5. ISC 2002:
Sao Paulo,
Brazil
Agnes Hui Chan, Virgil D. Gligor (Eds.):
Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings.
Lecture Notes in Computer Science 2433 Springer 2002, ISBN 3-540-44270-7 BibTeX
@proceedings{DBLP:conf/isw/2002,
editor = {Agnes Hui Chan and
Virgil D. Gligor},
title = {Information Security, 5th International Conference, ISC 2002
Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings},
booktitle = {ISC},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2433},
year = {2002},
isbn = {3-540-44270-7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Intrusion Detection and Tamper Resistance
Cryptographic Algorithm and Attack Implementation
- Akashi Satoh, Sumio Morioka:
Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI.
48-62
Electronic Edition (Springer LINK) BibTeX
- Helger Lipmaa:
Fast Software Implementations of SC2000.
63-74
Electronic Edition (Springer LINK) BibTeX
- Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott:
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512.
75-89
Electronic Edition (Springer LINK) BibTeX
- Kahil Jallad, Jonathan Katz, Bruce Schneier:
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.
90-101
Electronic Edition (Springer LINK) BibTeX
Access Control and Trust Management (I)
Authentication and Privacy
E-commerce Protocols (I)
Signature Schemes
Cryptography (I)
Access Control and Trust Management (II)
Key Management
Security Analysis
E-commerce Protocols (II)
Cryptography (II)
Copyright © Sat May 16 23:26:36 2009
by Michael Ley (ley@uni-trier.de)