The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISC"( http://dblp.L3S.de/Venues/ICISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icisc

Publication years (Num. hits)
1998 (19) 1999 (21) 2000 (21) 2001 (34) 2002 (37) 2003 (34) 2004 (36) 2005 (35) 2006 (30) 2007 (29) 2008 (26) 2009 (26) 2010 (29) 2011 (33) 2012 (37) 2013 (32) 2014 (27) 2015 (24) 2016 (19) 2017 (21) 2018 (23) 2019 (19) 2020 (16) 2021 (24) 2022 (25) 2023 (1)
Publication types (Num. hits)
inproceedings(653) proceedings(25)
Venues (Conferences, Journals, ...)
ICISC(678)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 441 occurrences of 289 keywords

Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jesus Molina, Xavier Chorin, Michel Cukier Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation
1Atsuko Miyaji Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RPA, elliptic curve, DPA, SPA
1Jean-Philippe Aumasson, Willi Meier Analysis of Multivariate Hash Functions. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Willi Geiselmann, Rainer Steinwandt Cryptanalysis of a Hash Function Proposed at ICISC 2006. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function
1Yan Wen, Huaimin Wang A Secure Virtual Execution Environment for Untrusted Code. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion confinement, isolated execution, virtual execution environment, security, virtual machine
1Jinwei Hu, Ruixuan Li 0001, Zhengding Lu Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Chuan-Wen Loe, Khoongming Khoo Side Channel Attacks on Irregularly Decimated Generators. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Irregularly Decimated Generators, ABSG, Timing Analysis, Fault Attack, DECIM
1Li Jiang, Lingdi Ping, Xuezeng Pan Handling Dynamic Information Release. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF languages, Computer security, information flow, security-type systems
1Raphael C.-W. Phan, Serge Vaudenay Security-Preserving Asymmetric Protocol Encapsulation. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hongbo Yu, Xiaoyun Wang 0001 Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-collision, multi-near-collision, Hash function, sufficient condition, differential path
1Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improving the Time Complexity of Matsui's Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Fourier Transform, block ciphers, linear cryptanalysis
1Hong Zhang, Yeping He, Zhiguo Shi Spatial Context in Role-Based Access Control. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin Gi Choe, Ho-Kun Moon, Myung-Soo Rhee An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dongho Won, Seungjoo Kim (eds.) Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon A New Proxy Signature Scheme Providing Self-delegation. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Junsheng Chang, Huaimin Wang, Gang Yin A Time-Frame Based Trust Model for P2P Systems. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF peer to peer, trust model
1Heeyoul Kim, Younho Lee, Byungchun Chung, Hyunsoo Yoon, Jaewon Lee, KyungIm Jung Digital Rights Management with Right Delegation for Home Networks. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF right delegation, DRM, domain, proxy certificate
1Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng 0001 On Algebraic Immunity and Annihilators. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hypergraph Theory, Greedy Algorithm, Algebraic Attacks, Algebraic Immunity
1Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota Birthday Paradox for Multi-collisions. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-collision, hash function, collision resistant, birthday paradox
1Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder
1Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt A Simpler Sieving Device: Combining ECM and TWIRL. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hidehiro Katou, Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa A High-Speed Square Root Algorithm in Extension Fields. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marek Klonowski, Anna Lauks Extended Sanitizable Signatures. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jongoh Choi, Si-Ho Cha, JooSeok Song An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Frédéric Muller, Thomas Peyrin Cryptanalysis of T-Function-Based Hash Functions. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Norbert Pramstaller, Christian Rechberger Improved Collision Attack on the Hash Function Proposed at PKC'98. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision
1Palash Sarkar 0001 Generic Attacks on Symmetric Ciphers. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chen-Yin Liao, Jen-Wei Yeh, Ming-Seng Kao A Copy Protection Technique Using Multi-level Error Coding. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kang Ryoung Park, Min Cheol Whang, Joa Sang Lim, Yongjoo Cho Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Daniel Joscák, Jirí Tuma Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-block collision attack, 3C and 3C+ constructions, hash functions
1Vladimir Shpilrain Hashing with Polynomials. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Bonwook Koo, Hwan Seok Jang, Jung Hwan Song On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF diffusion layer, SPN, Block cipher, binary matrix
1Zonghua Zhang, Pin-Han Ho, Xiaodong Lin 0001, Hong Shen 0001 Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay RFID Privacy Based on Public-Key Cryptography. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Min Surp Rhee, Byoungcheon Lee (eds.) Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Palash Sarkar 0001 New Constructions of Constant Size Ciphertext HIBE Without Random Oracle. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Divyan M. Konidala, Kwangjo Kim Mobile RFID Applications and Security Challenges. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun Collision Search Attack for 53-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collision search attack, HAS-160, cryptanalysis, hash function
1Sangwoon Yang, Jinsub Park, Younggap You The Smallest ARIA Module with 16-Bit Architecture. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, Low Power Design, ARIA
1Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anonymous channel, Klein bottle routing, mix network, onion routing
1Grace C.-W. Ting Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rightful ownership, watermarking, SVD, DWT, Information hiding, ambiguity
1Woong-Sik Kim, Weon-Hee Yoo, Jang-Hyun Park, Bok-Ki Kim An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Choonsik Park, Seongtaek Chee (eds.) Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vipul Goyal, Abhishek Jain 0002, Jean-Jacques Quisquater Improvements to Mitchell's Remote User Authentication Protocol. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Duc-Liem Vo, Kwangjo Kim Yet Another Forward Secure Signature from Bilinear Pairings. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key evolution, pairings, Forward security, key exposure
1Shaoquan Jiang, Guang Gong Efficient Authenticators with Application to Key Exchange. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Louis Goubin An Algebraic Masking Method to Protect AES Against Power Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Shigeo Tsujii Information Security as Interdisciplinary Science Based on Ethics. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sanjit Chatterjee, Palash Sarkar 0001 Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF parameter size, security, standard model, identity based encryption
