Cryptographic Applications |
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel |
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji |
Anonymity-Enhanced Pseudonym System / Yuko Tamura |
Intrusion Detection |
Using Feedback to Improve Masquerade Detection / Kwong H. Yung |
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services / Zhi Guo ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun |
An IP Traceback Scheme Integrating DPM and PPM / Fan Min ; Jun-yan Zhang ; Guo-wie Yang |
Cryptographic Algorithms |
Improved Scalable Hash Chain Traversal / Sung-Ryul Kim |
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem / Rui Zhang ; Hideki Imai |
On the Security of Two Threshold Signature Schemes with Traceable Signers / Guilin Wang ; Xiaoxi Han ; Bo Zhu |
Digital Signature |
Proxy and Threshold One-Time Signatures / Mohamed Al-Ibrahim ; Anton Cerny |
A Threshold GQ Signature Scheme / Li-Shan Liu ; Cheng-Kang Chu ; Wen-Guey Tzeng |
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary / Gene Itkis ; Peng Xie |
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme / Chong-zhi Gao ; Zheng-an Yao ; Lei Li |
Security Modelling |
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems / Ching Lin ; Vijay Varadharajan |
An Authorization Model for E-consent Requirement in a Health Care Application / Chun Ruan |
PLI: A New Framework to Protect Digital Content for P2P Networks / Guofei Gu ; Bin B. Zhu ; Shipeng Li ; Shiyong Zhang |
Web Security |
Improved Algebraic Traitor Tracing Scheme / Chunyan Bai ; Guiliang Feng |
Common Vulnerability Markup Language / Haitao Tian ; Liusheng Huang ; Zhi Zhou ; Hui Zhang |
Trust on Web Browser: Attack vs. Defense / Tie-Yan Li ; Yongdong Wu |
Security Protocols |
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards / Luciano Rila ; Chris J. Mitchell |
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party / Jae-Gwi Choi ; Kouichi Sakurai ; Ji-Hwan Park |
Using OCSP to Secure Certificate-Using Transactions in M-commerce / Jose L. Muñoz ; Jordi Forné ; Oscar Esparza ; Bernabe Miguel Soriano |
Cryptanalysis |
Differential Fault Analysis on A.E.S / Pierre Dusart ; Gilles Letourneux ; Olivier Vivolo |
Side-Channel Attack on Substitution Blocks / Roman Novak |
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation / Yasuyuki Sakai |
A Fast Correlation Attack for LFSR-Based Stream Ciphers / Sarbani Palit ; Bimal K. Roy ; Arindom De |
Key Management |
Making the Key Agreement Protocol in Mobile Ad Hoc Network |
More Efficient / Gang Yao ; Kui Ren ; Feng Bao ; Robert H. Deng ; Dengguo Feng |
An Efficient Tree-Based Group Key Agreement Using Bilinear Map / Sangwon Lee ; Yongdae Kim ; Kwangjo Kim ; Dae-Hyun Ryu |
A Key Recovery Mechanism for Reliable Group Key Management / Taenam Cho ; Sang-Ho Lee |
Efficient Implementations |
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model / Sandeepan Chowdhury ; Subhamoy Maitra |
Efficient Distributed Signcryption Scheme as Group Signcryption / DongJin Kwak ; SangJae Moon |
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors / Johann Großschädl ; Guy-Armand Kamendje |
Author Index |
Cryptographic Applications |
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel |
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji |