Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Qing, Sihan")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 83

  • Page / 4
Export

Selection :

  • and

Asymmetric concurrent signaturesNGUYEN, Khanh.Lecture notes in computer science. 2005, pp 181-193, issn 0302-9743, isbn 3-540-30934-9, 13 p.Conference Paper

On the security of a multi-party certified email protocolJIANYING ZHOU.Lecture notes in computer science. 2004, pp 40-52, issn 0302-9743, isbn 3-540-23563-9, 13 p.Conference Paper

D-DIPS: An intrusion prevention system for database securityJIAZHU DAI; HUAIKOU MIAO.Lecture notes in computer science. 2005, pp 481-490, issn 0302-9743, isbn 3-540-30934-9, 10 p.Conference Paper

Information and communications security (Malaga, 27-29 October 2004)Lopez, Javier; Qing, Sihan; Okamoto, Eiji et al.Lecture notes in computer science. 2004, issn 0302-9743, isbn 3-540-23563-9, XI, 564 p, isbn 3-540-23563-9Conference Proceedings

Information and communications security (8th International conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006)Ning, Peng; Li, Ninghui; Qing, Sihan et al.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-49496-0, 1 vol.(XIV-558 p.), isbn 3-540-49496-0Conference Proceedings

Admissible interference by typing for cryptographic protocolsFELLAH, Alaaeddine; MULLINS, John.Lecture notes in computer science. 2005, pp 123-135, issn 0302-9743, isbn 3-540-30934-9, 13 p.Conference Paper

PCAV: Internet Attack visualization on parallel CoordinatesHYUNSANG CHOI; HEEJO LEE.Lecture notes in computer science. 2005, pp 454-466, issn 0302-9743, isbn 3-540-30934-9, 13 p.Conference Paper

Left-to-right signed-bit τ-adic representations of n integers (short paper)BRUMLEY, Billy Bob.Lecture notes in computer science. 2006, pp 469-478, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

Port scan behavior diagnosis by clusteringLANJIA WANG; HAIXIN DUAN; XING LI et al.Lecture notes in computer science. 2005, pp 243-255, issn 0302-9743, isbn 3-540-30934-9, 13 p.Conference Paper

Identification of traitors using a trellisFERNANDEZ, Marcel; SORIANO, Miguel.Lecture notes in computer science. 2004, pp 211-222, issn 0302-9743, isbn 3-540-23563-9, 12 p.Conference Paper

Multi-designated verifiers signaturesLAGUILLAUMIE, Fabien; VERGNAUD, Damien.Lecture notes in computer science. 2004, pp 495-507, issn 0302-9743, isbn 3-540-23563-9, 13 p.Conference Paper

A construction for general and efficient oblivious commitment based envelope protocolsJIANGTAO LI; NINGHUI LI.Lecture notes in computer science. 2006, pp 122-138, issn 0302-9743, isbn 3-540-49496-0, 17 p.Conference Paper

An identity-based proxy signature scheme from pairingsSHIM, Kyung-Ah.Lecture notes in computer science. 2006, pp 60-71, issn 0302-9743, isbn 3-540-49496-0, 12 p.Conference Paper

Quantifying information leakage in tree-based hash protocols (short paper)NOHL, Karsten; EVANS, David.Lecture notes in computer science. 2006, pp 228-237, issn 0302-9743, isbn 3-540-49496-0, 10 p.Conference Paper

Multiplex encryption: A practical approach to encrypting multi-recipient emailsWEI WEI; XUHUA DING; KEFEI CHEN et al.Lecture notes in computer science. 2005, pp 269-279, issn 0302-9743, isbn 3-540-30934-9, 11 p.Conference Paper

Enforce mandatory access control policy on XML documentsLAN LI; XINGHAO JIANG; JIANHUA LI et al.Lecture notes in computer science. 2005, pp 336-349, issn 0302-9743, isbn 3-540-30934-9, 14 p.Conference Paper

On randomized addition-subtraction chains to counteract differential power attacksKARGL, Anton; WIESEND, Götz.Lecture notes in computer science. 2004, pp 278-290, issn 0302-9743, isbn 3-540-23563-9, 13 p.Conference Paper

On some weak extensions of AES and BESMONNERAT, Jean; VAUDENAY, Serge.Lecture notes in computer science. 2004, pp 414-426, issn 0302-9743, isbn 3-540-23563-9, 13 p.Conference Paper

Volatile memory computer forensics to detect Kernel level compromiseRING, Sandra; COLE, Eric.Lecture notes in computer science. 2004, pp 158-170, issn 0302-9743, isbn 3-540-23563-9, 13 p.Conference Paper

Hierarchical key assignment for black-box tracing with efficient ciphertext sizeMATSUSHITA, Tatsuyuki; IMAI, Hideki.Lecture notes in computer science. 2006, pp 92-111, issn 0302-9743, isbn 3-540-49496-0, 20 p.Conference Paper

Cryptanalysis of two user identification schemes with key distribution preserving anonymityYOON, Eun-Jun; YOO, Kee-Young.Lecture notes in computer science. 2005, pp 315-322, issn 0302-9743, isbn 3-540-30934-9, 8 p.Conference Paper

Session table architecture for defending SYN flood attackXIN LI; ZHENZHOU JI; MINGZENG HU et al.Lecture notes in computer science. 2005, pp 220-230, issn 0302-9743, isbn 3-540-30934-9, 11 p.Conference Paper

Factorization-based fail-stop signatures revisitedSCHMIDT-SAMOA, Katja.Lecture notes in computer science. 2004, pp 118-131, issn 0302-9743, isbn 3-540-23563-9, 14 p.Conference Paper

A semi-fragile steganographic digital signature for imagesHEBBES, Luke; LENAGHAN, Andrew.Lecture notes in computer science. 2004, pp 200-210, issn 0302-9743, isbn 3-540-23563-9, 11 p.Conference Paper

New identity-based ring signature schemesHERRANZ, Javier; SAEZ, German.Lecture notes in computer science. 2004, pp 27-39, issn 0302-9743, isbn 3-540-23563-9, 13 p.Conference Paper

  • Page / 4