The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISC"( http://dblp.L3S.de/Venues/ICISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icisc

Publication years (Num. hits)
1998 (19) 1999 (21) 2000 (21) 2001 (34) 2002 (37) 2003 (34) 2004 (36) 2005 (35) 2006 (30) 2007 (29) 2008 (26) 2009 (26) 2010 (29) 2011 (33) 2012 (37) 2013 (32) 2014 (27) 2015 (24) 2016 (19) 2017 (21) 2018 (23) 2019 (19) 2020 (16) 2021 (24) 2022 (25) 2023 (1)
Publication types (Num. hits)
inproceedings(653) proceedings(25)
Venues (Conferences, Journals, ...)
ICISC(678)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 441 occurrences of 289 keywords

Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hua Chen 0011, Dengguo Feng An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Self-inverse, Nonlinearity, S-Box, Walsh Hadamard Transform
1Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee 0002 On the Pseudorandomness of a Modification of KASUMI Type Permutations. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF KASUMI, block cipher, provable security, Pseudorandomness
1Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee An Efficient and Verifiable Solution to the Millionaire Problem. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF millionaire problem, zero test, batch equation, efficiency, verifiability
1Bo-Yin Yang, Jiun-Ming Chen All in the XL Family: Theory and Practice. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee 0002, Dowon Hong Padding Oracle Attacks on Multiple Modes of Operation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Padding oracle attacks, Multiple modes of operation, Block ciphers
1Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos D. Zaroliagis Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Generation of Prime Order Elliptic Curves, Class Field Polynomials, Elliptic Curve Cryptosystems, Complex Multiplication
1Yasuyuki Nogami, Yoshitaka Morikawa A Method for Distinguishing the Two Candidate Elliptic Curves in CM Method. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CM method, irreducible cubic polynomial, quadratic power residue/non residue
1Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim 0001 New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Substitution-permutation networks, Branch number, Independent variables, Cryptography, AES, Differential cryptanalysis, Linear cryptanalysis, ARIA
1Joseph K. Liu, Duncan S. Wong On the Security Models of (Threshold) Ring Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Anonymity, Security Models, Bilinear Maps, Ring Signature
1Kisik Chang, Robert H. Deng, Feng Bao 0001, Sangjin Lee 0002, HyungJun Kim, Jongin Lim 0001 On Security Notions for Steganalysis. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pseudoprocessingness, steganography, steganalysis
1Minsoo Lee, Jintaek Kim, Sehyun Park, Ohyoung Song, Sungik Jun A Location-Aware Secure Interworking Architecture Between 3GPP and WLAN Systems. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, ubiquitous computing, agents, Location-awareness, home network, 4G, interworking
1Frank Stajano Security for Ubiquitous Computing. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee 0002, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong 0001 New Block Cipher: ARIA. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jonathan Katz Binary Tree Encryption: Constructions and Applications. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Identity-based signcryption, public ciphertext authenticity, network security, provable security, firewalls, elliptic curve cryptosystems, public key cryptosystems, forward security, semantical security, cryptographic primitives, public verifiability
1Raylin Tso, Ying Miao 0001, Eiji Okamoto A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose Yet Another Definition of Weak Collision Resistance and Its Analysis. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1YoungJu Choie, Eunjeong Lee Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Tate pairing implementation, elliptic curve cryptosystem, hyperelliptic curve cryptosystem
1Willy Susilo, Yi Mu 0001 Non-interactive Deniable Ring Authentication. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ring signature schemes, non-interactive, ring-to-ring authentication, deniable
1Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher
1Tetsu Iwata, Kaoru Kurosawa On the Security of a New Variant of OMAC. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF OMAC, provable security, Message authentication code, pseudorandom permutation
1Xiaofeng Chen 0001, Byoungcheon Lee, Kwangjo Kim Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Bid-rigging, Receipt-free, Auction, Homomorphic encryption
1Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park A General Expansion Method Using Efficient Endomorphisms. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Efficient Endomorphism, Elliptic Curve, Scalar Multiplication, Frobenius Expansion
1Jongsung Kim, Seokhie Hong, Sangjin Lee 0002, Jung Hwan Song, Hyungjin Yang Truncated Differential Attacks on 8-Round CRYPTON. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Truncated Differential Attack, CRYPTON, Block Cipher
1Limin Gu, Jiwu Huang, Zewen Chen Analysis of the Bounds for Linear Block Codes in Watermark Channel. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Wen Ping Ma, Moon Ho Lee New Methods to Construct Cheating Immune Functions. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Quadratic Function, Balanced Function, Cheating Immune Function, MDS Code
1Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Scalar Multiplication, Hyperelliptic Curve, Frobenius Expansion
1Joseph K. Liu, Victor K. Wei, Duncan S. Wong A Separable Threshold Ring Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Shahrokh Saeednia, Steve Kremer, Olivier Markowitch An Efficient Strong Designated Verifier Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Designated verifier, Signature, Discrete logarithm, Signcryption
1Changjie Wang, Ho-fung Leung, Yumin Wang Secure Double Auction Protocols with Full Privacy Protection. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee 0002 Differential Cryptanalysis of TEA and XTEA. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TEA, XTEA, truncated differential cryptanalysis, Block cipher, differential cryptanalysis
1Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim Design of Bit Parallel Multiplier with Lower Time Complexity. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Guilin Wang, Feng Bao 0001, Jianying Zhou 0001, Robert H. Deng Security Analysis of Some Proxy Signatures. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Digital signatures, security analysis, proxy signatures
1Guilin Wang On the Security of a Group Signature Scheme with Forward Security. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signature, group signature, forward security
1Muxiang Zhang Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Jiun-Ming Chen, Bo-Yin Yang A More Secure and Efficacious TTS Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Peeter Laud, Ricardo Corin Sound Computational Interpretation of Formal Encryption with Composed Keys. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee Extended Role Based Access Control and Procedural Restrictions. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Pil Joong Lee, Chae Hoon Lim (eds.) Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo Providing Receipt-Freeness in Mixnet-Based Voting Protocols. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Mixnet, Designated-verifier re-encryption proof, Tamper resistant randomizer, Electronic voting, Receipt-freeness, Re-encryption
1Wen Ping Ma, Moon Ho Lee Group Oriented Cryptosystems Based on Linear Access Structures. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Group Oriented Cryptosystem, ElGamal Cryptosystem, Vector Space Access Structure, Cryptography, Secret Sharing
1Joong Chul Yoon, Seok Won Jung, Sungwoo Lee Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Toru Nakanishi 0001, Daisuke Yamamoto, Yuji Sugiyama Sealed-Bid Auctions with Efficient Bids. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF multiparty computation (MPC), mix-and-match, additive homomorphic cryptosystems, Sealed-bid auction
1Yuan Zhang, Moon-Jung Chung, Hyun Kim Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, collaboration, Access control, virtual enterprise, task assignment
1Ginger Myles, Christian S. Collberg Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Copyright protection, register allocation, Java bytecode, software piracy, software watermarking
1Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang An Efficient Revocation Algorithm in Group Signatures. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Hai Jin 0001, Jianhua Sun 0002, Hao Chen 0002, Zongfen Han A Risk-Sensitive Intrusion Detection Model. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee 0001, Jong In Lim 0001 Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF encrypt-then-sign, authenticity, confidentiality, non-repudiation, signcryption, authenticated encryption, public verifiability
1Se Ah Choi, Kyeongcheol Yang Balanced Shrinking Generators. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Period, Linear Complexity, Balancedness, Statistical Properties, Shrinking Generator, Self-Shrinking Generator
1Erik Zenner On the Efficiency of theClock Control Guessing Attack. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block/Stream Ciphers, Cryptographic Primitives
1Nicolas T. Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm
1Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Endomorphism, Elliptic Curve Cryptosystem, Scalar Multiplication, Frobenius Expansion
1Yaron Sella Speeding Up Secure Sessions Establishment on the Internet. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
1Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang A Dynamic Group Key Distribution Scheme with Flexible User Join. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Kaoru Kurosawa On the Universal Hash Functionsin Luby-Rackoff Cipher. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block/Stream Ciphers, Provable Security, Cryptographic Primitives
1Byoungcheon Lee, Kwangjo Kim Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tamper-resistant randomizer, divertible zero-knowledge proof, Electronic voting, receipt-freeness
1Hyun-Gyu Kim, Hyeong-Cheol Oh Efficient Hardware Multiplicative Inverters. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Threshold MACs. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kwangjo Kim (eds.) Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Jun-Bum Shin, Kwangsu Lee, Kyungah Shim New DSA-Verifiable Signcryption Schemes. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1JuHee Ki, Hyun-Jeong Kim, Dong Hoon Lee 0001, Chang-Seop Park Efficient Multicast Key Management for Stateless Receivers. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multicast, key management, group communication
1Jaeil Lee, Taekyoung Kwon 0002, Sanghoon Song, JooSeok Song A Model for Embedding and Authorizing Digital Signatures in Printed Documents. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Practical Aspects, Computer Security, Distribute Systems Security
1Yuh-Dauh Lyuu, Ming-Luen Wu Convertible Group Undeniable Signatures. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Régis Bevan, Erik Knudsen Ways to Enhance Differential Power Analysis. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Kouichi Sakurai, Tsuyoshi Takagi A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack
1Youn-Hee Gil, Daesung Moon, Sung Bum Pan, Yongwha Chung Fingerprint Verification System Involving Smart Card. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Olivier Markowitch, Dieter Gollmann, Steve Kremer On Fairness in Exchange Protocols. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF exchange protocols, fairness, security protocols, fair exchange, security properties
1Choonwoo Ryu, Hakil Kim A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Willy Susilo, Reihaneh Safavi-Naini An Efficient Fail-Stop Signature Scheme Based on Factorization. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Lu Xiao 0003, Howard M. Heys Hardware Design and Analysisof Block Cipher Components. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Serge Lefranc, David Naccache Cut-&-Paste Attacks with JAVA. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Guilin Wang On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF threshold group signatures, threshold-multisignatures, digital signatures, group signatures
1Bodo Möller Improved Techniques for Fast Exponentiation. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Stefan Mangard A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key Expansion, Smart Cards, AES, Power Analysis, SPA, Key Scheduling
1Beomsik Song, Jennifer Seberry Consistent Differential Patterns of Rijndael. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Consistent Differential Patterns, Differential Characteristics, Cryptanalysis, Rijndael
1Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen Applet Verification Strategiesfor RAM-Constrained Devices. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Xian-Mo Zhang Ideal Threshold Schemes from MDS Codes. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cheating Detection and Identification, Secret Sharing, Threshold Schemes
1Tetsuya Izu, Tsuyoshi Takagi Efficient Computations of the Tate Pairingfor the Large MOV Degrees. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Jacobian coordinate, MOV degree, Elliptic curve cryptosystem, Tate pairing, efficient computation
1HyungJong Kim 0002 System Specification Based Network Modeling for Survivability Testing Simulation. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Survivability, Simulation Model, Vulnerability Analysis, System Specification, DEVS-Formalism
1Raphael Chung-Wei Phan, Soichi Furuya Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF extended slide attacks, sliding property, cryptanalysis, Block ciphers, DES, key schedule
1Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan Non-interactive Auction Schemewith Strong Privacy. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Christopher Krügel, Thomas Toth, Clemens Kerer Decentralized Event Correlation for Intrusion Detection. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intrusion Detection, Network Security, Event Correlation
1Joan Mir, Joan Borrell Protecting General Flexible Itineraries of Mobile Agents. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Soichi Furuya Slide Attacks with a Known-Plaintext Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Clemente Galdi, Pino Persiano Private Computation with Shared Randomness over Broadcast Channel. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Secure Distributed Protocols, Private Function Evaluation, Broadcast Channel
1Josef Pieprzyk, Xian-Mo Zhang Constructions of Cheating Immune Secret Sharing. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Supakorn Kungpisdan, Yongyuth Permpoontanalarp Practical Reasoning about Accountability in Electronic Commerce Protocols. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Formal methods for security protocols, analysis of electronic commerce protocols
1André Weimerskirch, Gilles Thonet A Distributed Light-Weight Authentication Model for Ad-hoc Networks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF low-value transactions, security, Ad-hoc network, authentication, trust, public-key
1Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang Efficient Revocation Schemes for Secure Multicast. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk Copyright Protection of Object-Oriented Software. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Gérard D. Cohen, Simon Litsyn, Gilles Zémor Binary Codes for Collusion-Secure Fingerprinting. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Collusion-resistant code, intersecting code, B2-sequence, watermarking, Fingerprinting
1Ron Steinfeld, Laurence Bull, Yuliang Zheng 0001 Content Extraction Signatures. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fragment-extraction, content blinding, fact verification, content verification, digital signatures, provable security, Content-extraction
1Kouichi Itoh, Masahiko Takenaka, Naoya Torii DPA Countermeasure Based on the "Masking Method". Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF masking method, DPA, countermeasure, Rijndael
1Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Vorapranee Khu-smith, Chris J. Mitchell Enhancing the Security of Cookies. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Web security, Internet security, Cookies
1Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem
Displaying result #501 - #600 of 678 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license