The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
2005 (conf/isw/2005)

  1. Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis
    A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:1-15 [Conf]
  2. Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
    SVision: A Network Host-Centered Anomaly Visualization Technique. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:16-28 [Conf]
  3. Deholo Nali, Carlisle M. Adams, Ali Miri
    Time-Based Release of Confidential Information in Hierarchical Settings. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:29-43 [Conf]
  4. Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung
    "Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:44-58 [Conf]
  5. Yanjiang Yang, Beng Chin Ooi
    A Privacy Preserving Rental System. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:59-73 [Conf]
  6. Ratna Dutta, Rana Barua
    Constant Round Dynamic Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:74-88 [Conf]
  7. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
    A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:89-103 [Conf]
  8. Hyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku
    ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:104-117 [Conf]
  9. Dennis Hofheinz, Dominique Unruh
    On the Notion of Statistical Security in Simulatability Definitions. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:118-133 [Conf]
  10. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
    Certificateless Public Key Encryption Without Pairing. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:134-148 [Conf]
  11. Victor K. Wei
    Tracing-by-Linking Group Signatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:149-163 [Conf]
  12. Jean Monnerat, Serge Vaudenay
    Chaum's Designated Confirmer Signature Revisited. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:164-178 [Conf]
  13. Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis
    gore: Routing-Assisted Defense Against DDoS Attacks. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:179-193 [Conf]
  14. Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim
    IPSec Support in NAT-PT Scenario for IPv6 Transition. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:194-202 [Conf]
  15. Alexander W. Dent
    Hybrid Signcryption Schemes with Outsider Security. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:203-217 [Conf]
  16. Guomin Yang, Duncan S. Wong, Xiaotie Deng
    Analysis and Improvement of a Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:218-232 [Conf]
  17. Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
    Efficient and Proactive Threshold Signcryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:233-243 [Conf]
  18. Chris J. Mitchell
    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:244-258 [Conf]
  19. Akashi Satoh
    Hardware Architecture and Cost Estimates for Breaking SHA-1. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:259-273 [Conf]
  20. Peng Wang, Dengguo Feng, Wenling Wu
    On the Security of Tweakable Modes of Operation: TBC and TAE. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:274-287 [Conf]
  21. Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
    A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:288-299 [Conf]
  22. Chi-Ming Hu, Wen-Guey Tzeng
    Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:300-313 [Conf]
  23. Helger Lipmaa
    An Oblivious Transfer Protocol with Log-Squared Communication. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:314-328 [Conf]
  24. Yvo Desmedt, Kaoru Kurosawa
    Electronic Voting: Starting Over? [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:329-343 [Conf]
  25. Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee
    Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:344-358 [Conf]
  26. Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson
    Universally Composable Time-Stamping Schemes with Audit. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:359-373 [Conf]
  27. Kun Peng, Colin Boyd, Ed Dawson
    A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:374-388 [Conf]
  28. Adam Young
    Building a Cryptovirus Using Microsoft's Cryptographic API. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:389-401 [Conf]
  29. Gary S.-W. Yeo, Raphael Chung-Wei Phan
    On the Security of the WinRAR Encryption Method. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:402-416 [Conf]
  30. Hongxia Jin, Ginger Myles, Jeffery Lotspiech
    Towards Better Software Tamper Resistance. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:417-430 [Conf]
  31. Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar
    Device-Enabled Authorization in the Grey-System. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:431-445 [Conf]
  32. Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
    Evaluating Access Control Policies Through Model Checking. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:446-460 [Conf]
  33. Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu
    A Cryptographic Solution for General Access Control. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:461-473 [Conf]
  34. Xiaolan Zhang 0003, Brian King
    Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:474-481 [Conf]
  35. Daoxi Xiu, Zhaoyu Liu
    A Formal Definition for Trust in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:482-489 [Conf]
  36. Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
    A Practical Voting Scheme with Receipts. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:490-497 [Conf]
  37. Zhenghong Wang, Ruby B. Lee
    New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:498-505 [Conf]
  38. German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn
    Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:506-514 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002