Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2003.bht:"

 download as .bib file

@proceedings{DBLP:conf/icisc/2003,
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b96249},
  doi          = {10.1007/B96249},
  isbn         = {3-540-21376-7},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenLK03,
  author       = {Xiaofeng Chen and
                  Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {259--273},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_20},
  doi          = {10.1007/978-3-540-24691-6\_20},
  timestamp    = {Thu, 17 Nov 2022 14:05:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenLK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenSHMD03,
  author       = {Kevin Chen and
                  Leonie Ruth Simpson and
                  Matthew Henricksen and
                  William Millan and
                  Ed Dawson},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {418--431},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_31},
  doi          = {10.1007/978-3-540-24691-6\_31},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenSHMD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenWWHH03,
  author       = {Zewen Chen and
                  Jilin Wang and
                  Yumin Wang and
                  Jiwu Huang and
                  Daren Huang},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {An Efficient Revocation Algorithm in Group Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {339--351},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_25},
  doi          = {10.1007/978-3-540-24691-6\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenWWHH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenY03,
  author       = {Jiun{-}Ming Chen and
                  Bo{-}Yin Yang},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {A More Secure and Efficacious {TTS} Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {320--338},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_24},
  doi          = {10.1007/978-3-540-24691-6\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChoieL03,
  author       = {YoungJu Choie and
                  Eunjeong Lee},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_9},
  doi          = {10.1007/978-3-540-24691-6\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChoieL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChowYHC03,
  author       = {Sherman S. M. Chow and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui and
                  Kam{-}Pui Chow},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Efficient Forward and Provably Secure ID-Based Signcryption Scheme
                  with Public Verifiability and Public Ciphertext Authenticity},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {352--369},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_26},
  doi          = {10.1007/978-3-540-24691-6\_26},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChowYHC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GuHC03,
  author       = {Limin Gu and
                  Jiwu Huang and
                  Zewen Chen},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Analysis of the Bounds for Linear Block Codes in Watermark Channel},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {294--304},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_22},
  doi          = {10.1007/978-3-540-24691-6\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GuHC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Hirose03,
  author       = {Shoichi Hirose},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Yet Another Definition of Weak Collision Resistance and Its Analysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {87--96},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_8},
  doi          = {10.1007/978-3-540-24691-6\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Hirose03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HongHKCLL03,
  author       = {Seokhie Hong and
                  Deukjo Hong and
                  Youngdai Ko and
                  Donghoon Chang and
                  Wonil Lee and
                  Sangjin Lee},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Differential Cryptanalysis of {TEA} and {XTEA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {402--417},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_30},
  doi          = {10.1007/978-3-540-24691-6\_30},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HongHKCLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {On the Security of a New Variant of {OMAC}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {67--78},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_6},
  doi          = {10.1007/978-3-540-24691-6\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Katz03,
  author       = {Jonathan Katz},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Binary Tree Encryption: Constructions and Applications},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_1},
  doi          = {10.1007/978-3-540-24691-6\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Katz03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimHLSY03,
  author       = {Jongsung Kim and
                  Seokhie Hong and
                  Sangjin Lee and
                  Jung Hwan Song and
                  Hyungjin Yang},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Truncated Differential Attacks on 8-Round {CRYPTON}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {446--456},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_33},
  doi          = {10.1007/978-3-540-24691-6\_33},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimHLSY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KwonKPSSSYYLLCHH03,
  author       = {Daesung Kwon and
                  Jaesung Kim and
                  Sangwoo Park and
                  Soo Hak Sung and
                  Yaekwon Sohn and
                  Jung Hwan Song and
                  Yongjin Yeom and
                  E{-}Joong Yoon and
                  Sangjin Lee and
                  Jaewon Lee and
                  Seongtaek Chee and
                  Daewan Han and
                  Jin Hong},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {New Block Cipher: {ARIA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {432--445},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_32},
  doi          = {10.1007/978-3-540-24691-6\_32},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KwonKPSSSYYLLCHH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LaudC03,
  author       = {Peeter Laud and
                  Ricardo Corin},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Sound Computational Interpretation of Formal Encryption with Composed
                  Keys},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {55--66},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_5},
  doi          = {10.1007/978-3-540-24691-6\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LaudC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeBDKYY03,
  author       = {Byoungcheon Lee and
                  Colin Boyd and
                  Ed Dawson and
                  Kwangjo Kim and
                  Jeongmo Yang and
                  Seungjae Yoo},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Providing Receipt-Freeness in Mixnet-Based Voting Protocols},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {245--258},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_19},
  doi          = {10.1007/978-3-540-24691-6\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeBDKYY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeJKYKK03,
  author       = {Seon Ok Lee and
                  Seok Won Jung and
                  Chang Han Kim and
                  Janghong Yoon and
                  Jae{-}Young Koh and
                  Daeho Kim},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Design of Bit Parallel Multiplier with Lower Time Complexity},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {127--139},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_11},
  doi          = {10.1007/978-3-540-24691-6\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeJKYKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuWW03,
  author       = {Joseph K. Liu and
                  Victor K. Wei and