1Gisle Grimen, Christian Mönch, Roger Midtstraum Software-Based Copy Protection for Temporal Media During Dissemination and Playback. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Felix Brandt 0001 Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu, Yukiyasu Tsunoo Expanding Weak PRF with Small Key Size. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sjouke Mauw, Martijn Oostdijk Foundations of Attack Trees. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF semantics, attack trees, threat analysis
1Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Hong Wang Weaknesses of COSvd (2, 128) Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer
1Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara A Timed-Release Key Management Scheme for Backward Recovery. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jacques Patarin, Audrey Montreuil Benes and Butterfly Schemes Revisited. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information-theoretic primitive, design of keyed hash functions. (An extended version of this paper is available from the authors), unconditional security, Pseudo-random functions
1Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez An FPGA Implementation of CCM Mode Using AES. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David Naccache National Security, Forensics and Mobile Communications. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Junbeom Hur, Younho Lee, Seong-Min Hong 0001, Hyunsoo Yoon Trust Management for Resilient Wireless Sensor Networks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu 0001 An Efficient Static Blind Ring Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song An Efficient Design of CCMP for Robust Security Network. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu, Yukiyasu Tsunoo Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Soonhak Kwon, Taekyoung Kwon 0002, Young-Ho Park 0001 New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF linear multiplier, NIST recommended binary fields, elliptic curve cryptography
1André Adelsbach, Ulrich Huber 0001, Ahmad-Reza Sadeghi Property-Based Broadcast Encryption for Multi-level Security Policies. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wenling Wu, Wentao Zhang, Dengguo Feng Integral Cryptanalysis of Reduced FOX Block Cipher. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois Cryptanalysis of Sfinks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis
1Jacques Patarin On Linear Systems of Equations with Distinct Variables and Small Block Size. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha Relative Doubling Attack Against Montgomery Ladder. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Doubling attack, Cryptography, Smart card, Side-channel attack, Scalar multiplication, Exponentiation, Simple power analysis (SPA), Chosen-message attack
1Yusuke Naito 0001, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta Improved Collision Attack on MD4 with Probability Almost 1. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Changda Wang 0001, Shiguang Ju The Dilemma of Covert Channels Searching. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho Finding Collision on 45-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Extended Resiliency, Extended Immunity, Divide-and- Conquer Algebraic Attacks
1Bart Goethals, Sven Laur, Helger Lipmaa, Taneli Mielikäinen On Private Scalar Product Computation for Privacy-Preserving Data Mining. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF private scalar product protocol, vertically partitioned frequent pattern mining, Privacy-preserving data mining
1Sanjit Chatterjee, Palash Sarkar 0001, Rana Barua Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Jacobian coordinate, Tate pairing, efficient implementation
1Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu Identity Based Threshold Ring Signature. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature
1Michael K. Reiter Security by, and for, Converged Mobile Devices. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Chao Li, Armando Barreto Profile-Based 3D Face Registration and Recognition. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF biometrics, profile, recognition, registration, 3D, face, contour, moment, range, intensity, 2D
1Dae Hyun Yum, Pil Joong Lee Separable Implicit Certificate Revocation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF certificate-based encryption, PKI, certificate revocation
1Marcin Gogolewski, Miroslaw Kutylowski, Tomasz Luczak 0001 Mobile Mixing. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF degenerate divisor, scalar multiplication, window method, hyperelliptic curve cryptosystem
1Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim Efficient Broadcast Encryption Using Multiple Interpolation Methods. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation, partition, Broadcast encryption
1Youngchan Han, Choonwoo Ryu, Jihyun Moon, Hakil Kim, H. Choi A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Twin, Fingerprint, Family, Uniqueness, Contingency Table, Personal authentication
1Bodo Möller Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, Efficient implementations
1Siyuan Liu, Shuhong Wang 0001, Robert H. Deng, Weizhong Shao A Block Oriented Fingerprinting Scheme in Relational Database. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security, Fingerprinting, Scheme, Block
1Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi Identity-Based Access Control for Ad Hoc Groups. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1HyoJin Yoon, Jung Hee Cheon, Yongdae Kim Batch Verifications with ID-Based Signatures. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ID-based signatures, Batch verifications
1Katsuyuki Takashima New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kalle Burbeck, Simin Nadjm-Tehrani ADWICE - Anomaly Detection with Real-Time Incremental Clustering. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Clustering, Adaptability, Real-time, Intrusion Detection, Anomaly Detection
1Nicolas T. Courtois Algebraic Attacks on Combiners with Memory and Several Outputs. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jens-Matthias Bohli, Rainer Steinwandt On Subliminal Channels in Deterministic Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF deterministic signature schemes, subliminal channels
1Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon-Jae Lee 0001, Sang-Jae Moon Dragon: A Fast Word Based Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF word based stream cipher, nonlinear filter, nonlinear feedback shift register
1Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha Improvement on Ha-Moon Randomized Exponentiation Algorithm. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis
1Jong In Lim 0001, Dong Hoon Lee 0001 (eds.) Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Seungjoo Kim, Dongho Won Threshold Entrusted Undeniable Signature. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Entrusted undeniable signature, Undeniable signature, Threshold signature
1Shoichi Hirose Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher, black-box model, double-block-length hash function
1Bertrand Anckaert, Bjorn De Sutter, Dominique Chanet, Koen De Bosschere Steganography for Executables and Code Transformation Signatures. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF code transformation signature, steganography, executables
Displaying result #401 - #500 of 678 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license