![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/icics/icics2002.bht:"
@inproceedings{DBLP:conf/icics/BiryukovNPV02, author = {Alex Biryukov and Jorge Nakahara Jr. and Bart Preneel and Joos Vandewalle}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {New Weak-Key Classes of {IDEA}}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {315--326}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_27}, doi = {10.1007/3-540-36159-6\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/BiryukovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ByunJLP02, author = {Jin Wook Byun and Ik Rae Jeong and Dong Hoon Lee and Chang{-}Seop Park}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Password-Authenticated Key Exchange between Clients with Different Passwords}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {134--146}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_12}, doi = {10.1007/3-540-36159-6\_12}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/ByunJLP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CareyCM02, author = {Nathan Carey and Andrew J. Clark and George M. Mohay}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {{IDS} Interoperability and Correlation Using {IDMEF} and Commodity Systems}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {252--264}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_22}, doi = {10.1007/3-540-36159-6\_22}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/CareyCM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChengW02, author = {Jeff S. L. Cheng and Victor K. Wei}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Defenses against the Truncation of Computation Results of Free-Roaming Agents}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {1--12}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_1}, doi = {10.1007/3-540-36159-6\_1}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChengW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ChuT02, author = {Cheng{-}Kang Chu and Wen{-}Guey Tzeng}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Distributed Key Generation as a Component of an Integrated Protocol}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {411--421}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_35}, doi = {10.1007/3-540-36159-6\_35}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ChuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DasM02, author = {Tanmoy Kanti Das and Subhamoy Maitra}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Robust Block Oriented Watermarking Scheme in Spatial Domain}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {184--196}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_16}, doi = {10.1007/3-540-36159-6\_16}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/DasM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Filiol02, author = {Eric Filiol}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A New Statistical Testing for Symmetric Ciphers and Hash Functions}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {342--353}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_29}, doi = {10.1007/3-540-36159-6\_29}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Filiol02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/FuruyaS02, author = {Soichi Furuya and Kouichi Sakurai}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Risks with Raw-Key Masking - The Security Evaluation of 2-Key {XCBC}}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {327--341}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_28}, doi = {10.1007/3-540-36159-6\_28}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/FuruyaS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/HanaokaHSI02, author = {Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {85--96}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_8}, doi = {10.1007/3-540-36159-6\_8}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/HanaokaHSI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/IshiharaAF02, author = {Yasunori Ishihara and Shuichiro Ako and Toru Fujiwara}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Security against Inference Attacks on Negative Information in Object-Oriented Databases}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {49--60}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_5}, doi = {10.1007/3-540-36159-6\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/IshiharaAF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/IzuT02, author = {Tetsuya Izu and Tsuyoshi Takagi}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Fast Elliptic Curve Multiplications with {SIMD} Operations}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {217--230}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_19}, doi = {10.1007/3-540-36159-6\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/IzuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/JinXHL02, author = {Hai Jin and Feng Xian and Zongfen Han and Shengli Li}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Distributed Dynamic {\(\mathrm{\mu}\)}Firewall Architecture with Mobile Agents and KeyNote Trust Management System}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {13--24}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_2}, doi = {10.1007/3-540-36159-6\_2}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/JinXHL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KholoshaT02, author = {Alexander Kholosha and Henk C. A. van Tilborg}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {434--446}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_37}, doi = {10.1007/3-540-36159-6\_37}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KholoshaT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KimKK02, author = {Myungsun Kim and Jongseong Kim and Kwangjo Kim}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {97--108}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_9}, doi = {10.1007/3-540-36159-6\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KimKK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KohYCKK02, author = {Jong{-}Young Koh and Mi Ra Yi and Tae Ho Cho and Hyung{-}Jong Kim and Hong{-}Geun Kim}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {374--385}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_32}, doi = {10.1007/3-540-36159-6\_32}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KohYCKK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KuninobuTTNS02, author = {Shigeta Kuninobu and Yoshiaki Takata and Daigo Taguchi and Masayuki Nakae and Hiroyuki Seki}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Specification Language for Distributed Policy Control}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {386--398}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_33}, doi = {10.1007/3-540-36159-6\_33}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KuninobuTTNS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KuznetsovSS02, author = {Vadim Kuznetsov and Helena Sandstr{\"{o}}m and Andrei Simkin}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {An Evaluation of Different {IP} Traceback Approaches}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {37--48}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_4}, doi = {10.1007/3-540-36159-6\_4}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/KuznetsovSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Kwon02, author = {Soonhak Kwon}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Low Complexity Bit Serial Systolic Multipliers over GF(2\({}^{\mbox{m}}\)) for Three Classes of Finite Fields}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {209--216}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_18}, doi = {10.1007/3-540-36159-6\_18}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Kwon02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LamGV02, author = {Charles C. Y. Lam and Guang Gong and Scott A. Vanstone}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Message Authentication Codes with Error Correcting Capabilities}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {354--366}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_30}, doi = {10.1007/3-540-36159-6\_30}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LamGV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LeeHLLYL02, author = {Changhoon Lee and Deukjo Hong and Sungjae Lee and Sangjin Lee and Hyungjin Yang and Jongin Lim}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Chosen Plaintext Linear Attack on Block Cipher {CIKS-1}}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {456--468}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_39}, doi = {10.1007/3-540-36159-6\_39}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LeeHLLYL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiWG02, author = {Shoupeng Li and Shizhong Wu and Tao Guo}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {The Consistency of an Access Control