Stop the war!
Остановите войну!
for scientists:
default search action
InfoSecu 2004: Shanghai, China
- John R. White, Huanye Sheng:
Proceedings of the 3rd International Conference on Information Security, InfoSecu 2004, Shanghai, China, November 14-16, 2004. ACM 2004
Cryptology I
- Ming Li, Dawu Gu, Yong Wang, Yingcai Bai:
Research on authenticated key agreement in group settings. 1-4 - Wenjun Luo, Xiang Li:
A study of secure multi-party elementary function computation protocols. 5-12 - Hailong Wen, Dawu Gu:
Authenticated group key agreement with admission control. 13-17 - Jingsong Cui, Rong Peng, Li-Na Wang:
The optimized key distribution scheme in threshold RSA. 18-21 - Rongxing Lu, Zhenfu Cao:
A proxy-protected signature scheme based on conic. 22-26 - Jiguo Li, Yichen Zhang, Yuelong Zhu:
Security analysis and improvement of some proxy signature schemes. 27-32 - Shanshan Duan, Zhenfu Cao, Rongxing Lu:
Robust ID-based threshold signcryption scheme from pairings. 33-37 - Zuowen Tan, Zhuojun Liu:
Provably secure delegation-by-certification proxy signature schemes. 38-43 - Yuan Zhou, Zhenfu Cao, Rongxing Lu:
An efficient digital signature using self-certified public keys. 44-47 - Tadahiko Ito, Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto:
Anonymous traceable disclosure scheme using pairing over elliptic curve. 48-52 - Yan Yao, Ping Yi, Yi-Ping Zhong, Shi-Yong Zhang:
Gossip-based scalable and reliable group key distribution framework. 53-61
Biometrics, watermarking, IKE
- Xiang-Yang Wang, Yong-rui Cui, Hongying Yang, Hong Zhao:
A new content-based digital audio watermarking algorithm for copyright protection. 62-68 - Yun-Kai Zhang, Fang-Wei Wang, Yu-Qing Zhang, Jian-Feng Ma:
Worm propagation modeling and analysis based on quarantine. 69-75 - Xingming Sun, Gang Luo, Huajun Huang:
Component-based digital watermarking of Chinese texts. 76-81 - Wenjie Liu, Guochang Gu, Hongnan Wang:
Communication and recovery issues in grid environment. 82-86
Cryptology II
- Jian Zhang, Hua-Can He, Min Zhao:
Hybrid detector set: detectors with different affinity. 87-91 - Lihua Wang, Zhenfu Cao, Eiji Okamoto, Ying Miao, Takeshi Okamoto:
Transformation-free proxy cryptosystems and their applications to electronic commerce. 92-98 - Botao Li, Junzhou Luo:
On timeliness of a fair non-repudiation protocol. 99-106 - Zhongwen Li, Zhongpan Qiu:
A new type of security and safety architecture for distributed system: models and implementation. 107-114 - Haiyong Bao, Zhenfu Cao, Haifeng Qian:
Cryptanalysis of group signature scheme from ID-based signature scheme. 115-118 - Zhenchuan Chai, Zhenfu Cao, Rongxing Lu:
ID-based threshold decryption without random oracles and its application in key escrow. 119-124 - Ping Yi, Yan Yao, Yafei Hou, Yiping Zhong, Shiyong Zhang:
Securing ad hoc networks through mobile agent. 125-129 - Qianhong Wu, Bo Qin, Yumin Wang:
How to conduct a sealed bargain on the internet. 130-135 - Xin Liu, Qiu-Liang Xu, Jiu-Qing Shang:
A public auction scheme based on group signature. 136-142 - Zuhua Shao:
Cryptanalysis of publicly verifiable authenticated encryption. 143-145
IDS, content filtering, Java, etc.
- Tongshen Hu, Xiamin, Qingzhang Chen, Kezhen Ying:
Design and implement of firewall-log-based online attack detection system. 146-149 - Degang Yang, Chun-yan Hu, Yong-hong Chen:
A framework of cooperating intrusion detection based on clustering analysis and expert system. 150-154 - Zhicai Shi, Zhenzhou Ji, Mingzeng Hu:
A novel distributed intrusion detection model based on mobile agent. 155-159 - Qingbo Yin, Rubo Zhang, Xueyao Li:
An new intrusion detection method based on linear prediction. 160-165 - Jing-Xin Wang, Zhi-Ying Wang, Kui Dai:
A network intrusion detection system based on the artificial neural networks. 166-170 - Tieli Sun, Wei Zhao, Zhiyan Zhao:
An architecture of pattern-oriented distributed meta-search engine. 171-174
Methodology, performance
- Yongzhuang Wei, Yu-Pu Hu:
New construction of resilient functions with satisfying multiple cryptographic criteria. 175-180 - Jingmei Liu, Baodian Wei, Xinmei Wang:
New method to determine algebraic expression of Rijndael S-box. 181-185 - Gang Yin, Huaimin Wang, Dian-xi Shi, Yan Jia, Meng Teng:
A rule-based framework for role-based constrained delegation. 186-191 - Yunfeng Li, Qingsheng Zhu, Yukun Cao:
Automatic metadata generation based on neural network. 192-197 - Jianhua Yang, Shou-Hsuan Stephen Huang:
A real-time algorithm to detect long connection chains of interactive terminal sessions. 198-203
3A
- Lunwei Wang, Xiangke Liao, Huaimin Wang:
AT-PAM: an authentication trustworthiness-based PAM. 204-209 - Ke-jun Sheng, Jiqiang Liu, Xin Liu:
Organization structure based access control model. 210-215
Extended abstract
- Yiliang Han, Xiaoyuan Yang, Yupu Hu:
Signcryption based on elliptic curve and its multi-party schemes. 216-217 - Hongxia Xia, Qi Shen, Luo Zhong, Shan Feng, Rui Hao:
Application of data mining technology and generic algorithm to intrusion detection system. 218-219 - Chunxiao Ye, Yunqing Fu, Zhongfu Wu:
An attribute-based-delegation-model. 220-221 - Xuelong Zhao, Jiwen Wang, Manwu Xu, Fengyu Liu:
High-quality pseudo-random sequence generator based on one-dimensional extended cellular automata. 222-223 - Yong Zhong, Xiaolin Qin:
Database intrusion detection based on user query frequent itemsets mining with item constraints. 224-225 - Yu Yao, Fuxiang Gao, Ge Yu:
Hybrid BP/CNN neural network for intrusion detection. 226-228 - Chunbo Ma, Jun Ao, Dake He:
An ID-based group signature. 229-230 - Bo Li, Xiao-Ping Qiu:
An application of machine leaning to network intrusion detection. 231-233 - Yuehua Zhao, Guixian Cai, Yunhai Du:
An image watermark algorithm based on discrete cosine transform block classifying. 234-235 - Peiyu Liu, Yuguo Liu:
Research on network information filtering model based on fuzzy set. 236-237 - Xiao Zhang, Zhanhuai Li:
Research on security of storage area network. 238-239 - Xiaoyuan Yang, Xu An Wang, Wei Zhang:
New multi-signature and proxy multi-signature schemes from the Weil pairings. 240-241 - Yang Shi, Liming Cao, Xiaoping Wang:
A security scheme of electronic commerce for mobile agents uses undetachable digital signatures. 242-243 - Fang Liu, Kui Dai, Zhiying Wang:
Applying multiple criteria decision making to improve security architecture development. 244-246 - Xinpeng Zhang, Shuozhong Wang:
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size. 247-248
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.