ICICS C

41 papers

YearTitle / Authors
2005A Behavior-Based Ingress Rate-Limiting Mechanism Against DoS/DDoS Attacks.
Song Huang, Ling Zhang, Shouling Dong
2005Achieving Efficient Conjunctive Keyword Searches over Encrypted Data.
Lucas Ballard, Seny Kamara, Fabian Monrose
2005Admissible Interference by Typing for Cryptographic Protocols.
Alaaeddine Fellah, John Mullins
2005An Evenhanded Certified Email System for Contract Signing.
Kenji Imamoto, Jianying Zhou, Kouichi Sakurai
2005Asymmetric Concurrent Signatures.
Khanh Nguyen
2005Authenticating Query Results in Data Publishing.
Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou
2005Batching SSL/TLS Handshake Improved.
Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu
2005Ciphertext Comparison, a New Solution to the Millionaire Problem.
Kun Peng, Colin Boyd, Ed Dawson, Byoungcheon Lee
2005Cryptanalysis of PASS II and MiniPass.
Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi
2005Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity.
Eun-Jun Yoon, Kee-Young Yoo
2005Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security.
Shuhong Wang, Feng Bao, Robert H. Deng
2005D_DIPS: An Intrusion Prevention System for Database Security.
Jiazhu Dai, Huaikou Miao
2005Efficient ID-Based Optimistic Fair Exchange with Provable Security.
Zhenfeng Zhang, Dengguo Feng, Jing Xu, Yongbin Zhou
2005Efficient and Non-interactive Timed-Release Encryption.
Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
2005Enforce Mandatory Access Control Policy on XML Documents.
Lan Li, Xinghao Jiang, Jianhua Li
2005Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment.
Sangjin Kim, Hoonjung Lee, Heekuck Oh
2005Generic Construction of (Identity-Based) Perfect Concurrent Signatures.
Sherman S. M. Chow, Willy Susilo
2005Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai
2005Implementation of Packet Filter Configurations Anomaly Detection System with SIERRA.
Yi Yin, Raghuvel S. Bhuvaneswaran, Yoshiaki Katayama, Naohisa Takahashi
2005Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings
Sihan Qing, Wenbo Mao, Javier López, Guilin Wang
2005Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
Tieyan Li, Huafei Zhu, Yongdong Wu
2005Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.
Wei Wei, Xuhua Ding, Kefei Chen
2005Network Access Control for Mobile Ad-Hoc Networks.
Pan Wang, Peng Ning, Douglas S. Reeves
2005Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG).
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian
2005On Delegatability of Four Designated Verifier Signatures.
Yong Li, Helger Lipmaa, Dingyi Pei
2005On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol.
J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti
2005On the Security Bounds of CMC, EME, EME
Raphael Chung-Wei Phan, Bok-Min Goi
2005On the Security of Encryption Modes of MD4, MD5 and HAVAL.
Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
2005PCAV: Internet Attack Visualization on Parallel Coordinates.
Hyunsang Choi, Heejo Lee
2005PIATS: A Partially Sanitizable Signature Scheme.
Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
2005Port Scan Behavior Diagnosis by Clustering.
Lanjia Wang, Hai-Xin Duan, Xing Li
2005Private Itemset Support Counting.
Sven Laur, Helger Lipmaa, Taneli Mielikäinen
2005Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware.
Debra L. Cook, Ricardo A. Baratto, Angelos D. Keromytis
2005Reversible Watermark with Large Capacity Using the Predictive Coding.
Minoru Kuribayashi, Masakatu Morii, Hatsukazu Tanaka
2005Secure Multicast Using Proxy Encryption.
Yun-Peng Chiu, Chin-Laung Lei, Chun-Ying Huang
2005Security Properties of Two Authenticated Conference Key Agreement Protocols.
Qiang Tang, Chris J. Mitchell
2005Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains.
Huafei Zhu, Feng Bao, Robert H. Deng
2005Session Table Architecture for Defending SYN Flood Attack.
Xin Li, Zhenzhou Ji, Mingzeng Hu
2005Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves.
Yasuyuki Sakai, Kouichi Sakurai
2005Total Disclosure of the Embedding and Detection Algorithms for a Secure Digital Watermarking Scheme for Audio.
David Megías, Jordi Herrera-Joancomartí, Julià Minguillón
2005Visual Cryptographic Protocols Using the Trusted Initializer.
Hidenori Kuwakado, Masakatu Morii, Hatsukazu Tanaka