Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cisc/inscrypt2006.bht:"
@inproceedings{DBLP:conf/cisc/AnP06, author = {Gaeil An and Joon S. Park}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {182--195}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_15}, doi = {10.1007/11937807\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/AnP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChakrabortyS06, author = {Debrup Chakraborty and Palash Sarkar}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {A General Construction of Tweakable Block Ciphers and Different Modes of Operations}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {88--102}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_8}, doi = {10.1007/11937807\_8}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChakrabortyS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenLCG06, author = {You Chen and Yang Li and Xueqi Cheng and Li Guo}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {153--167}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_13}, doi = {10.1007/11937807\_13}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenLCG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/FernandezN06, author = {Marcel Fernandez and Josep Cotrina Navau}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Obtaining Asymptotic Fingerprint Codes Through a New Analysis of the Boneh-Shaw Codes}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {289--303}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_23}, doi = {10.1007/11937807\_23}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/FernandezN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/HuMLL06, author = {Xuexian Hu and Yongtao Ming and Wenfen Liu and Shiqu Li}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {On the Rate of Coincidence of Two Clock-Controlled Combiners}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {54--65}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_5}, doi = {10.1007/11937807\_5}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/HuMLL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KimJSH06, author = {SeongKi Kim and EunKyung Jin and YoungJin Song and Sang{-}Yong Han}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Design and Implementation of Fast Access Control That Supports the Separation of Duty}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {211--224}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_17}, doi = {10.1007/11937807\_17}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KimJSH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KimKKH06, author = {Deok Jin Kim and Tae{-}Hyung Kim and Jong Kim and Sung Je Hong}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {238--252}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_19}, doi = {10.1007/11937807\_19}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KimKKH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KrzywieckiKK06, author = {Lukasz Krzywiecki and Przemyslaw Kubiak and Miroslaw Kutylowski}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {A Revocation Scheme Preserving Privacy}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {130--143}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_11}, doi = {10.1007/11937807\_11}, timestamp = {Mon, 23 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KrzywieckiKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LibertQY06, author = {Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater and Moti Yung}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Efficient Intrusion-Resilient Signatures Without Random Oracles}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {27--41}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_3}, doi = {10.1007/11937807\_3}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LibertQY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LimKSMCK06, author = {Yoonsun Lim and Myung Kim and Kwang Hee Seo and Ho{-}Kun Moon and Jin Gi Choe and Yu Kang}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {279--288}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_22}, doi = {10.1007/11937807\_22}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LimKSMCK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Ma06, author = {Changshe Ma}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Efficient Short Signcryption Scheme with Public Verifiability}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {118--129}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_10}, doi = {10.1007/11937807\_10}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Ma06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ParkCLLYC06, author = {Haeryong Park and Zhengjun Cao and Lihua Liu and Seongan Lim and Ikkwon Yie and Kilsoo Chun}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in {CISC} '05}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {1--12}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_1}, doi = {10.1007/11937807\_1}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ParkCLLYC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TangQ06, author = {Liuying Tang and Sihan Qing}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {A Practical Alternative to Domain and Type Enforcement Integrity Formal Models}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {225--237}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_18}, doi = {10.1007/11937807\_18}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TangQ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TangYCM06, author = {Chenghua Tang and Shuping Yao and Zhongjie Cui and Limin Mao}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {A Network Security Policy Model and Its Realization Mechanism}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {168--181}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_14}, doi = {10.1007/11937807\_14}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TangYCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TartaryW06, author = {Christophe Tartary and Huaxiong Wang}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {103--117}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_9}, doi = {10.1007/11937807\_9}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TartaryW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TongWDL06, author = {Yuan{-}man Tong and Zhiying Wang and Kui Dai and Hongyi Lu}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using {WDDL} and Wave-Pipelining}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {66--77}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_6}, doi = {10.1007/11937807\_6}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TongWDL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TongZW06, author = {Xin Tong and Jie Zhang and Qiao{-}Yan Wen}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {New Constructions of Large Binary Sequences Family with Low Correlation}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {42--53}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_4}, doi = {10.1007/11937807\_4}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TongZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangHS06, author = {Zhan Wang and Yoshiaki Hori and Kouichi Sakurai}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Application and Evaluation of Bayesian Filter for Chinese Spam}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {253--263}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_20}, doi = {10.1007/11937807\_20}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangLW06, author = {Dayin Wang and Dongdai Lin and Wenling Wu}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {{OPMAC:} One-Key Poly1305 {MAC}}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {78--87}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_7}, doi = {10.1007/11937807\_7}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangLW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WengLCL06, author = {Jian Weng and Shengli Liu and Kefei Chen and Xiangxue Li}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Identity-Based Key-Insulated Signature with Secure Key-Updates}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {13--26}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_2}, doi = {10.1007/11937807\_2}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WengLCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuB06, author = {Yongdong Wu and Feng Bao}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Batch Decryption of Encrypted Short Messages and Its Application on Concurrent {SSL} Handshakes}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {264--278}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_21}, doi = {10.1007/11937807\_21}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WuB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YiXNY06, author = {Yi Shi and Xinyu Yang and Ning Li and Yong Qi}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Deterministic Packet Marking with Link Signatures for {IP} Traceback}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {144--152}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_12}, doi = {10.1007/11937807\_12}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YiXNY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YuanHHZ06, author = {Chunyang Yuan and Yeping He and Jianbo He and Zhouyi Zhou}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {A Verifiable Formal Specification for {RBAC} Model with Constraints of Separation of Duty}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {196--210}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_16}, doi = {10.1007/11937807\_16}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YuanHHZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cisc/2006, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807}, doi = {10.1007/11937807}, isbn = {3-540-49608-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.