![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "stream:conf/infosecu:"
@inproceedings{DBLP:conf/infosecu/00010Z04, author = {Jiguo Li and Yichen Zhang and Yuelong Zhu}, editor = {John R. White and Huanye Sheng}, title = {Security analysis and improvement of some proxy signature schemes}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {27--32}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046297}, doi = {10.1145/1046290.1046297}, timestamp = {Tue, 15 Feb 2022 16:17:26 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/00010Z04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/0001COMO04, author = {Lihua Wang and Zhenfu Cao and Eiji Okamoto and Ying Miao and Takeshi Okamoto}, editor = {John R. White and Huanye Sheng}, title = {Transformation-free proxy cryptosystems and their applications to electronic commerce}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {92--98}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046310}, doi = {10.1145/1046290.1046310}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/0001COMO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/0001W04, author = {Xinpeng Zhang and Shuozhong Wang}, editor = {John R. White and Huanye Sheng}, title = {A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {247--248}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046350}, doi = {10.1145/1046290.1046350}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/0001W04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/BaoCQ04, author = {Haiyong Bao and Zhenfu Cao and Haifeng Qian}, editor = {John R. White and Huanye Sheng}, title = {Cryptanalysis of group signature scheme from ID-based signature scheme}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {115--118}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046313}, doi = {10.1145/1046290.1046313}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/BaoCQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ChaiCL04, author = {Zhenchuan Chai and Zhenfu Cao and Rongxing Lu}, editor = {John R. White and Huanye Sheng}, title = {ID-based threshold decryption without random oracles and its application in key escrow}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {119--124}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046314}, doi = {10.1145/1046290.1046314}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ChaiCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/CuiPW04, author = {Jingsong Cui and Rong Peng and Li{-}Na Wang}, editor = {John R. White and Huanye Sheng}, title = {The optimized key distribution scheme in threshold {RSA}}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {18--21}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046295}, doi = {10.1145/1046290.1046295}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/CuiPW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/DuanCL04, author = {Shanshan Duan and Zhenfu Cao and Rongxing Lu}, editor = {John R. White and Huanye Sheng}, title = {Robust ID-based threshold signcryption scheme from pairings}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {33--37}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046298}, doi = {10.1145/1046290.1046298}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/DuanCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/Han0H04, author = {Yiliang Han and Xiaoyuan Yang and Yupu Hu}, editor = {John R. White and Huanye Sheng}, title = {Signcryption based on elliptic curve and its multi-party schemes}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {216--217}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046336}, doi = {10.1145/1046290.1046336}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/Han0H04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/HuXCY04, author = {Tongshen Hu and Xiamin and Qingzhang Chen and Kezhen Ying}, editor = {John R. White and Huanye Sheng}, title = {Design and implement of firewall-log-based online attack detection system}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {146--149}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046320}, doi = {10.1145/1046290.1046320}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/HuXCY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ItoOIO04, author = {Tadahiko Ito and Takeshi Okamoto and Atsuo Inomata and Eiji Okamoto}, editor = {John R. White and Huanye Sheng}, title = {Anonymous traceable disclosure scheme using pairing over elliptic curve}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {48--52}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046301}, doi = {10.1145/1046290.1046301}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ItoOIO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiGWB04, author = {Ming Li and Dawu Gu and Yong Wang and Yingcai Bai}, editor = {John R. White and Huanye Sheng}, title = {Research on authenticated key agreement in group settings}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {1--4}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046292}, doi = {10.1145/1046290.1046292}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiGWB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiL04, author = {Botao Li and Junzhou Luo}, editor = {John R. White and Huanye Sheng}, title = {On timeliness of a fair non-repudiation protocol}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {99--106}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046311}, doi = {10.1145/1046290.1046311}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiQ04, author = {Zhongwen Li and Zhongpan Qiu}, editor = {John R. White and Huanye Sheng}, title = {A new type of security and safety architecture for distributed system: models and implementation}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {107--114}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046312}, doi = {10.1145/1046290.1046312}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiQ04a, author = {Bo Li and Xiao{-}Ping Qiu}, editor = {John R. White and Huanye Sheng}, title = {An application of machine leaning to network intrusion detection}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {231--233}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046343}, doi = {10.1145/1046290.1046343}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiQ04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiZC04, author = {Yunfeng Li and Qingsheng Zhu and Yukun Cao}, editor = {John R. White and Huanye Sheng}, title = {Automatic metadata generation based on neural network}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {192--197}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046330}, doi = {10.1145/1046290.1046330}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiZC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiuD004, author = {Fang Liu and Kui Dai and Zhiying Wang}, editor = {John R. White and Huanye Sheng}, title = {Applying multiple criteria decision making to improve security architecture development}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {244--246}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046349}, doi = {10.1145/1046290.1046349}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiuD004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiuGW04, author = {Wenjie Liu and Guochang Gu and Hongnan Wang}, editor = {John R. White and Huanye Sheng}, title = {Communication and recovery issues in grid environment}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {82--86}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046307}, doi = {10.1145/1046290.1046307}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiuGW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiuL04, author = {Peiyu Liu and Yuguo Liu}, editor = {John R. White and Huanye Sheng}, title = {Research on network information filtering model based on fuzzy set}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {236--237}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046345}, doi = {10.1145/1046290.1046345}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiuL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiuWW04, author = {Jingmei Liu and Baodian Wei and Xinmei Wang}, editor = {John R. White and Huanye Sheng}, title = {New method to determine algebraic expression of Rijndael S-box}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {181--185}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046328}, doi = {10.1145/1046290.1046328}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LiuWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LiuXS04, author = {Xin Liu and Qiu{-}Liang Xu and Jiu{-}Qing Shang}, editor = {John R. White and Huanye Sheng}, title = {A public auction scheme based on group signature}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {136--142}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046317}, doi = {10.1145/1046290.1046317}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosecu/LiuXS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LuC04, author = {Rongxing Lu and Zhenfu Cao}, editor = {John R. White and Huanye Sheng}, title = {A proxy-protected signature scheme based on conic}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {22--26}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046296}, doi = {10.1145/1046290.1046296}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LuC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/LuoL04, author = {Wenjun Luo and Xiang Li}, editor = {John R. White and Huanye Sheng}, title = {A study of secure multi-party elementary function computation protocols}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {5--12}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046293}, doi = {10.1145/1046290.1046293}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/LuoL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/MaAH04, author = {Chunbo Ma and Jun Ao and Dake He}, editor = {John R. White and Huanye Sheng}, title = {An ID-based group signature}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {229--230}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046342}, doi = {10.1145/1046290.1046342}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/MaAH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/Shao04, author = {Zuhua Shao}, editor = {John R. White and Huanye Sheng}, title = {Cryptanalysis of publicly verifiable authenticated encryption}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {143--145}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046318}, doi = {10.1145/1046290.1046318}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/Shao04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ShengLL04, author = {Ke{-}jun Sheng and Jiqiang Liu and Xin Liu}, editor = {John R. White and Huanye Sheng}, title = {Organization structure based access control model}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {210--215}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046334}, doi = {10.1145/1046290.1046334}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ShengLL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ShiCW04, author = {Yang Shi and Liming Cao and Xiaoping Wang}, editor = {John R. White and Huanye Sheng}, title = {A security scheme of electronic commerce for mobile agents uses undetachable digital signatures}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {242--243}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046348}, doi = {10.1145/1046290.1046348}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ShiCW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ShiJH04, author = {Zhicai Shi and Zhenzhou Ji and Mingzeng Hu}, editor = {John R. White and Huanye Sheng}, title = {A novel distributed intrusion detection model based on mobile agent}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {155--159}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046322}, doi = {10.1145/1046290.1046322}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ShiJH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/SunLH04, author = {Xingming Sun and Gang Luo and Huajun Huang}, editor = {John R. White