


default search action
SSR 2015: Tokyo, Japan
- Liqun Chen, Shin'ichiro Matsuo:
Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Lecture Notes in Computer Science 9497, Springer 2015, ISBN 978-3-319-27151-4
Bitcoin and Payment
- Patrick McCorry, Siamak Fayyaz Shahandashti
, Dylan Clarke, Feng Hao
:
Authenticated Key Exchange over Bitcoin. 3-20 - Maryam Mehrnezhad, Feng Hao
, Siamak Fayyaz Shahandashti
:
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. 21-39
Protocol and API
- Jung Yeon Hwang, Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Boyeon Song:
Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures. 43-69 - Karl Christoph Ruland, Jochen Sassmannshausen:
Non-repudiation Services for the MMS Protocol of IEC 61850. 70-85 - Antonio González-Burgueño, Sonia Santiago
, Santiago Escobar
, Catherine Meadows, José Meseguer:
Analysis of the PKCS#11 API Using the Maude-NPA Tool. 86-106
Analysis on Cryptographic Algorithm
- Daniel J. Bernstein, Tung Chou
, Chitchanok Chuengsatiansup, Andreas Hülsing
, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal:
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to. 109-139 - Zhenfeng Zhang, Kang Yang, Jiang Zhang
, Cheng Chen:
Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks. 140-153 - Gautham Sekar:
Side Channel Cryptanalysis of Streebog. 154-162
Privacy
- Mohammed Shafiul Alam Khan, Chris J. Mitchell
:
Improving Air Interface User Privacy in Mobile Telephony. 165-184 - Mwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li
, Chris J. Mitchell
, Po-Wah Yau:
Generating Unlinkable IPv6 Addresses. 185-199
Trust and Formal Analysis
- Masatoshi Hokino, Yuri Fujiki, Sakura Onda, Takeaki Kaneko, Natsuhiko Sakimura, Hiroyuki Sato:
A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks. 203-217 - Kristof Teichel, Dieter Sibold, Stefan Milius:
First Results of a Formal Analysis of the Network Time Security Specification. 218-245 - Joshua D. Guttman
, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe:
Formal Support for Standardizing Protocols with State. 246-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.