Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cisc/inscrypt2008.bht:"
@proceedings{DBLP:conf/cisc/2008, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79499-8}, doi = {10.1007/978-3-540-79499-8}, isbn = {978-3-540-79498-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Al-HinaiBC08, author = {Sultan Al{-}Hinai and Lynn Margaret Batten and Bernard D. Colbert}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {201--215}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_17}, doi = {10.1007/978-3-540-79499-8\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Al-HinaiBC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Bogdanov08, author = {Andrey Bogdanov}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Linear Slide Attacks on the KeeLoq Block Cipher}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {66--80}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_7}, doi = {10.1007/978-3-540-79499-8\_7}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Bogdanov08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChalkiasHHSA08, author = {Konstantinos Chalkias and Spyros T. Halkidis and Dimitrios Hristu{-}Varsakelis and George Stephanides and Anastasios Alexiadis}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {A Provably Secure One-Pass Two-Party Key Establishment Protocol}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {108--122}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_10}, doi = {10.1007/978-3-540-79499-8\_10}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ChalkiasHHSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChangCL08, author = {Chin{-}Chen Chang and Yi{-}Fang Cheng and Iuon{-}Chang Lin}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Security Enhancement of a Flexible Payment Scheme and Its Role-Based Access Control}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {457--462}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_35}, doi = {10.1007/978-3-540-79499-8\_35}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ChangCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenJ08, author = {Shiwei Chen and Chenhui Jin}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {An Improved Collision Attack on {MD5} Algorithm}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {343--357}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_27}, doi = {10.1007/978-3-540-79499-8\_27}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChenZX08, author = {Zhixiong Chen and Ning Zhang and Guozhen Xiao}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {231--245}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_19}, doi = {10.1007/978-3-540-79499-8\_19}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChenZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChengWM08, author = {Feng Cheng and Christian Wolter and Christoph Meinel}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {A Simple, Smart and Extensible Framework for Network Security Measurement}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {517--531}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_41}, doi = {10.1007/978-3-540-79499-8\_41}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChengWM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CichonK08, author = {Jacek Cichon and Miroslaw Kutylowski}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Anonymity and k-Choice Identities}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {283--297}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_23}, doi = {10.1007/978-3-540-79499-8\_23}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/CichonK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/CollardSQ08, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {51--65}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_6}, doi = {10.1007/978-3-540-79499-8\_6}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/CollardSQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DengL08, author = {Yi Deng and Dongdai Lin}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model under Standard Assumption}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {123--137}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_11}, doi = {10.1007/978-3-540-79499-8\_11}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/DengL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DingG08, author = {Ning Ding and Dawu Gu}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {153--166}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_13}, doi = {10.1007/978-3-540-79499-8\_13}, timestamp = {Tue, 24 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/DingG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DingY08, author = {Jintai Ding and Bo{-}Yin Yang}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Multivariates Polynomials for Hashing}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {358--371}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_28}, doi = {10.1007/978-3-540-79499-8\_28}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DingY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DongPW08, author = {Jun{-}Wu Dong and Dingyi Pei and Xueli Wang}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {A Key Predistribution Scheme Based on 3-Designs}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {81--92}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_8}, doi = {10.1007/978-3-540-79499-8\_8}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/DongPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/DuboisFSS08, author = {Vivien Dubois and Pierre{-}Alain Fouque and Adi Shamir and Jacques Stern}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Cryptanalysis of the {SFLASH} Signature Scheme}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {1--4}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_1}, doi = {10.1007/978-3-540-79499-8\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/DuboisFSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GuZ08, author = {Chunxiang Gu and Yuefei Zhu}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {An Efficient ID-Based Proxy Signature Scheme from Pairings}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {40--50}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_5}, doi = {10.1007/978-3-540-79499-8\_5}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GuZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GuZP08, author = {Chunxiang Gu and Yuefei Zhu and Heng Pan}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Efficient Public Key Encryption with Keyword Search Schemes from Pairings}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {372--383}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_29}, doi = {10.1007/978-3-540-79499-8\_29}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GuZP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/GuoMCX08, author = {Fuchun Guo and Yi Mu and Zhide Chen and Li Xu}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Multi-Identity Single-Key Decryption without Random Oracles}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {384--398}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_30}, doi = {10.1007/978-3-540-79499-8\_30}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/GuoMCX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Jiang08, author = {Shaoquan Jiang}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Deniable Authentication on the Internet}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {298--312}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_24}, doi = {10.1007/978-3-540-79499-8\_24}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Jiang08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/JiangDH08, author = {Xin Jiang and Jintai Ding and Lei Hu}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Kipnis-Shamir Attack on {HFE} Revisited}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {399--411}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_31}, doi = {10.1007/978-3-540-79499-8\_31}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/JiangDH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KolokotronisLK08, author = {Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Improved Bounds on the Linear Complexity of Keystreams Obtained by Filter Generators}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {246--255}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_20}, doi = {10.1007/978-3-540-79499-8\_20}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/KolokotronisLK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MaC08, author = {Chuangui Ma and Rui