Weizhong Qiang A New Approach to Hide Policy for Automated Trust Negotiation. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Willy Susilo, Duncan S. Wong Ring Signature with Designated Linkability. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF linkable ring signature, spontaneous group signature, ring signature
1Yi-Ming Chen 0008, Yung-Wei Kao Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information flow, security policy, Colored Petri Nets, SELinux
Displaying result #301 - #359 of 359 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license