ISPEC C

36 papers

YearTitle / Authors
2006A Chaos-Based Robust Software Watermarking.
Fenlin Liu, Bin Lu, Xiangyang Luo
2006A Counting-Based Method for Massive Spam Mail Classification.
Hao Luo, Binxing Fang, Xiao-chun Yun
2006A Design and Implementation of Profile Based Web Application Securing Proxy.
Youngtae Yun, Sangseo Park, Yosik Kim, JaeCheol Ryou
2006A Novel Dynamic Immunization Strategy for Computer Network Epidemics.
ZhiFei Tao, Hai Jin, Zongfen Han, En Cheng
2006A Practical Clumped-Tree Multicast Encryption Scheme.
Ling Dong, Kefei Chen
2006A Protocol of Member-Join in a Secret Sharing Scheme.
Xiao Li, Mingxing He
2006Adversarial Organization Modeling for Network Attack/Defense.
Ji Wu, Chaoqun Ye, Shiyao Jin
2006An Efficient Way to Build Secure Disk.
Fangyong Hou, Hongjun He, Zhiying Wang, Kui Dai
2006An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards.
Muhammad Khurram Khan, Jiashu Zhang
2006An Empirical Study of Quality and Cost Based Security Engineering.
Seok Lee, Tai-Myung Chung, Myeonggil Choi
2006DPA-Resistant Finite Field Multipliers and Secure AES Design.
Yoo-Jin Baek, Mi-Jung Noh
2006Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Hyung Chan Kim, Wook Shin, Rudrapatna S. Ramakrishna, Kouichi Sakurai
2006Diophantine Approximation Attack on a Fast Public Key Cryptosystem.
Baocang Wang, Yupu Hu
2006Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments.
Gu Su Kim, Young Ik Eom
2006Efficient Public Key Broadcast Encryption Using Identifier of Receivers.
Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee
2006Further Security Analysis of XTR.
Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
2006Identity Based Key Insulated Signature.
Yuan Zhou, Zhenfu Cao, Zhenchuan Chai
2006Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings.
Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang
2006Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings
Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou
2006Integrating Grid with Cryptographic Computing.
Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin
2006Linkable Democratic Group Signatures.
Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
2006Model and Estimation of Worm Propagation Under Network Partition.
Ping Wang, Binxing Fang, Xiao-chun Yun
2006More on Shared-Scalar-Product Protocols.
Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu
2006Practical Forensic Analysis in Advanced Access Content System.
Hongxia Jin, Jeffery Lotspiech
2006Preventing Web-Spoofing with Automatic Detecting Security Indicator.
Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu
2006Privately Retrieve Data from Large Databases.
Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang
2006Securing C Programs by Dynamic Type Checking.
Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun
2006Security Analysis of a Server-Aided RSA Key Generation Protocol.
Tianjie Cao, Xianping Mao, Dongdai Lin
2006Security Protocol Analysis with Improved Authentication Tests.
Xiehua Li, Shutang Yang, Jianhua Li, Hongwen Zhu
2006Short (Identity-Based) Strong Designated Verifier Signature Schemes.
Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
2006Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication.
Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li
2006Tackling Worm Detection Speed and False Alarm in Virus Throttling.
Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi
2006Three-Round Secret Handshakes Based on ElGamal and DSA.
Lan Zhou, Willy Susilo, Yi Mu
2006Trojan Horse Attack Strategy on Quantum Private Communication.
Jinye Peng, Guangqiang He, Jin Xiong, Guihua Zeng
2006Using
Yahui Lu, Li Zhang, Yinbo Liu, Jiaguang Sun
2006Using Data Field to Analyze Network Intrusions.
Feng Xie, Shuo Bai