Search dblp for Publications

export results for "stream:conf/infosecu:"

 download as .bib file

@inproceedings{DBLP:conf/infosecu/00010Z04,
  author       = {Jiguo Li and
                  Yichen Zhang and
                  Yuelong Zhu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Security analysis and improvement of some proxy signature schemes},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {27--32},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046297},
  doi          = {10.1145/1046290.1046297},
  timestamp    = {Tue, 15 Feb 2022 16:17:26 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/00010Z04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/0001COMO04,
  author       = {Lihua Wang and
                  Zhenfu Cao and
                  Eiji Okamoto and
                  Ying Miao and
                  Takeshi Okamoto},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Transformation-free proxy cryptosystems and their applications to
                  electronic commerce},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {92--98},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046310},
  doi          = {10.1145/1046290.1046310},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/0001COMO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/0001W04,
  author       = {Xinpeng Zhang and
                  Shuozhong Wang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A new watermarking scheme against inserter-based attacks suitable
                  for digital media with moderate size},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {247--248},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046350},
  doi          = {10.1145/1046290.1046350},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/0001W04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/BaoCQ04,
  author       = {Haiyong Bao and
                  Zhenfu Cao and
                  Haifeng Qian},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Cryptanalysis of group signature scheme from ID-based signature scheme},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {115--118},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046313},
  doi          = {10.1145/1046290.1046313},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/BaoCQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ChaiCL04,
  author       = {Zhenchuan Chai and
                  Zhenfu Cao and
                  Rongxing Lu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {ID-based threshold decryption without random oracles and its application
                  in key escrow},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {119--124},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046314},
  doi          = {10.1145/1046290.1046314},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ChaiCL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/CuiPW04,
  author       = {Jingsong Cui and
                  Rong Peng and
                  Li{-}Na Wang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {The optimized key distribution scheme in threshold {RSA}},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {18--21},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046295},
  doi          = {10.1145/1046290.1046295},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/CuiPW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/DuanCL04,
  author       = {Shanshan Duan and
                  Zhenfu Cao and
                  Rongxing Lu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Robust ID-based threshold signcryption scheme from pairings},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {33--37},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046298},
  doi          = {10.1145/1046290.1046298},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/DuanCL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/Han0H04,
  author       = {Yiliang Han and
                  Xiaoyuan Yang and
                  Yupu Hu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Signcryption based on elliptic curve and its multi-party schemes},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {216--217},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046336},
  doi          = {10.1145/1046290.1046336},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/Han0H04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/HuXCY04,
  author       = {Tongshen Hu and
                  Xiamin and
                  Qingzhang Chen and
                  Kezhen Ying},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Design and implement of firewall-log-based online attack detection
                  system},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {146--149},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046320},
  doi          = {10.1145/1046290.1046320},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/HuXCY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ItoOIO04,
  author       = {Tadahiko Ito and
                  Takeshi Okamoto and
                  Atsuo Inomata and
                  Eiji Okamoto},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Anonymous traceable disclosure scheme using pairing over elliptic
                  curve},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {48--52},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046301},
  doi          = {10.1145/1046290.1046301},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ItoOIO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiGWB04,
  author       = {Ming Li and
                  Dawu Gu and
                  Yong Wang and
                  Yingcai Bai},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Research on authenticated key agreement in group settings},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046292},
  doi          = {10.1145/1046290.1046292},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiGWB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiL04,
  author       = {Botao Li and
                  Junzhou Luo},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {On timeliness of a fair non-repudiation protocol},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {99--106},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046311},
  doi          = {10.1145/1046290.1046311},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiQ04,
  author       = {Zhongwen Li and
                  Zhongpan Qiu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A new type of security and safety architecture for distributed system:
                  models and implementation},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {107--114},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046312},
  doi          = {10.1145/1046290.1046312},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiQ04a,
  author       = {Bo Li and
                  Xiao{-}Ping Qiu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {An application of machine leaning to network intrusion detection},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {231--233},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046343},
  doi          = {10.1145/1046290.1046343},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiQ04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiZC04,
  author       = {Yunfeng Li and
                  Qingsheng Zhu and
                  Yukun Cao},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Automatic metadata generation based on neural network},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {192--197},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046330},
  doi          = {10.1145/1046290.1046330},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiZC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiuD004,
  author       = {Fang Liu and
                  Kui Dai and
                  Zhiying Wang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Applying multiple criteria decision making to improve security architecture
                  development},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {244--246},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046349},
  doi          = {10.1145/1046290.1046349},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiuD004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiuGW04,
  author       = {Wenjie Liu and
                  Guochang Gu and
                  Hongnan Wang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Communication and recovery issues in grid environment},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {82--86},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046307},
  doi          = {10.1145/1046290.1046307},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiuGW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiuL04,
  author       = {Peiyu Liu and
                  Yuguo Liu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Research on network information filtering model based on fuzzy set},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {236--237},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046345},
  doi          = {10.1145/1046290.1046345},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiuL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiuWW04,
