close
1.

電子ブック

EB
Jonathan Katz, David Hutchison, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
2.

電子ブック

EB
Jonathan Katz, David Hutchison, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
3.

電子ブック

EB
David Hutchison, Takeo Kanade, Fabio Martinelli, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
4.

電子ブック

EB
David Hutchison, Takeo Kanade, Moti Yung, Liehuang Zhu
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Trusted Services
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang
Enforcing Sticky Policies with TPM and Virtualization / Gina Kounga ; Liqun Chen
Mobile Trusted Systems
Mass Transit Ticketing with NFC Mobile Phones / Jan-Erik Ekberg ; Sandeep Tamrakar
Anonymous Ticketing for NFC-Enabled Mobile Phones / David Derler ; Klaus Potzmader ; Kurt Dietrich
Security Analysis
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks / Qinggang Yue ; Feng Liu ; Rui Xue
Fault Detection of the MacGuffin Cipher against Differential Fault Attack / Wei Li ; Dawu Gu ; Zhiqiang Liu ; Ya Liu ; Xiaohu Huang
Computationally Sound Symbolic Analysis of EAP-TNC Protocol / Zijian Zhang ; Liehuang Zhu ; Feng Wang ; Lejian Liao ; Gong Guo ; Hongyuan Wang
A Technique for Remote Detection of Certain Virtual Machine Monitors / Christopher Jämthagen ; Martin Hell ; Ben Smeets
Cryptographic Aspects
Indifferentiability of Domain Extension Modes for Hash Functions / Yiyuam Luo ; Xuejia Lai ; Zheng Gong
Multicollisions and Graph-Based Hash Functions / Kimmo Halunen
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng
MQQ-SIG: An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme / Danilo Gligoroski ; Rune Steinsmo ; Ødegard ; Rune Erlend Jensen ; Ludovic Perret ; Jean-Charles Faugère ; Svein Johan Knapskog ; Smile Markovski
Multifactor Authenticated Key Renewal / Shin'ichiro Matsuo ; Daisuke Moriyama ; Moti Yung
Restricted Identification Scheme and Diffie-Hellman Linking Problem / Miroslaw Kutylowski ; Lukasz Krzywiecki ; Przemyslaw Kubiak ; Michal Koza
Trusted Networks
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks / Dong Hao ; Avishek Adhikari ; Kouichi Sakurai
Hash Chains at the Basis of a Secure Reactive Routing Protocol / Thouraya Bouabana-Tebibel
Implementation
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM / Patrick Koeberl ; Jiangtao Li ; Roel Maes ; Anand Rajan ; Claire Vishik ; Marcin Wójcik
A Performance Analysis of Identity-Based Encryption Schemes / Pengqi Cheng ; Yan Gu ; Zihong Lu ; Jianfei Wang ; Wenlei Zhu ; Zhen Chen ; Jiwei Huang
Direct Anonymous Attestation
A (Corrected) DAA Scheme Using Batch Proof and Verification / Ernie Brickell
DAA Protocol Analysis and Verification / Yu Qin ; Xiaobo Chu ; Dengguo Feng ; Wei Feng
Author Index
Trusted Services
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang
5.

電子ブック

EB
David Hutchison, Takeo Kanade, Josef Kittler, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward / Chiaki Ohtahara ; Keita Okada ; Yu Sasaki ; Takeshi Shimoyama
Known-Key Distinguisher on Round-Reduced 3D Block Cipher / Le Dong ; Shuang Wu ; Jian Zou
Identity-Based Signcryption from Identity-Based Cryptography / Woomyo Lee ; Jae Woo Seo ; Pil Joong Lee
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts / Dae Hyun Yum ; Duk Soo Kim ; Jin Seok Kim ; Sung Je Hong
Solving a DLP with Auxiliary Input with the ρ-Algorithm / Yumi Sakemi ; Tetsuya Izu ; Masahiko Takenaka ; Masaya Yasuda
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems / Yanbin Pan ; Yingpu Deng
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage / Tatsuyuki Matsushita ; Shinji Yamanaka ; Fangming Zhao
Rule Indexing for Efficient Intrusion Detection Systems / Boojoong Kang ; Hye Seon Kim ; Ji Su Yang ; Eul Gyu Im
Security Data Extraction from LEC 61850 ACSI Models for Network and System Management / Chung-Hyo Kim ; Moon-Seok Choi ; Seong-Ho Ju ; Yong-Hun Lim ; Jong-Mock Baek
Lightweight Middleware-Based ZigBee Security in Building Energy Management System / Insung Hong ; Jisung Byun ; Sehyun Park
A Map-Layer-Based Access Control Model / Yingjun Zhang ; Yang Zhang ; Kai Chen
Application Authentication for Hybrid Services of Broadcasting and Communications Networks / Go Ohtake ; Kazuto Ogawa
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols / Naoto Kiribuchi ; Ryo Kato ; Takashi Nishide ; Tsukasa Endo ; Hiroshi Yoshiura
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks / Kwantae Cho ; Dong Hoon Lee
Mutual Private Set Intersection with Linear Complexity / Myungsun Kim ; Hyung Tae Lee ; Jung Hee Cheon
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs / Chung Il Sun ; Tae Ho Cho
Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation / Jarno Salonen
Exploiting Routing Tree Construction in CTP / Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson
Author Index
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang
6.

電子ブック

EB
David Hutchison, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