ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 3rd international conference on Information security - InfoSecu '04
Latest Publications
TOTAL DOCUMENTS
53
(FIVE YEARS 0)
H-INDEX
7
(FIVE YEARS 0)
Published By ACM Press
1581139551
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
An attribute-based-delegation-model
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046338
◽
2004
◽
Cited By ~ 5
Author(s):
Chunxiao Ye
◽
Yunqing Fu
◽
Zhongfu Wu
Download Full-text
An image watermark algorithm based on discrete cosine transform block classifying
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046344
◽
2004
◽
Cited By ~ 7
Author(s):
Zhao Yuehua
◽
Cai Guixian
◽
Du Yunhai
Keyword(s):
Discrete Cosine Transform
◽
Cosine Transform
◽
Image Watermark
◽
Watermark Algorithm
Download Full-text
Transformation-free proxy cryptosystems and their applications to electronic commerce
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046310
◽
2004
◽
Cited By ~ 4
Author(s):
Lihua Wang
◽
Zhenfu Cao
◽
Eiji Okamoto
◽
Ying Miao
◽
Takeshi Okamoto
Keyword(s):
Electronic Commerce
Download Full-text
Research on network information filtering model based on fuzzy set
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046345
◽
2004
◽
Author(s):
Liu Peiyu
◽
Liu Yuguo
Keyword(s):
Fuzzy Set
◽
Information Filtering
◽
Network Information
◽
Model Based
Download Full-text
Cryptanalysis of group signature scheme from ID-based signature scheme
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046313
◽
2004
◽
Author(s):
Haiyong Bao
◽
Zhenfu Cao
◽
Haifeng Qian
Keyword(s):
Group Signature
◽
Signature Scheme
Download Full-text
A new watermarking scheme against inserter-based attacks suitable for digital media with moderate size
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046350
◽
2004
◽
Author(s):
Xinpeng Zhang
◽
Shuozhong Wang
Keyword(s):
Digital Media
◽
Moderate Size
◽
Watermarking Scheme
Download Full-text
On timeliness of a fair non-repudiation protocol
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046311
◽
2004
◽
Author(s):
Li Botao
◽
Luo Junzhou
Download Full-text
Automatic metadata generation based on neural network
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046330
◽
2004
◽
Cited By ~ 1
Author(s):
Yunfeng Li
◽
Qingsheng Zhu
◽
Yukun Cao
Keyword(s):
Neural Network
◽
Metadata Generation
Download Full-text
Organization structure based access control model
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046334
◽
2004
◽
Author(s):
Ke-jun Sheng
◽
Ji-qiang Liu
◽
Xin Liu
Keyword(s):
Access Control
◽
Organization Structure
◽
Control Model
◽
Access Control Model
Download Full-text
A network intrusion detection system based on the artificial neural networks
Proceedings of the 3rd international conference on Information security - InfoSecu '04
◽
10.1145/1046290.1046324
◽
2004
◽
Cited By ~ 7
Author(s):
Wang Jing-xin
◽
Wang Zhi-ying
◽
Dai Kui
Keyword(s):
Neural Networks
◽
Artificial Neural Networks
◽
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
Network Intrusion Detection
◽
Network Intrusion
◽
Network Intrusion Detection System
◽
Artificial Neural
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close