Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wisa/wisa2010.bht:"
@proceedings{DBLP:conf/wisa/2010, editor = {Yongwha Chung and Moti Yung}, title = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-17955-6}, doi = {10.1007/978-3-642-17955-6}, isbn = {978-3-642-17954-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AllailouMM10, author = {Boufeldja Allailou and Abdelaziz Marjane and Abdellah Mokrane}, editor = {Yongwha Chung and Moti Yung}, title = {Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {76--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_6}, doi = {10.1007/978-3-642-17955-6\_6}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AllailouMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AmakiHMO10, author = {Takehiko Amaki and Masanori Hashimoto and Yukio Mitsuyama and Takao Onoye}, editor = {Yongwha Chung and Moti Yung}, title = {A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {107--121}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_8}, doi = {10.1007/978-3-642-17955-6\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AmakiHMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BaoZ10, author = {Kehua Bao and Zhenfeng Zhang}, editor = {Yongwha Chung and Moti Yung}, title = {Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {221--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_16}, doi = {10.1007/978-3-642-17955-6\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/BaoZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DottlingLMA10, author = {Nico D{\"{o}}ttling and Dejan E. Lazich and J{\"{o}}rn M{\"{u}}ller{-}Quade and Antonio Sobreira de Almeida}, editor = {Yongwha Chung and Moti Yung}, title = {Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {206--220}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_15}, doi = {10.1007/978-3-642-17955-6\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DottlingLMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DowsleyGMN10, author = {Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento}, editor = {Yongwha Chung and Moti Yung}, title = {A Two-Party Protocol with Trusted Initializer for Computing the Inner Product}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {337--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_25}, doi = {10.1007/978-3-642-17955-6\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DowsleyGMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DowsleyHIN10, author = {Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, editor = {Yongwha Chung and Moti Yung}, title = {Round-Optimal Deniable Ring Authentication in the Presence of Big Brother}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {307--321}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_23}, doi = {10.1007/978-3-642-17955-6\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DowsleyHIN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ElaabidMGD10, author = {M. Abdelaziz Elaabid and Olivier Meynard and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Yongwha Chung and Moti Yung}, title = {Combined Side-Channel Attacks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {175--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_13}, doi = {10.1007/978-3-642-17955-6\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FujiokaSY10, author = {Atsushi Fujioka and Koutarou Suzuki and Kazuki Yoneyama}, editor = {Yongwha Chung and Moti Yung}, title = {Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {15--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_2}, doi = {10.1007/978-3-642-17955-6\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FujiokaSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GallaisKT10, author = {Jean{-}Fran{\c{c}}ois Gallais and Ilya Kizhvatov and Michael Tunstall}, editor = {Yongwha Chung and Moti Yung}, title = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES} Implementations}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {243--257}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_18}, doi = {10.1007/978-3-642-17955-6\_18}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/GallaisKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JangYLY10, author = {Jae{-}hoon Jang and Don{-}Gu Yeo and Dong{-}hee Lee and Heung{-}Youl Youm}, editor = {Yongwha Chung and Moti Yung}, title = {An {IP} Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {150--159}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_11}, doi = {10.1007/978-3-642-17955-6\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JangYLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JinLKP10, author = {Changlong Jin and Shengzhe Li and Hakil Kim and Eunsoo Park}, editor = {Yongwha Chung and Moti Yung}, title = {Fingerprint Liveness Detection Based on Multiple Image Quality Features}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {281--291}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_21}, doi = {10.1007/978-3-642-17955-6\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JinLKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JingXL10, author = {Wenpan Jing and Haixia Xu and Bao Li}, editor = {Yongwha Chung and Moti Yung}, title = {A New Efficient Construction for Non-Malleable Zero-Knowledge Sets}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {31--43}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_3}, doi = {10.1007/978-3-642-17955-6\_3}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JingXL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Kabasele-Tenday10, author = {Jean{-}Marie Kabasele{-}Tenday}, editor = {Yongwha Chung and Moti Yung}, title = {Using Special Use Cases for Security in the Software Development Life Cycle}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {122--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_9}, doi = {10.1007/978-3-642-17955-6\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Kabasele-Tenday10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeCKP10, author = {Hansung Lee and Yunsu Chung and Jeongnyeo Kim and Daihee Park}, editor = {Yongwha Chung and Moti Yung}, title = {Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {273--280}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_20}, doi = {10.1007/978-3-642-17955-6\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeCKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuQGT10, author = {Hongying Liu and Guoyu Qian and Satoshi Goto and Yukiyasu Tsunoo}, editor = {Yongwha Chung and Moti Yung}, title = {Correlation Power Analysis Based on Switching Glitch Model}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {191--205}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_14}, doi = {10.1007/978-3-642-17955-6\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiuQGT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MiyajiO10, author = {Atsuko Miyaji and Kazumasa Omote}, editor = {Yongwha Chung and Moti Yung}, title = {Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {135--149}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_10}, doi = {10.1007/978-3-642-17955-6\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MiyajiO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MiyajiRS10, author = {Atsuko Miyaji and Mohammad Shahriar Rahman and Masakazu Soshi}, editor = {Yongwha Chung and Moti Yung}, title = {Hidden Credential Retrieval without Random Oracles}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {160--174}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_12}, doi = {10.1007/978-3-642-17955-6\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MiyajiRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NakatsuLSO10, author = {Daisuke Nakatsu and Yang Li and Kazuo Sakiyama and Kazuo Ohta}, editor = {Yongwha Chung and Moti Yung}, title = {Combination of {SW} Countermeasure and {CPU} Modification on {FPGA} against Power Analysis}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {258--272}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_19}, doi = {10.1007/978-3-642-17955-6\_19}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NakatsuLSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NguyenNK10, author = {Thi Hai Binh Nguyen and Van Huan Nguyen and Hakil Kim}, editor = {Yongwha Chung and Moti Yung}, title = {Robust Feature Extraction for Facial Image Quality Assessment}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {292--306}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_22}, doi = {10.1007/978-3-642-17955-6\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NguyenNK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NishideS10, author = {Takashi Nishide and Kouichi Sakurai}, editor = {Yongwha Chung and Moti Yung}, title = {Distributed Paillier Cryptosystem without Trusted Dealer}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {44--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_4}, doi = {10.1007/978-3-642-17955-6\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NishideS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PandeyB10, author = {Sumit Kumar Pandey and Rana Barua}, editor = {Yongwha Chung and Moti Yung}, title = {Construction of Identity Based Signcryption Schemes}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {1--14}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_1}, doi = {10.1007/978-3-642-17955-6\_1}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PandeyB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SuWZL10, author = {Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li}, editor = {Yongwha Chung and Moti Yung}, title = {Full-Round Differential Attack on {TWIS} Block Cipher}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {234--242}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_17}, doi = {10.1007/978-3-642-17955-6\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SuWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Walter10, author = {Colin D. Walter}, editor = {Yongwha Chung and Moti Yung}, title = {Fast Scalar Multiplication for {ECC} over GF(\emph{p}) Using Division Chains}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {61--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_5}, doi = {10.1007/978-3-642-17955-6\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Walter10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WengerFF10, author = {Erich Wenger and Martin Feldhofer and Norbert Felber}, editor = {Yongwha Chung and Moti Yung}, title = {Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {92--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_7}, doi = {10.1007/978-3-642-17955-6\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WengerFF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Yoneyama10, author = {Kazuki Yoneyama}, editor = {Yongwha Chung and Moti Yung}, title = {Cross-Realm Password-Based Server Aided Key Exchange}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {322--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_24}, doi = {10.1007/978-3-642-17955-6\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Yoneyama10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.