Search dblp for Publications

export results for "toc:db/conf/icics/icics2002.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icics/BiryukovNPV02,
  author       = {Alex Biryukov and
                  Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {New Weak-Key Classes of {IDEA}},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {315--326},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_27},
  doi          = {10.1007/3-540-36159-6\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/BiryukovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ByunJLP02,
  author       = {Jin Wook Byun and
                  Ik Rae Jeong and
                  Dong Hoon Lee and
                  Chang{-}Seop Park},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Password-Authenticated Key Exchange between Clients with Different
                  Passwords},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {134--146},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_12},
  doi          = {10.1007/3-540-36159-6\_12},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/ByunJLP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CareyCM02,
  author       = {Nathan Carey and
                  Andrew J. Clark and
                  George M. Mohay},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {{IDS} Interoperability and Correlation Using {IDMEF} and Commodity
                  Systems},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {252--264},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_22},
  doi          = {10.1007/3-540-36159-6\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/CareyCM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChengW02,
  author       = {Jeff S. L. Cheng and
                  Victor K. Wei},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Defenses against the Truncation of Computation Results of Free-Roaming
                  Agents},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_1},
  doi          = {10.1007/3-540-36159-6\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChengW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ChuT02,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Distributed Key Generation as a Component of an Integrated Protocol},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {411--421},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_35},
  doi          = {10.1007/3-540-36159-6\_35},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ChuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DasM02,
  author       = {Tanmoy Kanti Das and
                  Subhamoy Maitra},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Robust Block Oriented Watermarking Scheme in Spatial Domain},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {184--196},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_16},
  doi          = {10.1007/3-540-36159-6\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/DasM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Filiol02,
  author       = {Eric Filiol},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A New Statistical Testing for Symmetric Ciphers and Hash Functions},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {342--353},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_29},
  doi          = {10.1007/3-540-36159-6\_29},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Filiol02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/FuruyaS02,
  author       = {Soichi Furuya and
                  Kouichi Sakurai},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Risks with Raw-Key Masking - The Security Evaluation of 2-Key {XCBC}},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {327--341},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_28},
  doi          = {10.1007/3-540-36159-6\_28},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/FuruyaS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/HanaokaHSI02,
  author       = {Yumiko Hanaoka and
                  Goichiro Hanaoka and
                  Junji Shikata and
                  Hideki Imai},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds
                  and Constructions},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {85--96},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_8},
  doi          = {10.1007/3-540-36159-6\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/HanaokaHSI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/IshiharaAF02,
  author       = {Yasunori Ishihara and
                  Shuichiro Ako and
                  Toru Fujiwara},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Security against Inference Attacks on Negative Information in Object-Oriented
                  Databases},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {49--60},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_5},
  doi          = {10.1007/3-540-36159-6\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/IshiharaAF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/IzuT02,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Fast Elliptic Curve Multiplications with {SIMD} Operations},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {217--230},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_19},
  doi          = {10.1007/3-540-36159-6\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/IzuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/JinXHL02,
  author       = {Hai Jin and
                  Feng Xian and
                  Zongfen Han and
                  Shengli Li},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Distributed Dynamic {\(\mathrm{\mu}\)}Firewall Architecture with
                  Mobile Agents and KeyNote Trust Management System},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_2},
  doi          = {10.1007/3-540-36159-6\_2},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/JinXHL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KholoshaT02,
  author       = {Alexander Kholosha and
                  Henk C. A. van Tilborg},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic
                  Properties},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {434--446},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_37},
  doi          = {10.1007/3-540-36159-6\_37},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KholoshaT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KimKK02,
  author       = {Myungsun Kim and
                  Jongseong Kim and
                  Kwangjo Kim},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman
                  Assumption},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_9},
  doi          = {10.1007/3-540-36159-6\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KimKK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KohYCKK02,
