Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icisc/icisc2003.bht:"
@proceedings{DBLP:conf/icisc/2003, editor = {Jong In Lim and Dong Hoon Lee}, title = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b96249}, doi = {10.1007/B96249}, isbn = {3-540-21376-7}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenLK03, author = {Xiaofeng Chen and Byoungcheon Lee and Kwangjo Kim}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {259--273}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_20}, doi = {10.1007/978-3-540-24691-6\_20}, timestamp = {Thu, 17 Nov 2022 14:05:51 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ChenLK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenSHMD03, author = {Kevin Chen and Leonie Ruth Simpson and Matthew Henricksen and William Millan and Ed Dawson}, editor = {Jong In Lim and Dong Hoon Lee}, title = {A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {418--431}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_31}, doi = {10.1007/978-3-540-24691-6\_31}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ChenSHMD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenWWHH03, author = {Zewen Chen and Jilin Wang and Yumin Wang and Jiwu Huang and Daren Huang}, editor = {Jong In Lim and Dong Hoon Lee}, title = {An Efficient Revocation Algorithm in Group Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {339--351}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_25}, doi = {10.1007/978-3-540-24691-6\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChenWWHH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChenY03, author = {Jiun{-}Ming Chen and Bo{-}Yin Yang}, editor = {Jong In Lim and Dong Hoon Lee}, title = {A More Secure and Efficacious {TTS} Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {320--338}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_24}, doi = {10.1007/978-3-540-24691-6\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChenY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChoieL03, author = {YoungJu Choie and Eunjeong Lee}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {97--111}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_9}, doi = {10.1007/978-3-540-24691-6\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChoieL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChowYHC03, author = {Sherman S. M. Chow and Siu{-}Ming Yiu and Lucas Chi Kwong Hui and Kam{-}Pui Chow}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {352--369}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_26}, doi = {10.1007/978-3-540-24691-6\_26}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChowYHC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GuHC03, author = {Limin Gu and Jiwu Huang and Zewen Chen}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Analysis of the Bounds for Linear Block Codes in Watermark Channel}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {294--304}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_22}, doi = {10.1007/978-3-540-24691-6\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GuHC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Hirose03, author = {Shoichi Hirose}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Yet Another Definition of Weak Collision Resistance and Its Analysis}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {87--96}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_8}, doi = {10.1007/978-3-540-24691-6\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Hirose03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HongHKCLL03, author = {Seokhie Hong and Deukjo Hong and Youngdai Ko and Donghoon Chang and Wonil Lee and Sangjin Lee}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Differential Cryptanalysis of {TEA} and {XTEA}}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {402--417}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_30}, doi = {10.1007/978-3-540-24691-6\_30}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HongHKCLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Jong In Lim and Dong Hoon Lee}, title = {On the Security of a New Variant of {OMAC}}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {67--78}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_6}, doi = {10.1007/978-3-540-24691-6\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Katz03, author = {Jonathan Katz}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Binary Tree Encryption: Constructions and Applications}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {1--11}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_1}, doi = {10.1007/978-3-540-24691-6\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Katz03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimHLSY03, author = {Jongsung Kim and Seokhie Hong and Sangjin Lee and Jung Hwan Song and Hyungjin Yang}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Truncated Differential Attacks on 8-Round {CRYPTON}}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {446--456}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_33}, doi = {10.1007/978-3-540-24691-6\_33}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimHLSY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KwonKPSSSYYLLCHH03, author = {Daesung Kwon and Jaesung Kim and Sangwoo Park and Soo Hak Sung and Yaekwon Sohn and Jung Hwan Song and Yongjin Yeom and E{-}Joong Yoon and Sangjin Lee and Jaewon Lee and Seongtaek Chee and Daewan Han and Jin Hong}, editor = {Jong In Lim and Dong Hoon Lee}, title = {New Block Cipher: {ARIA}}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {432--445}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_32}, doi = {10.1007/978-3-540-24691-6\_32}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KwonKPSSSYYLLCHH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LaudC03, author = {Peeter Laud and Ricardo Corin}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Sound Computational Interpretation of Formal Encryption with Composed Keys}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {55--66}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_5}, doi = {10.1007/978-3-540-24691-6\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LaudC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeBDKYY03, author = {Byoungcheon Lee and Colin Boyd and Ed Dawson and Kwangjo Kim and Jeongmo Yang and Seungjae Yoo}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Providing Receipt-Freeness in Mixnet-Based Voting Protocols}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {245--258}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_19}, doi = {10.1007/978-3-540-24691-6\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeBDKYY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeJKYKK03, author = {Seon Ok Lee and Seok Won Jung and Chang Han Kim and Janghong Yoon and Jae{-}Young Koh and Daeho Kim}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Design of Bit Parallel Multiplier with Lower Time Complexity}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {127--139}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_11}, doi = {10.1007/978-3-540-24691-6\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeJKYKK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuWW03, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, editor = {Jong In Lim and Dong Hoon Lee}, title = {A Separable Threshold Ring Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {12--26}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_2}, doi = {10.1007/978-3-540-24691-6\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiuWW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MaL03, author = {Wen Ping Ma and Moon Ho Lee}, editor = {Jong In Lim and Dong Hoon Lee}, title = {New Methods to Construct Cheating Immune Functions}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {79--86}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_7}, doi = {10.1007/978-3-540-24691-6\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MaL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MaL03a, author = {Wen Ping Ma and Moon Ho Lee}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Group Oriented Cryptosystems Based on Linear Access Structures}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {370--376}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_27}, doi = {10.1007/978-3-540-24691-6\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MaL03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MylesC03, author = {Ginger Myles and Christian S. Collberg}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {274--293}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_21}, doi = {10.1007/978-3-540-24691-6\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MylesC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NakanishiYS03, author = {Toru Nakanishi and Daisuke Yamamoto and Yuji Sugiyama}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Sealed-Bid Auctions with Efficient Bids}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {230--244}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_18}, doi = {10.1007/978-3-540-24691-6\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/NakanishiYS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ParkLKP03, author = {Tae{-}Jun Park and Mun{-}Kyu Lee and E{-}yong Kim and Kunsoo Park}, editor = {Jong In Lim and Dong Hoon Lee}, title = {A General Expansion Method Using Efficient Endomorphisms}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {112--126}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_10}, doi = {10.1007/978-3-540-24691-6\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ParkLKP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ParkLP03, author = {Tae{-}Jun Park and Mun{-}Kyu Lee and Kunsoo Park}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Efficient Scalar Multiplication in Hyperelliptic Curves Using {A} New Frobenius Expansion}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {152--165}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_13}, doi = {10.1007/978-3-540-24691-6\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ParkLP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SaeedniaKM03, author = {Shahrokh Saeednia and Steve Kremer and Olivier Markowitch}, editor = {Jong In Lim and Dong Hoon Lee}, title = {An Efficient Strong Designated Verifier Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {40--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_4}, doi = {10.1007/978-3-540-24691-6\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SaeedniaKM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ShinLKKL03, author = {Wook Shin and Dong{-}Ik Lee and Hyoung{-}Chun Kim and Jung{-}Min Kang and Jin{-}Seok Lee}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Extended Role Based Access Control and Procedural Restrictions}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {184--196}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_15}, doi = {10.1007/978-3-540-24691-6\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ShinLKKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SusiloM03, author = {Willy Susilo and Yi Mu}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Non-interactive Deniable Ring Authentication}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {386--401}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_29}, doi = {10.1007/978-3-540-24691-6\_29}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SusiloM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TsoMO03, author = {Raylin Tso and Ying Miao and Eiji Okamoto}, editor = {Jong In Lim and Dong Hoon Lee}, title = {A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {377--385}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_28}, doi = {10.1007/978-3-540-24691-6\_28}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/TsoMO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Wang03, author = {Guilin Wang}, editor = {Jong In Lim and Dong Hoon Lee}, title = {On the Security of a Group Signature Scheme with Forward Security}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {27--39}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_3}, doi = {10.1007/978-3-540-24691-6\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Wang03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangBZD03, author = {Guilin Wang and Feng Bao and Jianying Zhou and Robert H. Deng}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Security Analysis of Some Proxy Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {305--319}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_23}, doi = {10.1007/978-3-540-24691-6\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WangBZD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangLW03, author = {Changjie Wang and Ho{-}fung Leung and Yumin Wang}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Secure Double Auction Protocols with Full Privacy Protection}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {215--229}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_17}, doi = {10.1007/978-3-540-24691-6\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WangLW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YoonJL03, author = {Joong Chul Yoon and Seok Won Jung and Sungwoo Lee}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {139--151}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_12}, doi = {10.1007/978-3-540-24691-6\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YoonJL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Zhang03, author = {Muxiang Zhang}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {166--183}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_14}, doi = {10.1007/978-3-540-24691-6\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Zhang03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangCK03, author = {Yuan Zhang and Moon{-}Jung Chung and Hyun Kim}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {197--214}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_16}, doi = {10.1007/978-3-540-24691-6\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ZhangCK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.