default search action
WISA 2008: Jeju Island, Korea
- Kyo-Il Chung, Kiwook Sohn, Moti Yung:
Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5379, Springer 2009, ISBN 978-3-642-00305-9
Smart Card and Secure Hardware(1)
- Christoph Herbst, Marcel Medwed:
Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation. 1-13 - Marcel Medwed, Elisabeth Oswald:
Template Attacks on ECDSA. 14-27 - Takeshi Sugawara, Naofumi Homma, Takafumi Aoki, Akashi Satoh:
Compact ASIC Architectures for the 512-Bit Hash Function Whirlpool. 28-40
Wireless and Sensor Network Security(1)
- Qingyu Xu, Mingxing He:
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. 41-55 - Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. 56-68 - Md. Shariful Islam, Md. Abdul Hamid, Byung Goo Choi, Choong Seon Hong:
Securing Layer-2 Path Selection in Wireless Mesh Networks. 69-83
Public Key Crypto Applications
- Camille Vuillaume, Katsuyuki Okeya, Erik Dahmen, Johannes Buchmann:
Public Key Authentication with Memory Tokens. 84-98 - Wei Wu, Yi Mu, Willy Susilo, Xinyi Huang:
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. 99-114 - S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan:
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. 115-129
Privacy and Anonymity
- Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka:
Sanitizable and Deletable Signature. 130-144 - Peishun Wang, Huaxiong Wang, Josef Pieprzyk:
An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data. 145-159 - Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta:
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. 160-173
N/W Security and Intrusion Detection
- Hidenori Kuwakado, Shoichi Hirose:
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. 174-189 - Sooyoung Chae, Hosub Lee, Jaeik Cho, Manhyun Jung, Jongin Lim, Jongsub Moon:
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. 190-200 - Jun-Hyung Park, Minsoo Kim, Bong-Nam Noh:
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. 201-210
Application Security and Trust Management
- Hassan Jameel, Riaz Ahmed Shaikh, Le Xuan Hung, Weiwei Yuan, Syed Muhammad Khaliq-ur-Rahman Raazi, Ngo Trong Canh, Sungyoung Lee, Heejo Lee, Yuseung Son, Miguel Fernandes:
Image-Feature Based Human Identification Protocols on Limited Display Devices. 211-224 - Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis. 225-239 - Marek Klonowski, Michal Przykucki, Tomasz Struminski:
Data Deletion with Provable Security. 240-255
Smart Card and Secure Hardware(2)
- Jörn-Marc Schmidt, Chong Hee Kim:
A Probing Attack on AES. 256-265 - Josep M. Miret, Daniel Sadornil, Juan Tena, Rosana Tomàs, Magda Valls:
On Avoiding ZVP-Attacks Using Isogeny Volcanoes. 266-277 - Shoichi Hirose:
Security Analysis of DRBG Using HMAC in NIST SP 800-90. 278-291
Wireless and Sensor Network Security(2)
- Mooseop Kim, Jaecheol Ryou, Sungik Jun:
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. 292-304 - Jun Zhou, Mingxing He:
An Improved Distributed Key Management Scheme in Wireless Sensor Networks. 305-319 - Donghyun Choi, Sungkyu Cho, Dongho Won, Seungjoo Kim:
Protection Profile for Connected Interoperable DRM Framework. 320-332
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.