close
1.

図書

図書
Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 416 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2836
所蔵情報: loading…
目次情報: 続きを見る
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST / Duncan S. Wong ; Karyin Fung ; Joseph K. Liu ; Victor K. Wei
A Policy Based Framework for Access Control / Ricardo Nabhen ; Edgard Jamhour ; Carlos Maziero
Trading-Off Type-Inference Memory Complexity against Communication / Konstantin Hyppönen ; David Naccache ; Elena Trichina ; Alexei Tchoulkine
Security Remarks on a Group Signature Scheme with Member Deletion / Guilin Wang ; Feng Bao ; Jianying Zhou ; Robert H. Deng
An Efficient Known Plaintext Attack on FEA-M / Hongjun Wu
An Efficient Public-Key Framework / Robert Deng
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature / Jong-Phil Yang ; Chul Sur ; Kyung Hyune Rhee
Practical Service Charge for P2P Content Distribution / Jose Antonio Onieva ; Javier Lopez
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback / Henry C.J. Lee ; Vrizlynn L.L. Thing ; Yi Xu ; Miao Ma
A Lattice Based General Blind Watermark Scheme / Yongliang Liu ; Wen Gao ; Zhao Wang ; Shaohui Liu
Role-Based Access Control and the Access Control Matrix / Gregory Saunders ; Michael Hitchens ; Vijay Varadharajan
Broadcast Encryption Schemes Based on the Sectioned Key Tree / Miodrag J. Mihaljevic
Research on the Collusion Estimation / Gang Li ; Jie Yang
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains / Mohsen Ashourian ; Yo-Sung Ho
Protocols for Malicious Host Revocation / Oscar Esparza ; Miguel Soriano ; Jose L. Muñoz ; Jordi Forne
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code / Pik-Wah Chan ; Michael R. Lyu
A Novel Two-Level Trust Model for Grid / Tie-Yan Li ; HuaFei Zhu ; Kwok-Yan Lam
Practical t-out-n Oblivious Transfer and Its Applications / Qian-Hong Wu ; Jian-Hong Zhang ; Yu-Min Wang
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme / Yongdong Wu
ID-Based Distributed "Magic Ink" Signature from Pairings / Yan Xie ; Fangguo Zhang ; Xiaofeng Chen
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature / Shuwang Lü ; Zhenhua Liu
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives / Yang Cui ; Kazukuni Kobara ; Hideki Imai
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems / Xiao-dong Yi ; Xue-jun Yang
A Novel Efficient Group Signature Scheme with Forward Security / Jianhong Zhang ; Qianhong Wu ; Yumin Wang
Variations of Diffie-Hellman Problem
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine / Taeshik Sohn ; JungTaek Seo ; Jongsub Moon
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine / Min Luo ; Lina Wang ; Huanguo Zhang ; Jin Chen
UC-RBAC: A Usage Constrained Role-Based Access Control Model / Zhen Xu ; Dengguo Feng ; Lan Li ; Hua Chen
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography / Mathieu Ciet ; Marc Joye
An Optimized Multi-bits Blind Watermarking Scheme / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
A Compound Intrusion Detection Model / Jianhua Sun ; Hai Jin ; Hao Chen ; Qian Zhang ; Zongfen Han
An Efficient Convertible Authenticated Encryption Scheme and Its Variant / Hui-Feng Huang ; Chin-Chen Chang
Space-Economical Reassembly for Intrusion Detection System / Meng Zhang ; Jiu-bin Ju
A Functional Decomposition of Virus and Worm Programs / J. Krishna Murthy
Author Index
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
2.

図書

図書
Jianying Zhou, Moti Yung, Yongfei Han, (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 436 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2846
所蔵情報: loading…
目次情報: 続きを見る
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
Anonymity-Enhanced Pseudonym System / Yuko Tamura
Intrusion Detection
Using Feedback to Improve Masquerade Detection / Kwong H. Yung
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services / Zhi Guo ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun
An IP Traceback Scheme Integrating DPM and PPM / Fan Min ; Jun-yan Zhang ; Guo-wie Yang
Cryptographic Algorithms
Improved Scalable Hash Chain Traversal / Sung-Ryul Kim
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem / Rui Zhang ; Hideki Imai
On the Security of Two Threshold Signature Schemes with Traceable Signers / Guilin Wang ; Xiaoxi Han ; Bo Zhu
Digital Signature
Proxy and Threshold One-Time Signatures / Mohamed Al-Ibrahim ; Anton Cerny
A Threshold GQ Signature Scheme / Li-Shan Liu ; Cheng-Kang Chu ; Wen-Guey Tzeng
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary / Gene Itkis ; Peng Xie
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme / Chong-zhi Gao ; Zheng-an Yao ; Lei Li
Security Modelling
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems / Ching Lin ; Vijay Varadharajan
An Authorization Model for E-consent Requirement in a Health Care Application / Chun Ruan
PLI: A New Framework to Protect Digital Content for P2P Networks / Guofei Gu ; Bin B. Zhu ; Shipeng Li ; Shiyong Zhang
Web Security
Improved Algebraic Traitor Tracing Scheme / Chunyan Bai ; Guiliang Feng
Common Vulnerability Markup Language / Haitao Tian ; Liusheng Huang ; Zhi Zhou ; Hui Zhang
Trust on Web Browser: Attack vs. Defense / Tie-Yan Li ; Yongdong Wu
Security Protocols
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards / Luciano Rila ; Chris J. Mitchell
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party / Jae-Gwi Choi ; Kouichi Sakurai ; Ji-Hwan Park
Using OCSP to Secure Certificate-Using Transactions in M-commerce / Jose L. Muñoz ; Jordi Forné ; Oscar Esparza ; Bernabe Miguel Soriano
Cryptanalysis
Differential Fault Analysis on A.E.S / Pierre Dusart ; Gilles Letourneux ; Olivier Vivolo
Side-Channel Attack on Substitution Blocks / Roman Novak
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation / Yasuyuki Sakai
A Fast Correlation Attack for LFSR-Based Stream Ciphers / Sarbani Palit ; Bimal K. Roy ; Arindom De
Key Management
Making the Key Agreement Protocol in Mobile Ad Hoc Network
More Efficient / Gang Yao ; Kui Ren ; Feng Bao ; Robert H. Deng ; Dengguo Feng
An Efficient Tree-Based Group Key Agreement Using Bilinear Map / Sangwon Lee ; Yongdae Kim ; Kwangjo Kim ; Dae-Hyun Ryu
A Key Recovery Mechanism for Reliable Group Key Management / Taenam Cho ; Sang-Ho Lee
Efficient Implementations
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model / Sandeepan Chowdhury ; Subhamoy Maitra
Efficient Distributed Signcryption Scheme as Group Signcryption / DongJin Kwak ; SangJae Moon
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors / Johann Großschädl ; Guy-Armand Kamendje
Author Index
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