  author       = {Jingmei Liu and
                  Baodian Wei and
                  Xinmei Wang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {New method to determine algebraic expression of Rijndael S-box},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {181--185},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046328},
  doi          = {10.1145/1046290.1046328},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiuWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LiuXS04,
  author       = {Xin Liu and
                  Qiu{-}Liang Xu and
                  Jiu{-}Qing Shang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A public auction scheme based on group signature},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {136--142},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046317},
  doi          = {10.1145/1046290.1046317},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosecu/LiuXS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LuC04,
  author       = {Rongxing Lu and
                  Zhenfu Cao},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A proxy-protected signature scheme based on conic},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {22--26},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046296},
  doi          = {10.1145/1046290.1046296},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LuC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/LuoL04,
  author       = {Wenjun Luo and
                  Xiang Li},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A study of secure multi-party elementary function computation protocols},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {5--12},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046293},
  doi          = {10.1145/1046290.1046293},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/LuoL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/MaAH04,
  author       = {Chunbo Ma and
                  Jun Ao and
                  Dake He},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {An ID-based group signature},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {229--230},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046342},
  doi          = {10.1145/1046290.1046342},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/MaAH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/Shao04,
  author       = {Zuhua Shao},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Cryptanalysis of publicly verifiable authenticated encryption},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {143--145},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046318},
  doi          = {10.1145/1046290.1046318},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/Shao04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ShengLL04,
  author       = {Ke{-}jun Sheng and
                  Jiqiang Liu and
                  Xin Liu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Organization structure based access control model},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {210--215},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046334},
  doi          = {10.1145/1046290.1046334},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ShengLL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ShiCW04,
  author       = {Yang Shi and
                  Liming Cao and
                  Xiaoping Wang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A security scheme of electronic commerce for mobile agents uses undetachable
                  digital signatures},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {242--243},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046348},
  doi          = {10.1145/1046290.1046348},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ShiCW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ShiJH04,
  author       = {Zhicai Shi and
                  Zhenzhou Ji and
                  Mingzeng Hu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A novel distributed intrusion detection model based on mobile agent},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {155--159},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046322},
  doi          = {10.1145/1046290.1046322},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ShiJH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/SunLH04,
  author       = {Xingming Sun and
                  Gang Luo and
                  Huajun Huang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Component-based digital watermarking of Chinese texts},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {76--81},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046306},
  doi          = {10.1145/1046290.1046306},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/SunLH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/SunZZ04,
  author       = {Tieli Sun and
                  Wei Zhao and
                  Zhiyan Zhao},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {An architecture of pattern-oriented distributed meta-search engine},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {171--174},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046325},
  doi          = {10.1145/1046290.1046325},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/SunZZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/TanL04,
  author       = {Zuowen Tan and
                  Zhuojun Liu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Provably secure delegation-by-certification proxy signature schemes},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {38--43},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046299},
  doi          = {10.1145/1046290.1046299},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/TanL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/WangCYZ04,
  author       = {Xiang{-}Yang Wang and
                  Yong{-}rui Cui and
                  Hongying Yang and
                  Hong Zhao},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A new content-based digital audio watermarking algorithm for copyright
                  protection},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {62--68},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046304},
  doi          = {10.1145/1046290.1046304},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/WangCYZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/WangLW04,
  author       = {Lunwei Wang and
                  Xiangke Liao and
                  Huaimin Wang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {{AT-PAM:} an authentication trustworthiness-based {PAM}},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {204--209},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046333},
  doi          = {10.1145/1046290.1046333},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/WangLW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/WangWD04,
  author       = {Jing{-}Xin Wang and
                  Zhi{-}Ying Wang and
                  Kui Dai},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A network intrusion detection system based on the artificial neural
                  networks},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {166--170},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046324},
  doi          = {10.1145/1046290.1046324},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/WangWD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/WeiH04,
  author       = {Yongzhuang Wei and
                  Yu{-}Pu Hu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {New construction of resilient functions with satisfying multiple cryptographic
                  criteria},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {175--180},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046327},
  doi          = {10.1145/1046290.1046327},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/WeiH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/WenG04,
  author       = {Hailong Wen and
                  Dawu Gu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Authenticated group key agreement with admission control},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {13--17},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046294},
  doi          = {10.1145/1046290.1046294},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/WenG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/WuQW04,
  author       = {Qianhong Wu and
                  Bo Qin and
                  Yumin Wang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {How to conduct a sealed bargain on the internet},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {130--135},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046316},
  doi          = {10.1145/1046290.1046316},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/WuQW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/XiaSZFH04,
  author       = {Hongxia Xia and
                  Qi Shen and
                  Luo Zhong and
                  Shan Feng and
                  Rui Hao},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Application of data mining technology and generic algorithm to intrusion
                  detection system},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {218--219},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046337},
  doi          = {10.1145/1046290.1046337},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/XiaSZFH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YangH04,
  author       = {Jianhua Yang and
                  Shou{-}Hsuan Stephen Huang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A real-time algorithm to detect long connection chains of interactive
                  terminal sessions},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {198--203},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046331},
  doi          = {10.1145/1046290.1046331},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosecu/YangH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YangHC04,
  author       = {Degang Yang and
                  Chun{-}yan Hu and
                  Yong{-}hong Chen},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A framework of cooperating intrusion detection based on clustering
                  analysis and expert system},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {150--154},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046321},
  doi          = {10.1145/1046290.1046321},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/YangHC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YangWZ04,
  author       = {Xiaoyuan Yang and
                  Xu An Wang and
                  Wei Zhang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {New multi-signature and proxy multi-signature schemes from the Weil
                  pairings},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {240--241},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046347},
  doi          = {10.1145/1046290.1046347},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/YangWZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YaoGY04,
  author       = {Yu Yao and
                  Fuxiang Gao and
                  Ge Yu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Hybrid {BP/CNN} neural network for intrusion detection},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {226--228},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046341},
  doi          = {10.1145/1046290.1046341},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/YaoGY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YaoYZZ04,
  author       = {Yan Yao and
                  Ping Yi and
                  Yi{-}Ping Zhong and
                  Shi{-}Yong Zhang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Gossip-based scalable and reliable group key distribution framework},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {53--61},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046302},
  doi          = {10.1145/1046290.1046302},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/YaoYZZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YeFW04,
  author       = {Chunxiao Ye and
                  Yunqing Fu and
                  Zhongfu Wu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {An attribute-based-delegation-model},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {220--221},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046338},
  doi          = {10.1145/1046290.1046338},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/YeFW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YiYHZZ04,
  author       = {Ping Yi and
                  Yan Yao and
                  Yafei Hou and
                  Yiping Zhong and
                  Shiyong Zhang},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Securing ad hoc networks through mobile agent},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {125--129},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046315},
  doi          = {10.1145/1046290.1046315},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/YiYHZZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YinWS0T04,
  author       = {Gang Yin and
                  Huaimin Wang and
                  Dian{-}xi Shi and
                  Yan Jia and
                  Meng Teng},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {A rule-based framework for role-based constrained delegation},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {186--191},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046329},
  doi          = {10.1145/1046290.1046329},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/YinWS0T04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/YinZL04,
  author       = {Qingbo Yin and
                  Rubo Zhang and
                  Xueyao Li},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {An new intrusion detection method based on linear prediction},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {160--165},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046323},
  doi          = {10.1145/1046290.1046323},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosecu/YinZL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ZhangHZ04,
  author       = {Jian Zhang and
                  Hua{-}Can He and
                  Min Zhao},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Hybrid detector set: detectors with different affinity},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {87--91},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046309},
  doi          = {10.1145/1046290.1046309},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ZhangHZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ZhangL04,
  author       = {Xiao Zhang and
                  Zhanhuai Li},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Research on security of storage area network},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {238--239},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046346},
  doi          = {10.1145/1046290.1046346},
  timestamp    = {Tue, 19 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosecu/ZhangL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ZhangWZM04,
  author       = {Yun{-}Kai Zhang and
                  Fang{-}Wei Wang and
                  Yu{-}Qing Zhang and
                  Jian{-}Feng Ma},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Worm propagation modeling and analysis based on quarantine},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {69--75},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046305},
  doi          = {10.1145/1046290.1046305},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ZhangWZM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ZhaoCD04,
  author       = {Yuehua Zhao and
                  Guixian Cai and
                  Yunhai Du},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {An image watermark algorithm based on discrete cosine transform block
                  classifying},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {234--235},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046344},
  doi          = {10.1145/1046290.1046344},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ZhaoCD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ZhaoWXL04,
  author       = {Xuelong Zhao and
                  Jiwen Wang and
                  Manwu Xu and
                  Fengyu Liu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {High-quality pseudo-random sequence generator based on one-dimensional
                  extended cellular automata},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {222--223},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046339},
  doi          = {10.1145/1046290.1046339},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ZhaoWXL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ZhongQ04,
  author       = {Yong Zhong and
                  Xiaolin Qin},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Database intrusion detection based on user query frequent itemsets
                  mining with item constraints},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {224--225},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046340},
  doi          = {10.1145/1046290.1046340},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ZhongQ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosecu/ZhouCL04,
  author       = {Yuan Zhou and
                  Zhenfu Cao and
                  Rongxing Lu},
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {An efficient digital signature using self-certified public keys},
  booktitle    = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  pages        = {44--47},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290.1046300},
  doi          = {10.1145/1046290.1046300},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/ZhouCL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infosecu/2004,
  editor       = {John R. White and
                  Huanye Sheng},
  title        = {Proceedings of the 3rd International Conference on Information Security,
                  InfoSecu 2004, Shanghai, China, November 14-16, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1046290},
  doi          = {10.1145/1046290},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosecu/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics