


default search action
5. ICICS 2003: Huhehaote, China
- Sihan Qing, Dieter Gollmann, Jianying Zhou:

Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Lecture Notes in Computer Science 2836, Springer 2003, ISBN 3-540-20150-5 - Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa:

A Fast Square Root Computation Using the Frobenius Mapping. 1-10 - Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim:

A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. 11-21 - Yan Wang, Chi-Hung Chi, Tieyan Li:

Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents. 22-33 - Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei:

On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. 34-46 - Ricardo Nabhen, Edgard Jamhour, Carlos Maziero:

A Policy Based Framework for Access Control. 47-59 - Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine:

Trading-Off Type-Inference Memory Complexity against Communication. 60-71 - Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

:
Security Remarks on a Group Signature Scheme with Member Deletion. 72-83 - Hongjun Wu, Feng Bao, Robert H. Deng

:
An Efficient Known Plaintext Attack on FEA-M. 84-87 - Jianying Zhou, Feng Bao, Robert H. Deng

:
An Efficient Public-Key Framework. 88-99 - Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee:

ROCEM: Robust Certified E-mail System Based on Server-Supported Signature. 100-111 - Jose Antonio Onieva, Jianying Zhou, Javier López:

Practical Service Charge for P2P Content Distribution. 112-123 - Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma

:
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. 124-135 - Yongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu:

A Lattice Based General Blind Watermark Scheme. 136-144 - Gregory Saunders, Michael Hitchens

, Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix. 145-157 - Miodrag J. Mihaljevic:

Broadcast Encryption Schemes Based on the Sectioned Key Tree. 158-169 - Gang Li, Jie Yang:

Research on the Collusion Estimation. 170-178 - Mohsen Ashourian, Yo-Sung Ho:

Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains. 179-190 - Oscar Esparza

, Miguel Soriano, Jose L. Muñoz, Jordi Forné
:
Protocols for Malicious Host Revocation. 191-201 - Pat Pik-Wah Chan, Michael R. Lyu:

A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code. 202-213 - Tieyan Li, Huafei Zhu, Kwok-Yan Lam:

A Novel Two-Level Trust Model for Grid. 214-225 - Qianhong Wu, Jianhong Zhang, Yumin Wang:

Practical t-out-n Oblivious Transfer and Its Applications. 226-237 - Yongdong Wu, Robert H. Deng

:
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. 238-248 - Yan Xie, Fangguo Zhang

, Xiaofeng Chen, Kwangjo Kim:
ID-Based Distributed "Magic Ink" Signature from Pairings. 249-259 - Yan Wang, Shuwang Lü, Zhenhua Liu:

A Simple Anonymous Fingerprinting Scheme Based on Blind Signature. 260-268 - Yang Cui, Kazukuni Kobara, Hideki Imai:

Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. 269-279 - Xiaodong Yi, Xuejun Yang:

A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems. 280-291 - Jianhong Zhang, Qianhong Wu, Yumin Wang:

A Novel Efficient Group Signature Scheme with Forward Security. 292-300 - Feng Bao, Robert H. Deng

, Huafei Zhu:
Variations of Diffie-Hellman Problem. 301-312 - Taeshik Shon, Jung-Taek Seo, Jongsub Moon:

A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. 313-324 - Min Luo, Lina Wang, Huanguo Zhang, Jin Chen:

A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. 325-336 - Zhen Xu, Dengguo Feng, Lan Li, Hua Chen:

UC-RBAC: A Usage Constrained Role-Based Access Control Model. 337-347 - Mathieu Ciet, Marc Joye:

(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. 348-359 - Xiaoqiang Li, Xiangyang Xue, Wei Li:

An Optimized Multi-bits Blind Watermarking Scheme. 360-369 - Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han:

A Compound Intrusion Detection Model. 370-381 - Hui-Feng Huang, Chin-Chen Chang:

An Efficient Convertible Authenticated Encryption Scheme and Its Variant. 382-392 - Meng Zhang, Jiubin Ju:

Space-Economical Reassembly for Intrusion Detection System. 393-404 - J. Krishna Murthy:

A Functional Decomposition of Virus and Worm Programs. 405-414

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














