default search action
5. ICICS 2003: Huhehaote, China
- Sihan Qing, Dieter Gollmann, Jianying Zhou:
Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings. Lecture Notes in Computer Science 2836, Springer 2003, ISBN 3-540-20150-5 - Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa:
A Fast Square Root Computation Using the Frobenius Mapping. 1-10 - Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim:
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. 11-21 - Yan Wang, Chi-Hung Chi, Tieyan Li:
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents. 22-33 - Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei:
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. 34-46 - Ricardo Nabhen, Edgard Jamhour, Carlos Maziero:
A Policy Based Framework for Access Control. 47-59 - Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine:
Trading-Off Type-Inference Memory Complexity against Communication. 60-71 - Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Remarks on a Group Signature Scheme with Member Deletion. 72-83 - Hongjun Wu, Feng Bao, Robert H. Deng:
An Efficient Known Plaintext Attack on FEA-M. 84-87 - Jianying Zhou, Feng Bao, Robert H. Deng:
An Efficient Public-Key Framework. 88-99 - Jong-Phil Yang, Chul Sur, Kyung Hyune Rhee:
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature. 100-111 - Jose Antonio Onieva, Jianying Zhou, Javier López:
Practical Service Charge for P2P Content Distribution. 112-123 - Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma:
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. 124-135 - Yongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu:
A Lattice Based General Blind Watermark Scheme. 136-144 - Gregory Saunders, Michael Hitchens, Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix. 145-157 - Miodrag J. Mihaljevic:
Broadcast Encryption Schemes Based on the Sectioned Key Tree. 158-169 - Gang Li, Jie Yang:
Research on the Collusion Estimation. 170-178 - Mohsen Ashourian, Yo-Sung Ho:
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains. 179-190 - Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné:
Protocols for Malicious Host Revocation. 191-201 - Pat Pik-Wah Chan, Michael R. Lyu:
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code. 202-213 - Tieyan Li, Huafei Zhu, Kwok-Yan Lam:
A Novel Two-Level Trust Model for Grid. 214-225 - Qianhong Wu, Jianhong Zhang, Yumin Wang:
Practical t-out-n Oblivious Transfer and Its Applications. 226-237 - Yongdong Wu, Robert H. Deng:
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. 238-248 - Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim:
ID-Based Distributed "Magic Ink" Signature from Pairings. 249-259 - Yan Wang, Shuwang Lü, Zhenhua Liu:
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature. 260-268 - Yang Cui, Kazukuni Kobara, Hideki Imai:
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. 269-279 - Xiaodong Yi, Xuejun Yang:
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems. 280-291 - Jianhong Zhang, Qianhong Wu, Yumin Wang:
A Novel Efficient Group Signature Scheme with Forward Security. 292-300 - Feng Bao, Robert H. Deng, Huafei Zhu:
Variations of Diffie-Hellman Problem. 301-312 - Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. 313-324 - Min Luo, Lina Wang, Huanguo Zhang, Jin Chen:
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. 325-336 - Zhen Xu, Dengguo Feng, Lan Li, Hua Chen:
UC-RBAC: A Usage Constrained Role-Based Access Control Model. 337-347 - Mathieu Ciet, Marc Joye:
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. 348-359 - Xiaoqiang Li, Xiangyang Xue, Wei Li:
An Optimized Multi-bits Blind Watermarking Scheme. 360-369 - Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han:
A Compound Intrusion Detection Model. 370-381 - Hui-Feng Huang, Chin-Chen Chang:
An Efficient Convertible Authenticated Encryption Scheme and Its Variant. 382-392 - Meng Zhang, Jiubin Ju:
Space-Economical Reassembly for Intrusion Detection System. 393-404 - J. Krishna Murthy:
A Functional Decomposition of Virus and Worm Programs. 405-414
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.