ICICS C

57 papers

YearTitle / Authors
2001A Cyclic Window Algorithm for ECC Defined over Extension Fields.
Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi
2001A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce.
Kanta Matsuura
2001A Digital Nominative Proxy Signature Scheme for Mobile Communication.
Hee-Un Park, Im-Yeong Lee
2001A New Approach for Secure Multicast Routing in a Large Scale Network.
Young-Chul Shim
2001A New Semantics of Authentication Logic.
Yifa Li
2001A Novel Data Hiding Method for Two-Color Images.
Gang Pan, Yijun Wu, Zhaohui Wu
2001A Public Key Cryptosystem Based on the Subgroup Membership Problem.
Juan Manuel González Nieto, Colin Boyd, Ed Dawson
2001A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications.
Dianlong Zhang, Harald Lukhaub, Werner Zorn
2001A Role-Based Model for Access Control in Database Federations.
Eric Disson, Danielle Boulanger, Gilles Dubois
2001A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems.
Hee-Wan Kim, Hae-Kyung Rhee, Tai M. Chung, Young Ik Eom, Ung-Mo Kim
2001A Unified Methodology for Verification and Synthesis of Firewall Configurations.
Yongyuth Permpoontanalarp, Chaiwat Rujimethabhas
2001A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls.
Hongpei Li, Lianli Chang, Xinmei Wang
2001AMBAR Protocol: Access Management Based on Authorization Reduction.
Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta
2001An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes.
Shigeta Kuninobu, Yoshiaki Takata, Hiroyuki Seki, Katsuro Inoue
2001An Identification Scheme Provably Secure against Reset Attack.
Chan H. Lee, Xiaotie Deng, Huafei Zhu
2001An Intelligent Intruder Model for Security Protocol Analysis.
Dongxi Liu, Xiaoyong Li, Yingcai Bai
2001Applying NCP Logic to the Analysis of SSL 3.0.
Zhimin Song, Sihan Qing
2001Attacks on Two Digital Signature Schemes Based on Error Correcting Codes.
Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou
2001Cheating Immune Secret Sharing.
Xian-Mo Zhang, Josef Pieprzyk
2001Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication.
Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
2001Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes.
Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao
2001Cryptanalysis of the Improved User Efficient Blind Signatures.
Chin-Chen Chang, Iuon-Chang Lin
2001Cryptography and Middleware Security.
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
2001Dealing with Uncertainties in Risk Analysis Using Belief Functions.
Sungbaek Cho, Zbigniew Ciechanowicz
2001Defeating Denial-of-Service Attacks on the Internet.
Baoqing Ye
2001Dispatching Mobile Agents with Secure Routes in Parallel.
Yan Wang, Kian-Lee Tan
2001Efficient Software Implementation for Finite Field Multiplication in Normal Basis.
Peng Ning, Yiqun Lisa Yin
2001Encryption Sticks (Randomats).
Gideon Samid
2001Enforcing Obligation with Security Monitors.
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
2001Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions.
Jie-lü Xu, Hanliang Xu, Yan Wang, Shuwang Lü
2001Estimating the Scalability of the Internet Key Exchange.
Sanna Kunnari
2001Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain.
Xiaochen Bo, Lincheng Shen, Wensen Chang
2001Fair Electronic Cash Based on a Group Signature Scheme.
Greg Maitland, Colin Boyd
2001Fair Exchange of Digital Signatures with Offline Trusted Third Party.
Chuan-Kun Wu, Vijay Varadharajan
2001Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves.
Fangguo Zhang, Futai Zhang, Yumin Wang
2001Generalization of Elliptic Curve Digital Signature Schemes.
Lin You, Yixian Yang, Chun Qi Zhang
2001Hierarchical Simulation Model with Animation for Large Network Security.
Mi Ra Yi, Tae Ho Cho
2001Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001
Sihan Qing, Tatsuaki Okamoto, Jianying Zhou
2001NIDS Research Based on Artificial Immunology.
Wenjian Luo, Xianbin Cao, Xufa Wang
2001On a Network Security Model for the Secure Information Flow on Multilevel Secure Network.
Ki-Yoong Hong, Chul Kim
2001Performance of WTLS and Its Impact on an M-commerce Transaction.
Ian Herwono, Ingo Liebhardt
2001Playing Lottery on the Internet.
Jianying Zhou, Chunfu Tan
2001Primitive Polynomials over GF(2) - A Cryptologic Approach.
Kishan Chand Gupta, Subhamoy Maitra
2001Privacy Protection for Transactions of Digital Goods.
Feng Bao, Robert H. Deng
2001Quantifying Network Denial of Service: A Location Service Case Study.
Yan Chen, Adam W. Bargteil, David Bindel, Randy H. Katz, John Kubiatowicz
2001RBAC for XML Document Stores.
Michael Hitchens, Vijay Varadharajan
2001Reasoning about Accountability within Delegation.
Bruno Crispo, Giancarlo Ruffo
2001Redundancy, Obscurity, Self-Containment & Independence.
Seenil Gram
2001Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles.
Ji-Hwan Park, Sook Ee Jeong, Chang Soo Kim
2001SECUSIM: A Tool for the Cyber-Attack Simulation.
Jong Sou Park, Jang-Se Lee, Hwankuk Kim, Jeong-Rye Jeong, Dong-Bok Yeom, Sung-Do Chi
2001Security of Blind Discrete Log Signatures against Interactive Attacks.
Claus-Peter Schnorr
2001Square Attack on Reduced Camellia Cipher.
Yeping He, Sihan Qing
2001TH-SMS: Security Management System in Advanced Computational Infrastructure.
Yu Chen, Qian Fang, Zhihui Du, Zhenchun Huang, Sanli Li
2001Threshold Undeniable RSA Signature Scheme.
Guilin Wang, Sihan Qing, Mingsheng Wang, Zhanfei Zhou
2001Towards the Forgery of a Group Signature without Knowing the Group Center's Secret.
Chin-Chen Chang, Kuo-Feng Hwang
2001Two Simple Batch Verifying Multiple Digital Signatures.
Min-Shiang Hwang, Cheng-Chi Lee, Yuan-Liang Tang
2001Unconditionally-Secure Oblivious Transfer.
Bo Yang, Shixiong Zhu, Yumin Wang