Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icics/icics2005.bht:"
@inproceedings{DBLP:conf/icics/BallardKM05, author = {Lucas Ballard and Seny Kamara and Fabian Monrose}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Achieving Efficient Conjunctive Keyword Searches over Encrypted Data}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {414--426}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_35}, doi = {10.1007/11602897\_35}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/BallardKM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CathaloLQ05, author = {Julien Cathalo and Beno{\^{\i}}t Libert and Jean{-}Jacques Quisquater}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Efficient and Non-interactive Timed-Release Encryption}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {291--303}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_25}, doi = {10.1007/11602897\_25}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CathaloLQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CederquistCD05, author = {J. G. Cederquist and Ricardo Corin and Muhammad Torabi Dashti}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {27--39}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_3}, doi = {10.1007/11602897\_3}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CederquistCD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChiuLH05, author = {Yun{-}Peng Chiu and Chin{-}Laung Lei and Chun{-}Ying Huang}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Secure Multicast Using Proxy Encryption}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {280--290}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_24}, doi = {10.1007/11602897\_24}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ChiuLH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChoiL05, author = {Hyunsang Choi and Heejo Lee}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {{PCAV:} Internet Attack Visualization on Parallel Coordinates}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {454--466}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_38}, doi = {10.1007/11602897\_38}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ChoiL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChowS05, author = {Sherman S. M. Chow and Willy Susilo}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Generic Construction of (Identity-Based) Perfect Concurrent Signatures}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {194--206}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_17}, doi = {10.1007/11602897\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChowS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CookBK05, author = {Debra L. Cook and Ricardo A. Baratto and Angelos D. Keromytis}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {363--375}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_31}, doi = {10.1007/11602897\_31}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CookBK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DaiM05, author = {Jiazhu Dai and Huaikou Miao}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {D{\_}DIPS: An Intrusion Prevention System for Database Security}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {481--490}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_40}, doi = {10.1007/11602897\_40}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/DaiM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/FellahM05, author = {Alaaeddine Fellah and John Mullins}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Admissible Interference by Typing for Cryptographic Protocols}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {123--135}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_11}, doi = {10.1007/11602897\_11}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/FellahM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/GoiDS05, author = {Bok{-}Min Goi and Jintai Ding and Mohammad Umar Siddiqi}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Cryptanalysis of {PASS} {II} and MiniPass}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {159--168}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_14}, doi = {10.1007/11602897\_14}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/GoiDS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HuangZD05, author = {Song Huang and Ling Zhang and Shouling Dong}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {231--242}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_20}, doi = {10.1007/11602897\_20}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HuangZD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ImamotoZS05, author = {Kenji Imamoto and Jianying Zhou and Kouichi Sakurai}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {An Evenhanded Certified Email System for Contract Signing}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {1--13}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_1}, doi = {10.1007/11602897\_1}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ImamotoZS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/IzuKTY05, author = {Tetsuya Izu and Nobuyuki Kanaya and Masahiko Takenaka and Takashi Yoshioka}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {{PIATS:} {A} Partially Sanitizable Signature Scheme}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {72--83}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_7}, doi = {10.1007/11602897\_7}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/IzuKTY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KimBPL05, author = {Jongsung Kim and Alex Biryukov and Bart Preneel and Sangjin Lee}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {On the Security of Encryption Modes of MD4, {MD5} and {HAVAL}}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {147--158}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_13}, doi = {10.1007/11602897\_13}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KimBPL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KimLO05, author = {Sangjin Kim and Hoonjung Lee and Heekuck Oh}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent {PKG} Environment}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {323--335}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_28}, doi = {10.1007/11602897\_28}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/KimLO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KuribayashiMT05, author = {Minoru Kuribayashi and Masakatu Morii and Hatsukazu Tanaka}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Reversible Watermark with Large Capacity Using the Predictive Coding}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {441--453}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_37}, doi = {10.1007/11602897\_37}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KuribayashiMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KuwakadoMT05, author = {Hidenori Kuwakado and Masakatu Morii and Hatsukazu Tanaka}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Visual Cryptographic Protocols Using the Trusted Initializer}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {112--122}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_10}, doi = {10.1007/11602897\_10}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/KuwakadoMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LaurLM05, author = {Sven Laur and Helger Lipmaa and Taneli Mielik{\"{a}}inen}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Private Itemset Support Counting}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {97--111}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_9}, doi = {10.1007/11602897\_9}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LaurLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiJH05, author = {Xin Li and Zhenzhou Ji and Mingzeng Hu}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Session Table Architecture for Defending {SYN} Flood Attack}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {220--230}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_19}, doi = {10.1007/11602897\_19}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiJH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiJL05, author = {Lan Li and Xinghao Jiang and Jianhua Li}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Enforce Mandatory Access Control Policy on {XML} Documents}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {336--349}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_29}, doi = {10.1007/11602897\_29}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiJL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiLP05, author = {Yong Li and Helger Lipmaa and Dingyi Pei}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {On Delegatability of Four Designated Verifier Signatures}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {61--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_6}, doi = {10.1007/11602897\_6}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiZW05, author = {Tieyan Li and Huafei Zhu and Yongdong Wu}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Multi-Source Stream Authentication Framework in Case of Composite {MPEG-4} Stream}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {389--401}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_33}, doi = {10.1007/11602897\_33}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiZW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaDPZ05, author = {Di Ma and Robert H. Deng and HweeHwa Pang and Jianying Zhou}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Authenticating Query Results in Data Publishing}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {376--388}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_32}, doi = {10.1007/11602897\_32}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaDPZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MegiasHM05, author = {David Meg{\'{\i}}as and Jordi Herrera{-}Joancomart{\'{\i}} and Juli{\`{a}} Minguill{\'{o}}n}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {427--440}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_36}, doi = {10.1007/11602897\_36}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MegiasHM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Nguyen05, author = {Khanh Nguyen}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Asymmetric Concurrent Signatures}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {181--193}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_16}, doi = {10.1007/11602897\_16}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/Nguyen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PengBDL05, author = {Kun Peng and Colin Boyd and Ed Dawson and Byoungcheon Lee}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Ciphertext Comparison, a New Solution to the Millionaire Problem}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {84--96}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_8}, doi = {10.1007/11602897\_8}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/PengBDL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PhanG05, author = {Raphael Chung{-}Wei Phan and Bok{-}Min Goi}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {On the Security Bounds of CMC, EME, EME\({}^{\mbox{+}}\) and EME\({}^{\mbox{*}}\) Modes of Operation}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {136--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_12}, doi = {10.1007/11602897\_12}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/PhanG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/QiJBW05, author = {Fang Qi and Weijia Jia and Feng Bao and Yongdong Wu}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Batching {SSL/TLS} Handshake Improved}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {402--413}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_34}, doi = {10.1007/11602897\_34}, timestamp = {Tue, 24 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/QiJBW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SakaiS05, author = {Yasuyuki Sakai and Kouichi Sakurai}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Simple Power Analysis on Fast Modular Reduction with {NIST} Recommended Elliptic Curves}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {169--180}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_15}, doi = {10.1007/11602897\_15}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/SakaiS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ShahriariSJZO05, author = {Hamid Reza Shahriari and Reza Sadoddin and Rasool Jalili and Reza Zakeri and Ali Reza Omidian}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Network Vulnerability Analysis Through Vulnerability Take-Grant Model {(VTG)}}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {256--268}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_22}, doi = {10.1007/11602897\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ShahriariSJZO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TangM05, author = {Qiang Tang and Chris J. Mitchell}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Security Properties of Two Authenticated Conference Key Agreement Protocols}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {304--314}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_26}, doi = {10.1007/11602897\_26}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/TangM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangBD05, author = {Shuhong Wang and Feng Bao and Robert H. Deng}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {53--60}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_5}, doi = {10.1007/11602897\_5}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangBIS05, author = {Guilin Wang and Feng Bao and Kenji Imamoto and Kouichi Sakurai}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {40--52}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_4}, doi = {10.1007/11602897\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangBIS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangDL05, author = {Lanjia Wang and Hai{-}Xin Duan and Xing Li}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Port Scan Behavior Diagnosis by Clustering}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {243--255}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_21}, doi = {10.1007/11602897\_21}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangDL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangNR05, author = {Pan Wang and Peng Ning and Douglas S. Reeves}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Network Access Control for Mobile Ad-Hoc Networks}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {350--362}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_30}, doi = {10.1007/11602897\_30}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WangNR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WeiDC05, author = {Wei Wei and Xuhua Ding and Kefei Chen}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Multiplex Encryption: {A} Practical Approach to Encrypting Multi-recipient Emails}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {269--279}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_23}, doi = {10.1007/11602897\_23}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WeiDC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YinBKT05, author = {Yi Yin and Raghuvel S. Bhuvaneswaran and Yoshiaki Katayama and Naohisa Takahashi}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Implementation of Packet Filter Configurations Anomaly Detection System with {SIERRA}}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {467--480}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_39}, doi = {10.1007/11602897\_39}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/YinBKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YoonY05, author = {Eun{-}Jun Yoon and Kee{-}Young Yoo}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {315--322}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_27}, doi = {10.1007/11602897\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/YoonY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangFXZ05, author = {Zhenfeng Zhang and Dengguo Feng and Jing Xu and Yongbin Zhou}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Efficient ID-Based Optimistic Fair Exchange with Provable Security}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {14--26}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_2}, doi = {10.1007/11602897\_2}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhangFXZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhuBD05, author = {Huafei Zhu and Feng Bao and Robert H. Deng}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {207--219}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_18}, doi = {10.1007/11602897\_18}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ZhuBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2005, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897}, doi = {10.1007/11602897}, isbn = {3-540-30934-9}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.