Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wisa/wisa2005.bht:"
@proceedings{DBLP:conf/wisa/2005, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11604938}, doi = {10.1007/11604938}, isbn = {3-540-31012-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChaeKK05, author = {Song{-}hwa Chae and Wonil Kim and Dong{-}Kyoo Kim}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Role-Based Access Control Model for Ubiquitous Computing Environment}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {354--363}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_28}, doi = {10.1007/11604938\_28}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChaeKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChengHCW05, author = {Bo{-}Chao Cheng and Ching{-}Fu Huang and Wei{-}Chi Chang and Cheng{-}Shong Wu}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Developing and Implementing {IHPM} on {IXP} 425 Network Processor Platforms}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {218--231}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_17}, doi = {10.1007/11604938\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChengHCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GuoWZYL05, author = {Fei Guo and Jianmin Wang and Zhihao Zhang and Xiaojun Ye and Deyi Li}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {An Improved Algorithm to Watermark Numeric Relational Data}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {138--149}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_11}, doi = {10.1007/11604938\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GuoWZYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongJW05, author = {Kihun Hong and Souhwan Jung and Shyhtsun Felix Wu}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {96--107}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_8}, doi = {10.1007/11604938\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HongJW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IzuKOS05, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Takeshi Shimoyama}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {232--242}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_18}, doi = {10.1007/11604938\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IzuKOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Juang05, author = {Wen{-}Shenq Juang}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {A Simple and Efficient Conference Scheme for Mobile Communications}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {81--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_7}, doi = {10.1007/11604938\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Juang05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangKPLSYK05, author = {Hyun{-}Ho Kang and Brian M. Kurkoski and Young{-}Ran Park and Hyejoo Lee and Sanguk Shin and Kazuhiko Yamaguchi and Kingo Kobayashi}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Video Fingerprinting System Using Wavelet and Error Correcting Code}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {150--164}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_12}, doi = {10.1007/11604938\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangKPLSYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KanlayasiriS05, author = {Urupoj Kanlayasiri and Surasak Sanguanpong}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Key Factors Influencing Worm Infection in Enterprise Networks}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {54--67}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_5}, doi = {10.1007/11604938\_5}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KanlayasiriS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKKK05, author = {Mun{-}Kyu Lee and Keon Tae Kim and Howon Kim and Dong Kyue Kim}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Efficient Hardware Implementation of Elliptic Curve Cryptography over \emph{GF}(\emph{p}\({}^{\mbox{\emph{m}}}\))}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {207--217}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_16}, doi = {10.1007/11604938\_16}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeKKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeePS05, author = {Minsoo Lee and Sehyun Park and Ohyoung Song}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Elastic Security QoS Provisioning for Telematics Applications}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {126--137}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_10}, doi = {10.1007/11604938\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeePS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeS05, author = {Ho Lee and Jung Hwan Song}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Designing Security Auditing Protocol with Web Browsers}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {364--376}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_29}, doi = {10.1007/11604938\_29}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LimK05, author = {Chae Hoon Lim and Tymur Korkishko}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {mCrypton - {A} Lightweight Block Cipher for Security of Low-Cost {RFID} Tags and Sensors}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {243--258}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_19}, doi = {10.1007/11604938\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LimK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MadouAMDSB05, author = {Matias Madou and Bertrand Anckaert and Patrick Moseley and Saumya K. Debray and Bjorn De Sutter and Koen De Bosschere}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Software Protection Through Dynamic Code Mutation}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {194--206}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_15}, doi = {10.1007/11604938\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MadouAMDSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MukhopadhyayS05, author = {Sourav Mukhopadhyay and Palash Sarkar}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Application of LFSRs in Time/Memory Trade-Off Cryptanalysis}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {25--37}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_3}, doi = {10.1007/11604938\_3}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MukhopadhyayS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NamKW05, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {1--9}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_1}, doi = {10.1007/11604938\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NamKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Oh05, author = {Sejong Oh}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {New Concept of Authority Range for Flexible Management of Role Hierarchy}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {343--353}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_27}, doi = {10.1007/11604938\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Oh05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OkadaK05, author = {Mitsuo Okada and Hiroaki Kikuchi}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Secure Asymmetric Watermark Detection Without Secret of Modified Pixels}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {165--178}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_13}, doi = {10.1007/11604938\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OkadaK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OntuaP05, author = {Marife G. Ontua and Susan Pancho{-}Festin}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Evaluation of the Unified Modeling Language for Security Requirements Analysis}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {68--80}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_6}, doi = {10.1007/11604938\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OntuaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OswaldS05, author = {Elisabeth Oswald and Kai Schramm}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {An Efficient Masking Scheme for {AES} Software Implementations}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {292--305}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_23}, doi = {10.1007/11604938\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OswaldS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkKP05, author = {Je Hong Park and Bo Gyeong Kang and Sangwoo Park}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Cryptanalysis of Some Group-Oriented Proxy Signature Schemes}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {10--24}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_2}, doi = {10.1007/11604938\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkLHC05, author = {Tae{-}Jun Park and Mun{-}Kyu Lee and Dowon Hong and Kyoil Chung}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {A {DPA} Countermeasure by Randomized Frobenius Decomposition}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {271--282}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_21}, doi = {10.1007/11604938\_21}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkLHC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RheeBLL05, author = {Hyun Sook Rhee and Jin Wook Byun and Dong Hoon Lee and Jongin Lim}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Oblivious Conjunctive Keyword Search}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {318--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_25}, doi = {10.1007/11604938\_25}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/RheeBLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShinJ05, author = {Moon Sun Shin and Kyeong Ja Jeong}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {An Alert Data Mining Framework for Network-Based Intrusion Detection System}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {38--53}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_4}, doi = {10.1007/11604938\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShinJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShinPL05, author = {Jong Hoon Shin and Dong Jin Park and Pil Joong Lee}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {{DPA} Attack on the Improved Ha-Moon Algorithm}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {283--291}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_22}, doi = {10.1007/11604938\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShinPL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SuzukiY05, author = {Koutarou Suzuki and Makoto Yokoo}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Secure Multi-attribute Procurement Auction}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {306--317}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_24}, doi = {10.1007/11604938\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SuzukiY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Takashima05, author = {Katsuyuki Takashima}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on {(EC)DSA}}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {259--270}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_20}, doi = {10.1007/11604938\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Takashima05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TartaryW05, author = {Christophe Tartary and Huaxiong Wang}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Efficient Multicast Stream Authentication for the Fully Adversarial Network Model}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {108--125}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_9}, doi = {10.1007/11604938\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TartaryW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YamamotoCNSU05, author = {Go Yamamoto and Koji Chida and Anderson C. A. Nascimento and Koutarou Suzuki and Shigenori Uchiyama}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {328--342}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_26}, doi = {10.1007/11604938\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YamamotoCNSU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YouSKCLK05, author = {Jin Ho You and Seong Chae Seo and Young Dae Kim and Jun Yong Choi and Sang Jun Lee and Byung Ki Kim}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Kimchi: {A} Binary Rewriting Defense Against Format String Attacks}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {179--193}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_14}, doi = {10.1007/11604938\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YouSKCLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.