Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2006.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icisc/ChangKLLH06,
  author       = {Ku{-}Young Chang and
                  Ju{-}Sung Kang and
                  Mun{-}Kyu Lee and
                  Hangrok Lee and
                  Dowon Hong},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {New Variant of the Self-Shrinking Generator and Its Cryptographic
                  Properties},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {41--50},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_6},
  doi          = {10.1007/11927587\_6},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChangKLLH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChangWY06,
  author       = {Junsheng Chang and
                  Huaimin Wang and
                  Gang Yin},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {A Time-Frame Based Trust Model for {P2P} Systems},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {155--165},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_14},
  doi          = {10.1007/11927587\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChangWY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChatterjeeS06,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {New Constructions of Constant Size Ciphertext {HIBE} Without Random
                  Oracle},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {310--327},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_26},
  doi          = {10.1007/11927587\_26},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChatterjeeS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChoPSY06,
  author       = {Hong{-}Su Cho and
                  Sangwoo Park and
                  Soo Hak Sung and
                  Aaram Yun},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Collision Search Attack for 53-Step {HAS-160}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {286--295},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_24},
  doi          = {10.1007/11927587\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChoPSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChoiCS06,
  author       = {Jongoh Choi and
                  Si{-}Ho Cha and
                  JooSeok Song},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc
                  Networks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_16},
  doi          = {10.1007/11927587\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChoiCS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChoiPKSKCMR06,
  author       = {Yoon{-}Ho Choi and
                  Jong{-}Ho Park and
                  Sang{-}Kon Kim and
                  Seung{-}Woo Seo and
                  Yu Kang and
                  Jin Gi Choe and
                  Ho{-}Kun Moon and
                  Myung{-}Soo Rhee},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {An Efficient Forensic Evidence Collection Scheme of Host Infringement
                  at the Occurrence Time},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {206--221},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_18},
  doi          = {10.1007/11927587\_18},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChoiPKSKCMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GeiselmannJKPS06,
  author       = {Willi Geiselmann and
                  Fabian Januszewski and
                  Hubert K{\"{o}}pfer and
                  Jan Pelzl and
                  Rainer Steinwandt},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {A Simpler Sieving Device: Combining {ECM} and {TWIRL}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {118--135},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_12},
  doi          = {10.1007/11927587\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GeiselmannJKPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JoscakT06,
  author       = {Daniel Josc{\'{a}}k and
                  Jir{\'{\i}} Tuma},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements
                  of the Merkle-Damg{\aa}rd Construction},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {257--266},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_22},
  doi          = {10.1007/11927587\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/JoscakT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KatouWNM06,
  author       = {Hidehiro Katou and
                  Feng Wang and
                  Yasuyuki Nogami and
                  Yoshitaka Morikawa},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {A High-Speed Square Root Algorithm in Extension Fields},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {94--106},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_10},
  doi          = {10.1007/11927587\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KatouWNM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimLCYLJ06,
  author       = {Heeyoul Kim and
                  Younho Lee and
                  Byungchun Chung and
                  Hyunsoo Yoon and
                  Jaewon Lee and
                  KyungIm Jung},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Digital Rights Management with Right Delegation for Home Networks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {233--245},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_20},
  doi          = {10.1007/11927587\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimLCYLJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KlonowskiL06,
  author       = {Marek Klonowski and
                  Anna Lauks},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Extended Sanitizable Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {343--355},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_28},
  doi          = {10.1007/11927587\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KlonowskiL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KonidalaK06,
  author       = {Divyan M. Konidala and
                  Kwangjo Kim},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Mobile {RFID} Applications and Security Challenges},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {194--205},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_17},
  doi          = {10.1007/11927587\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KonidalaK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KooJS06,
  author       = {Bonwook Koo and
                  Hwan Seok Jang and
                  Jung Hwan Song},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {On Constructing of a 32 {\texttimes}32 Binary Matrix as a Diffusion
                  Layer for a 256-Bit Block Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_7},
  doi          = {10.1007/11927587\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KooJS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KooLRCL06,
  author       = {Bonseok Koo and
                  Dongwook Lee and
                  Gwonho Ryu and
                  Taejoo Chang and
                  Sangjin Lee},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {High-Speed {RSA} Crypto-processor with Radix-4 Modular Multiplication
