Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icisc/icisc2004.bht:"
@proceedings{DBLP:conf/icisc/2004, editor = {Choonsik Park and Seongtaek Chee}, title = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137120}, doi = {10.1007/B137120}, isbn = {3-540-26226-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AnckaertSCB04, author = {Bertrand Anckaert and Bjorn De Sutter and Dominique Chanet and Koen De Bosschere}, editor = {Choonsik Park and Seongtaek Chee}, title = {Steganography for Executables and Code Transformation Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {425--439}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_31}, doi = {10.1007/11496618\_31}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AnckaertSCB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BohliS04, author = {Jens{-}Matthias Bohli and Rainer Steinwandt}, editor = {Choonsik Park and Seongtaek Chee}, title = {On Subliminal Channels in Deterministic Signature Schemes}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {182--194}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_14}, doi = {10.1007/11496618\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/BohliS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BurbeckN04, author = {Kalle Burbeck and Simin Nadjm{-}Tehrani}, editor = {Choonsik Park and Seongtaek Chee}, title = {{ADWICE} - Anomaly Detection with Real-Time Incremental Clustering}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {407--424}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_30}, doi = {10.1007/11496618\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/BurbeckN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChangDFLKL04, author = {Kisik Chang and Robert H. Deng and Feng Bao and Sangjin Lee and HyungJun Kim and Jongin Lim}, editor = {Choonsik Park and Seongtaek Chee}, title = {On Security Notions for Steganalysis}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {440--454}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_32}, doi = {10.1007/11496618\_32}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChangDFLKL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChatterjeeSB04, author = {Sanjit Chatterjee and Palash Sarkar and Rana Barua}, editor = {Choonsik Park and Seongtaek Chee}, title = {Efficient Computation of Tate Pairing in Projective Coordinate over General Characteristic Fields}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {168--181}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_13}, doi = {10.1007/11496618\_13}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChatterjeeSB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenF04, author = {Hua Chen and Dengguo Feng}, editor = {Choonsik Park and Seongtaek Chee}, title = {An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse S-Boxes}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {352--361}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_26}, doi = {10.1007/11496618\_26}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChenF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenHMFSDLM04, author = {Kevin Chen and Matthew Henricksen and William Millan and Joanne Fuller and Leonie Ruth Simpson and Ed Dawson and Hoon{-}Jae Lee and Sang{-}Jae Moon}, editor = {Choonsik Park and Seongtaek Chee}, title = {Dragon: {A} Fast Word Based Stream Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {33--50}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_5}, doi = {10.1007/11496618\_5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ChenHMFSDLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChoSKLSL04, author = {Hong{-}Su Cho and Soo Hak Sung and Daesung Kwon and Jung{-}Keun Lee and Jung Hwan Song and Jongin Lim}, editor = {Choonsik Park and Seongtaek Chee}, title = {New Method for Bounding the Maximum Differential Probability for SPNs and {ARIA}}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {21--32}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_4}, doi = {10.1007/11496618\_4}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ChoSKLSL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChowHY04, author = {Sherman S. M. Chow and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, editor = {Choonsik Park and Seongtaek Chee}, title = {Identity Based Threshold Ring Signature}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {218--232}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_17}, doi = {10.1007/11496618\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ChowHY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Courtois04, author = {Nicolas T. Courtois}, editor = {Choonsik Park and Seongtaek Chee}, title = {Algebraic Attacks on Combiners with Memory and Several Outputs}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {3--20}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_3}, doi = {10.1007/11496618\_3}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Courtois04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GoethalsLLM04, author = {Bart Goethals and Sven Laur and Helger Lipmaa and Taneli Mielik{\"{a}}inen}, editor = {Choonsik Park and Seongtaek Chee}, title = {On Private Scalar Product Computation for Privacy-Preserving Data Mining}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {104--120}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_9}, doi = {10.1007/11496618\_9}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GoethalsLLM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GogolewskiKL04, author = {Marcin Gogolewski and Miroslaw Kutylowski and Tomasz Luczak}, editor = {Choonsik Park and Seongtaek Chee}, title = {Mobile Mixing}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {380--393}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_28}, doi = {10.1007/11496618\_28}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/GogolewskiKL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HanRMKC04, author = {Youngchan Han and Choonwoo Ryu and Jihyun Moon and Hakil Kim and H. Choi}, editor = {Choonsik Park and Seongtaek Chee}, title = {A Study on Evaluating the Uniqueness of Fingerprints Using Statistical Analysis}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {467--477}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_34}, doi = {10.1007/11496618\_34}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HanRMKC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Hirose04, author = {Shoichi Hirose}, editor = {Choonsik Park and Seongtaek Chee}, title = {Provably Secure Double-Block-Length Hash Functions in a Black-Box Model}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {330--342}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_24}, doi = {10.1007/11496618\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Hirose04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KatagiAKT04, author = {Masanobu Katagi and Toru Akishita and Izuru Kitamura and Tsuyoshi Takagi}, editor = {Choonsik Park and Seongtaek Chee}, title = {Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {296--312}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_22}, doi = {10.1007/11496618\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KatagiAKT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimW04, author = {Seungjoo Kim and Dongho Won}, editor = {Choonsik Park and Seongtaek Chee}, title = {Threshold Entrusted Undeniable Signature}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {195--203}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_15}, doi = {10.1007/11496618\_15}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KonstantinouKSZ04, author = {Elisavet Konstantinou and Aristides Kontogeorgis and Yannis C. Stamatiou and Christos D. Zaroliagis}, editor = {Choonsik Park and Seongtaek Chee}, title = {Generating Prime Order Elliptic Curves: Difficulties and Efficiency