Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wisa/wisa2007.bht:"
@proceedings{DBLP:conf/wisa/2007, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77535-5}, doi = {10.1007/978-3-540-77535-5}, isbn = {978-3-540-77534-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChangWYT07, author = {Junsheng Chang and Huaimin Wang and Gang Yin and Yang{-}Bin Tang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {ICRep: An Incentive Compatible Reputation Mechanism for {P2P} Systems}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {371--386}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_27}, doi = {10.1007/978-3-540-77535-5\_27}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChangWYT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiS07, author = {Myeonggil Choi and Sangmun Shin}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {359--370}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_26}, doi = {10.1007/978-3-540-77535-5\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HaPMY07, author = {JaeCheol Ha and JeaHoon Park and Sang{-}Jae Moon and Sung{-}Ming Yen}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Provably Secure Countermeasure Resistant to Several Types of Power Attack for {ECC}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {333--344}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_24}, doi = {10.1007/978-3-540-77535-5\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HaPMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HanLY07, author = {Lilong Han and Qingtang Liu and Zongkai Yang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Authorization Constraints Specification of {RBAC}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {266--276}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_19}, doi = {10.1007/978-3-540-77535-5\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HanLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HashimotoIUISKI07, author = {Toru Hashimoto and Takashi Itoh and Masazumi Ueba and Hisato Iwai and Hideichi Sasaoka and Kazukuni Kobara and Hideki Imai}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {173--187}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_13}, doi = {10.1007/978-3-540-77535-5\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HashimotoIUISKI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JangEK07, author = {Jihyeon Jang and Stephen J. Elliott and Hakil Kim}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Implementation of BioAPI Conformance Test Suite Using {BSP} Testing Model}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {48--60}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_4}, doi = {10.1007/978-3-540-77535-5\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JangEK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeCV07, author = {Yong Ki Lee and Herwin Chan and Ingrid Verbauwhede}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Iteration Bound Analysis and Throughput Optimum Architecture of {SHA-256} (384, 512) for Hardware Implementations}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {102--114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_8}, doi = {10.1007/978-3-540-77535-5\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeCV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeCYY07, author = {Byoungcheon Lee and Kim{-}Kwang Raymond Choo and Jeongmo Yang and Seungjae Yoo}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Secret Signatures: How to Achieve Business Privacy Efficiently?}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {30--47}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_3}, doi = {10.1007/978-3-540-77535-5\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeCYY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeV07, author = {Yong Ki Lee and Ingrid Verbauwhede}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {115--127}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_9}, doi = {10.1007/978-3-540-77535-5\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LimUKL07, author = {Jae{-}Deok Lim and Sung{-}Kyong Un and Jeong{-}Nyeo Kim and ChoelHoon Lee}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Implementation of LSM-Based {RBAC} Module for Embedded System}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {91--101}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_7}, doi = {10.1007/978-3-540-77535-5\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LimUKL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LoPG07, author = {Swee{-}Won Lo and Raphael C.{-}W. Phan and Bok{-}Min Goi}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {245--265}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_18}, doi = {10.1007/978-3-540-77535-5\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LoPG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/McEvoyTMM07, author = {Robert P. McEvoy and Michael Tunstall and Colin C. Murphy and William P. Marnane}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Differential Power Analysis of {HMAC} Based on SHA-2, and Countermeasures}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {317--332}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_23}, doi = {10.1007/978-3-540-77535-5\_23}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/McEvoyTMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ProuffR07, author = {Emmanuel Prouff and Matthieu Rivain}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {A Generic Method for Secure SBox Implementation}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {227--244}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_17}, doi = {10.1007/978-3-540-77535-5\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ProuffR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SameshimaSMK07, author = {Yoshiki Sameshima and Hideaki Saisho and Tsutomu Matsumoto and Norihisa Komoda}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure {OS} and Virtual Machine}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {128--141}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_10}, doi = {10.1007/978-3-540-77535-5\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SameshimaSMK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShiraseKTO07, author = {Masaaki Shirase and Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Universal \emph{eta}\({}_{\mbox{T}}\) Pairing Algorithm over Arbitrary Extension Degree}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_1}, doi = {10.1007/978-3-540-77535-5\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShiraseKTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/StumpfRE07, author = {Frederic Stumpf and Patrick R{\"{o}}der and Claudia Eckert}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {142--156}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_11}, doi = {10.1007/978-3-540-77535-5\_11}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/StumpfRE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TanakaHSK07, author = {Hidema Tanaka and Yasuo Hatano and Nobuyuki Sugio and Toshinobu Kaneko}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Security Analysis of {MISTY1}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {215--226}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_16}, doi = {10.1007/978-3-540-77535-5\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TanakaHSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TangLLW07, author = {Zhuo Tang and Ruixuan Li and Zhengding Lu and Zhumu Wen}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {277--290}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_20}, doi = {10.1007/978-3-540-77535-5\_20}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TangLLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TewsWP07, author = {Erik Tews and Ralf{-}Philipp Weinmann and Andrei Pyshkin}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Breaking 104 Bit {WEP} in Less Than 60 Seconds}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {188--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_14}, doi = {10.1007/978-3-540-77535-5\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TewsWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Walter07, author = {Colin D. Walter}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Longer Randomly Blinded {RSA} Keys May Be Weaker Than Shorter Ones}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {303--316}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_22}, doi = {10.1007/978-3-540-77535-5\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Walter07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WilsonFA07, author = {William O. Wilson and Jan Feyereisl and Uwe Aickelin}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Detecting Motifs in System Call Sequences}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {157--172}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_12}, doi = {10.1007/978-3-540-77535-5\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WilsonFA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WuMSH07, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {16--29}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_2}, doi = {10.1007/978-3-540-77535-5\_2}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WuMSH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XiaHH07, author = {Lei Xia and Wei Huang and Hao Huang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {A Compositional Multiple Policies Operating System Security Model}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {291--302}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_21}, doi = {10.1007/978-3-540-77535-5\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XiaHH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XiangK07, author = {Shijun Xiang and Hyoung{-}Joong Kim}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Geometrically Invariant Image Watermarking in the {DWT} Domain}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {76--90}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_6}, doi = {10.1007/978-3-540-77535-5\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XiangK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XuY07, author = {Shenkun Xu and Xiaojun Ye}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Risk {\&} Distortion Based K-Anonymity}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {345--358}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_25}, doi = {10.1007/978-3-540-77535-5\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XuY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YoshitomiTKT07, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {203--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_15}, doi = {10.1007/978-3-540-77535-5\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YoshitomiTKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhouMGJ07, author = {Yongxin Zhou and Alec Main and Yuan Xiang Gu and Harold Johnson}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Information Hiding in Software with Mixed Boolean-Arithmetic Transforms}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {61--75}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_5}, doi = {10.1007/978-3-540-77535-5\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ZhouMGJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.