![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/ispec/ispec2005.bht:"
@inproceedings{DBLP:conf/ispec/AdelsbachGS05, author = {Andr{\'{e}} Adelsbach and Sebastian Gajek and J{\"{o}}rg Schwenk}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Visual Spoofing of {SSL} Protected Web Sites and Effective Countermeasures}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {204--216}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_18}, doi = {10.1007/978-3-540-31979-5\_18}, timestamp = {Wed, 25 Sep 2019 18:12:57 +0200}, biburl = {https://dblp.org/rec/conf/ispec/AdelsbachGS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/AdelsbachHS05, author = {Andr{\'{e}} Adelsbach and Ulrich Huber and Ahmad{-}Reza Sadeghi}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Secure Software Delivery and Installation in Embedded Systems}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {255--267}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_22}, doi = {10.1007/978-3-540-31979-5\_22}, timestamp = {Sat, 02 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/AdelsbachHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/BaekSS05, author = {Joonsang Baek and Reihaneh Safavi{-}Naini and Willy Susilo}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Token-Controlled Public Key Encryption}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {386--397}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_33}, doi = {10.1007/978-3-540-31979-5\_33}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/BaekSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChangTL05, author = {Chin{-}Chen Chang and Chun{-}Sen Tseng and Chia{-}Chen Lin}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Hiding Data in Binary Images}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {338--349}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_29}, doi = {10.1007/978-3-540-31979-5\_29}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ChangTL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ChenH05, author = {Kung Chen and Chih{-}Mao Huang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {A Practical Aspect Framework for Enforcing Fine-Grained Access Control in Web Applications}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {156--167}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_14}, doi = {10.1007/978-3-540-31979-5\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ChenH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FangGH05, author = {Yanmei Fang and Limin Gu and Jiwu Huang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Performance Analysis of CDMA-Based Watermarking with Quantization Scheme}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {350--361}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_30}, doi = {10.1007/978-3-540-31979-5\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FangGH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FernandezSN05, author = {Marcel Fernandez and Miguel Soriano and Josep Cotrina Navau}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Tracing Traitors by Guessing Secrets. The \emph{q}-Ary Case}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {61--73}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_6}, doi = {10.1007/978-3-540-31979-5\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FernandezSN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FernandezSN05a, author = {Marcel Fernandez and Miguel Soriano and Josep Cotrina Navau}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {A New Class of Codes for Fingerprinting Schemes}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {398--409}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_34}, doi = {10.1007/978-3-540-31979-5\_34}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FernandezSN05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HansenO05, author = {Frode Hansen and Vladimir A. Oleshchuk}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Conformance Checking of {RBAC} Policy and its Implementation}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {144--155}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_13}, doi = {10.1007/978-3-540-31979-5\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HansenO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HasleKKS05, author = {H{\aa}gen Hasle and Yngve Kristiansen and Ketil Kintel and Einar Snekkenes}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Measuring Resistance to Social Engineering}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {132--143}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_12}, doi = {10.1007/978-3-540-31979-5\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HasleKKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HedabouPB05, author = {Mustapha Hedabou and Pierre Pinel and Lucien B{\'{e}}n{\'{e}}teau}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Countermeasures for Preventing Comb Method Against {SCA} Attacks}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {85--96}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_8}, doi = {10.1007/978-3-540-31979-5\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HedabouPB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HouWDL05, author = {Fangyong Hou and Zhiying Wang and Kui Dai and Yun Liu}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Protecting Mass Data Basing on Small Trusted Agent}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {362--373}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_31}, doi = {10.1007/978-3-540-31979-5\_31}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HouWDL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HuangCHL05, author = {Xiaoqin Huang and Lin Chen and Linpeng Huang and Minglu Li}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {An Identity-Based Grid Security Infrastructure Model}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {314--325}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_27}, doi = {10.1007/978-3-540-31979-5\_27}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HuangCHL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JaliliIAS05, author = {Rasool Jalili and Fatemeh Imani{-}Mehr and Morteza Amini and Hamid Reza Shahriari}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {192--203}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_17}, doi = {10.1007/978-3-540-31979-5\_17}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JaliliIAS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/JiangLHD05, author = {Wenbao Jiang and Chen Li and Shuang Hao and Yiqi Dai}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Using Trust for Restricted Delegation in Grid Environments}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {293--301}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_25}, doi = {10.1007/978-3-540-31979-5\_25}, timestamp = {Wed, 31 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/JiangLHD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LemkeSS05, author = {Kerstin Lemke and Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {An Open Approach for Designing Secure Electronic Immobilizers}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {230--242}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_20}, doi = {10.1007/978-3-540-31979-5\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LemkeSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiDE05, author = {Zhuowei Li and Amitabha Das and Sabu Emmanuel}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Model Redundancy vs. Intrusion Detection}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {217--229}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_19}, doi = {10.1007/978-3-540-31979-5\_19}, timestamp = {Wed, 02 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LiDE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiangLSW05, author = {Bin Liang and Heng Liu and Wenchang Shi and Yanjun Wu}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {109--120}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_10}, doi = {10.1007/978-3-540-31979-5\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiangLSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiaoZC05, author = {Xu Liao and Li Zhang and Stephen Chi{-}fai Chan}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {A Task-Oriented Access Control Model for WfMS}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {168--177}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_15}, doi = {10.1007/978-3-540-31979-5\_15}, timestamp = {Thu, 30 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiaoZC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LindenV05, author = {Mikael Linden and Inka Vilpola}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {An Empirical Study on the Usability of Logout in a Single Sign-on System}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {243--254}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_21}, doi = {10.1007/978-3-540-31979-5\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LindenV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiuW05, author = {Joseph K. Liu and Duncan S. Wong}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {A Restricted Multi-show Credential System and Its Application on E-Voting}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {268--279}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_23}, doi = {10.1007/978-3-540-31979-5\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiuW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/NayakPG05, author = {Debabrata Nayak and Deepak B. Phatak and Ved Prakash Gulati}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: {A} Novel Approach}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {25--35}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_3}, doi = {10.1007/978-3-540-31979-5\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/NayakPG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ParkPKK05, author = {Heejin Park and Sang{-}Kil Park and Ki{-}Ryong Kwon and Dong Kyue Kim}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {74--84}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_7}, doi = {10.1007/978-3-540-31979-5\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ParkPKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/RiebachRT05, author = {Stephan Riebach and Erwin P. Rathgeb and Birger T{\"{o}}dtmann}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Risk Assessment of Production Networks Using Honeynets - Some Practical Experience}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {1--12}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_1}, doi = {10.1007/978-3-540-31979-5\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/RiebachRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/RobinsonSW05, author = {Philip Robinson and Christian Schaefer and Thomas Walter}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {{POSSET} - Policy-Driven Secure Session Transfer}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {13--24}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_2}, doi = {10.1007/978-3-540-31979-5\_2}, timestamp = {Thu, 21 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/RobinsonSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SadeghiS05, author = {Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Towards Multilateral-Secure {DRM} Platforms}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {326--337}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_28}, doi = {10.1007/978-3-540-31979-5\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SadeghiS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SamuelDS05, author = {Hany A. Samuel and Yasser H. Dakroury and Hussein I. Shahein}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Recard: Using Recommendation Cards Approach for Building Trust in Peer-to-Peer Networks}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {280--292}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_24}, doi = {10.1007/978-3-540-31979-5\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SamuelDS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SidiroglouIKS05, author = {Stelios Sidiroglou and John Ioannidis and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {An Email Worm Vaccine Architecture}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {97--108}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_9}, doi = {10.1007/978-3-540-31979-5\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SidiroglouIKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TanLM05, author = {Zuowen Tan and Zhuojun Liu and Mingsheng Wang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {On the Security of Some Nonrepudiable Threshold Proxy Signature Schemes}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {374--385}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_32}, doi = {10.1007/978-3-540-31979-5\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TanLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TsangW05, author = {Patrick P. Tsang and Victor K. Wei}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {48--60}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_5}, doi = {10.1007/978-3-540-31979-5\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TsangW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuQWCW05, author = {Qianhong Wu and Bo Qin and Changjie Wang and Xiaofeng Chen and Yumin Wang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {\emph{t}-Out-of-\emph{n} String/Bit Oblivious Transfers Revisited}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {410--421}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_35}, doi = {10.1007/978-3-540-31979-5\_35}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WuQWCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuSLSYB05, author = {Yanjun Wu and Wenchang Shi and Hongliang Liang and Qinghua Shang and Chunyang Yuan and Bin Liang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Security On-demand Architecture with Multiple Modules Support}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {121--131}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_11}, doi = {10.1007/978-3-540-31979-5\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/WuSLSYB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YuSJWA05, author = {Zhongchao Yu and Chuk{-}Yang Seng and Tao Jiang and Xue Wu and William A. Arbaugh}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Robust Routing in Malicious Environment for Ad Hoc Networks}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {36--47}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_4}, doi = {10.1007/978-3-540-31979-5\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YuSJWA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangHXY05, author = {Tao Zhang and Mingzeng Hu and Xiao{-}chun Yun and Yongzheng Zhang}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Computer Vulnerability Evaluation Using Fault Tree Analysis}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {302--313}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_26}, doi = {10.1007/978-3-540-31979-5\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangHXY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangS05, author = {Zonghua Zhang and Hong Shen}, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {A Brief Observation-Centric Analysis on Anomaly-Based Intrusion Detection}, booktitle = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, pages = {178--191}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31979-5\_16}, doi = {10.1007/978-3-540-31979-5\_16}, timestamp = {Mon, 25 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2005, editor = {Robert H. Deng and Feng Bao and HweeHwa Pang and Jianying Zhou}, title = {Information Security Practice and Experience, First International Conference, {ISPEC} 2005, Singapore, April 11-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3439}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b107167}, doi = {10.1007/B107167}, isbn = {3-540-25584-2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.