close
1.

図書

図書
Jianying Zhou, Moti Yung, Yongfei Han, (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 436 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2846
所蔵情報: loading…
目次情報: 続きを見る
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
Anonymity-Enhanced Pseudonym System / Yuko Tamura
Intrusion Detection
Using Feedback to Improve Masquerade Detection / Kwong H. Yung
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services / Zhi Guo ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun
An IP Traceback Scheme Integrating DPM and PPM / Fan Min ; Jun-yan Zhang ; Guo-wie Yang
Cryptographic Algorithms
Improved Scalable Hash Chain Traversal / Sung-Ryul Kim
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem / Rui Zhang ; Hideki Imai
On the Security of Two Threshold Signature Schemes with Traceable Signers / Guilin Wang ; Xiaoxi Han ; Bo Zhu
Digital Signature
Proxy and Threshold One-Time Signatures / Mohamed Al-Ibrahim ; Anton Cerny
A Threshold GQ Signature Scheme / Li-Shan Liu ; Cheng-Kang Chu ; Wen-Guey Tzeng
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary / Gene Itkis ; Peng Xie
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme / Chong-zhi Gao ; Zheng-an Yao ; Lei Li
Security Modelling
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems / Ching Lin ; Vijay Varadharajan
An Authorization Model for E-consent Requirement in a Health Care Application / Chun Ruan
PLI: A New Framework to Protect Digital Content for P2P Networks / Guofei Gu ; Bin B. Zhu ; Shipeng Li ; Shiyong Zhang
Web Security
Improved Algebraic Traitor Tracing Scheme / Chunyan Bai ; Guiliang Feng
Common Vulnerability Markup Language / Haitao Tian ; Liusheng Huang ; Zhi Zhou ; Hui Zhang
Trust on Web Browser: Attack vs. Defense / Tie-Yan Li ; Yongdong Wu
Security Protocols
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards / Luciano Rila ; Chris J. Mitchell
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party / Jae-Gwi Choi ; Kouichi Sakurai ; Ji-Hwan Park
Using OCSP to Secure Certificate-Using Transactions in M-commerce / Jose L. Muñoz ; Jordi Forné ; Oscar Esparza ; Bernabe Miguel Soriano
Cryptanalysis
Differential Fault Analysis on A.E.S / Pierre Dusart ; Gilles Letourneux ; Olivier Vivolo
Side-Channel Attack on Substitution Blocks / Roman Novak
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation / Yasuyuki Sakai
A Fast Correlation Attack for LFSR-Based Stream Ciphers / Sarbani Palit ; Bimal K. Roy ; Arindom De
Key Management
Making the Key Agreement Protocol in Mobile Ad Hoc Network
More Efficient / Gang Yao ; Kui Ren ; Feng Bao ; Robert H. Deng ; Dengguo Feng
An Efficient Tree-Based Group Key Agreement Using Bilinear Map / Sangwon Lee ; Yongdae Kim ; Kwangjo Kim ; Dae-Hyun Ryu
A Key Recovery Mechanism for Reliable Group Key Management / Taenam Cho ; Sang-Ho Lee
Efficient Implementations
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model / Sandeepan Chowdhury ; Subhamoy Maitra
Efficient Distributed Signcryption Scheme as Group Signcryption / DongJin Kwak ; SangJae Moon
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors / Johann Großschädl ; Guy-Armand Kamendje
Author Index
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
2.

図書

図書
Jianying Zhou, Moti Yung, Feng Bao (eds.)
出版情報: Berlin : Springer, c2006  xiv, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3989
所蔵情報: loading…
3.

図書

図書
Helger Lipmaa, Moti Yung, Dongdai Lin (eds.)
出版情報: Berlin : Springer, c2006  xi, 303 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4318
所蔵情報: loading…
4.

図書

図書
Reihaneh Safavi-Naini, Moti Yung (eds.)
出版情報: Berlin : Springer, c2006  xi, 355 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3919
所蔵情報: loading…
5.

図書

図書
Roberto De Prisco, Moti Yung (eds.)
出版情報: Berlin : Springer, c2006  xi, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4116
所蔵情報: loading…
目次情報: 続きを見る
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
Signature Schemes Variants
Relations Among Security Notions for Undeniable Signature Schemes / Kaoru Kurosawa ; Swee-Huay Heng
Concurrent Blind Signatures Without Random Oracles / Aggelos Kiayias ; Hong-Sheng Zhou
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions / Fabien Laguillaumie ; Benoit Libert ; Jean-Jacques Quisquater
Block Ciphers Analysis
Understanding Two-Round Differentials in AES / Joan Daemen ; Vincent Rijmen
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b / Jiqiang Lu ; Changhoon Lee ; Jongsung Kim
Anonymity and E-Commerce
Constant-Size Dynamic k-TAA / Man Ho Au ; Willy Susilo ; Yi Mu
On Secure Orders in the Presence of Faults / Amir Herzberg ; Igal Yoffe
Balancing Accountability and Privacy Using E-Cash / Jan Camenisch ; Susan Hohenberger ; Anna Lysyanskaya
Public Key Encryption and Key Exchange
About the Security of MTI/CO and MQV / Sebastien Kunz-Jacques ; David Pointcheval
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles / David Galindo ; Eike Kiltz
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Secret Sharing
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants / Jaume Marti-Farre ; Carles Padro
Cheating Immune (2, n)-Threshold Visual Secret Sharing / Roberto Be Prisco ; Alfredo De Santis
Rational Secret Sharing, Revisited / S. Dov Gordon ; Jonathan Katz
Symmetric Key Cryptanalysis and Randomness
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 / Alex Biryukov ; Bart Preneel ; Seokhie Hong
Distinguishing Stream Ciphers with Convolutional Filters / Gilles Van Assche
On Statistical Testing of Random Numbers Generators / Fida El Haje ; Yuri Golubev ; Pierre-Yvan Liardet ; Yannick Teglia
Applied Authentication
Lightweight Email Signatures / Ben Adida ; David Chau ; Ronald L. Rivest
Shoehorning Security into the EPC Tag Standard / Daniel V. Bailey ; Art Juels
Proof-Carrying Proxy Certificates / Walid Bagga ; Stefano Crosta ; Refik Molva
Public Key Related Cryptanalysis
Cryptanalysis of Rainbow / Olivier Billet ; Henri Gilbert
An Improved LPN Algorithm / Eric Levieil ; Pierre-Alain Fouque
Invited Talk
Theory and Practice of Multiparty Computation / Ivan Damgard
Author Index
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
6.

図書

図書
Luís Caires ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xxv, 1477 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3580
所蔵情報: loading…
7.

図書

図書
Markus Jakobsson, Moti Yung, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xiv, 510 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3089
所蔵情報: loading…
8.

図書

図書
Dengguo Feng, Dongdai Lin, Moti Yung (eds.)
出版情報: Berlin : Springer, c2005  xii, 420 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3822
所蔵情報: loading…
9.

図書

図書
Andrew S. Patrick, Moti Yung (eds.)
出版情報: Berlin : Springer, c2005  xii, 376 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3570
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