|
Conferences in DBLP
- Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:1-15 [Conf]
- Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
SVision: A Network Host-Centered Anomaly Visualization Technique. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:16-28 [Conf]
- Deholo Nali, Carlisle M. Adams, Ali Miri
Time-Based Release of Confidential Information in Hierarchical Settings. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:29-43 [Conf]
- Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:44-58 [Conf]
- Yanjiang Yang, Beng Chin Ooi
A Privacy Preserving Rental System. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:59-73 [Conf]
- Ratna Dutta, Rana Barua
Constant Round Dynamic Group Key Agreement. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:74-88 [Conf]
- Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:89-103 [Conf]
- Hyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku
ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:104-117 [Conf]
- Dennis Hofheinz, Dominique Unruh
On the Notion of Statistical Security in Simulatability Definitions. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:118-133 [Conf]
- Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:134-148 [Conf]
- Victor K. Wei
Tracing-by-Linking Group Signatures. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:149-163 [Conf]
- Jean Monnerat, Serge Vaudenay
Chaum's Designated Confirmer Signature Revisited. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:164-178 [Conf]
- Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
gore: Routing-Assisted Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:179-193 [Conf]
- Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim
IPSec Support in NAT-PT Scenario for IPv6 Transition. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:194-202 [Conf]
- Alexander W. Dent
Hybrid Signcryption Schemes with Outsider Security. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:203-217 [Conf]
- Guomin Yang, Duncan S. Wong, Xiaotie Deng
Analysis and Improvement of a Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:218-232 [Conf]
- Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
Efficient and Proactive Threshold Signcryption. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:233-243 [Conf]
- Chris J. Mitchell
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:244-258 [Conf]
- Akashi Satoh
Hardware Architecture and Cost Estimates for Breaking SHA-1. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:259-273 [Conf]
- Peng Wang, Dengguo Feng, Wenling Wu
On the Security of Tweakable Modes of Operation: TBC and TAE. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:274-287 [Conf]
- Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:288-299 [Conf]
- Chi-Ming Hu, Wen-Guey Tzeng
Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:300-313 [Conf]
- Helger Lipmaa
An Oblivious Transfer Protocol with Log-Squared Communication. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:314-328 [Conf]
- Yvo Desmedt, Kaoru Kurosawa
Electronic Voting: Starting Over? [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:329-343 [Conf]
- Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:344-358 [Conf]
- Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
Universally Composable Time-Stamping Schemes with Audit. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:359-373 [Conf]
- Kun Peng, Colin Boyd, Ed Dawson
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:374-388 [Conf]
- Adam Young
Building a Cryptovirus Using Microsoft's Cryptographic API. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:389-401 [Conf]
- Gary S.-W. Yeo, Raphael Chung-Wei Phan
On the Security of the WinRAR Encryption Method. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:402-416 [Conf]
- Hongxia Jin, Ginger Myles, Jeffery Lotspiech
Towards Better Software Tamper Resistance. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:417-430 [Conf]
- Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar
Device-Enabled Authorization in the Grey-System. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:431-445 [Conf]
- Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
Evaluating Access Control Policies Through Model Checking. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:446-460 [Conf]
- Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu
A Cryptographic Solution for General Access Control. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:461-473 [Conf]
- Xiaolan Zhang 0003, Brian King
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:474-481 [Conf]
- Daoxi Xiu, Zhaoyu Liu
A Formal Definition for Trust in Distributed Systems. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:482-489 [Conf]
- Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
A Practical Voting Scheme with Receipts. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:490-497 [Conf]
- Zhenghong Wang, Ruby B. Lee
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:498-505 [Conf]
- German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn
Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP] ISC, 2005, pp:506-514 [Conf]
|