Cheng}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {182--191}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_15}, doi = {10.1007/978-3-540-79499-8\_15}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MaC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MouffronRZ08, author = {Marc Mouffron and Frederic Rousseau and Huafei Zhu}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {138--152}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_12}, doi = {10.1007/978-3-540-79499-8\_12}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MouffronRZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/QuL08, author = {Longjiang Qu and Chao Li}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {271--282}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_22}, doi = {10.1007/978-3-540-79499-8\_22}, timestamp = {Tue, 12 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/QuL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/SattarM08, author = {Fouz Sattar and Muid Mufti}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {On Modeling Post Decryption Error Processes in {UMTS} Air Interface}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {507--516}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_40}, doi = {10.1007/978-3-540-79499-8\_40}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/SattarM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TartaryPW08, author = {Christophe Tartary and Josef Pieprzyk and Huaxiong Wang}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {167--181}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_14}, doi = {10.1007/978-3-540-79499-8\_14}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TartaryPW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TianL08, author = {Junfeng Tian and Ning Li}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {A New Proactive Defense Model Based on Intrusion Deception and Traceback}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {497--506}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_39}, doi = {10.1007/978-3-540-79499-8\_39}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TianL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/TsoOO08, author = {Raylin Tso and Takeshi Okamoto and Eiji Okamoto}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {11--24}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_3}, doi = {10.1007/978-3-540-79499-8\_3}, timestamp = {Fri, 02 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/TsoOO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangHL08, author = {Weijia Wang and Lei Hu and Yong Li}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Provably Secure N-Party Authenticated Key Exchange in the Multicast {DPWA} Setting}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {93--107}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_9}, doi = {10.1007/978-3-540-79499-8\_9}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangLY08, author = {Daoshun Wang and Xiaobo Li and Feng Yi}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Probabilistic (n, n) Visual Secret Sharing Scheme for Grayscale Images}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {192--200}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_16}, doi = {10.1007/978-3-540-79499-8\_16}, timestamp = {Wed, 31 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WangLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangQ08, author = {Jin{-}Song Wang and Wen{-}Feng Qi}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Four Families of Binary Sequences with Low Correlation and Large Linear Complexity}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {216--230}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_18}, doi = {10.1007/978-3-540-79499-8\_18}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WangQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WangQ08a, author = {Jin{-}Song Wang and Wen{-}Feng Qi}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Linear Equation on Polynomial Single Cycle T-Functions}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {256--270}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_21}, doi = {10.1007/978-3-540-79499-8\_21}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/WangQ08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuBDMR08, author = {Yongdong Wu and Feng Bao and Robert H. Deng and Marc Mouffron and Frederic Rousseau}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled {DRM}}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {472--481}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_37}, doi = {10.1007/978-3-540-79499-8\_37}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WuBDMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WuMSH08, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {25--39}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_4}, doi = {10.1007/978-3-540-79499-8\_4}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WuMSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/XiangL08, author = {Yang Xiang and Qiang Li}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Online Tracing Scanning Worm with Sliding Window}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {482--496}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_38}, doi = {10.1007/978-3-540-79499-8\_38}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/XiangL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YoungY08, author = {Adam L. Young and Moti Yung}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {A Timing-Resistant Elliptic Curve Backdoor in {RSA}}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {427--441}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_33}, doi = {10.1007/978-3-540-79499-8\_33}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YoungY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/Yung08, author = {Moti Yung}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {On the Evolution of User Authentication: Non-bilateral Factors}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {5--10}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_2}, doi = {10.1007/978-3-540-79499-8\_2}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/Yung08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhanZY08, author = {Jing Zhan and Huanguo Zhang and Fei Yan}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Building Trusted Sub-domain for the Grid with Trusted Computing}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {463--471}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_36}, doi = {10.1007/978-3-540-79499-8\_36}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhanZY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangHI08, author = {Rui Zhang and Goichiro Hanaoka and Hideki Imai}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Orthogonality between Key Privacy and Data Privacy, Revisited}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {313--327}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_25}, doi = {10.1007/978-3-540-79499-8\_25}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangHI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhaoDKZLF08, author = {Bin Zhao and Lanjun Dang and Weidong Kou and Jun Zhang and Zan Li and Kai Fan}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {A Watermarking Scheme in the Encrypted Domain for Watermarking Protocol}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {442--456}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_34}, doi = {10.1007/978-3-540-79499-8\_34}, timestamp = {Sun, 12 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhaoDKZLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhouL08, author = {Sujing Zhou and Dongdai Lin}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Unlinkable Randomizable Signature and Its Application in Group Signature}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {328--342}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_26}, doi = {10.1007/978-3-540-79499-8\_26}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhouL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhouLWD08, author = {Haijian Zhou and Ping Luo and Daoshun Wang and Yiqi Dai}, editor = {Dingyi Pei and Moti Yung and Dongdai Lin and Chuankun Wu}, title = {Cryptanalysis of General Lu-Lee Type Systems}, booktitle = {Information Security and Cryptology, Third {SKLOIS} Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4990}, pages = {412--426}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-79499-8\_32}, doi = {10.1007/978-3-540-79499-8\_32}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhouLWD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.