close
1.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
2.

電子ブック

EB
Liqun Chen, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
3.

電子ブック

EB
Shlomi Dolev, Jorge Cobb, Michael Fischer, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
A Geometry of Networks / Yechiam Yemini
Contributed Papers
Systematic Correct Construction of Self-stabilizing Systems: A Case Study / Ananda Basu ; Borzoo Bonakdarpour ; Marius Bozga ; Joseph Sifakis
A Fault-Resistant Asynchronous Clock Function / Ezra N. Hoch ; Michael Ben-Or ; Danny Dolev
Self-stabilizing Leader Election in Dynamic Networks / Ajoy K. Datta ; Lawrence L. Larmore ; Hema Piniganti
Loop-Free Super-Stabilizing Spanning Tree Construction / Lélia Blin ; Maria Gradinariu Potop-Butucaru ; Stephane Rovedakis ; Sébastien Tixeuil
A New Technique for Proving Self-stabilizing under the Distributed Scheduler / Sven Köhler ; Volker Turau
Tranformational Approach for Designing Scheduler-Oblivious Self-stabilizing Algorithms / Abhishek Dhama ; Oliver Theel
On Byzantine Containment Properties of the min+1 Protocol / Swan Dubois ; Toshimitsu Masuzawa
Efficient Self-stabilizing Graph Searching in Tree Networks / Jean Blair ; Fredrik Manne ; Rodica Mihai
Adaptive Containment of Time-Bounded Byzantine Faults / Yukiko Yamauchi ; Doina Bein
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
Self-stabilizing Algorithm of Two-Hop Conflict Resolution / Stéphane Pomportes ; Joanna Tomasik ; Anthony Busson ; Véronique Vèque
Low Memory Distributed Protocols for 2-Coloring / Amos Israeli ; Mathew D. McCubbins ; Ramamohan Paturi ; Andrea Vattani
Connectivity-Preserving Scattering of Mobile Robots with Limited Visibility / Taisuke Izumi
Computing in Social Networks / Andrei Giurgiu ; Rachid Guerraoui ; Kévin Huguenin ; Anne-Marie Kermarrec
On Transactional Scheduling in Distributed Transactional Memory Systems / Junwhan Kim ; Binoy Ravindran
Recursion in Distributed Computing / Eli Gafni ; Sergio Rajsbaum
On Adaptive Renaming under Eventually Limited Contention / Damien Imbs ; Michel Raynal
RobuSTM: A Robust Software Transactional Memory / Jons-Tobias Wamhoff ; Torvald Riegel ; Christof Fetzer ; Pascal Felber
A Provably Starvation-Free Distributed Directory Protocol / Hagit Attiya ; Vincent Gramoli ; Alessia Milani
Lightweight Live Migration for High Availability Cluster Service / Bo Jiang ; Changsoo Kim
Approximation of ?-Timeliness / Carole Delporte-Gallet ; Stéphane Devismes ; Hugues Fauconnier
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
4.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
5.

電子ブック

EB
Yongwha Chung, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets / Wenpan Jing ; Haixia Xu ; Bao Li
Distributed Paillier Cryptosystem without Trusted Dealer / Takashi Nishide ; Kouichi Sakurai
Implementation
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains / Colin D. Walter
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs / Boufeldja Allailou ; Abdelaziz Marjane ; Abdellah Mokrane
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices / Erich Wenger ; Martin Feldhofer ; Nobert Felber
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling / Takehiko Amaki ; Masanori Hashimoto ; Yukio Mitsuyama ; Takao Onoye
Mobile Security/Secure Coding
Using Special Use Cases for Security in the Software Development Life Cycle / Jean-Marie Kabasele Tenday
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Atsuko Miyaji ; Kazumasa Omote
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6 / Jae-hoon Jang ; Don-Gu Yeo ; Dong-hee Lee ; Heung-Youl Youm
Hidden Credential Retrieval without Random Oracles / Mohammad Shahriar Rahman ; Masakazu Soshi
Attack
Combined Side-Channel Attacks / M. Abdelaziz Elaabid ; Olivier Meynard ; Sylvain Guilley ; Jean-Luc Danger
Correlation Power Analysis Based on Switching Glitch Model / Hongying Liu ; Guoyu Qian ; Satoshi Goto ; Yukiyasu Tsunoo
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity / Nico Döttling ; Dejan Lazich ; Jörn Müller-Quade ; Antonio Sobreira de Almeida
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks / Kehua Bao ; Zhenfeng Zhang
Full-Round Differential Attact on TWIS Block Clipher / Bozhan Su ; Wenling Wu ; Lei Zhang ; Yanjun Li
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations / Jean-François Gallais ; Ilya Kizhvatov ; Michael Tunstall
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis / Daisuke Nakatsu ; Yang Li ; Kazuo Sakiyama ; Kazuo Ohta
Biometrics
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram / Hansung Lee ; Yunsu Chung ; Jeongnyeo Kim ; Daihee Park
Fingerprint Liveness Detection Based on Multiple Image Quality Features / Changlong Jin ; Shengazhe Li ; Hakil Kim ; Ensoo Park
Robust Feature Extraction for Facial Image Quality Assessment / Thi Hai Binh Nguyen ; Van Huan Nguyen
Secure Protocol
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother / Rafael Dowsley ; Goichiro Hanaoka ; Hideki Imai ; Anderson C.A. Nascimento
Cross-Realm Password-Based Server Aided Key Exchange
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product / Jeroen van de Graaf ; Davidson Marques
Author Index
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
6.

電子ブック

EB
Xuejia Lai, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
7.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
8.

電子ブック

EB
David Hutchison, Takeo Kanade, Fabio Martinelli, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
9.

電子ブック

EB
Liqun Chen, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
10.

電子ブック

EB
David Hutchison, Takeo Kanade, Moti Yung, Liehuang Zhu
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Trusted Services
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang
Enforcing Sticky Policies with TPM and Virtualization / Gina Kounga ; Liqun Chen
Mobile Trusted Systems
Mass Transit Ticketing with NFC Mobile Phones / Jan-Erik Ekberg ; Sandeep Tamrakar
Anonymous Ticketing for NFC-Enabled Mobile Phones / David Derler ; Klaus Potzmader ; Kurt Dietrich
Security Analysis
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks / Qinggang Yue ; Feng Liu ; Rui Xue
Fault Detection of the MacGuffin Cipher against Differential Fault Attack / Wei Li ; Dawu Gu ; Zhiqiang Liu ; Ya Liu ; Xiaohu Huang
Computationally Sound Symbolic Analysis of EAP-TNC Protocol / Zijian Zhang ; Liehuang Zhu ; Feng Wang ; Lejian Liao ; Gong Guo ; Hongyuan Wang
A Technique for Remote Detection of Certain Virtual Machine Monitors / Christopher Jämthagen ; Martin Hell ; Ben Smeets
Cryptographic Aspects
Indifferentiability of Domain Extension Modes for Hash Functions / Yiyuam Luo ; Xuejia Lai ; Zheng Gong
Multicollisions and Graph-Based Hash Functions / Kimmo Halunen
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng
MQQ-SIG: An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme / Danilo Gligoroski ; Rune Steinsmo ; Ødegard ; Rune Erlend Jensen ; Ludovic Perret ; Jean-Charles Faugère ; Svein Johan Knapskog ; Smile Markovski
Multifactor Authenticated Key Renewal / Shin'ichiro Matsuo ; Daisuke Moriyama ; Moti Yung
Restricted Identification Scheme and Diffie-Hellman Linking Problem / Miroslaw Kutylowski ; Lukasz Krzywiecki ; Przemyslaw Kubiak ; Michal Koza
Trusted Networks
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks / Dong Hao ; Avishek Adhikari ; Kouichi Sakurai
Hash Chains at the Basis of a Secure Reactive Routing Protocol / Thouraya Bouabana-Tebibel
Implementation
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM / Patrick Koeberl ; Jiangtao Li ; Roel Maes ; Anand Rajan ; Claire Vishik ; Marcin Wójcik
A Performance Analysis of Identity-Based Encryption Schemes / Pengqi Cheng ; Yan Gu ; Zihong Lu ; Jianfei Wang ; Wenlei Zhu ; Zhen Chen ; Jiwei Huang
Direct Anonymous Attestation
A (Corrected) DAA Scheme Using Batch Proof and Verification / Ernie Brickell
DAA Protocol Analysis and Verification / Yu Qin ; Xiaobo Chu ; Dengguo Feng ; Wei Feng
Author Index
Trusted Services
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang
11.

