


default search action
3. ICICS 2001: Xian, China
- Sihan Qing, Tatsuaki Okamoto, Jianying Zhou:

Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001. Lecture Notes in Computer Science 2229, Springer 2001, ISBN 3-540-42880-1 - Claus-Peter Schnorr:

Security of Blind Discrete Log Signatures against Interactive Attacks. 1-12 - Dongxi Liu, Xiaoyong Li, Yingcai Bai:

An Intelligent Intruder Model for Security Protocol Analysis. 13-22 - Kishan Chand Gupta, Subhamoy Maitra:

Primitive Polynomials over GF(2) - A Cryptologic Approach. 23-34 - Bo Yang, Shixiong Zhu, Yumin Wang:

Unconditionally-Secure Oblivious Transfer. 35-41 - Chin-Chen Chang, Iuon-Chang Lin:

Cryptanalysis of the Improved User Efficient Blind Signatures. 42-46 - Chin-Chen Chang, Kuo-Feng Hwang:

Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. 47-51 - Xiaochen Bo, Lincheng Shen, Wensen Chang:

Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain. 52-61 - Kazumaro Aoki, Fumitaka Hoshino

, Tetsutaro Kobayashi:
A Cyclic Window Algorithm for ECC Defined over Extension Fields. 62-73 - Fangguo Zhang

, Futai Zhang, Yumin Wang:
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves. 74-83 - Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou:

Attacks on Two Digital Signature Schemes Based on Error Correcting Codes. 84-89 - Kanta Matsuura

:
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce. 90-94 - Young-Chul Shim:

A New Approach for Secure Multicast Routing in a Large Scale Network. 95-106 - Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim:

A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems. 107-118 - Sungbaek Cho, Zbigniew Ciechanowicz:

Dealing with Uncertainties in Risk Analysis Using Belief Functions. 119-130 - Michael Hitchens, Vijay Varadharajan:

RBAC for XML Document Stores. 131-143 - Xian-Mo Zhang, Josef Pieprzyk

:
Cheating Immune Secret Sharing. 144-149 - Gideon Samid:

Encryption Sticks (Randomats). 150-154 - Zhimin Song, Sihan Qing:

Applying NCP Logic to the Analysis of SSL 3.0. 155-166 - Ian Herwono, Ingo Liebhardt:

Performance of WTLS and Its Impact on an M-commerce Transaction. 167-171 - Carlos Ribeiro, Andre Zuquete

, Paulo Ferreira:
Enforcing Obligation with Security Monitors. 172-176 - Peng Ning, Yiqun Lisa Yin:

Efficient Software Implementation for Finite Field Multiplication in Normal Basis. 177-188 - Jianying Zhou, Chunfu Tan:

Playing Lottery on the Internet. 189-201 - Feng Bao, Robert H. Deng

:
Privacy Protection for Transactions of Digital Goods. 202-213 - Jie-lü Xu, Hanliang Xu, Yan Wang, Shuwang Lü:

Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions. 214-220 - Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou:

Threshold Undeniable RSA Signature Scheme. 221-232 - Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang:

Two Simple Batch Verifying Multiple Digital Signatures. 233-237 - Yeping He, Sihan Qing:

Square Attack on Reduced Camellia Cipher. 238-245 - Lin You, Yixian Yang, Chun Qi Zhang:

Generalization of Elliptic Curve Digital Signature Schemes. 246-250 - Bruno Crispo, Giancarlo Ruffo

:
Reasoning about Accountability within Delegation. 251-260 - Gang Pan, Yijun Wu, Zhaohui Wu:

A Novel Data Hiding Method for Two-Color Images. 261-270 - Chan H. Lee, Xiaotie Deng, Huafei Zhu:

An Identification Scheme Provably Secure against Reset Attack. 271-279 - Sanna Kunnari:

Estimating the Scalability of the Internet Key Exchange. 280-291 - Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue:

An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes. 292-303 - Baoqing Ye:

Defeating Denial-of-Service Attacks on the Internet. 304-315 - Dianlong Zhang, Harald Lukhaub, Werner Zorn:

A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications. 316-327 - Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas:

A Unified Methodology for Verification and Synthesis of Firewall Configurations. 328-339 - Yan Chen, Adam W. Bargteil, David Bindel

, Randy H. Katz, John Kubiatowicz:
Quantifying Network Denial of Service: A Location Service Case Study. 340-351 - Juan Manuel González Nieto, Colin Boyd, Ed Dawson:

A Public Key Cryptosystem Based on the Subgroup Membership Problem. 352-363 - Ki-Yoong Hong, Chul Kim:

On a Network Security Model for the Secure Information Flow on Multilevel Secure Network. 364-370 - Wenjian Luo, Xianbin Cao, Xufa Wang:

NIDS Research Based on Artificial Immunology. 371-375 - Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta:

AMBAR Protocol: Access Management Based on Authorization Reduction. 376-380 - Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras:

Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication. 381-385 - Yan Wang, Kian-Lee Tan

:
Dispatching Mobile Agents with Secure Routes in Parallel. 386-397 - Yu Chen, Qian Fang, Zhihui Du, Zhenchun Huang

, Sanli Li:
TH-SMS: Security Management System in Advanced Computational Infrastructure. 398-407 - Ulrich Lang, Dieter Gollmann, Rudolf Schreiner:

Cryptography and Middleware Security. 408-418 - Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao:

Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes. 419-428 - Eric Disson, Danielle Boulanger, Gilles Dubois:

A Role-Based Model for Access Control in Database Federations. 429-440 - Hongpei Li, Lianli Chang, Xinmei Wang:

A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls. 441-450 - Hee-Un Park, Im-Yeong Lee:

A Digital Nominative Proxy Signature Scheme for Mobile Communication. 451-455 - Mi Ra Yi, Tae Ho Cho:

Hierarchical Simulation Model with Animation for Large Network Security. 456-460 - Greg Maitland, Colin Boyd:

Fair Electronic Cash Based on a Group Signature Scheme. 461-465 - Chuan-Kun Wu, Vijay Varadharajan:

Fair Exchange of Digital Signatures with Offline Trusted Third Party. 466-470 - Jong Sou Park, Jang-Se Lee, Hwankuk Kim

, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi:
SECUSIM: A Tool for the Cyber-Attack Simulation. 471-475 - Yifa Li:

A New Semantics of Authentication Logic. 476-482 - Ji-Hwan Park, Sook Ee Jeong, Chang Soo Kim:

Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles. 483-494 - Seenil Gram:

Redundancy, Obscurity, Self-Containment & Independence. 495-502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