                  and Chinese Remainder Theorem},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {81--93},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_9},
  doi          = {10.1007/11927587\_9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KooLRCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeKPY06,
  author       = {Younho Lee and
                  Heeyoul Kim and
                  Yongsu Park and
                  Hyunsoo Yoon},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {A New Proxy Signature Scheme Providing Self-delegation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {328--342},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_27},
  doi          = {10.1007/11927587\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeKPY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiaoYK06,
  author       = {Chen{-}Yin Liao and
                  Jen{-}Wei Yeh and
                  Ming{-}Seng Kao},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {A Copy Protection Technique Using Multi-level Error Coding},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {222--232},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_19},
  doi          = {10.1007/11927587\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiaoYK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelPR06,
  author       = {Florian Mendel and
                  Norbert Pramstaller and
                  Christian Rechberger},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Improved Collision Attack on the Hash Function Proposed at PKC'98},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {8--21},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_3},
  doi          = {10.1007/11927587\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelPR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MullerP06,
  author       = {Fr{\'{e}}d{\'{e}}ric Muller and
                  Thomas Peyrin},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Cryptanalysis of T-Function-Based Hash Functions},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {267--285},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_23},
  doi          = {10.1007/11927587\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MullerP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ParkWLC06,
  author       = {Kang Ryoung Park and
                  Min Cheol Whang and
                  Joa Sang Lim and
                  Yongjoo Cho},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical
                  {SVM}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {246--256},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_21},
  doi          = {10.1007/11927587\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ParkWLC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengNDD06,
  author       = {Kun Peng and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Yvo Desmedt and
                  Ed Dawson},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Klein Bottle Routing: An Alternative to Onion Routing and Mix Network},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {296--309},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_25},
  doi          = {10.1007/11927587\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengNDD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Sarkar06,
  author       = {Palash Sarkar},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Generic Attacks on Symmetric Ciphers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {7},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_2},
  doi          = {10.1007/11927587\_2},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Sarkar06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Shpilrain06,
  author       = {Vladimir Shpilrain},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Hashing with Polynomials},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {22--28},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_4},
  doi          = {10.1007/11927587\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Shpilrain06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SuzukiTKT06,
  author       = {Kazuhiro Suzuki and
                  Dongvu Tonien and
                  Kaoru Kurosawa and
                  Koji Toyota},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Birthday Paradox for Multi-collisions},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {29--40},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_5},
  doi          = {10.1007/11927587\_5},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SuzukiTKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Vaudenay06,
  author       = {Serge Vaudenay},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {{RFID} Privacy Based on Public-Key Cryptography},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {1--6},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_1},
  doi          = {10.1007/11927587\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Vaudenay06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YangPY06,
  author       = {Sangwoon Yang and
                  Jinsub Park and
                  Younggap You},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {The Smallest {ARIA} Module with 16-Bit Architecture},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_11},
  doi          = {10.1007/11927587\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YangPY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangHLS06,
  author       = {Zonghua Zhang and
                  Pin{-}Han Ho and
                  Xiaodong Lin and
                  Hong Shen},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Janus: {A} Two-Sided Analytical Model for Multi-Stage Coordinated
                  Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {136--154},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_13},
  doi          = {10.1007/11927587\_13},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangHLS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangHS06,
  author       = {Hong Zhang and
                  Yeping He and
                  Zhiguo Shi},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Spatial Context in Role-Based Access Control},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {166--178},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_15},
  doi          = {10.1007/11927587\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangPZ06,
  author       = {Xian{-}Mo Zhang and
                  Josef Pieprzyk and
                  Yuliang Zheng},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {On Algebraic Immunity and Annihilators},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_8},
  doi          = {10.1007/11927587\_8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangPZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2006,
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587},
  doi          = {10.1007/11927587},
  isbn         = {3-540-49112-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics