Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icics/icics2004.bht:"
@inproceedings{DBLP:conf/icics/AbdallaW04, author = {Michel Abdalla and Bogdan Warinschi}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {On the Minimal Assumptions of Group Signature Schemes}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {1--13}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_1}, doi = {10.1007/978-3-540-30191-2\_1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/AbdallaW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/AbieSF04, author = {Habtamu Abie and P{\aa}l Spilling and Bent Foyn}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {546--562}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_42}, doi = {10.1007/978-3-540-30191-2\_42}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/AbieSF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChowHYC04, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu and Kam{-}Pui Chow}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Secure Hierarchical Identity Based Signature and Its Application}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {480--494}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_37}, doi = {10.1007/978-3-540-30191-2\_37}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChowHYC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CietG04, author = {Mathieu Ciet and Christophe Giraud}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Transient Fault Induction Attacks on {XTR}}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {440--451}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_34}, doi = {10.1007/978-3-540-30191-2\_34}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/CietG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DavisMR04, author = {Darren Davis and Fabian Monrose and Michael K. Reiter}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Time-Scoped Searching of Encrypted Audit Logs}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {532--545}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_41}, doi = {10.1007/978-3-540-30191-2\_41}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/DavisMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DuttaBS04, author = {Ratna Dutta and Rana Barua and Palash Sarkar}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Provably Secure Authenticated Tree Based Group Key Agreement}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {92--104}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_8}, doi = {10.1007/978-3-540-30191-2\_8}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/DuttaBS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/El-KhalilK04, author = {Rakan El{-}Khalil and Angelos D. Keromytis}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Hydan: Hiding Information in Program Binaries}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {187--199}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_15}, doi = {10.1007/978-3-540-30191-2\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/El-KhalilK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/FernandezS04, author = {Marcel Fernandez and Miguel Soriano}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Identification of Traitors Using a Trellis}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {211--222}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_17}, doi = {10.1007/978-3-540-30191-2\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/FernandezS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GarciaABCCN04, author = {Joaqu{\'{\i}}n Garc{\'{\i}}a and Fabien Autrel and Joan Borrell and Sergio Castillo and Fr{\'{e}}d{\'{e}}ric Cuppens and Guillermo Navarro}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {223--235}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_18}, doi = {10.1007/978-3-540-30191-2\_18}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/GarciaABCCN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GiansiracusaRCR04, author = {Michelangelo Giansiracusa and Selwyn Russell and Andrew J. Clark and Volker Roth}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {343--357}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_27}, doi = {10.1007/978-3-540-30191-2\_27}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/GiansiracusaRCR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Gonzalez-DeleitoMD04, author = {Nicol{\'{a}}s Gonz{\'{a}}lez{-}Deleito and Olivier Markowitch and Emmanuel Dall'Olio}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {A New Key-Insulated Signature Scheme}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {465--479}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_36}, doi = {10.1007/978-3-540-30191-2\_36}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Gonzalez-DeleitoMD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HalkidisCS04, author = {Spyros T. Halkidis and Alexander Chatzigeorgiou and George Stephanides}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {A Qualitative Evaluation of Security Patterns}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {132--144}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_11}, doi = {10.1007/978-3-540-30191-2\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HalkidisCS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HanILS04, author = {Dong{-}Guk Han and Tetsuya Izu and Jongin Lim and Kouichi Sakurai}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Modified Power-Analysis Attacks on {XTR} and an Efficient Countermeasure}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {305--317}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_24}, doi = {10.1007/978-3-540-30191-2\_24}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/HanILS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HebbesL04, author = {Luke Hebbes and Andrew P. Lenaghan}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {A Semi-fragile Steganographic Digital Signature for Images}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {200--210}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_16}, doi = {10.1007/978-3-540-30191-2\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HebbesL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HerranzS04, author = {Javier Herranz and Germ{\'{a}}n S{\'{a}}ez}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {New Identity-Based Ring Signature Schemes}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {27--39}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_3}, doi = {10.1007/978-3-540-30191-2\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HerranzS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HerrmannJ04, author = {Klaus Herrmann and Michael A. Jaeger}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {{PAYFLUX} - Secure Electronic Payment in Mobile Ad Hoc Networks}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {66--78}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_6}, doi = {10.1007/978-3-540-30191-2\_6}, timestamp = {Wed, 26 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HerrmannJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HongJ04, author = {Kihun Hong and Souhwan Jung}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {An Efficient Authentication Scheme Using Recovery Information in Signature}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {520--531}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_40}, doi = {10.1007/978-3-540-30191-2\_40}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HongJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/IshiharaSF04, author = {Yasunori Ishihara and Yumi Shimakawa and Toru Fujiwara}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {145--157}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_12}, doi = {10.1007/978-3-540-30191-2\_12}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/IshiharaSF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JungZWK04, author = {Souhwan Jung and Fan Zhao and Shyhtsun Felix Wu and HyunGon Kim}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Threat Analysis on NEtwork MObility {(NEMO)}}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {331--342}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_26}, doi = {10.1007/978-3-540-30191-2\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/JungZWK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KarglW04, author = {Anton Kargl and G{\"{o}}tz Wiesend}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {278--290}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_22}, doi = {10.1007/978-3-540-30191-2\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KarglW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KomanoO04, author = {Yuichi Komano and Kazuo Ohta}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Taxonomic Consideration to {OAEP} Variants and Their Security}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {105--117}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_9}, doi = {10.1007/978-3-540-30191-2\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KomanoO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LaguillaumieV04, author = {Fabien Laguillaumie and Damien Vergnaud}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Multi-designated Verifiers Signatures}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {495--507}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_38}, doi = {10.1007/978-3-540-30191-2\_38}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LaguillaumieV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LanotteMTTT04, author = {Ruggero Lanotte and Andrea Maggiolo{-}Schettini and Simone Tini and Angelo Troina and Enrico Tronci}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Automatic Covert Channel Analysis of a Multilevel Secure Component}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {249--261}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_20}, doi = {10.1007/978-3-540-30191-2\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LanotteMTTT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LeeYKKPO04, author = {Hyung{-}Woo Lee and Sung{-}Hyun Yun and Taekyoung Kwon and Jae{-}Sung Kim and Hee{-}Un Park and Nam{-}Ho Oh}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Reflector Attack Traceback System with Pushback Based iTrace Mechanism}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {236--248}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_19}, doi = {10.1007/978-3-540-30191-2\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LeeYKKPO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiWMZD04, author = {Tieyan Li and Yongdong Wu and Di Ma and Huafei Zhu and Robert H. Deng}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Flexible Verification of {MPEG-4} Stream in Peer-to-Peer {CDN}}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {79--91}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_7}, doi = {10.1007/978-3-540-30191-2\_7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiWMZD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LinYC04, author = {Hsi{-}Chung Lin and Sung{-}Ming Yen and Guan{-}Ting Chen}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Adaptive-CCA on OpenPGP Revisited}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {452--464}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_35}, doi = {10.1007/978-3-540-30191-2\_35}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LinYC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LynchM04, author = {Christopher Lynch and Catherine Meadows}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Sound Approximations to Diffie-Hellman Using Rewrite Rules}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {262--277}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_21}, doi = {10.1007/978-3-540-30191-2\_21}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LynchM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaDWL04, author = {Di Ma and Robert H. Deng and Yongdong Wu and Tieyan Li}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Dynamic Access Control for Multi-privileged Group Communications}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {508--519}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_39}, doi = {10.1007/978-3-540-30191-2\_39}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaDWL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MazhelisPV04, author = {Oleksiy Mazhelis and Seppo Puuronen and Jari Veijalainen}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Modelling Dependencies Between Classifiers in Mobile Masquerader Detection}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {318--330}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_25}, doi = {10.1007/978-3-540-30191-2\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MazhelisPV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MihaljevicFI04, author = {Miodrag J. Mihaljevic and Marc P. C. Fossorier and Hideki Imai}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Secret-Public Storage Trade-Off for Broadcast Encryption Key Management}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {375--387}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_29}, doi = {10.1007/978-3-540-30191-2\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MihaljevicFI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MonneratV04, author = {Jean Monnerat and Serge Vaudenay}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {On Some Weak Extensions of {AES} and {BES}}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {414--426}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_32}, doi = {10.1007/978-3-540-30191-2\_32}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MonneratV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MoodahiGLM04, author = {Ilanit Moodahi and Ehud Gudes and Oz Lavee and Amnon Meisels}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {A SecureWorkflow Model Based on Distributed Constrained Role and Task Assignment for the Internet}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {171--186}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_14}, doi = {10.1007/978-3-540-30191-2\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MoodahiGLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NikovNP04, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Robust Metering Schemes for General Access Structures}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {53--65}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_5}, doi = {10.1007/978-3-540-30191-2\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/NikovNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PetrovicF04, author = {Slobodan Petrovic and Amparo F{\'{u}}ster{-}Sabater}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {427--439}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_33}, doi = {10.1007/978-3-540-30191-2\_33}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/PetrovicF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/RingC04, author = {Sandra Ring and Eric Cole}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Volatile Memory Computer Forensics to Detect Kernel Level Compromise}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {158--170}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_13}, doi = {10.1007/978-3-540-30191-2\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/RingC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Schmidt-Samoa04, author = {Katja Schmidt{-}Samoa}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Factorization-Based Fail-Stop Signatures Revisited}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {118--131}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_10}, doi = {10.1007/978-3-540-30191-2\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Schmidt-Samoa04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SimPL04, author = {Sang Gyoo Sim and Dong Jin Park and Pil Joong Lee}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {New Power Analysis on the Ha-Moon Algorithm and the {MIST} Algorithm}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {291--304}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_23}, doi = {10.1007/978-3-540-30191-2\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/SimPL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SusiloMZ04, author = {Willy Susilo and Yi Mu and Fangguo Zhang}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Perfect Concurrent Signature Schemes}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {14--26}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_2}, doi = {10.1007/978-3-540-30191-2\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SusiloMZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WanKO04, author = {Tao Wan and Evangelos Kranakis and Paul C. van Oorschot}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Securing the Destination-Sequenced Distance Vector Routing Protocol {(S-DSDV)}}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {358--374}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_28}, doi = {10.1007/978-3-540-30191-2\_28}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WanKO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangCC04, author = {Bo{-}Yin Yang and Jiun{-}Ming Chen and Nicolas T. Courtois}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {On Asymptotic Security Estimates in {XL} and Gr{\"{o}}bner Bases-Related Algebraic Cryptanalysis}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {401--413}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_31}, doi = {10.1007/978-3-540-30191-2\_31}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/YangCC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangWFB04, author = {Bin Zhang and Hongjun Wu and Dengguo Feng and Feng Bao}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Security Analysis of the Generalized Self-shrinking Generator}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {388--400}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_30}, doi = {10.1007/978-3-540-30191-2\_30}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangWFB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Zhou04, author = {Jianying Zhou}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {On the Security of a Multi-party Certified Email Protocol}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {40--52}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_4}, doi = {10.1007/978-3-540-30191-2\_4}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Zhou04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2004, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b101042}, doi = {10.1007/B101042}, isbn = {3-540-23563-9}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.