  author       = {Jong{-}Young Koh and
                  Mi Ra Yi and
                  Tae Ho Cho and
                  Hyung{-}Jong Kim and
                  Hong{-}Geun Kim},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Knowledge-Based Modeling and Simulation of Network Access Control
                  Mechanisms Representing Security Policies},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {374--385},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_32},
  doi          = {10.1007/3-540-36159-6\_32},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KohYCKK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KuninobuTTNS02,
  author       = {Shigeta Kuninobu and
                  Yoshiaki Takata and
                  Daigo Taguchi and
                  Masayuki Nakae and
                  Hiroyuki Seki},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Specification Language for Distributed Policy Control},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {386--398},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_33},
  doi          = {10.1007/3-540-36159-6\_33},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KuninobuTTNS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KuznetsovSS02,
  author       = {Vadim Kuznetsov and
                  Helena Sandstr{\"{o}}m and
                  Andrei Simkin},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {An Evaluation of Different {IP} Traceback Approaches},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {37--48},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_4},
  doi          = {10.1007/3-540-36159-6\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KuznetsovSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Kwon02,
  author       = {Soonhak Kwon},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Low Complexity Bit Serial Systolic Multipliers over GF(2\({}^{\mbox{m}}\))
                  for Three Classes of Finite Fields},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {209--216},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_18},
  doi          = {10.1007/3-540-36159-6\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Kwon02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LamGV02,
  author       = {Charles C. Y. Lam and
                  Guang Gong and
                  Scott A. Vanstone},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Message Authentication Codes with Error Correcting Capabilities},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {354--366},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_30},
  doi          = {10.1007/3-540-36159-6\_30},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LamGV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LeeHLLYL02,
  author       = {Changhoon Lee and
                  Deukjo Hong and
                  Sungjae Lee and
                  Sangjin Lee and
                  Hyungjin Yang and
                  Jongin Lim},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Chosen Plaintext Linear Attack on Block Cipher {CIKS-1}},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {456--468},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_39},
  doi          = {10.1007/3-540-36159-6\_39},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LeeHLLYL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiWG02,
  author       = {Shoupeng Li and
                  Shizhong Wu and
                  Tao Guo},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {The Consistency of an Access Control List},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {367--373},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_31},
  doi          = {10.1007/3-540-36159-6\_31},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiWG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LopezMPTV02,
  author       = {Javier L{\'{o}}pez and
                  Antonio Mana and
                  Ernesto Pimentel and
                  Jos{\'{e}} M. Troya and
                  Mariemma Inmaculada Yag{\"{u}}e del Valle},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Access Control Infrastructure for Digital Objects},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {399--410},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_34},
  doi          = {10.1007/3-540-36159-6\_34},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LopezMPTV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LundinKJ02,
  author       = {Emilie Lundin and
                  H{\aa}kan Kvarnstr{\"{o}}m and
                  Erland Jonsson},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Synthetic Fraud Data Generation Methodology},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {265--277},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_23},
  doi          = {10.1007/3-540-36159-6\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LundinKJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Matsushita02,
  author       = {Tatsuyuki Matsushita},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box
                  Tracing},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {197--208},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_17},
  doi          = {10.1007/3-540-36159-6\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Matsushita02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MiyajiN02,
  author       = {Atsuko Miyaji and
                  Masao Nonaka},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Cryptanalysis of the Reduced-Round {RC6}},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {480--494},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_41},
  doi          = {10.1007/3-540-36159-6\_41},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/MiyajiN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MolinaA02,
  author       = {Jesus Molina and
                  William A. Arbaugh},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Using Independent Auditors as Intrusion Detection Systems},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {291--302},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_25},
  doi          = {10.1007/3-540-36159-6\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/MolinaA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NaccacheTTT02,
  author       = {David Naccache and
                  Alexei Tchoulkine and
                  Christophe Tymen and
                  Elena Trichina},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Reducing the Memory Complexity of Type-Inference Algorithms},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {109--121},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_10},
