default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 38 matches
- 2003
- Mohsen Ashourian, Yo-Sung Ho:
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains. ICICS 2003: 179-190 - Feng Bao, Robert H. Deng
, Huafei Zhu:
Variations of Diffie-Hellman Problem. ICICS 2003: 301-312 - Pat Pik-Wah Chan, Michael R. Lyu:
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code. ICICS 2003: 202-213 - Mathieu Ciet, Marc Joye:
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. ICICS 2003: 348-359 - Yang Cui, Kazukuni Kobara, Hideki Imai:
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. ICICS 2003: 269-279 - Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim:
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. ICICS 2003: 11-21 - Oscar Esparza
, Miguel Soriano, Jose L. Muñoz, Jordi Forné
:
Protocols for Malicious Host Revocation. ICICS 2003: 191-201 - Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa:
A Fast Square Root Computation Using the Frobenius Mapping. ICICS 2003: 1-10 - Hui-Feng Huang, Chin-Chen Chang:
An Efficient Convertible Authenticated Encryption Scheme and Its Variant. ICICS 2003: 382-392 - Konstantin Hyppönen, David Naccache, Elena Trichina, Alexei Tchoulkine:
Trading-Off Type-Inference Memory Complexity against Communication. ICICS 2003: 60-71 - Henry C. J. Lee, Vrizlynn L. L. Thing, Yi Xu, Miao Ma
:
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback. ICICS 2003: 124-135 - Xiaoqiang Li, Xiangyang Xue, Wei Li:
An Optimized Multi-bits Blind Watermarking Scheme. ICICS 2003: 360-369 - Gang Li, Jie Yang:
Research on the Collusion Estimation. ICICS 2003: 170-178 - Tieyan Li, Huafei Zhu, Kwok-Yan Lam:
A Novel Two-Level Trust Model for Grid. ICICS 2003: 214-225 - Yongliang Liu, Wen Gao, Zhao Wang, Shaohui Liu:
A Lattice Based General Blind Watermark Scheme. ICICS 2003: 136-144 - Min Luo, Lina Wang, Huanguo Zhang, Jin Chen:
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine. ICICS 2003: 325-336 - Miodrag J. Mihaljevic:
Broadcast Encryption Schemes Based on the Sectioned Key Tree. ICICS 2003: 158-169 - J. Krishna Murthy:
A Functional Decomposition of Virus and Worm Programs. ICICS 2003: 405-414 - Ricardo Nabhen, Edgard Jamhour, Carlos Maziero:
A Policy Based Framework for Access Control. ICICS 2003: 47-59 - Jose Antonio Onieva, Jianying Zhou, Javier López:
Practical Service Charge for P2P Content Distribution. ICICS 2003: 112-123 - Gregory Saunders, Michael Hitchens
, Vijay Varadharajan:
Role-Based Access Control and the Access Control Matrix. ICICS 2003: 145-157 - Taeshik Shon, Jung-Taek Seo, Jongsub Moon:
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine. ICICS 2003: 313-324 - Jianhua Sun, Hai Jin, Hao Chen, Qian Zhang, Zongfen Han:
A Compound Intrusion Detection Model. ICICS 2003: 370-381 - Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
:
Security Remarks on a Group Signature Scheme with Member Deletion. ICICS 2003: 72-83 - Yan Wang, Chi-Hung Chi, Tieyan Li:
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents. ICICS 2003: 22-33 - Yan Wang, Shuwang Lü, Zhenhua Liu:
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature. ICICS 2003: 260-268 - Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei:
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. ICICS 2003: 34-46 - Hongjun Wu, Feng Bao, Robert H. Deng
:
An Efficient Known Plaintext Attack on FEA-M. ICICS 2003: 84-87 - Yongdong Wu, Robert H. Deng
:
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. ICICS 2003: 238-248 - Qianhong Wu, Jianhong Zhang, Yumin Wang:
Practical t-out-n Oblivious Transfer and Its Applications. ICICS 2003: 226-237
skipping 8 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-07-17 18:12 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint