Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icisc/icisc2006.bht:"
@inproceedings{DBLP:conf/icisc/ChangKLLH06, author = {Ku{-}Young Chang and Ju{-}Sung Kang and Mun{-}Kyu Lee and Hangrok Lee and Dowon Hong}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {New Variant of the Self-Shrinking Generator and Its Cryptographic Properties}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {41--50}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_6}, doi = {10.1007/11927587\_6}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChangKLLH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChangWY06, author = {Junsheng Chang and Huaimin Wang and Gang Yin}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {A Time-Frame Based Trust Model for {P2P} Systems}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {155--165}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_14}, doi = {10.1007/11927587\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChangWY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChatterjeeS06, author = {Sanjit Chatterjee and Palash Sarkar}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {New Constructions of Constant Size Ciphertext {HIBE} Without Random Oracle}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {310--327}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_26}, doi = {10.1007/11927587\_26}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChatterjeeS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChoPSY06, author = {Hong{-}Su Cho and Sangwoo Park and Soo Hak Sung and Aaram Yun}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Collision Search Attack for 53-Step {HAS-160}}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {286--295}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_24}, doi = {10.1007/11927587\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChoPSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChoiCS06, author = {Jongoh Choi and Si{-}Ho Cha and JooSeok Song}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {179--193}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_16}, doi = {10.1007/11927587\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChoiCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChoiPKSKCMR06, author = {Yoon{-}Ho Choi and Jong{-}Ho Park and Sang{-}Kon Kim and Seung{-}Woo Seo and Yu Kang and Jin Gi Choe and Ho{-}Kun Moon and Myung{-}Soo Rhee}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {206--221}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_18}, doi = {10.1007/11927587\_18}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChoiPKSKCMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GeiselmannJKPS06, author = {Willi Geiselmann and Fabian Januszewski and Hubert K{\"{o}}pfer and Jan Pelzl and Rainer Steinwandt}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {A Simpler Sieving Device: Combining {ECM} and {TWIRL}}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {118--135}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_12}, doi = {10.1007/11927587\_12}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GeiselmannJKPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JoscakT06, author = {Daniel Josc{\'{a}}k and Jir{\'{\i}} Tuma}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damg{\aa}rd Construction}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {257--266}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_22}, doi = {10.1007/11927587\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/JoscakT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KatouWNM06, author = {Hidehiro Katou and Feng Wang and Yasuyuki Nogami and Yoshitaka Morikawa}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {A High-Speed Square Root Algorithm in Extension Fields}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {94--106}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_10}, doi = {10.1007/11927587\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KatouWNM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimLCYLJ06, author = {Heeyoul Kim and Younho Lee and Byungchun Chung and Hyunsoo Yoon and Jaewon Lee and KyungIm Jung}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Digital Rights Management with Right Delegation for Home Networks}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {233--245}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_20}, doi = {10.1007/11927587\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimLCYLJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KlonowskiL06, author = {Marek Klonowski and Anna Lauks}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Extended Sanitizable Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {343--355}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_28}, doi = {10.1007/11927587\_28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KlonowskiL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KonidalaK06, author = {Divyan M. Konidala and Kwangjo Kim}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Mobile {RFID} Applications and Security Challenges}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {194--205}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_17}, doi = {10.1007/11927587\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KonidalaK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KooJS06, author = {Bonwook Koo and Hwan Seok Jang and Jung Hwan Song}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {On Constructing of a 32 {\texttimes}32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {51--64}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_7}, doi = {10.1007/11927587\_7}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KooJS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KooLRCL06, author = {Bonseok Koo and Dongwook Lee and Gwonho Ryu and Taejoo Chang and Sangjin Lee}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {High-Speed {RSA} Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {81--93}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_9}, doi = {10.1007/11927587\_9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KooLRCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeKPY06, author = {Younho Lee and Heeyoul Kim and Yongsu Park and Hyunsoo Yoon}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {A New Proxy Signature Scheme Providing Self-delegation}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {328--342}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_27}, doi = {10.1007/11927587\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeKPY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiaoYK06, author = {Chen{-}Yin Liao and Jen{-}Wei Yeh and Ming{-}Seng Kao}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {A Copy Protection Technique Using Multi-level Error Coding}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {222--232}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_19}, doi = {10.1007/11927587\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiaoYK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelPR06, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Improved Collision Attack on the Hash Function Proposed at PKC'98}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {8--21}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_3}, doi = {10.1007/11927587\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelPR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MullerP06, author = {Fr{\'{e}}d{\'{e}}ric Muller and Thomas Peyrin}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Cryptanalysis of T-Function-Based Hash Functions}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {267--285}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_23}, doi = {10.1007/11927587\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MullerP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ParkWLC06, author = {Kang Ryoung Park and Min Cheol Whang and Joa Sang Lim and Yongjoo Cho}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical {SVM}}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {246--256}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_21}, doi = {10.1007/11927587\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ParkWLC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengNDD06, author = {Kun Peng and Juan Manuel Gonz{\'{a}}lez Nieto and Yvo Desmedt and Ed Dawson}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Klein Bottle Routing: An Alternative to Onion Routing and Mix Network}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {296--309}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_25}, doi = {10.1007/11927587\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengNDD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Sarkar06, author = {Palash Sarkar}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Generic Attacks on Symmetric Ciphers}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {7}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_2}, doi = {10.1007/11927587\_2}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Sarkar06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Shpilrain06, author = {Vladimir Shpilrain}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Hashing with Polynomials}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {22--28}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_4}, doi = {10.1007/11927587\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Shpilrain06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SuzukiTKT06, author = {Kazuhiro Suzuki and Dongvu Tonien and Kaoru Kurosawa and Koji Toyota}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Birthday Paradox for Multi-collisions}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {29--40}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_5}, doi = {10.1007/11927587\_5}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SuzukiTKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Vaudenay06, author = {Serge Vaudenay}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {{RFID} Privacy Based on Public-Key Cryptography}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {1--6}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_1}, doi = {10.1007/11927587\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Vaudenay06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YangPY06, author = {Sangwoon Yang and Jinsub Park and Younggap You}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {The Smallest {ARIA} Module with 16-Bit Architecture}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {107--117}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_11}, doi = {10.1007/11927587\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YangPY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangHLS06, author = {Zonghua Zhang and Pin{-}Han Ho and Xiaodong Lin and Hong Shen}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Janus: {A} Two-Sided Analytical Model for Multi-Stage Coordinated Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {136--154}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_13}, doi = {10.1007/11927587\_13}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ZhangHLS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangHS06, author = {Hong Zhang and Yeping He and Zhiguo Shi}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Spatial Context in Role-Based Access Control}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {166--178}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_15}, doi = {10.1007/11927587\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ZhangHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangPZ06, author = {Xian{-}Mo Zhang and Josef Pieprzyk and Yuliang Zheng}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {On Algebraic Immunity and Annihilators}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {65--80}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_8}, doi = {10.1007/11927587\_8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ZhangPZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2006, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587}, doi = {10.1007/11927587}, isbn = {3-540-49112-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.