and Huanye Sheng}, title = {Component-based digital watermarking of Chinese texts}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {76--81}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046306}, doi = {10.1145/1046290.1046306}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/SunLH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/SunZZ04, author = {Tieli Sun and Wei Zhao and Zhiyan Zhao}, editor = {John R. White and Huanye Sheng}, title = {An architecture of pattern-oriented distributed meta-search engine}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {171--174}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046325}, doi = {10.1145/1046290.1046325}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/SunZZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/TanL04, author = {Zuowen Tan and Zhuojun Liu}, editor = {John R. White and Huanye Sheng}, title = {Provably secure delegation-by-certification proxy signature schemes}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {38--43}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046299}, doi = {10.1145/1046290.1046299}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/TanL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/WangCYZ04, author = {Xiang{-}Yang Wang and Yong{-}rui Cui and Hongying Yang and Hong Zhao}, editor = {John R. White and Huanye Sheng}, title = {A new content-based digital audio watermarking algorithm for copyright protection}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {62--68}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046304}, doi = {10.1145/1046290.1046304}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/WangCYZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/WangLW04, author = {Lunwei Wang and Xiangke Liao and Huaimin Wang}, editor = {John R. White and Huanye Sheng}, title = {{AT-PAM:} an authentication trustworthiness-based {PAM}}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {204--209}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046333}, doi = {10.1145/1046290.1046333}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/WangLW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/WangWD04, author = {Jing{-}Xin Wang and Zhi{-}Ying Wang and Kui Dai}, editor = {John R. White and Huanye Sheng}, title = {A network intrusion detection system based on the artificial neural networks}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {166--170}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046324}, doi = {10.1145/1046290.1046324}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/WangWD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/WeiH04, author = {Yongzhuang Wei and Yu{-}Pu Hu}, editor = {John R. White and Huanye Sheng}, title = {New construction of resilient functions with satisfying multiple cryptographic criteria}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {175--180}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046327}, doi = {10.1145/1046290.1046327}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/WeiH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/WenG04, author = {Hailong Wen and Dawu Gu}, editor = {John R. White and Huanye Sheng}, title = {Authenticated group key agreement with admission control}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {13--17}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046294}, doi = {10.1145/1046290.1046294}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/WenG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/WuQW04, author = {Qianhong Wu and Bo Qin and Yumin Wang}, editor = {John R. White and Huanye Sheng}, title = {How to conduct a sealed bargain on the internet}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {130--135}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046316}, doi = {10.1145/1046290.1046316}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/WuQW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/XiaSZFH04, author = {Hongxia Xia and Qi Shen and Luo Zhong and Shan Feng and Rui Hao}, editor = {John R. White and Huanye Sheng}, title = {Application of data mining technology and generic algorithm to intrusion detection system}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {218--219}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046337}, doi = {10.1145/1046290.1046337}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/XiaSZFH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YangH04, author = {Jianhua Yang and Shou{-}Hsuan Stephen Huang}, editor = {John R. White and Huanye Sheng}, title = {A real-time algorithm to detect long connection chains of interactive terminal sessions}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {198--203}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046331}, doi = {10.1145/1046290.1046331}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosecu/YangH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YangHC04, author = {Degang Yang and Chun{-}yan Hu and Yong{-}hong Chen}, editor = {John R. White and Huanye Sheng}, title = {A framework of cooperating intrusion detection based on clustering analysis and expert system}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {150--154}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046321}, doi = {10.1145/1046290.1046321}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/YangHC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YangWZ04, author = {Xiaoyuan Yang and Xu An Wang and Wei Zhang}, editor = {John R. White and Huanye Sheng}, title = {New multi-signature and proxy multi-signature schemes from the Weil pairings}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {240--241}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046347}, doi = {10.1145/1046290.1046347}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/YangWZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YaoGY04, author = {Yu Yao and Fuxiang Gao and Ge Yu}, editor = {John R. White and Huanye Sheng}, title = {Hybrid {BP/CNN} neural network for intrusion detection}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {226--228}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046341}, doi = {10.1145/1046290.1046341}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/YaoGY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YaoYZZ04, author = {Yan Yao and Ping Yi and Yi{-}Ping Zhong and Shi{-}Yong Zhang}, editor = {John R. White and Huanye Sheng}, title = {Gossip-based scalable and reliable group key distribution framework}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {53--61}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046302}, doi = {10.1145/1046290.1046302}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/YaoYZZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YeFW04, author = {Chunxiao Ye and Yunqing Fu and Zhongfu Wu}, editor = {John R. White and Huanye Sheng}, title = {An attribute-based-delegation-model}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {220--221}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046338}, doi = {10.1145/1046290.1046338}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/YeFW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YiYHZZ04, author = {Ping Yi and Yan Yao and Yafei Hou and Yiping Zhong and Shiyong Zhang}, editor = {John R. White and Huanye Sheng}, title = {Securing ad hoc networks through mobile agent}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {125--129}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046315}, doi = {10.1145/1046290.1046315}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/YiYHZZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YinWS0T04, author = {Gang Yin and Huaimin Wang and Dian{-}xi Shi and Yan Jia and Meng Teng}, editor = {John R. White and Huanye Sheng}, title = {A rule-based framework for role-based constrained delegation}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {186--191}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046329}, doi = {10.1145/1046290.1046329}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/YinWS0T04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/YinZL04, author = {Qingbo Yin and Rubo Zhang and Xueyao Li}, editor = {John R. White and Huanye Sheng}, title = {An new intrusion detection method based on linear prediction}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {160--165}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046323}, doi = {10.1145/1046290.1046323}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosecu/YinZL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ZhangHZ04, author = {Jian Zhang and Hua{-}Can He and Min Zhao}, editor = {John R. White and Huanye Sheng}, title = {Hybrid detector set: detectors with different affinity}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {87--91}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046309}, doi = {10.1145/1046290.1046309}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ZhangHZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ZhangL04, author = {Xiao Zhang and Zhanhuai Li}, editor = {John R. White and Huanye Sheng}, title = {Research on security of storage area network}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {238--239}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046346}, doi = {10.1145/1046290.1046346}, timestamp = {Tue, 19 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosecu/ZhangL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ZhangWZM04, author = {Yun{-}Kai Zhang and Fang{-}Wei Wang and Yu{-}Qing Zhang and Jian{-}Feng Ma}, editor = {John R. White and Huanye Sheng}, title = {Worm propagation modeling and analysis based on quarantine}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {69--75}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046305}, doi = {10.1145/1046290.1046305}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ZhangWZM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ZhaoCD04, author = {Yuehua Zhao and Guixian Cai and Yunhai Du}, editor = {John R. White and Huanye Sheng}, title = {An image watermark algorithm based on discrete cosine transform block classifying}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {234--235}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046344}, doi = {10.1145/1046290.1046344}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ZhaoCD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ZhaoWXL04, author = {Xuelong Zhao and Jiwen Wang and Manwu Xu and Fengyu Liu}, editor = {John R. White and Huanye Sheng}, title = {High-quality pseudo-random sequence generator based on one-dimensional extended cellular automata}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {222--223}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046339}, doi = {10.1145/1046290.1046339}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ZhaoWXL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ZhongQ04, author = {Yong Zhong and Xiaolin Qin}, editor = {John R. White and Huanye Sheng}, title = {Database intrusion detection based on user query frequent itemsets mining with item constraints}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {224--225}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046340}, doi = {10.1145/1046290.1046340}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ZhongQ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosecu/ZhouCL04, author = {Yuan Zhou and Zhenfu Cao and Rongxing Lu}, editor = {John R. White and Huanye Sheng}, title = {An efficient digital signature using self-certified public keys}, booktitle = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, pages = {44--47}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290.1046300}, doi = {10.1145/1046290.1046300}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/ZhouCL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infosecu/2004, editor = {John R. White and Huanye Sheng}, title = {Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1046290}, doi = {10.1145/1046290}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infosecu/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.