List}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {367--373}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_31}, doi = {10.1007/3-540-36159-6\_31}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiWG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LopezMPTV02, author = {Javier L{\'{o}}pez and Antonio Mana and Ernesto Pimentel and Jos{\'{e}} M. Troya and Mariemma Inmaculada Yag{\"{u}}e del Valle}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Access Control Infrastructure for Digital Objects}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {399--410}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_34}, doi = {10.1007/3-540-36159-6\_34}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LopezMPTV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LundinKJ02, author = {Emilie Lundin and H{\aa}kan Kvarnstr{\"{o}}m and Erland Jonsson}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Synthetic Fraud Data Generation Methodology}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {265--277}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_23}, doi = {10.1007/3-540-36159-6\_23}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LundinKJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Matsushita02, author = {Tatsuyuki Matsushita}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {197--208}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_17}, doi = {10.1007/3-540-36159-6\_17}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Matsushita02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MiyajiN02, author = {Atsuko Miyaji and Masao Nonaka}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Cryptanalysis of the Reduced-Round {RC6}}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {480--494}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_41}, doi = {10.1007/3-540-36159-6\_41}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MiyajiN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MolinaA02, author = {Jesus Molina and William A. Arbaugh}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Using Independent Auditors as Intrusion Detection Systems}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {291--302}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_25}, doi = {10.1007/3-540-36159-6\_25}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/MolinaA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NaccacheTTT02, author = {David Naccache and Alexei Tchoulkine and Christophe Tymen and Elena Trichina}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Reducing the Memory Complexity of Type-Inference Algorithms}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {109--121}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_10}, doi = {10.1007/3-540-36159-6\_10}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/NaccacheTTT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NakanishiTS02, author = {Toru Nakanishi and Masayuki Tao and Yuji Sugiyama}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Group Signature Scheme Committing the Group}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {73--84}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_7}, doi = {10.1007/3-540-36159-6\_7}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/NakanishiTS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PangTWR02, author = {Xiaolin Pang and Kian{-}Lee Tan and Yan Wang and Jian Ren}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Secure Agent-Mediated Payment Protocol}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {422--433}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_36}, doi = {10.1007/3-540-36159-6\_36}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/PangTWR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PengBDV02, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapali Viswanathan}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {147--159}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_13}, doi = {10.1007/3-540-36159-6\_13}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/PengBDV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PieprzykZ02, author = {Josef Pieprzyk and Xian{-}Mo Zhang}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Ideal Threshold Schemes from Orthogonal Arrays}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {469--479}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_40}, doi = {10.1007/3-540-36159-6\_40}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/PieprzykZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/PyoL02, author = {Changwoo Pyo and Gyungho Lee}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {25--36}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_3}, doi = {10.1007/3-540-36159-6\_3}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/PyoL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/SenSCGC02, author = {Subhayan Sen and Chandrama Shaw and Dipanwita Roy Chowdhury and Niloy Ganguly and Parimal Pal Chaudhuri}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Cellular Automata Based Cryptosystem {(CAC)}}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {303--314}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_26}, doi = {10.1007/3-540-36159-6\_26}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/SenSCGC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Shim02, author = {Kyungah Shim}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {The Risks of Compromising Secret Information}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {122--133}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_11}, doi = {10.1007/3-540-36159-6\_11}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Shim02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TzengT02, author = {Wen{-}Guey Tzeng and Zhi{-}Jia Tzeng}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Robust Key-Evolving Public Key Encryption Schemes}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {61--72}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_6}, doi = {10.1007/3-540-36159-6\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/TzengT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/VaaralaNV02, author = {Sami Vaarala and Antti Nuopponen and Teemupekka Virtanen}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Attacking Predictable IPsec {ESP} Initialization Vectors}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {160--172}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_14}, doi = {10.1007/3-540-36159-6\_14}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/VaaralaNV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/VenkateswarluM02, author = {Ayineedi Venkateswarlu and Subhamoy Maitra}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Further Results on Multiples of Primitive Polynomials and Their Products over {GF(2)}}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {231--242}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_20}, doi = {10.1007/3-540-36159-6\_20}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/VenkateswarluM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WatanabeK02, author = {Hajime Watanabe and Takashi Kitagawa}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {An {ID} Coding Scheme for Fingerprinting, Randomized c-Secure {CRT} Code}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {173--183}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_15}, doi = {10.1007/3-540-36159-6\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/WatanabeK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Wu02, author = {Hongjun Wu}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Related-Cipher Attacks}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {447--455}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_38}, doi = {10.1007/3-540-36159-6\_38}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Wu02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Yee02, author = {Ka{-}Ping Yee}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {User Interaction Design for Secure Systems}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {278--290}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_24}, doi = {10.1007/3-540-36159-6\_24}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/Yee02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangVM02, author = {Junqi Zhang and Vijay Varadharajan and Yi Mu}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {A Secure Object Sharing Scheme for Java Card}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {243--251}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_21}, doi = {10.1007/3-540-36159-6\_21}, timestamp = {Mon, 17 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhangVM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icics/2002, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6}, doi = {10.1007/3-540-36159-6}, isbn = {3-540-00164-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.