C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
CISC
2005
2005
2005
Keyphrases
Publications
2005
Gil-Jong Mun
,
Yongmin Kim
,
DongKook Kim
,
BongNam Noh
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach.
CISC
(2005)
Jong Sou Park
,
Khaja Mohammad Shazzad
,
Dong Seong Kim
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection.
CISC
(2005)
Hyun-Sun Kang
,
Chang-Seop Park
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks.
CISC
(2005)
Roman Schlegel
,
Serge Vaudenay
Enforcing Email Addresses Privacy Using Tokens.
CISC
(2005)
Tianjie Cao
,
Dongdai Lin
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes.
CISC
(2005)
Serge Vaudenay
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography.
CISC
(2005)
Raylin Tso
,
Takeshi Okamoto
,
Eiji Okamoto
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.
CISC
(2005)
Cheol-Min Park
,
Myung-Hwan Kim
,
Moti Yung
A Remark on Implementing the Weil Pairing.
CISC
(2005)
Fagen Li
,
Juntao Gao
,
Yupu Hu
ID-Based Threshold Unsigncryption Scheme from Pairings.
CISC
(2005)
Rui Zhang
,
Hideki Imai
Improvements on Security Proofs of Some Identity Based Encryption Schemes.
CISC
(2005)
Jian Liao
,
Junfang Xiao
,
Yinghao Qi
,
Peiwei Huang
,
Mentian Rong
ID-Based Signature Scheme Without Trusted PKG.
CISC
(2005)
Zhanfei Zhou
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes.
CISC
(2005)
Jong-Hyuk Roh
,
Kyoon-Ha Lee
Key Management for Secure Overlay Multicast.
CISC
(2005)
Shimin Wei
,
Guolong Chen
,
Guozhen Xiao
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences.
CISC
(2005)
Peng Wang
,
Dengguo Feng
,
Wenling Wu
HCTR: A Variable-Input-Length Enciphering Mode.
CISC
(2005)
Fei Gao
,
Su-Juan Qin
,
Qiao-Yan Wen
,
Fu-Chen Zhu
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption.
CISC
(2005)
Hongda Li
,
Bao Li
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP.
CISC
(2005)
Sherman S. M. Chow
,
Zhengjun Cao
,
Joseph K. Liu
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
CISC
(2005)
Jihong Teng
,
Shiqu Li
,
Xiaoying Huang
.
CISC
(2005)
Duhyun Bae
,
Jiho Kim
,
Sehyun Park
,
Ohyoung Song
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN.
CISC
(2005)
Giovanni Di Crescenzo
You Can Prove So Many Things in Zero-Knowledge.
CISC
(2005)
Yuan Zhou
,
Zhenfu Cao
,
Zhenchuan Chai
Constructing Secure Proxy Cryptosystem.
CISC
(2005)
Chunxiang Gu
,
Yuefei Zhu
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme .
CISC
(2005)
Siraj A. Shaikh
,
Vicky J. Bush
,
Steve A. Schneider
Specifying Authentication Using Signal Events in CSP.
CISC
(2005)
Chang-Joo Moon
,
Woojin Paik
,
Young-Gab Kim
,
JuHum Kwon
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control.
CISC
(2005)
Xiaolan Joy Zhang
,
Brian King
Modeling RFID Security.
CISC
(2005)
Guang Gong
,
Kishan Chand Gupta
,
Martin Hell
,
Yassir Nawaz
Towards a General RC4-Like Keystream Generator.
CISC
(2005)
Xiangguo Cheng
,
Huafei Zhu
,
Ying Qiu
,
Xinmei Wang
Efficient Group Signatures from Bilinear Pairing.
CISC
(2005)
Wen Ping Ma
,
Fu Tai Zhang
New Methods to Construct Cheating Immune Multisecret Sharing Scheme.
CISC
(2005)
Yongdong Wu
Efficient Authentication of Electronic Document Workflow.
CISC
(2005)
Yongwha Chung
,
Daesung Moon
,
Sungju Lee
,
Seunghwan Jung
,
Taehae Kim
,
Dosung Ahn
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault.
CISC
(2005)
Pradeep Kumar Mishra
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC.
CISC
(2005)
Zuhua Shao
Enhanced Aggregate Signatures from Pairings.
CISC
(2005)
Takayuki Furuya
,
Takahiro Matsuzaki
,
Kanta Matsuura
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation.
CISC
(2005)
Yu Yu
,
Jussipekka Leiwo
,
A. Benjamin Premkumar
An Improved Secure Two-Party Computation Protocol.
CISC
(2005)
volume 3822, 2005
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
CISC
3822 (2005)