                  Duncan S. Wong},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {A Separable Threshold Ring Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {12--26},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_2},
  doi          = {10.1007/978-3-540-24691-6\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuWW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MaL03,
  author       = {Wen Ping Ma and
                  Moon Ho Lee},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {New Methods to Construct Cheating Immune Functions},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {79--86},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_7},
  doi          = {10.1007/978-3-540-24691-6\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MaL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MaL03a,
  author       = {Wen Ping Ma and
                  Moon Ho Lee},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Group Oriented Cryptosystems Based on Linear Access Structures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {370--376},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_27},
  doi          = {10.1007/978-3-540-24691-6\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MaL03a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MylesC03,
  author       = {Ginger Myles and
                  Christian S. Collberg},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Software Watermarking Through Register Allocation: Implementation,
                  Analysis, and Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {274--293},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_21},
  doi          = {10.1007/978-3-540-24691-6\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MylesC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NakanishiYS03,
  author       = {Toru Nakanishi and
                  Daisuke Yamamoto and
                  Yuji Sugiyama},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Sealed-Bid Auctions with Efficient Bids},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {230--244},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_18},
  doi          = {10.1007/978-3-540-24691-6\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NakanishiYS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ParkLKP03,
  author       = {Tae{-}Jun Park and
                  Mun{-}Kyu Lee and
                  E{-}yong Kim and
                  Kunsoo Park},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {A General Expansion Method Using Efficient Endomorphisms},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {112--126},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_10},
  doi          = {10.1007/978-3-540-24691-6\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ParkLKP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ParkLP03,
  author       = {Tae{-}Jun Park and
                  Mun{-}Kyu Lee and
                  Kunsoo Park},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Efficient Scalar Multiplication in Hyperelliptic Curves Using {A}
                  New Frobenius Expansion},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {152--165},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_13},
  doi          = {10.1007/978-3-540-24691-6\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ParkLP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SaeedniaKM03,
  author       = {Shahrokh Saeednia and
                  Steve Kremer and
                  Olivier Markowitch},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {An Efficient Strong Designated Verifier Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_4},
  doi          = {10.1007/978-3-540-24691-6\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SaeedniaKM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ShinLKKL03,
  author       = {Wook Shin and
                  Dong{-}Ik Lee and
                  Hyoung{-}Chun Kim and
                  Jung{-}Min Kang and
                  Jin{-}Seok Lee},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Extended Role Based Access Control and Procedural Restrictions},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {184--196},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_15},
  doi          = {10.1007/978-3-540-24691-6\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ShinLKKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SusiloM03,
  author       = {Willy Susilo and
                  Yi Mu},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Non-interactive Deniable Ring Authentication},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {386--401},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_29},
  doi          = {10.1007/978-3-540-24691-6\_29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SusiloM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TsoMO03,
  author       = {Raylin Tso and
                  Ying Miao and
                  Eiji Okamoto},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {A New Algorithm for Searching a Consistent Set of Shares in a Threshold
                  Scheme with Cheaters},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {377--385},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_28},
  doi          = {10.1007/978-3-540-24691-6\_28},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/TsoMO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Wang03,
  author       = {Guilin Wang},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {On the Security of a Group Signature Scheme with Forward Security},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_3},
  doi          = {10.1007/978-3-540-24691-6\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Wang03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangBZD03,
  author       = {Guilin Wang and
                  Feng Bao and
                  Jianying Zhou and
                  Robert H. Deng},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Security Analysis of Some Proxy Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {305--319},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_23},
  doi          = {10.1007/978-3-540-24691-6\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WangBZD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangLW03,
  author       = {Changjie Wang and
                  Ho{-}fung Leung and
                  Yumin Wang},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Secure Double Auction Protocols with Full Privacy Protection},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {215--229},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_17},
  doi          = {10.1007/978-3-540-24691-6\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WangLW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YoonJL03,
  author       = {Joong Chul Yoon and
                  Seok Won Jung and
                  Sungwoo Lee},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Architecture for an Elliptic Curve Scalar Multiplication Resistant
                  to Some Side-Channel Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {139--151},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_12},
  doi          = {10.1007/978-3-540-24691-6\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YoonJL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Zhang03,
  author       = {Muxiang Zhang},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Adaptive Protocol for Entity Authentication and Key Agreement in Mobile
                  Networks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {166--183},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_14},
  doi          = {10.1007/978-3-540-24691-6\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Zhang03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangCK03,
  author       = {Yuan Zhang and
                  Moon{-}Jung Chung and
                  Hyun Kim},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Layer-Based Access Control Model in the Manufacturing Infrastructure
                  and Design Automation System},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {197--214},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_16},
  doi          = {10.1007/978-3-540-24691-6\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangCK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics