default search action
10. ISC 2007: Valparaíso, Chile
- Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta:
Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings. Lecture Notes in Computer Science 4779, Springer 2007, ISBN 978-3-540-75495-4
Intrusion Detection
- Thomas Raffetseder, Christopher Krügel, Engin Kirda:
Detecting System Emulators. 1-18 - Iosif-Viorel Onut, Ali A. Ghorbani:
Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. 19-36 - Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque:
E-NIPS: An Event-Based Network Intrusion Prediction System. 37-52
Digital Rights Management
- Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg:
Enabling Fairer Digital Rights Management with Trusted Computing. 53-70 - Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan:
Traitor Tracing with Optimal Transmission Rate. 71-88
Symmetric-Key Cryptography
- Debra L. Cook, Moti Yung, Angelos D. Keromytis:
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. 89-103 - Jorge Nakahara Jr., Ivan Carlos Pavão:
Impossible-Differential Attacks on Large-Block Rijndael. 104-117 - Akashi Satoh, Takeshi Sugawara, Takafumi Aoki:
High-Speed Pipelined Hardware Architecture for Galois Counter Mode. 118-129
Cryptographic Protocols and Schemes
- Mehmet S. Kiraz, Berry Schoenmakers, José Villegas:
Efficient Committed Oblivious Transfer of Bit Strings. 130-144 - Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao:
An Efficient Certified Email Protocol. 145-157 - Alexander W. Dent, Qiang Tang:
Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. 158-174 - Fabien Laguillaumie, Damien Vergnaud:
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. 175-188
Identify-Based Cryptography
- Cheng-Kang Chu, Wen-Guey Tzeng:
Identity-Based Proxy Re-encryption Without Random Oracles. 189-202 - Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. 203-220
Cryptanalysis
- Yao-Dong Zhao, Wen-Feng Qi:
Small Private-Exponent Attack on RSA with Primes Sharing Bits. 221-229 - Joo Yeon Cho, Josef Pieprzyk:
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. 230-248 - Gautham Sekar, Souradyuti Paul, Bart Preneel:
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. 249-262
Network Security
- Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins:
Queue Management as a DoS Counter-Measure? 263-280
Software Obfuscation
- Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov:
On the Concept of Software Obfuscation in Computer Security. 281-298 - Stephen Drape, Clark D. Thomborson, Anirban Majumdar:
Specifying Imperative Data Obfuscations. 299-314
Public-Key Cryptosystems
- Sherman S. M. Chow:
Token-Controlled Public Key Encryption in the Standard Model. 315-332 - Guilhem Castagnos, Damien Vergnaud:
Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. 333-350 - Yvo Desmedt, Kaoru Kurosawa:
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. 351-361 - Guilhem Castagnos, Benoît Chevallier-Mames:
Towards a DL-Based Additively Homomorphic Encryption Scheme. 362-375
Elliptic Curves and Applications
- Billy Bob Brumley, Kaisa Nyberg:
Differential Properties of Elliptic Curves and Blind Signatures. 376-389 - Pradeep Kumar Mishra, Vassil S. Dimitrov:
Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. 390-406
Database Security and Privacy
- Joachim Biskup, Jan-Hendrik Lochner:
Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. 407-422 - George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel:
Efficient Negative Databases from Cryptographic Hash Functions. 423-436
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.