Considerations}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {261--278}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_20}, doi = {10.1007/11496618\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KonstantinouKSZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeKLSLH04, author = {Taekeon Lee and Jongsung Kim and Changhoon Lee and Jaechul Sung and Sangjin Lee and Dowon Hong}, editor = {Choonsik Park and Seongtaek Chee}, title = {Padding Oracle Attacks on Multiple Modes of Operation}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {343--351}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_25}, doi = {10.1007/11496618\_25}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeKLSLH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeKPSJ04, author = {Minsoo Lee and Jintaek Kim and Sehyun Park and Ohyoung Song and Sungik Jun}, editor = {Choonsik Park and Seongtaek Chee}, title = {A Location-Aware Secure Interworking Architecture Between 3GPP and {WLAN} Systems}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {394--406}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_29}, doi = {10.1007/11496618\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeKPSJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeSHL04, author = {Wonil Lee and Kouichi Sakurai and Seokhie Hong and Sangjin Lee}, editor = {Choonsik Park and Seongtaek Chee}, title = {On the Pseudorandomness of a Modification of {KASUMI} Type Permutations}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {313--329}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_23}, doi = {10.1007/11496618\_23}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeSHL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiB04, author = {Chao Li and Armando Barreto}, editor = {Choonsik Park and Seongtaek Chee}, title = {Profile-Based 3D Face Registration and Recognition}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {478--488}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_35}, doi = {10.1007/11496618\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuW04, author = {Joseph K. Liu and Duncan S. Wong}, editor = {Choonsik Park and Seongtaek Chee}, title = {On the Security Models of (Threshold) Ring Signature Schemes}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {204--217}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_16}, doi = {10.1007/11496618\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiuW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuWDS04, author = {Siyuan Liu and Shuhong Wang and Robert H. Deng and Weizhong Shao}, editor = {Choonsik Park and Seongtaek Chee}, title = {A Block Oriented Fingerprinting Scheme in Relational Database}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {455--466}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_33}, doi = {10.1007/11496618\_33}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiuWDS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Moller04, author = {Bodo M{\"{o}}ller}, editor = {Choonsik Park and Seongtaek Chee}, title = {Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {137--153}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_11}, doi = {10.1007/11496618\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Moller04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NogamiM04, author = {Yasuyuki Nogami and Yoshitaka Morikawa}, editor = {Choonsik Park and Seongtaek Chee}, title = {A Method for Distinguishing the Two Candidate Elliptic Curves in {CM} Method}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {249--260}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_19}, doi = {10.1007/11496618\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/NogamiM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengBDL04, author = {Kun Peng and Colin Boyd and Ed Dawson and Byoungcheon Lee}, editor = {Choonsik Park and Seongtaek Chee}, title = {An Efficient and Verifiable Solution to the Millionaire Problem}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {51--66}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_6}, doi = {10.1007/11496618\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengBDL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Reiter04, author = {Michael K. Reiter}, editor = {Choonsik Park and Seongtaek Chee}, title = {Security by, and for, Converged Mobile Devices}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {1}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_1}, doi = {10.1007/11496618\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Reiter04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SaxenaTY04, author = {Nitesh Saxena and Gene Tsudik and Jeong Hyun Yi}, editor = {Choonsik Park and Seongtaek Chee}, title = {Identity-Based Access Control for Ad Hoc Groups}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {362--379}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_27}, doi = {10.1007/11496618\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SaxenaTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Stajano04, author = {Frank Stajano}, editor = {Choonsik Park and Seongtaek Chee}, title = {Security for Ubiquitous Computing}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {2}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_2}, doi = {10.1007/11496618\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Stajano04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Takashima04, author = {Katsuyuki Takashima}, editor = {Choonsik Park and Seongtaek Chee}, title = {New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {279--295}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_21}, doi = {10.1007/11496618\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Takashima04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YangC04, author = {Bo{-}Yin Yang and Jiun{-}Ming Chen}, editor = {Choonsik Park and Seongtaek Chee}, title = {All in the {XL} Family: Theory and Practice}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {67--86}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_7}, doi = {10.1007/11496618\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YangC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YenCMH04, author = {Sung{-}Ming Yen and Chien{-}Ning Chen and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Choonsik Park and Seongtaek Chee}, title = {Improvement on Ha-Moon Randomized Exponentiation Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {154--167}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_12}, doi = {10.1007/11496618\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YenCMH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YooJCK04, author = {Eun Sun Yoo and Nam{-}Su Jho and Jung Hee Cheon and Myung{-}Hwan Kim}, editor = {Choonsik Park and Seongtaek Chee}, title = {Efficient Broadcast Encryption Using Multiple Interpolation Methods}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {87--103}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_8}, doi = {10.1007/11496618\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YooJCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YoonCK04, author = {HyoJin Yoon and Jung Hee Cheon and Yongdae Kim}, editor = {Choonsik Park and Seongtaek Chee}, title = {Batch Verifications with ID-Based Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {233--248}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_18}, doi = {10.1007/11496618\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/YoonCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YumL04, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Choonsik Park and Seongtaek Chee}, title = {Separable Implicit Certificate Revocation}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {121--136}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_10}, doi = {10.1007/11496618\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YumL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.