ICICS C

42 papers

YearTitle / Authors
2002A Chosen Plaintext Linear Attack on Block Cipher CIKS-1.
Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim
2002A Distributed Dynamic µFirewall Architecture with Mobile Agents and KeyNote Trust Management System.
Hai Jin, Feng Xian, Zongfen Han, Shengli Li
2002A Flexibly Revocable Key-Distribution Scheme for Efficient Black-Box Tracing.
Tatsuyuki Matsushita
2002A Group Signature Scheme Committing the Group.
Toru Nakanishi, Masayuki Tao, Yuji Sugiyama
2002A New Statistical Testing for Symmetric Ciphers and Hash Functions.
Eric Filiol
2002A Robust Block Oriented Watermarking Scheme in Spatial Domain.
Tanmoy Kanti Das, Subhamoy Maitra
2002A Secure Agent-Mediated Payment Protocol.
Xiaolin Pang, Kian-Lee Tan, Yan Wang, Jian Ren
2002A Secure Object Sharing Scheme for Java Card.
Junqi Zhang, Vijay Varadharajan, Yi Mu
2002A Specification Language for Distributed Policy Control.
Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki
2002A Synthetic Fraud Data Generation Methodology.
Emilie Lundin, Håkan Kvarnström, Erland Jonsson
2002Access Control Infrastructure for Digital Objects.
Javier López, Antonio Mana, Ernesto Pimentel, José M. Troya, Mariemma Inmaculada Yagüe del Valle
2002An Evaluation of Different IP Traceback Approaches.
Vadim Kuznetsov, Helena Sandström, Andrei Simkin
2002An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code.
Hajime Watanabe, Takashi Kitagawa
2002Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption.
Myungsun Kim, Jongseong Kim, Kwangjo Kim
2002Attacking Predictable IPsec ESP Initialization Vectors.
Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen
2002Cellular Automata Based Cryptosystem (CAC).
Subhayan Sen, Chandrama Shaw, Dipanwita Roy Chowdhury, Niloy Ganguly, Parimal Pal Chaudhuri
2002Cryptanalysis of the Reduced-Round RC6.
Atsuko Miyaji, Masao Nonaka
2002Defenses against the Truncation of Computation Results of Free-Roaming Agents.
Jeff S. L. Cheng, Victor K. Wei
2002Distributed Key Generation as a Component of an Integrated Protocol.
Cheng-Kang Chu, Wen-Guey Tzeng
2002Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack.
Changwoo Pyo, Gyungho Lee
2002Fast Elliptic Curve Multiplications with SIMD Operations.
Tetsuya Izu, Tsuyoshi Takagi
2002Further Results on Multiples of Primitive Polynomials and Their Products over GF(2).
Ayineedi Venkateswarlu, Subhamoy Maitra
2002IDS Interoperability and Correlation Using IDMEF and Commodity Systems.
Nathan Carey, Andrew J. Clark, George M. Mohay
2002Ideal Threshold Schemes from Orthogonal Arrays.
Josef Pieprzyk, Xian-Mo Zhang
2002Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings
Robert H. Deng, Sihan Qing, Feng Bao, Jianying Zhou
2002Knowledge-Based Modeling and Simulation of Network Access Control Mechanisms Representing Security Policies.
Jong-Young Koh, Mi Ra Yi, Tae Ho Cho, Hyung-Jong Kim, Hong-Geun Kim
2002Low Complexity Bit Serial Systolic Multipliers over GF(2
Soonhak Kwon
2002Message Authentication Codes with Error Correcting Capabilities.
Charles C. Y. Lam, Guang Gong, Scott A. Vanstone
2002New Weak-Key Classes of IDEA.
Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
2002Password-Authenticated Key Exchange between Clients with Different Passwords.
Jin Wook Byun, Ik Rae Jeong, Dong Hoon Lee, Chang-Seop Park
2002Reducing the Memory Complexity of Type-Inference Algorithms.
David Naccache, Alexei Tchoulkine, Christophe Tymen, Elena Trichina
2002Related-Cipher Attacks.
Hongjun Wu
2002Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC.
Soichi Furuya, Kouichi Sakurai
2002Robust Key-Evolving Public Key Encryption Schemes.
Wen-Guey Tzeng, Zhi-Jia Tzeng
2002Robust, Privacy Protecting and Publicly Verifiable Sealed-Bid Auction.
Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
2002Security against Inference Attacks on Negative Information in Object-Oriented Databases.
Yasunori Ishihara, Shuichiro Ako, Toru Fujiwara
2002Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties.
Alexander Kholosha, Henk C. A. van Tilborg
2002The Consistency of an Access Control List.
Shoupeng Li, Shizhong Wu, Tao Guo
2002The Risks of Compromising Secret Information.
Kyungah Shim
2002Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
2002User Interaction Design for Secure Systems.
Ka-Ping Yee
2002Using Independent Auditors as Intrusion Detection Systems.
Jesus Molina, William A. Arbaugh