default search action
ISPEC 2010: Seoul, Korea
- Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang:
Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings. Lecture Notes in Computer Science 6047, Springer 2010, ISBN 978-3-642-12826-4
Cryptanalysis
- Jiazhe Chen, Keting Jia:
Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. 1-18 - Yanjun Li, Wenling Wu, Lei Zhang:
Integral Attacks on Reduced-Round ARIA Block Cipher. 19-29 - Jiageng Chen, Atsuko Miyaji:
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. 30-44 - Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry:
On the Security of NOEKEON against Side Channel Cube Attacks. 45-55
Algorithms and Implementations (I)
- Aivo Jürgenson, Jan Willemson:
On Fast and Approximate Attack Tree Computations. 56-66 - Katsuyuki Okeya, Hidehiro Katou, Yasuyuki Nogami:
Width-3 Joint Sparse Form. 67-84 - Lei Xu, Dongdai Lin:
Accelerating Inverse of GF(2n) with Precomputation. 85-95
Algorithms and Implementations (II)
- Zhen Wang, Xiaozhe Wang, Shuqin Fan:
Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis. 96-109 - Masaya Yasuda:
The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups. 110-122 - Lin Xu, Dongdai Lin, Xin Li:
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. 123-137
Network Security
- Thomas Richard McEvoy, Stephen D. Wolthusen:
Host-Based Security Sensor Integrity in Multiprocessing Environments. 138-152 - Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu:
Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. 153-171 - Zongbin Liu, Jiwu Jing, Peng Liu:
Rate-Based Watermark Traceback: A New Approach. 172-186 - Farshid Farhat, Mohammad Reza Pakravan, Mahmoud Salmasizadeh, Mohammad Reza Aref:
Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. 187-200
Access Control
- Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng:
Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk. 201-216 - Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim:
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . 217-228
Identity Management
- Inkyung Jeun, Dongho Won:
A Trustworthy ID Management Mechanism in Open Market. 229-240 - Byoung-Jin Han, Donghwi Shin, Hyoung-Jin Lim, Inkyung Jeun, Hyun-Chul Jung:
BioID: Biometric-Based Identity Management. 241-250
Trust Management
- Bin Wu, Dengguo Feng, Meijiao Duan:
Privacy Preserving of Trust Management Credentials Based on Trusted Computing. 251-263 - Daren Zha, Jiwu Jing, Le Kang:
Mitigating the Malicious Trust Expansion in Social Network Service. 264-275
Public Key Cryptography
- Jacob C. N. Schuldt, Kanta Matsuura:
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. 276-293 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Certificateless KEM and Hybrid Signcryption Schemes Revisited. 294-307 - Yazhe Zhang, Kunpeng Wang, Bao Li:
A Deniable Group Key Establishment Protocol in the Standard Model. 308-323 - Hui Li, Chuankun Wu, Lingbo Wei:
Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. 324-340
Security Applications
- Chiew Kang Leng, Josef Pieprzyk:
Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis. 341-358 - Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan:
Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. 359-376 - Youngsook Lee, Hyungkyu Yang, Dongho Won:
Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. 377-385 - Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim:
Protection Profile for Secure E-Voting Systems. 386-397
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.