電子ブック

EB
Shlomi Dolev, Jorge Cobb, Michael Fischer, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
A Geometry of Networks / Yechiam Yemini
Contributed Papers
Systematic Correct Construction of Self-stabilizing Systems: A Case Study / Ananda Basu ; Borzoo Bonakdarpour ; Marius Bozga ; Joseph Sifakis
A Fault-Resistant Asynchronous Clock Function / Ezra N. Hoch ; Michael Ben-Or ; Danny Dolev
Self-stabilizing Leader Election in Dynamic Networks / Ajoy K. Datta ; Lawrence L. Larmore ; Hema Piniganti
Loop-Free Super-Stabilizing Spanning Tree Construction / Lélia Blin ; Maria Gradinariu Potop-Butucaru ; Stephane Rovedakis ; Sébastien Tixeuil
A New Technique for Proving Self-stabilizing under the Distributed Scheduler / Sven Köhler ; Volker Turau
Tranformational Approach for Designing Scheduler-Oblivious Self-stabilizing Algorithms / Abhishek Dhama ; Oliver Theel
On Byzantine Containment Properties of the min+1 Protocol / Swan Dubois ; Toshimitsu Masuzawa
Efficient Self-stabilizing Graph Searching in Tree Networks / Jean Blair ; Fredrik Manne ; Rodica Mihai
Adaptive Containment of Time-Bounded Byzantine Faults / Yukiko Yamauchi ; Doina Bein
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
Self-stabilizing Algorithm of Two-Hop Conflict Resolution / Stéphane Pomportes ; Joanna Tomasik ; Anthony Busson ; Véronique Vèque
Low Memory Distributed Protocols for 2-Coloring / Amos Israeli ; Mathew D. McCubbins ; Ramamohan Paturi ; Andrea Vattani
Connectivity-Preserving Scattering of Mobile Robots with Limited Visibility / Taisuke Izumi
Computing in Social Networks / Andrei Giurgiu ; Rachid Guerraoui ; Kévin Huguenin ; Anne-Marie Kermarrec
On Transactional Scheduling in Distributed Transactional Memory Systems / Junwhan Kim ; Binoy Ravindran
Recursion in Distributed Computing / Eli Gafni ; Sergio Rajsbaum
On Adaptive Renaming under Eventually Limited Contention / Damien Imbs ; Michel Raynal
RobuSTM: A Robust Software Transactional Memory / Jons-Tobias Wamhoff ; Torvald Riegel ; Christof Fetzer ; Pascal Felber
A Provably Starvation-Free Distributed Directory Protocol / Hagit Attiya ; Vincent Gramoli ; Alessia Milani
Lightweight Live Migration for High Availability Cluster Service / Bo Jiang ; Changsoo Kim
Approximation of ?-Timeliness / Carole Delporte-Gallet ; Stéphane Devismes ; Hugues Fauconnier
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
12.

電子ブック

EB
Yongwha Chung, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets / Wenpan Jing ; Haixia Xu ; Bao Li
Distributed Paillier Cryptosystem without Trusted Dealer / Takashi Nishide ; Kouichi Sakurai
Implementation
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains / Colin D. Walter
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs / Boufeldja Allailou ; Abdelaziz Marjane ; Abdellah Mokrane
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices / Erich Wenger ; Martin Feldhofer ; Nobert Felber
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling / Takehiko Amaki ; Masanori Hashimoto ; Yukio Mitsuyama ; Takao Onoye
Mobile Security/Secure Coding
Using Special Use Cases for Security in the Software Development Life Cycle / Jean-Marie Kabasele Tenday
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Atsuko Miyaji ; Kazumasa Omote
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6 / Jae-hoon Jang ; Don-Gu Yeo ; Dong-hee Lee ; Heung-Youl Youm
Hidden Credential Retrieval without Random Oracles / Mohammad Shahriar Rahman ; Masakazu Soshi
Attack
Combined Side-Channel Attacks / M. Abdelaziz Elaabid ; Olivier Meynard ; Sylvain Guilley ; Jean-Luc Danger
Correlation Power Analysis Based on Switching Glitch Model / Hongying Liu ; Guoyu Qian ; Satoshi Goto ; Yukiyasu Tsunoo
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity / Nico Döttling ; Dejan Lazich ; Jörn Müller-Quade ; Antonio Sobreira de Almeida
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks / Kehua Bao ; Zhenfeng Zhang
Full-Round Differential Attact on TWIS Block Clipher / Bozhan Su ; Wenling Wu ; Lei Zhang ; Yanjun Li
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations / Jean-François Gallais ; Ilya Kizhvatov ; Michael Tunstall
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis / Daisuke Nakatsu ; Yang Li ; Kazuo Sakiyama ; Kazuo Ohta
Biometrics
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram / Hansung Lee ; Yunsu Chung ; Jeongnyeo Kim ; Daihee Park
Fingerprint Liveness Detection Based on Multiple Image Quality Features / Changlong Jin ; Shengazhe Li ; Hakil Kim ; Ensoo Park
Robust Feature Extraction for Facial Image Quality Assessment / Thi Hai Binh Nguyen ; Van Huan Nguyen
Secure Protocol
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother / Rafael Dowsley ; Goichiro Hanaoka ; Hideki Imai ; Anderson C.A. Nascimento
Cross-Realm Password-Based Server Aided Key Exchange
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product / Jeroen van de Graaf ; Davidson Marques
Author Index
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
13.

電子ブック

EB
David Hutchison, Takeo Kanade, Josef Kittler, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward / Chiaki Ohtahara ; Keita Okada ; Yu Sasaki ; Takeshi Shimoyama
Known-Key Distinguisher on Round-Reduced 3D Block Cipher / Le Dong ; Shuang Wu ; Jian Zou
Identity-Based Signcryption from Identity-Based Cryptography / Woomyo Lee ; Jae Woo Seo ; Pil Joong Lee
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts / Dae Hyun Yum ; Duk Soo Kim ; Jin Seok Kim ; Sung Je Hong
Solving a DLP with Auxiliary Input with the ρ-Algorithm / Yumi Sakemi ; Tetsuya Izu ; Masahiko Takenaka ; Masaya Yasuda
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems / Yanbin Pan ; Yingpu Deng
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage / Tatsuyuki Matsushita ; Shinji Yamanaka ; Fangming Zhao
Rule Indexing for Efficient Intrusion Detection Systems / Boojoong Kang ; Hye Seon Kim ; Ji Su Yang ; Eul Gyu Im
Security Data Extraction from LEC 61850 ACSI Models for Network and System Management / Chung-Hyo Kim ; Moon-Seok Choi ; Seong-Ho Ju ; Yong-Hun Lim ; Jong-Mock Baek
Lightweight Middleware-Based ZigBee Security in Building Energy Management System / Insung Hong ; Jisung Byun ; Sehyun Park
A Map-Layer-Based Access Control Model / Yingjun Zhang ; Yang Zhang ; Kai Chen
Application Authentication for Hybrid Services of Broadcasting and Communications Networks / Go Ohtake ; Kazuto Ogawa
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols / Naoto Kiribuchi ; Ryo Kato ; Takashi Nishide ; Tsukasa Endo ; Hiroshi Yoshiura
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks / Kwantae Cho ; Dong Hoon Lee
Mutual Private Set Intersection with Linear Complexity / Myungsun Kim ; Hyung Tae Lee ; Jung Hee Cheon
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs / Chung Il Sun ; Tae Ho Cho
Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation / Jarno Salonen
Exploiting Routing Tree Construction in CTP / Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson
Author Index
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang
14.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
15.

電子ブック

EB
Xuejia Lai, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
16.

電子ブック

EB
David Hutchison, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