  doi          = {10.1007/3-540-36159-6\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/NaccacheTTT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NakanishiTS02,
  author       = {Toru Nakanishi and
                  Masayuki Tao and
                  Yuji Sugiyama},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Group Signature Scheme Committing the Group},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {73--84},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_7},
  doi          = {10.1007/3-540-36159-6\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/NakanishiTS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PangTWR02,
  author       = {Xiaolin Pang and
                  Kian{-}Lee Tan and
                  Yan Wang and
                  Jian Ren},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Secure Agent-Mediated Payment Protocol},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {422--433},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_36},
  doi          = {10.1007/3-540-36159-6\_36},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PangTWR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PengBDV02,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapali Viswanathan},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {147--159},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_13},
  doi          = {10.1007/3-540-36159-6\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PengBDV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PieprzykZ02,
  author       = {Josef Pieprzyk and
                  Xian{-}Mo Zhang},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Ideal Threshold Schemes from Orthogonal Arrays},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {469--479},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_40},
  doi          = {10.1007/3-540-36159-6\_40},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/PieprzykZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/PyoL02,
  author       = {Changwoo Pyo and
                  Gyungho Lee},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Encoding Function Pointers and Memory Arrangement Checking against
                  Buffer Overflow Attack},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {25--36},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_3},
  doi          = {10.1007/3-540-36159-6\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/PyoL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/SenSCGC02,
  author       = {Subhayan Sen and
                  Chandrama Shaw and
                  Dipanwita Roy Chowdhury and
                  Niloy Ganguly and
                  Parimal Pal Chaudhuri},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Cellular Automata Based Cryptosystem {(CAC)}},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {303--314},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_26},
  doi          = {10.1007/3-540-36159-6\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/SenSCGC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Shim02,
  author       = {Kyungah Shim},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {The Risks of Compromising Secret Information},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_11},
  doi          = {10.1007/3-540-36159-6\_11},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Shim02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TzengT02,
  author       = {Wen{-}Guey Tzeng and
                  Zhi{-}Jia Tzeng},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Robust Key-Evolving Public Key Encryption Schemes},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {61--72},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_6},
  doi          = {10.1007/3-540-36159-6\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TzengT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/VaaralaNV02,
  author       = {Sami Vaarala and
                  Antti Nuopponen and
                  Teemupekka Virtanen},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Attacking Predictable IPsec {ESP} Initialization Vectors},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_14},
  doi          = {10.1007/3-540-36159-6\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/VaaralaNV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/VenkateswarluM02,
  author       = {Ayineedi Venkateswarlu and
                  Subhamoy Maitra},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Further Results on Multiples of Primitive Polynomials and Their Products
                  over {GF(2)}},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {231--242},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_20},
  doi          = {10.1007/3-540-36159-6\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/VenkateswarluM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WatanabeK02,
  author       = {Hajime Watanabe and
                  Takashi Kitagawa},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {An {ID} Coding Scheme for Fingerprinting, Randomized c-Secure {CRT}
                  Code},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {173--183},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_15},
  doi          = {10.1007/3-540-36159-6\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WatanabeK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Wu02,
  author       = {Hongjun Wu},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Related-Cipher Attacks},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {447--455},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_38},
  doi          = {10.1007/3-540-36159-6\_38},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Wu02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Yee02,
  author       = {Ka{-}Ping Yee},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {User Interaction Design for Secure Systems},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {278--290},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_24},
  doi          = {10.1007/3-540-36159-6\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Yee02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ZhangVM02,
  author       = {Junqi Zhang and
                  Vijay Varadharajan and
                  Yi Mu},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {A Secure Object Sharing Scheme for Java Card},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {243--251},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_21},
  doi          = {10.1007/3-540-36159-6\_21},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ZhangVM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2002,
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6},
  doi          = {10.1007/3-540-36159-6},
  isbn         = {3-540-00164-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics