close
1.

図書

図書
Burton S. Kaliski, Jr., Çetin K. Koç, Christof Paar (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 612 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2523
所蔵情報: loading…
2.

図書

図書
Maritta Heisel, Peter Liggesmeyer, Stefan Wittmann (eds.)
出版情報: Berlin : Springer, c2004  xi, 337 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3219
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
The Deconstruction of Safety Arguments Through Adversarial Counter-Argument / J.M. Armstrong ; S.E. Paynter
Using Fuzzy Self-Organising Maps for Safety Critical Systems / Z. Kurd ; T.P. Kelly
Using Formal Methods in a Retrospective Safety Case / L.-H. Eriksson
Reliability
A Highly Fault Detectable Cache Architecture for Dependable Computing / H.R. Zarandi ; S.G. Miremadi
An Empirical Exploration of the Difficulty Function / J.G.W. Bentley ; P.G. Bishop ; M. van der Meulen
Towards the Integration of Fault, Resource, and Power Management / T. Saridakis
Human Factors
Modeling Concepts for Safety-Related Requirements in Sociotechnical Systems / M. Cebulla
Analysing Mode Confusion: An Approach Using FDR2 / B. Buth
Handling Safety Critical Requirements in System Engineering Using the B Formal Method / D. Essame
Transportation
A Hybrid Testing Methodology for Railway Control Systems / G. De Nicola ; P. di Tommaso ; R. Esposito ; F. Flammini ; A. Orazzo
Actuator Based Hazard Analysis for Safety Critical Systems / P. Johannessen ; F. Torner ; J. Torin
Performability Measures of the Public Mobile Network of a Tele Control System / E. Ciancamerla ; M. Minichino
Software Development
PLC-Based Safety Critical Software Development for Nuclear Power Plants / J. Yoo ; S. Cha ; H.S. Son ; C.H. Kim ; J.-S. Lee
Compositional Hazard Analysis of UML Component and Deployment Models / H. Giese ; M. Tichy ; D. Schilling
Automatic Test Data Generation from Embedded C Code / E. Dillon ; C. Meudec
Fault Tree Analysis
State-Event-Fault-Trees - A Safety Analysis Model for Software Controlled Systems / B. Kaiser ; C. Gramlich
Safety Requirements and Fault Trees Using Retrenchment / R. Banach ; R. Cross
The Effects on Reliability of Integration of Aircraft Systems Based on Integrated Modular Avionics / D. Rehage ; U.B. Carl ; M. Merkel ; A. Vahl
Automotive Telematics - Road Safety Versus IT Security? / R.G. Herrtwich
Formal Methods and Systems
Modular Formal Analysis of the Central Guardian in the Time-Triggered Architecture / H. Pfeifer ; F.W. von Henke
Refinement of Fault Tolerant Control Systems in B / L. Laibinis ; E. Troubitsyna
Numerical Integration of PDEs for Safety Critical Applications Implemented by I&C Systems / M. Vollmer
Security and Quality of Service
An Integrated View of Security Analysis and Performance Evaluation: Trading QoS with Covert Channel Bandwidth / A. Aldini ; M. Bernardo
Dependability Benchmarking of Web-Servers / J. Duraes ; M. Vieira ; H. Madeira
Hazard and Risk Analysis
An Approach for Model-Based Risk Assessment / B.A. Gran ; R. Fredriksen ; A.P.-J. Thunem
How Explicit Are the Barriers to Failure in Safety Arguments? / S.P. Smith ; M.D. Harrison ; B.A. Schupp
Author Index
Invited Talk
Why Safety and Security Should and Will Merge / A. Pfitzmann
Safety Cases
3.

図書

図書
Kan Zhang, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2004  xii, 442 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3225
所蔵情報: loading…
目次情報: 続きを見る
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
Storage-Efficient Stateless Group Key Revocation / Pan Wang ; Peng Ning ; Douglas S. Reeves
Digital Signatures
Low-Level Ideal Signatures and General Integrity Idealization / Michael Backes ; Birgit Pfitzmann ; Michael Waidner
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA / Julien Cathalo ; Benoît Libert ; Jean-Jacques Quisquater
How to Break and Repair a Universally Composable Signature Functionality / Dennis Hofheinz
New Algorithms
RSA Accumulator Based Broadcast Encryption / Craig Gentry ; Zulfikar Ramzan
Chameleon Hashing Without Key Exposure / Xiaofeng Chen ; Fangguo Zhang ; Kwangjo Kim
Radix-r Non-Adjacent Form / Tsuyoshi Takagi ; Sung-Ming Yen ; Bo-Ching Wu
Cryptanalysis
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor / Raphael C.-W. Phan ; Helena Handschuh
Security Analysis of Two Signcryption Schemes / Guilin Wang ; Robert H. Deng ; DongJin Kwak ; SangJae Moon
On The Security of Key Derivation Functions / Carlisle Adams ; Guenther Kramer ; Serge Mister ; Robert Zuccherato
Intrusion Detection
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery / Hai Wang ; Peng Liu ; Lunqun Li
A Model for the Semantics of Attack Signatures in Misuse Detection Systems / Michael Meier
Detection of Sniffers in an Ethernet Network / Zouheir Trabelsi ; Hamza Rahmani
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks / Mark Foster ; Joseph N. Wilson ; Shigang Chen
Securing DBMS: Characterizing and Detecting Query Floods / Elisa Bertino ; Teodoro Leggieri ; Evimaria Terzi
Access Control
An XML-Based Approach to Document Flow Verification / Elena Ferrari ; Giovanni Mella
Model-Checking Access Control Policies / Dimitar P. Guelev ; Mark Ryan ; Pierre Yves Schobbens
A Distributed High Assurance Reference Monitor / Ajay Chander ; Drew Dean ; John Mitchell
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control / D. Nali ; C. Adams ; A. Miri
Human Authentication
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security) / Richard Bergmair ; Stefan Katzenbeisser
Image Recognition CAPTCHAs / Monica Chew ; J.D. Tygar
Certificate Management
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model / Zhengyi Le ; Yi Ouyang ; James Ford ; Fillia Makedon
Certificate Recommendations to Improve the Robustness of Web of Trust / Qinglin Jiang
Mobile and Ad Hoc Security
Universally Composable Secure Mobile Agent Computation / Ke Xu ; Stephen R. Tate
Re-thinking Security in IP Based Micro-Mobility / Jukka Ylitalo ; Jan Melén ; Pekka Nikander ; Vesa Torvinen
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group / Qianhong Wu ; Changjie Wang ; Yumin Wang
Web Security
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions / HongQian Karen Lu ; Asad Ali
Provable Unlinkability Against Traffic Analysis Already After <$>{\cal O}<$>(log(n)) Steps! / Marcin Gomułkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
An Efficient Online Electronic Cash with Unlinkable Exact Payments / Toru Nakanishi ; Mitsuaki Shiota ; Yuji Sugiyama
Digital Rights Management
Modifiable Digital Content Protection in P2P / Heejae Park ; Jong Kim
Survey on the Technological Aspects of Digital Rights Management / William Ku ; Chi-Hung Chi
Detecting Software Theft via Whole Program Path Birthmarks / Ginger Myles ; Christian Collberg
Software Security
Effective Security Requirements Analysis: HAZOP and Use Cases / Thitima Srivatanakul ; John A. Clark ; Fiona Polack
The Obfuscation Executive / Kelly Heffner
Author Index
Key Management
Practical Authenticated Key Agreement Using Passwords / Taekyoung Kwon
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks / Muxiang Zhang
4.

図書

図書
Howard Heys, Carlisle Adams (eds.)
出版情報: Berlin : Springer, c2000  viii, 241 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1758
所蔵情報: loading…
5.

図書

図書
Andreas Pfitzmann (ed.)
出版情報: Berlin : Springer, c2000  ix, 492 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1768
所蔵情報: loading…
目次情報: 続きを見る
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
Steganography: Paradigms and Examples
Steganography Secure against Cover-Stego-Attacks / Elke Franz ; Andreas Pfitzmann
Secure Steganographic Methods for Palette Images / Jiri Fridrich ; Rui Du
Attacks on Steganographic Systems / Andreas Westfeld
Beyond Symmetric Steganography
Developments in Steganography / Joshua R. Smith ; Chris Dodge
An Asymmetric Public Detection Watermarking Technique / Teddy Furon ; Pierre Duhamel
Zero Knowledge Watermark Detection / Scott Craver
Watermarking: Proving Ownership
Proving Ownership of Digital Content / André Adelsbach ; Birgit Pfitzmann ; Ahmad-Reza Sadeghi
Error- and Collusion-Secure Fingerprinting for Digital Data / Hans-Jürgen Guth
Watermarking: Detection and Decoding
Computing the Probability of False Watermark Detection / Matt L. Miller ; Jeffrey A. Bloom
Optimum Decoding of Non-additive Full Frame DFT Watermarks / Alessia De Rosa ; Mauro Barni ; Franco Bartolini ; Vito Cappellini ; Alessandro Piva
Watermark Detection after Quantization Attacks / Joachim J. Eggers ; Bernd Girod
Content-Based Watermarking for Image Authentication / Pedro Lamy ; José Martinho ; Tiago Rosa ; Maria Paula Queluz
Watermarking: Embedding Techniques
Fast Robust Template Matching for Affine Resistant Image Watermarks / Shelby Pereira ; Thierry Pun
A Stochastic Approach to Content Adaptive Digital Image Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Nazanin Baumgaertner
Performance Improvement of Spread Spectrum Based Image Watermarking Schemes through M-ary Modulation / Martin Kutter
Watermarking: New Designs and Applications
On the Design of a Watermarking System: Considerations and Rationales / Jean-Paul Linnartz ; Geert Depovere ; Ton Kalker
A Bayesian Approach to Affine Transformation Resistant Image and Video Watermarking / Gabriella Csurka ; Frédéric Deguillaume ; Joseph J. K. Ó Ruanaidh
Enhanced Intellectual Property Protection for Digital Circuits on Programmable Hardware / John Lach ; William H. Mangione-Smith ; Miodrag Potkonjak
Watermarking: Improving Robustness
Robust Watermarking for Images Based on Color Manipulation / Sebastiano Battiato ; Dario Catalano ; Giovanni Gallo ; Rosario Gennaro
Recovery of Watermarks from Distorted Images / Neil F. Johnson ; Zoran Duric ; Sushil Jajodia
Cocktail Watermarking on Images / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Watermarking and Software Protection
Hiding Signatures in Graph Coloring Solutions / Gang Qu
Robust Object Watermarking: Application to Code / Julien P. Stern ; Gaël Hachez ; François Koeune ; Jean-Jacques Quisquater
Software DisEngineering: Program Hiding Architecture and Experiments / Enriquillo Valdez ; Moti Yung
The Difficulty of Separating Private and Public Information
Chaffing at the Bit: Thoughts on a Note by Ronald Rivest / John McHugh
An Entropy-Based Framework for Database Inference / Ira S. Moskowitz ; LiWu Chang
Covert Information Transmission through the Use of Standard Collision Resolution Algorithms / Talat Mert DoGu ; Anthony Ephremides
The Cocaine Auction Protocol: On the Power of Anonymous Broadcast / Frank Stajano ; Ross Anderson
Stego-Engineering
Protecting Secret Keys in a Compromised Computational System / W. P. R. Mitchell
StegFS: A Steganographic File System for Linux / Andrew D. McDonald ; Markus G. Kuhn
Nonbinary Audio Cryptography / Yvo Desmedt ; Tri V. Le
Author Index
Fundamentals of Steganography
An Information-Theoretic Approach to Steganography and Watermarking / Thomas Mittelholzer
One-Time Hash Steganography / Natori Shin
6.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c1999  viii, 239 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Welcome
Formal Models
A Formal Framework and Evaluation Method for Network Denial of Service / C. Meadows
I/O Automaton Models and Proofs for Shared-Key Communication Systems / N. Lynch
Security Protocol Analysis: Notation, Transformation, and Simplification
Safe Simplifying Transformations for Security Protocols / M. Hui ; G. Lowe
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief / D. Monniaux
A Meta-Notation for Protocol Analysis / I. Cervesato ; N. Durgin ; P. Lincoln ; J. Mitchell ; A. Scedrov
Strand Spaces
Mixed Strand Spaces / F. Thayer ; J. Herzog ; J. Guttman
Honest Functions and their Application to the Analysis of Cryptographic Protocols / A. Maneki
Panel: Formalization and Proof of Secrecy Properties / D. Volpano ; M. Abadi ; R. Focardi ; J. Millen
Formalization and Proof of Secrecy Properties
Local Names
Authentication via Localized Names / C. Bodei ; P. Degano ; C. Priami
A Logic for SDSI's Linked Local Name Spaces / J. Halpern ; R. van der Meyden
Interaction and Composition
Trusted System Construction / C. O'Halloran
Secure Composition of Insecure Components / P. Sewell ; J. Vitek
Security Function Interactions / P. Bieber
Logics for Authorization and Access Control
A Logic-based Knowledge Representation for Authorization with Delegation / N. Li ; J. Feigenbaum ; B. Grosof
A Logical Framework for Reasoning on Data Access Control Policies / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo
Advances in Automated Security Protocol Analysis
Athena: A New Efficient Automatic Checker for Security Protocol Analysis / D. Song
CVS: A Compiler for the Analysis of Cryptographic Protocols / A. Durante ; R. Gorrieri
Noninterference Using Process Algebras
Process Algebra and Non-Interference / P. Ryan ; S. Schneider
What Is Intransitive Noninterference? / A. Roscoe ; M. Goldsmith
Index of Authors
Preface
Workshop Committee
Welcome
7.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2000  xi, 483 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1751
所蔵情報: loading…
目次情報: 続きを見る
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence / Reto Kohlas ; Ueli Maurer
The Composite Discrete Logarithm and Secure Authentication / David Pointcheval
Chosen-Ciphertext Security for Any One-Way Cryptosystem
Short Proofs of Knowledge for Factoring / Guillaume Poupard ; Jacques Stern
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms / X.Y.Wang ; L.C.Hui ; K.P.Chow ; W.W.Tsang ; C.F.Chong ; H.W.Chan
All-or-Nothing Transform and Remotely Keyed Encryption Protocols / Sang Uk Shin ; Weon Shin ; Kyung Hyune Rhee
Security of Public Key Certificate Based Authentication Protocols / Wu Wen ; Takamichi Saito ; Fumio Mizoguchi
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 / Tetsuya Izu ; Jun Kogure ; Kazuhiro Yokoyama
Key Recovery in Third Generation Wireless Communication Systems / Juanma González Nieto ; DongGook Park ; Colin Boyd ; Ed Dawson
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications / Katsuyuki Okeya ; Hiroyuki Kurumatani ; Kouichi Sakurai
Certificates of Recoverability with Scalable Recovery Agent Security / Eric R. Verheul
Design Validations for Discrete Logarithm Based Signature Schemes / Ernest Brickell ; Serge Vaudenay ; Moti Yung
Optimally Efficient Accountable Time-Stamping / Ahto Buldas ; HelgerLipmaa ; Berry Schoenmakers
"Pseudorandom Intermixing": A Tool for Shared Cryptography / YairFankel ; Philip MacKenzie
RSA-Based Auto-recoverable Cryptosystems / Adam Young
Efficient and Fresh Certification / Irene Gassko ; Peter S. Gemmell
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions / Ronald Cramer ; ard
Cryptographic Approaches to Privacy in Forensic DNA Databases / Philip Bohannon ; Markus Jakobsson ; Sukamol Srikwan
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes / Toru Inoue
An Auction Protocol Which Hides Bids of Losers / Chae Hoon Lim ; Hyo Sun Hwang ; Kazue Sako
Forward Secrecy and Its Application to Future Mobile Communications Security / Sang-Jae Moon
Selecting Cryptographic Key Sizes / Arjen K. Lenstra
A Structured ElGamal-Type Multisignature Scheme / Mike Burmester ; Yvo Desmedt ; Hiroshi Doi ; Masahiro Mambo ; Eiji Okamoto ; Mitsuru Tada ; Yuko Yoshifuji
Author Index
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
8.

図書

図書
V. Michael Bove, Jr. ... [et al.], chairs/editors ; sponsored and publised by SPIE--The International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE--the International Society for Optical Engineering, c1998  viii, 432 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 3228
所蔵情報: loading…
9.

図書

図書
Massimo Felici, Karama Kanoun, Alberto Pasquini (eds.)
出版情報: Berlin ; Tokyo : Springer, c1999  xviii, 482 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1698
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Software Reliability Engineering in Industry / J. D. Musa
Assessment and Certification
A Systematic Approach to Safety Case Maintenance / T. P. Kelly ; J. A. McDermid
SQUALE Dependability Assessment Criteria / Y. Deswarte ; M. Kaâniche ; P. Corneillie ; J. Goodson
Assessment and Certification of Safety-Critical Digital Architectures - The ACRuDA Project / G. Sonneck ; E. Schoitsch
Safety Assessment and Human Factors (Poster Session)
Safety Evaluation of a Train Leader Telephone System / G. Dahll
Safety Analysis Techniques for Validating Formal Models During Verification / R. de Lemos ; A. Saeed
Evaluating the Contribution of DesktopVR for Safety-Critical Applications / C. Johnson
Human Performance Reliability in the Design-for-Usability Life Cycle for Safety Human-Computer Interfaces / L. V. L. Filgueiras
The Impact of Different Media on Safety and Usability of Interactive ATC Applications / F. Paternò ; C. Santoro ; S. Tahmassebi
Human Factors
Patterns for Safer Human-Computer Interfaces / A. Hussey
Impact of Communication on Systems Dependability: Human Factors Perspectives / L. Rognin ; J.-P. Blanquart
A Method for Operator Error Detection Based on Plan Recognition / J. Mo ; Y. Crouzet
Safety Assessment
Hierarchically Performed Hazard Origin and Propagation Studies / Y. Papadopoulos
Hardware Redundant Vital Computer - Demonstration of Safety on the Basis of Current Standards / H. Krebs ; S. Mitra
Design for Safety (Poster Session)
System and Software Safety Analysis for the ERA Control Computer / P.G. Beerthuizen ; W. Kruidhof
Safety Markup Language: Concept and Application / C.-F. Fan ; S. Yih
Extendable Ground-to-Air Communication Architecture for CoDySa / A. Pakstas ; I. Shagaev
Hierarchical Reliability and Safety Models of Fault Tolerant Distributed Industrial Control Systems / J. C. Campelo ; P. Yuste ; F. Rodríguez ; P. J. Gil ; J. J. Serrano
The Development of a Commercial "Shrink-Wrapped Application" to Safety Integrity Level 2: The DUST-EXPERTÖ Story / T. Clement ; I. Cottam ; P. Froome ; C. Jones
Verification and Testing
Safety Verification of Ada 95 Programs Using Software Fault Trees / S.-Y. Min ; Y.-K. Jang ; S.-D. Cha ; Y.-R. Kwon ; D.-H. Bae
Programming Rule Static Verification for Reliable Software / P. Robert
Automated Black-Box Testing with Abstract VDM Oracles / B. K. Aichernig
Towards Statistical Control of an Industrial Test Process / G. Lombardi ; E. Peciola ; R. Mirandola ; A. Bertolino ; E. Marchetti
Design for Safety
Choosing Effective Methods for Diversity - How to Progress from Intuition to Science / P. Popov ; L. Strigini ; A. Romanovsky
A First Step Towards the Integration of Accident Reports and Constructive Design Documents
A Holistic Design Concept to Improve Safety Related Control Systems / M. Wimmer ; A. Rizzo ; M. Sujan
Dependability Analysis and Evaluation
Comparing Fault Trees and Bayesian Networks for Dependability Analysis / A. Bobbio ; L. Portinale ; M. Minichino ; E. Ciancamerla
FlexFi: A Flexible Fault Injection Environment for Microprocessor-Based Systems / A. Benso ; M. Rebaudengo ; M. Sonza Reorda
Structural Software Reliability Estimation / S. Kuball ; J. May ; G. Hughes
Formal Methods and Security (Poster Session)
Hazard Analysis in Formal Specification / K. Sere ; E. Troubitsyna
Modeling Safety-Critical Systems with Z and Petri Nets / M. Heiner ; M. Heisel
On Formal Languages for Sequences of Authorization Transformations / Y. Bai ; V. Varadharajan
Scheduling Fault-Tolerant Programs on Multiple Processors to Maximize Schedule Reliability / I. Czarnowski ; P. Jedrzejowicz ; E. Ratajczak
Formal Methods
Formal Design of Distributed Control Systems with Lustre / P. Caspi ; C. Mazuet ; R. Salem ; D. Weber
Formal Specification and Development of a Safety-Critical Train Management System / A. Chiappini ; A. Cimatti ; C. Porzia ; G. Rotondo ; R. Sebastaini ; P. Traverso ; A. Villafiorita
Formal Validation of the GUARDS Inter-Consistency Mechanism / C. Bernardeschi ; A. Fantechi ; S. Gnesi
A Graphical Environment for the Specification and Verification of Reactive Systems / A. K. Bhattacharjee ; S. D. Dhodapkar ; S. Seshia ; R. K. Shyamasundar
Security
Dependability Requirements and Security Architectures for the Healthcare/Medical Sector / G. Trouessin
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature / S.-M. Lee ; T.-Y. Kim
The Integration of Safety and Security Requirements / D. P. Eames ; J. Moffett
Author Index
Invited Talk
Software Reliability Engineering in Industry / J. D. Musa
Assessment and Certification
10.

図書

図書
Bruce Christianson ... [et al.](eds.)
出版情報: Berlin : Springer, c2000  xii, 227 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1796
所蔵情報: loading…
11.

図書

図書
Çetin K. Koç, Christof Paar (eds.)
出版情報: Berlin : Springer, c1999  xi, 352 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1717
所蔵情報: loading…
12.

図書

図書
Vijay Varadharajan, Yi Mu (eds.)
出版情報: Berlin : Springer, c1999  xi, 323 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1726
所蔵情報: loading…
目次情報: 続きを見る
Keynote Speech
International Cryptography / Doug McGowan
Cryptanalysis
Reaction attacks against several public key cryptosystems / C. Hall ; I. Goldberg ; B. Schneier
Cryptanalysis of some AES candidate algorithms / W. Wu ; B. Li ; D. Feng ; S. Qing
Language Based Approach to Security
Issues in the design of a language for role based access control / M. Hitchens ; V. Varadharajan
Extending Erlang for safe mobile code execution / L. Brown ; D. Sahlin
Electronic Commerce and Secret Sharing
Detachable electronic coins / C. Pavlovski ; C. Boyd ; E. Foo
Linear secret sharing with divisible shares / J. Pieprzyk
Efficient publicly verifiable secret sharing schemes with fast or delayed recovery / F. Boudot ; J. Traore
Digital Signatures
Zero-knowledge proofs of possession of ElGamal-like digital signatures and its applications / K. Q. Nguyen ; F. Bao ; Y. Mu
Signature scheme for controlled environments / K. Viswanathan ; E. Dawson
On the cryptographic value of the Qth root problem / C. L. Beaver ; P. S. Gemmell ; A. M. Johnston ; W. Neumann
Protecting Critical Information Systems / Sushil Jajodia
Security Protocols
Delegation chains secure up to constant length / M. Abe ; T. Okamoto
Optimal construction of unconditionally secured ID-based key sharing scheme for large-scale networks / G. Hanaoka ; T. Nishioka ; Y. Zheng ; H. Imai
Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack / S. Hirose ; K. Matsuura
An extended logic for analyzing timed-release public-key protocols / M. Kudo ; A. Mathuria
Applications
Bringing together X.509 and EDIFACT public key infrastructures: The DEDICA project / M. Rubia ; J. C. Cruellas ; M. Medina
User identification system based on biometrics for keystroke / K. Omote ; E. Okamoto
Boundary conditions that influence decisions about log file formats in multi-application smart cards / C. Markantonakis
Sending message into a definite future / W. Mao
Cryptography
Efficient accumulators without trapdoor / T. Sander
Evolutionary heuristics for finding cryptographically strong S-Boxes / W. Millan ; L. Burnett ; G. Garter ; A. Clark
Incremental authentication of tree-structured documents / P. Ekdahl ; B. Smeets
Complexity and Security Functions
Plateaued Functions / X.-M. Zhang
On the linear complexity of the Naor-Reingold pseudo-random function / F. Griffin ; I. E. Shparlinski
On the channel capacity of narrow-band subliminal channels / K. Kobara
Author Index
Keynote Speech
International Cryptography / Doug McGowan
Cryptanalysis
13.

図書

図書
Masahiro Mambo, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1999  ix, 275 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1729
所蔵情報: loading…
目次情報: 続きを見る
Electronic Money
Spending Programs: A Tool for Flexible Micropayments / Josep Domingo-Ferrer ; Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash / Shouhuai Xu ; Moti Yung ; Gendu Zhang ; Hong Zhu
Engineering an eCash System / Tim Ebringer ; Peter Thorne
Electronic Payment and Unlinkability
Unlinkable Electronic Coupon Protocol with Anonymity Control / Toru Nakanishi ; Nobuaki Haruna ; Yuji Sugiyama
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives / Marc Joye ; Narn-Yih Lee ; Tzonelih Hwang
Secure Software Components, Mobile Agents, and Authentication
Security Properties of Software Components / Khaled Khan ; Jun Han ; Yuliang Zheng
Methods for Protecting a Mobile Agent's Route / Dirk Westhoff ; Markus Schneider ; Claus Unger ; Firoz Kaderali
Non-interactive Cryptosystem for Entity Authentication / Hyung-Woo Lee ; Jung-Eun Kim ; Tai-Yun Kim
Network Security
Implementation of Virtual Private Networks at the Transport Layer / Jorge Davila ; Javier Lopez ; Rene Peralta
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree / Hiroaki Kikuchi ; Kensuke Abe ; Shohachiro Nakanishi
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks / Yuji Watanabe ; Hideki Imai
Digital Watermarking
Highly Robust Image Watermarking Using Complementary Modulations / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Region-Based Watermarking for Images / Gareth Brisbane ; Rei Safavi-Naini ; Philip Ogunbona
Digital Watermarking Robust Against JPEG Compression / Hye-Joo Lee ; Ji-Hwan Park
Protection of Software and Data
Fingerprints for Copyright Software Protection / Josef Pieprzyk
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption / Sang Uk Shin ; Kyeong Seop Sim ; Kyung Hyune Rhee
Electronic Money, Key Recovery, and Electronic Voting
On Anonymous Electronic Cash and Crime / Tomas Sander ; Amnon Ta-Shma
On the Difficulty of Key Recovery Systems / Seungjoo Kim ; Insoo Lee ; Masahiro Mambo ; Sungjun Park
An Improvement on a Practical Secret Voting Scheme / Miyako Ohkubo ; Fumiaki Miura ; Masayuki Abe ; Atsushi Fujioka ; Tatsuaki Okamoto
Digital Signatures
Undeniable Confirmer Signature / Khanh Nguyen ; Yi Mu ; Vijay Varadharajan
Extended Proxy Signatures for Smart Cards / Takeshi Okamoto ; Mitsuru Tada ; Eiji Okamoto
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures / Tsuyoshi Nishioka ; Goichiro Hanaoka
Cryptanalysis of Two Group Signature Schemes
Author Index
Electronic Money
Spending Programs: A Tool for Flexible Micropayments / Josep Domingo-Ferrer ; Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash / Shouhuai Xu ; Moti Yung ; Gendu Zhang ; Hong Zhu
14.

図書

図書
Ed Dawson, Andrew Clark, Colin Boyd (eds.)
出版情報: Berlin : Springer, c2000  xii, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1841
所蔵情報: loading…
15.

図書

図書
Mihir Bellare (ed.)
出版情報: Berlin : Springer, c2000  xi, 543 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1880
所蔵情報: loading…
目次情報: 続きを見る
XTR and NTRU
The XTR Pubhc Key System / Arjen K. Lenstra ; Eric R. Verheul
A Chosen-Ciphertext Attack against NTRU / Eliane Jaulmes ; Antoine Joux
Privacy for Databases
Privacy Preserving Data Mining / Yehuda Lindell ; Benny Pinkas
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing / Arnos Beimel ; Yuval Ishai ; Tal Malkin
Secure Distributed Computation and Applications
Parallel Reducibility for Information-Theoretically Secure Computation / Yevgeniy Dodis ; Silvio Micali
Optimistic Fair Secure Computation / Christian Cachin ; Jan Camenisch
A Cryptographic Solution to a Game Theoretic Problem / Shai Halevi ; Tal Rahin
Algebraic Cryptosystems
Differential Fault Attacks on Elliptic Curve Cryptosystems / Ingrid Bichl ; Bernd Meyer ; Volker Müller
Quantum Public-Key Cryptosystems / Tatsuaki Okamoto ; Keisuke Tanaka ; Shigenori Uchiyama
New Public-Key Cryptosystem Using Braid Groups / Ki Hyoung Ko ; Sang Jin Lee ; Jung Hee Cheon ; Jae Woo Han ; Ju-sung Kang ; Choonsik Park
Message Authentication
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm / Don Coppersmith ; Lars R. Knudsen ; Chris J. Mitchell
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions / John Black ; Phillip Rogaway
L-colhsion Attacks against Randomized MACs / Michael Semanko
Digital Signatures
On the Exact Security of Full Domain Hash / Jean-Sébastien Coron
Timed Commitments / Dan Boneh ; Moni Naor
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme / Giuseppe Ateniese ; Marc Joye ; Gene Tsudik
Provably Secure Partially Blind Signatures / Masayuki Abe
Cryptanalysis
Weaknesses in the SL2(<$>{\rm IF}_{2^n}<$>) Hashing Scheme / Rainer Steinwandt ; Markus Grassl ; Willi Geiselmann ; Thomas Beth
Fast Correlation Attacks through Reconstruction of Linear Polynomials / Thomas Johansson ; Fredrik Jönsson
Traitor Tracing and Broadcast Encryption
Sequential Traitor Tracing / Reihaneh Safavi-Naini ; Yejing Wang
Long-Lived Broadcast Encryption / Juan A. Garay ; Jessica Staddon ; Avishai Wool
Invited Talk
Taming the Adversary / Martín Abadi
Symmetrie Encryption
The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search / Anand Desai
On the Round Security of Symmetrie-Key Cryptographic Primitives / Zulfikar Ramzan ; Leonid Reyzin
New Paradigms for Constructing Symmetrie Encryption Schemes Secureagainst Chosen-Ciphertext Attack
To Commit or Not to Commit
Efficient Non-malleable Commitment Schemes / Marc Fischlin ; Roger Fischlin
Improved Non-committing Encryption Schemes Based on a General Complexity Assumption / Ivan Damgård ; Jesper Buus Nielsen
Protocols
A Note on the Round-Complexity of Concurrent Zero-Knowledge / Alan Rosen
An Improved Pseudo-random Generator Based on Discrete Log / Rosario Gennaro
Linking Classical and Quantum Key Agreement: Is There ``Bound Information''? / Nicolas Gisin ; Stefan Wolf
Stream Ciphers and Boolean Functions
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers / Muxiang Zhang ; Agnes Chan
Nonlinearity Bounds and Constructions of Resilient Boolean Functions / Palash Sarkar ; Subhamoy Maitra
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications / Jürgen Bierbrauer ; Holger Schellwat
Author Index
XTR and NTRU
The XTR Pubhc Key System / Arjen K. Lenstra ; Eric R. Verheul
A Chosen-Ciphertext Attack against NTRU / Eliane Jaulmes ; Antoine Joux
16.

図書

図書
David Aucsmith (ed.)
出版情報: Berlin : Springer, c1998  ix, 368 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1525
所蔵情報: loading…
17.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c1999  viii, 239 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1550
所蔵情報: loading…
目次情報: 続きを見る
Inductive Analysis of the Internet Protocol TLS / Lawrence C. Paulson
Discussion
External Consistency and the Veri cation of Security Protocols / Simon N. Foley
The Trust Shell Game / Carl Ellison
Overview of the AT&T Labs Trust-Management Project / Joan Feigenbaum
KeyNote: Trust Management for Public-Key Infrastructures / Matt Blaze ; Angelos D. Keromytis
Discussion - Trust Management
Application-Oriented Security Policies and Their Composition / Virgil D. Gligor ; Serban I. Gavrila
Secure Fingerprinting Using Public-Key Cryptography / Hiroshi Yoshiura ; Ryoichi Sasaki ; Kazuo Takaragi
Third Party Certi cation of HTTP Service Access Statistics / Francesco Bergadano ; Pancrazio De Mauro
Delegating Trust / William S. Harbison (Discussion)
Delegation of Responsibility / Bruno Crispo
Abuse of Process / Mark Lomas (Discussion)
A New Concept in Protocols: Veri able Computational Delegation / Peter Landrock
Delegation and Not-So Smart Cards / Bruce Christianson ; James A. Malcolm
Certi cation and Delegation / Michael Roe (Discussion)
Discussion - Di erences Between Academic and Commercial Security / Virgil Gligor ; Mark Lomas ; Raphael Yahalom ; John Warne
Optimistic Trust with Realistic eNvestigators
Insider Fraud / Dieter Gollmann
Panel Session - Future Directions / Stewart Lee ; Roger Needham
Contributor Index
Inductive Analysis of the Internet Protocol TLS / Lawrence C. Paulson
Discussion
External Consistency and the Veri cation of Security Protocols / Simon N. Foley
18.

図書

図書
Eiji Okamoto, George Davida, Masahiro Mambo, (eds.)
出版情報: Berlin ; New York : Springer, c1998  xii, 356 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1396
所蔵情報: loading…
19.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c1998  viii, 216 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1361
所蔵情報: loading…
20.

図書

図書
Burton S. Kaliski Jr. (ed.)
出版情報: Berlin ; Tokyo : Springer, c1997  xii, 537 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1294
所蔵情報: loading…
21.

図書

図書
Yongfei Han, Tatsuaki Okamoto, Sihan Qing, (eds.)
出版情報: Berlin : Springer, c1997  x, 484 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1334
所蔵情報: loading…
22.

図書

図書
sponsored by IEEE Computer Society
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c1997  viii, 209 p. ; 28 cm
所蔵情報: loading…
23.

図書

図書
Colin Boyd, Ed Dawson (eds.)
出版情報: Berlin : Springer, c1998  xi, 422 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1438
所蔵情報: loading…
24.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1998  xi, 262 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1431
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
Overview of elliptic curve cryptography / Kiyomichi Araki ; Takakazu Satoh ; Shinji Miura
Special Talk
Lattices and cryptography: An overview / Jacques Stern
Regular Contributions
A signcryption scheme with signature directly verifiable by public key / Feng Bao ; Robert H. Deng
Guaranteed correct sharing of integer factorization with off-line shareholders / Wenbo Mao
Lower bounds on term-based divisible cash systems / Tatsuaki Okamoto
Certifying trust / Ilari Lehti ; Pekka Nikander
On the security of server-aided RSA protocols / Johannes Merkle ; Ralph Werchner
On the security of ElGamal-based encryption / Yiannis Tsiounis
An authenticated Diffie-Hellman key agreement protocol secure against active attacks / Shouichi Hirose ; Susumu Yoshida
On the security of Girault's identification scheme / Shahrokh Saeednia ; Rei Safavi-Naini
A scheme for obtaining a message from the digital multisignature / Chin-Chen Chang ; Jyh-Jong Leu ; Pai-Cheng Huang ; Wei-Bin Lee
Secure hyperelliptic cryptosystems and their performance / Yasuyuki Sakai ; Kouichi Sakurai ; Hirokazu Ishizuka
A practical implementation of elliptic curve cryptosystems over GF(p) on a 16 bit microcomputer / Toshio Hasegawa ; Junko Nakajima ; Mitsuru Matsui
Two efficient algorithms for arithmetic of elliptic curves using Frobenius map / Jung Hee Cheon ; Sungmo Park ; Sangwoo Park ; Daeho Kim
Public-key cryptosystems using the modular group / Akihiro Yamamura
A cellular automaton based fast one-way hash function suitable for hardware implementation / Miodrag Mihaljević ; Yuliang Zheng ; Hideki Imai
A new hash function based on MDx-family and its application to MAC / Sang Uk Shin ; Kyung Hyune Rhee ; Dae Hyun Ryu ; Sang Jin Lee
Recent Results
Security issues for contactless smart cards / Michael W. David
Parameters for secure elliptic curve cryptosystem - improvements on Schoof's algorithm / Tetsuya Izu ; Jun Kogure ; Masayuki Noro ; Kazuhiro Yokoyama
A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme / Masahiro Mambo ; Hiroki Shizuya
Author Index
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
25.

図書

図書
Wolfgang Ehrenberger (ed.)
出版情報: Berlin : Springer, c1998  xvi, 392 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1516
所蔵情報: loading…
目次情報: 続きを見る
Formal Methods I - Analysis and Specification
CoRSA - A Constraint Based Approach to Requirements and Safety Analysis / K. Hollingworth ; A. Saeed
An Agenda for Specifying Software Components with Complex Data Models / K. Winter ; T. Santen ; M. Heisel
Safety in Production Cell Components: An Approach Combining Formal Real-Time Specifications and Patterns / H. Rust
Safety Properties Ensured by the OASIS Model for Safety Critical Real-Time Systems / V. David ; J. Delcoigne ; E. Leret ; A. Ourghanlian ; P. Hilsenkopf ; P. Paris
Linking Hazard Analysis to Formal Specification and Design in B / K. Lano ; P. Kan ; A. Sanchez
Management and Human Factors
Controlling Your Design through Your Software Process / N. Martín-Vivaldi ; P. Isacsson
Operator Errors and Their Causes / T. Grams
Security
A Performance Comparison of Group Security Mechanisms / A. Hutchison ; M. Wallbaum
Towards Secure Downloadable Executable Content: The Java Paradigm / J. Iliadis ; S. Gritzalis ; V. Oikonomou
Model and Implementation of a Secure SW-Development Process for
Mission Critical Software / F. Dafelmair
Impact of Object-Oriented Software Engineering Applied to the Development of
Security Systems / S. Jovalekic ; B. Rist
Medical Informatics
'Profit by Safety' or Quackery in Biomedical Information Technology? / B.A. de Mol ; F. Koornneef
Formal Methods II - Languages and Verification
Towards Automated Proof of Fail-safe Behaviour / P. Liggesmeyer ; M. Rothfelder
Verifying a Time-Triggered Protocol in a Multi-language Environment / A. Merceron ; M. Müllerburg ; G.M. Pinna
Methods and Languages for Safety-Related Real-Time Programming / W.A. Halang ; A.H. Frigeri
ANSI-C in Safety Critical Applications - Lessons-Learned from Software Evaluation / A. Lindner
Applications
A Structured Approach to the Formal Certification of Safety of Computer Aided Development Tools / P. Bertoli ; A. Cimatti ; F. Giunchiglia ; P. Traverso
Applying Formal Methods in Industry - The UseGat Project / S. Bologna ; R. Bove ; G. Dipoppa ; G. Biondi ; G. Mongardi ; C. Porzia ; B.G. Mortensen ; N. Kirkegaard
Increasing System Safety for by-wire Applications in Vehicles by Using a Time-Triggered Architecture / Th. Ringler ; J. Steiner ; R. Belschner ; B. Hedenetz
Fault-Tolerant Communication in Large-Scale Manipulators / H.-D. Kochs ; W. Geisselhardt ; H. Hilmer ; M. Lenord
Distributed Fault-Tolerant and Safety-Critical Application in Vehicles - A Time-Triggered Approach / E. Dilger ; T. Fuehrer ; B. Müller
Model Checking Safety-Critical Software with SPIN: An Application to a Railway Interlocking System / D. Romano ; F. Torielli
EURIS, a Specification Method for Distributed Interlockings / F.v.Dijk ; W. Fokkink ; G. Kolk ; P.v.d.Ven ; B.v.Vlijmen
Object Oriented Safety Analysis of an Extra High Voltage Substation Bay / B. Nowicki ; J. Górski
Formal Methods III - Petri Nets
Integration of Logical and Physical Properties of Embedded Systems by Use of Time Petri Nets / F. Saglietti
Safety Verification of Software Using Structured Petri Nets / K. Sacha
Reliability
Refinement of Safety-Related Hazards into Verifiable Code Assertions / K. Wong ; J. Joyce
A Conceptual Comparison of Two Commonly Used Safeguarding Principles / B. Knegtering ; A. Brombacher
A Holistic View on the Dependability of Software-Intensive Systems / G. Sonneck ; E. Schoitsch ; L. Strigini
Verifying Integrity of Decision Diagrams / R. Drechsler
Author Index
Formal Methods I - Analysis and Specification
CoRSA - A Constraint Based Approach to Requirements and Safety Analysis / K. Hollingworth ; A. Saeed
An Agenda for Specifying Software Components with Complex Data Models / K. Winter ; T. Santen ; M. Heisel
26.

図書

図書
Kazuo Ohta, Dingyi Pei (eds.)
出版情報: Berlin ; Tokyo : Springer, c1998  xii, 436 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1514
所蔵情報: loading…
27.

図書

図書
Hugo Krawczyk (ed.)
出版情報: Berlin ; Tokyo : Springer, c1998  xii, 517 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1462
所蔵情報: loading…
28.

図書

図書
sponsored by the IEEE Computer Society
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c1998  viii, 203 p. ; 28 cm
所蔵情報: loading…
29.

図書

図書
Jean-Jacques Quisquater ... [et al.]
出版情報: Berlin ; Tokyo : Springer, c1998  x, 375 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1485
所蔵情報: loading…
目次情報: 続きを見る
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior / H. Debar ; M. Dacier ; M. Nassehi ; A. Wespi
A Tool for Pro-active Defense Against the Buffer Overrun Attack / D. Bruschi ; E. Rosti ; R. Banfi
A Kernelized Architecture for Multilevel Secure Application Policies / S.N. Foley
Dealing with Multi-policy Security in Large Open Distributed Systems / C. Bidan ; V. Issarny
A Flexible Method for Information System Security Policy Specification / R. Ortalo
On the Security of Some Variants of the RSA Signature Scheme / M. Michels ; M. Stadler ; H.-M. Sun
Side Channel Cryptanalysis of Product Ciphers / J. Kelsey ; B. Schneier ; D. Wagner ; C. Hall
On the Security of Digital Tachographs / R. Anderson
An Authorization Model and Its Formal Semantics / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo
Authorization in CORBA Security / G. Karjoth
Rules for Designing Multilevel Object-Oriented Databases / F. Cuppens ; A. Gabillon
Byte Code Verification for Java Smart Cards Based on Model Checking / J. Posegga ; H. Vogt
Towards Formalizing the Java Security Architecture of JDK 1.2 / L. L. Kassab ; S. J. Greenwald
EUROMED-JAVA: Trusted Third Party Services for Securing Medical Java Applets / A. Varvitsiotis ; D. Polemi ; A. Marsh
MPEG PTY-Marks: Cheap Detection of Embedded Copyright Data in
DVD-Video / J.P.M.G. Linnartz ; J.C. Talstra
DHWM: A Scheme for Managing Watermarking Keys in the Aquarelle
Multimedia Distributed System / D. Augot ; J.-F. Delaigle ; C. Fontaine
The "Ticket" Concept for Copy Control Based on Embedded Signalling
Panel Session: Watermarking / G. Eizenberg ; J.-J. Quisquater
Authentication and Payment in Future Mobile Systems / G. Horn ; B. Preneel
Distributed Temporary Pseudonyms: A New Approach for Protecting Location Information in Mobile Communication Networks / D. Kesdogan ; P. Reichl ; K. Junghartchen
A Mix-Mediated Anonymity Service and Its Payment / E. Franz ; A. Jerichow
A Subjective Metric of Authentication / A. Jøsang
A Sound Logic for Analysing Electronic Commerce Protocols / V. Kessler ; H. Neumann
Kerberos Version IV: Inductive Analysis of the Secrecy Goals / G. Bella ; L.C. Paulson
Author Index
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior / H. Debar ; M. Dacier ; M. Nassehi ; A. Wespi
A Tool for Pro-active Defense Against the Buffer Overrun Attack / D. Bruschi ; E. Rosti ; R. Banfi
A Kernelized Architecture for Multilevel Secure Application Policies / S.N. Foley
30.

図書

図書
edited by Sokratis Katsikas
出版情報: London : Chapman & Hall on behalf of the International Federation for Information Processing, 1997  vi, 316 p. ; 24 cm
シリーズ名: Communications and multimedia security ; v. 3
所蔵情報: loading…
31.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1999  ix, 326 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1560
所蔵情報: loading…
目次情報: 続きを見る
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim
On the Security of Random Sources / Jean-Sébastien Coron
Anonymous Fingerprinting Based on Committed Oblivious Transfer / Josep Domingo-Ferrer
How to Enhance the Security of Public-Key Encryption at Minimum Cost / Eiichiro Fujisaki ; Tatsuaki Okamoto
Encrypted Message Authentication by Firewalls / Chandana Gamage ; Jussipekka Leiwo ; Yuliang Zheng
A Relationship between One-Wayness and Correlation Intractability / Satoshi Hada ; Toshiaki Tanaka
Message Recovery Fair Blind Signature / Hyung-Woo Lee ; Tai-Yun Kim
On Quorum Controlled Asymmetric Proxy Re-encryption / Markus Jakobsson
Mini-Cash: A Minimalistic Approach to E-Commerce
Preserving Privacy in Distributed Delegation with Fast Certificates / Pekka Nikander ; Yki Kortesniemi ; Jonna Partanen
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol / Simon Blake-Wilson ; Alfred Menezes
Toward Fair International Key Escrow - An Attempt by Distributed Trusted Third Agencies with Threshold Cryptography - / Shingo Miyazaki ; Ikuko Kuroda ; Kouichi Sakurai
How to Copyright a Function ? / David Naccache ; Adi Shamir ; Julien P. Stern
On the Security of RSA Screening
The Effectiveness of Lattice Attacks Against Low-Exponent RSA / Christophe Coupé ; Phong Nguyen ; Jacques Stern
A Trapdoor Permutation Equivalent to Factoring / Pascal Paillier
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Evaluating Differential Fault Analysis of Unknown Cryptosystems
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project / Montse Rubia ; Juan Carlos Cruellas ; Manel Medina
Hash Functions and the MAC Using All-or-Nothing Property / Sang Uk Shin ; Kyung Hyune Rhee ; Jae Woo Yoon
Decision Oracles are Equivalent to Matching Oracles / Helena Handschuh ; Yiannis Tsiounis ; Moti Yung
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret / Yuji Watanabe ; Hideki Imai
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy / Adam Young
A Secure Pay-per-View Scheme for Web-Based Video Service / Jianying Zhou ; Kwok-Yan Lam
Author Index
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim
On the Security of Random Sources / Jean-Sébastien Coron
32.

図書

図書
edited by Patrick Horster
出版情報: London : Chapman & Hall on behalf of the International Federation for Information Processing, 1996  vi, 314 p ; 24cm
所蔵情報: loading…
33.

図書

図書
edited by Louise Yngström, Jan Carlsen
出版情報: London ; Tokyo : Chapman & Hall on behalf of the IFIP, 1997  vii, 468 p. ; 24 cm
所蔵情報: loading…
34.

図書

図書
Vijay Varadharajan, Josef Pieprzyk, Yi Mu (eds.)
出版情報: Berlin ; Tokyo : Springer, c1997  xi, 336 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1270
所蔵情報: loading…
35.

図書

図書
Mark Lomas (ed.)
出版情報: Berlin : Springer, c1997  viii, 202 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1189
所蔵情報: loading…
36.

図書

図書
Josef Pieprzyk, Reihanah Safavi-Naini (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1995  xii, 430 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 917
所蔵情報: loading…
37.

図書

図書
Neal Koblitz (ed.)
出版情報: Berlin ; Tokyo : Springer, c1996  xii, 415 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1109
所蔵情報: loading…
38.

図書

図書
Elisa Bertino ... [et al.], (eds.)
出版情報: Berlin : Springer, c1996  x, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1146
所蔵情報: loading…
39.

図書

図書
Ed Dawson, Jovan Golić (eds.)
出版情報: Berlin ; New York ; Tokyo : Springer, c1996  xi, 325 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1029
所蔵情報: loading…
40.

図書

図書
edited by Jan H. P. Eloff and Sebastiaan H. von Solms
出版情報: London ; Tokyo : Chapman & Hall on behalf of the IFIP, 1995  viii, 623 p. ; 24 cm
所蔵情報: loading…
41.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society Press, c1995  viii, 177 p. ; 28 cm
所蔵情報: loading…
42.

図書

図書
edited by Sokratis K. Katsikas and Dimitris Gritzalis
出版情報: London : Chapman & Hall on behalf of the International Federation for Information Processing, 1996  xii,501p ; 24cm
所蔵情報: loading…
43.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society Press, c1996  ix, 189 p. ; 28 cm
所蔵情報: loading…
44.

図書

図書
Kwangjo Kim, Tsutomu Matsumoto (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1996  xii, 394 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1163
所蔵情報: loading…
45.

図書

図書
Josef Pieprzyk, Jennifer Seberry (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1996  ix, 331 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1172
所蔵情報: loading…
46.

図書

図書
edited by Reinhard Posch
出版情報: London : Chapman & Hall on behalf of the International Federation for Information Processing, 1995  viii, 221 p. ; 24 cm
所蔵情報: loading…
47.

図書

図書
edited by J.F. Lindeberg
出版情報: Oxford ; Tokyo : Published for the International Federation of Automatic Control by Pergamon Press, 1991  xi, 184 p. ; 31 cm
シリーズ名: IFAC symposia series ; 1991, no. 8
所蔵情報: loading…
目次情報: 続きを見る
Section headings and selected papers
Timing Aspects
Towards a common safety description model / R E Bloomfield et al
The formalization and analysis of a communications protocol / G Bruns ; S Anderson
Applications
Improving software quality in a space application / A Pasquini
A software tool for fault-tolerant systems in the operational phase / K Sismail
Hardware
Applying programmable gate arrays to provide diversity in safety relevant systems / W A Halang ; J M Schut
Some answers to the problem of safety in microprocessor-based devices / J Ph Gerardin et al
Assessment I
Using fault tree analysis in developing reliable software / E O Ovstedal
Synchronized local state diagram: a modelling methodology under development / P E Heegaard et al
Assessment II
Balancing reliability requirements for field devices and control logic modules in safety systems / L Bodsberg ; P Hokstad
Classification of critical events in systems described by Grafcet using the Markov process / Z Abazi ; T Peter
Specification and Development
An early warning method for safety-critical software development / A D Pengelly
A configuration management system for incremental delivery projects / F Redmill
Security
Security evaluation criteria / S J Knapskog
Information security issues in transaction systems applied to an integrated road traffic environment / B G Andersen
Verification and Validation
Software safety checks using stored tested paths / G Dahll
Models
Systematic software testing strategies as explanatory variables of proportional hazards / F Saglietti
The balancing of quality assurance against validation activities / T Stalhane
Author index
Keyword index
Section headings and selected papers
Timing Aspects
Towards a common safety description model / R E Bloomfield et al
48.

図書

図書
Y. Deswarte, G. Eizenberg, J.-J. Quisquater (eds.)
出版情報: Berlin : Springer, c1992  xi, 450 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 648
所蔵情報: loading…
49.

図書

図書
Computer Security Foundations Workshop ; IEEE Computer Society
出版情報: Los Alamitos, Calif. : IEEE Computer Society Press, c1991  viii, 243 p. ; 28 cm
所蔵情報: loading…
50.

図書

図書
edited by Klaus Dittrich, Seppo Rautakivi, Juhani Saari
出版情報: Amsterdam ; New York : North-Holland , New York, N.Y., U.S.A. : Distributors for the U.S. and Canada, Elsevier Science, 1991  ix, 421 p. ; 24 cm
所蔵情報: loading…
51.

図書

図書
edited by David T. Lindsay, Wyn L. Pric
出版情報: Amsterdam ; New York : North-Holland , New York : Elsevier Science Pub. Co. [distributor], 1991  xi, 467 p. ; 23 cm.
所蔵情報: loading…
52.

図書

図書
edited by William J. Caelli
出版情報: Amsterdam ; New York : North-Holland , New York, N.Y., U.S.A. : Distributors for the U.S. and Canada, Elsevier Science Pub. Co., 1989  xv, 490 p. ; 23 cm
所蔵情報: loading…
53.

図書

図書
J. Seberry, J. Pieprzyk (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1990  ix, 462 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 453
所蔵情報: loading…
54.

図書

図書
J.-J. Quisquater, J. Vandewalle (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1990  x, 710 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 434
所蔵情報: loading…
55.

図書

図書
Ernest F. Brickell (ed.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1993  x, 593 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 740
所蔵情報: loading…
56.

図書

図書
edited by E. Graham Dougall
出版情報: Amsterdam ; Tokyo : North-Holland, 1993  ix, 417 p. ; 23 cm
シリーズ名: IFIP transactions ; A . Computer science and technology ; 37
所蔵情報: loading…
57.

図書

図書
edited by Richard Sizer ... [et al.]
出版情報: Amsterdam ; New York : North Holland , New York, N.Y. : Distributors for the US and Canada, Elsevier Science, 1994  vi, 235 p. ; 23 cm
シリーズ名: IFIP transactions ; A, Computer science and technology ; v. 43
所蔵情報: loading…
58.

図書

図書
Jennifer Seberry, Yuliang Zheng, (eds.)
出版情報: Berlin ; New York : Springer-Verlag, c1993  xiii, 542 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 718
所蔵情報: loading…
59.

図書

図書
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1993  x, 498 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 739
所蔵情報: loading…
60.

図書

図書
Dieter Gollmann (ed.)
出版情報: Berlin : Springer, c1994  xi, 468 p. ; 25 cm
シリーズ名: Lecture notes in computer science ; 875
所蔵情報: loading…
61.

図書

図書
sponsored by the IEEE Computer Society
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society Press, c1993  viii, 163 p. ; 28 cm
所蔵情報: loading…
62.

図書

図書
Andrew Chmora, Stephen B. Wicker (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1994  xvii, 121 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 829
所蔵情報: loading…
63.

図書

図書
Computer Security Foundations Workshop ; IEEE Computer Society
出版情報: Los Alamitos, Calif. : IEEE Computer Society Press, c1992  viii, 189 p. ; 28 cm
所蔵情報: loading…
64.

図書

図書
sponsored by the IEEE Computer Society
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society Press, c1994  ix, 201 p. ; 28 cm
所蔵情報: loading…
65.

図書

図書
Ira S. Moskowitz (ed.)
出版情報: Berlin : Springer, c2001  viii, 412 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2137
所蔵情報: loading…
目次情報: 続きを見る
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
Information Hiding through Noisy Channels / Valeri Korjik ; Guillermo Morales-Luna
A Perceptual Audio Hashing Algorithm: A Tool for Robust Audio Identification and Information Hiding / M. Kivanç Mihçak ; Ramarathnam Venkatesan
Computational Forensic Techniques for Intellectual Property Protection / Jennifer L. Wong ; Darko Kirovski ; Miodrag Potkonjak
Intellectual Property Metering / Farinaz Koushanfar ; Gang Qu
Keyless Public Watermarking for Intellectual Property Authentication
Efficiency Improvements of the Private Message Service / Oliver Berthold ; Sebastian Clauß ; Stefan Köpsell ; Andreas Pfitzmann
A Reputation System to Increase MIX-Net Reliability / Roger Dingledine ; Michael J. Freedman ; David Hopwood ; David Molnar
Neural Networks Functions for Public Key Watermarking / Justin Picard ; Arnaud Robert
A Graph Theoretic Approach to Software Watermarking / Vijay Vazirani ; Saurabh Sinha
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks / Dimitris Thanos
Natural Language Watermarking: Design, Analysis, and a Proof-of-Concept Implementation / Mikhail J. Atallah ; Victor Raskin ; Michael Crogan ; Christian Hempelmann ; Florian Kerschbaum ; Dina Mohamed ; Sanket Naik
Digital Watermarking of Chemical Structure Sets / Joachim J. Eggers ; Wolf-Dietrich Ihlenfeldt ; Bernd Girod
The Strong Eternity Service / Tonda BeneÜ
Real World Patterns of Failure in Anonymity Systems / Richard Clayton ; George Danezis ; Markus G. Kuhn
Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems / Adam Back ; Ulf Möller ; Anton Stiglic
Automatic Detection of a Watermarked Document Using a Private Key / Julien P. Stern ; Jean-Pierre Tillich
Zero-Knowledge Watermark Detection and Proof of Ownership / André Adelsbach ; Ahmad-Reza Sadeghi
F5-A Steganographic Algorithm: High Capacity Despite Better Steganalysis / Andreas Westfeld
A Collusion-Secure Fingerprinting Code Reduced by Chinese Remaindering and Its Random-Error Resilience / Hirofumi Muratani
Practical Capacity of Digital Watermarks / Ryo Sugihara
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking / Sviatoslav Voloshynovskiy ; Alexander Herrigel ; Thierry Pun
Second Generation Benchmarking and Application Oriented Evaluation / Shelby Pereira ; Maribel Madueno ; Stéphan Marchand-Maillet
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum / Henrique Malvar
Hiding Association Rules by Using Confidence and Support / Elena Dasseni ; Vassilios S. Verykios ; Ahmed K. Elmagarmid ; Elisa Bertino
How to Break a Semi-anonymous Fingerprinting Scheme
An Analysis of One of the SDMI Candidates / Julien Boeuf
Author Index
Trustworthy Paper Documents / Marshall Bern ; Jeff Breidenbach ; David Goldberg
An Implementation of Key-Based Digital Signal Steganography / Toby Sharp
Distortion-Free Data Embedding for Images / Miroslav Goljan ; Jessica J. Fridrich ; Rui Du
66.

図書

図書
Colin Boyd (ed.)
出版情報: Berlin ; New York : Springer, c2001  xi, 601 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2248
所蔵情報: loading…
目次情報: 続きを見る
Lattice Based Cryptography
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
The Modular Inversion Hidden Number Problem / Dan Boneh ; Shai Halevi ; Nick Howgrave-Graham
Human Identification
Secure Human Identification Protocols / Nicholas J. Hopper ; Manuel Blum
Invited Talk
Unbelievable Security (Matching AES Security Using Public Key Systems) / Arjen K. Lenstra
Practical Public Key Cryptography
A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4 / Siguna Müller
Computation of Discrete Logarithms in {op F}_{{2}^{607}}cEmmanuel Thomé
Speeding Up XTR / Martijn Stam
An Efficient Implementation of Braid Groups / Jae Choon Cha ; Ki Hyoung Ko ; Sang Jin Lee ; Jae Woo Han ; Jung Hee Cheon
Cryptography Based on Coding Theory
How to Achieve a McEliece-Based Digital Signature Scheme / Nicolas T. Courtois ; Matthieu Finiasz ; Nicolas Sendrier
Efficient Traitor Tracing Algorithms Using List Decoding / Alice Silverberg ; Jessica Staddon ; Judy L. Walker
Block Ciphers
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis / Makoto Sugita ; Kazukuni Kobara ; Hideki Imai
Known-IV Attacks on Triple Modes of Operation of Block Ciphers / Deukjo Hong ; Jaechul Sung ; Seokhie Hong ; Wonil Lee ; Sangjin Lee ; Jongin Lim ; Okyeon Yi
Generic Attacks on Feistel Schemes / Jacques Patarin
A Compact Rijndael Hardware Architecture with S-Box Optimization / Akashi Satoh ; Sumio Morioka ; Kohji Takano ; Seiji Munetoh
Provable Security
Provable Security of KASUMI and 3GPP Encryption Mode f8 / Ju-Sung Kang ; Sang-Uk Shin ; Dowon Hong
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices / Duncan S. Wong ; Agnes H. Chan
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval
Threshold Cryptography
Fully Distributed Threshold RSA under Standard Assumptions / Pierre-Alain Fouque
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes / Anna Lysyanskaya ; Chris Peikert
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Two-Party Protocols
Oblivious Polynomial Evaluation and Oblivious Neural Learning / Yan-Cheng Chang ; Chi-Jen Lu
Mutually Independent Commitments / Moses Liskov ; Silvio Micali ; Leonid Reyzin ; Adam Smith
Zero Knowledge
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
Responsive Round Complexity and Concurrent Zero-Knowledge / Tzafrir Cohen ; Joe Kilian ; Erez Petrank
Cryptographic Building Blocks
Practical Construction and Analysis of Pseudo-Randomness Primitives / Johan Hastad ; Mats Näslund
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions / Yuriy Tarannikov ; Peter Korolev ; Anton Botev
Elliptic Curve Cryptography
An Extension of KedlayaÆs Point-Counting Algorithm to Superelliptic Curves / Pierrick Gaudry ; Nicolas Gürel
Supersingular Curves in Cryptography / Steven D. Galbraith
Short Signatures from the Weil Pairing / Ben Lynn ; Hovav Shacham
Self-Blindable Credential Certificates from the Weil Pairing / Eric R. Verheul
Anonymity
How to Leak a Secret / Ronald L. Rivest ; Adi Shamir ; Yael Tauman
Key-Privacy in Public-Key Encryption / Mihir Bellare ; Alexandra Boldyreva ; Anand Desai
Provably Secure Fair Blind Signatures with Tight Revocation / Masayuki Abe ; Miyako Ohkubo
tAuthor Index
Lattice Based Cryptography
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
67.

図書

図書
C. Pandu Rangan, Cunsheng Ding (eds.)
出版情報: Berlin : Springer, c2001  xiii, 349 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2247
所蔵情報: loading…
目次情報: 続きを見る
Invited Lecture Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut
Hashing
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer
A New Anonymous Fingerprinting Scheme with High Enciphering Rate / M. Kuribayashi ; H. Tanaka
A Parallel Algorithm for Extending Cryptographic Hash Functions / P. Sarkar ; P.J. Schellenberg
Incremental Hash Function Based on Pair Chaining& Modular Arithmetic Combining / B.-M. Goi ; M.U. Siddiqi ; H.-T. Chuah
Algebraic Schemes
Multiples of Primitive Polynomials over GF(2) / K.C. Gupta ; S. Maitra
Fast Generation of Cubic Irreducible Polynomials for XTR / J.M. Kim ; I. Yie ; S.I. Oh ; H.D. Kim ; J. Ryu
CheatingPrevention in Secret Sharingover GF(pt) / J. Pieprzyk ; X.-M. Zhang
Elliptic Curves
An Application of Sieve Methods to Elliptic Curves / S.A. Miri ; V.K. Murty
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography / H. Baier
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography / M. Ciet ; J.-J. Quisquater ; F. Sica
Coding Theory
Frameproof and IPP Codes / D.R. Stinson
Linear Authentication Codes: Bounds and Constructions / R. Safavi-Naini ; H. Wang ; C. Xing
Applications - I
Selective Receipt in Certified E-Mail / S. Kremer ; O. Markowitch
Spatial Domain Digital Watermarking with Buyer Authentication / D.P. Mukherjee
Efficient Public Auction with One-Time Registration and Public Verifiability / B. Lee ; K. Kim ; J. Ma
An Analysis of Integrity Services in Protocols / K. Viswanathan ; C. Boyd ; E. Dawson
Cryptanalysis
Cryptananlysis of the Nonlinear FeedForward Generator / S.S. Bedi ; N.R. Pillai
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / M. Maurer ; A. Menezes ; E. Teske
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem / A. Youssef ; G. Gong
Distributed Cryptography
Robust and Secure Broadcasting / Y. Mu ; V. Varadharajan
Toward Optimal Player Weights in Secure Distributed Protocols / K. Srinathan ; C.P. Rangan ; V. Kamakoti
Boolean Functions
Autocorrelation Properties of Correlation Immune Boolean Functions
On the Constructingof Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices / M. Fedorova ; Y. Tarannikov
Digital Signatures
A Twin Algorithm for Efficient Generation of Digital Signatures / D. Ramesh
Efficient ôon the Flyö Signature Schemes Based on Integer Factoring / T. Okamoto ; M. Tada ; A. Miyaji
Shift Registers
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator / A. Kholosha
Efficient Software Implementation of Linear Feedback Shift Registers / S. Chowdhury
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 / S. Lim ; S. Kim ; J. Kim
Applications - II
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography / L. Shujun ; M. Xuanqin ; C. Yuanlong
Re-dividingComplexity between Algorithms and Keys (Key Scripts) / G. Samid
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function / E. Kiltz
Author Index
Invited Lecture Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut
Hashing
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer
68.

図書

図書
Dan Boneh (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  xii, 630 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2729
所蔵情報: loading…
69.

図書

図書
Agnes Hui Chan, Virgil Gligor (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xii, 502 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2433
所蔵情報: loading…
目次情報: 続きを見る
Intrusion Detection and Tamper Resistance
Real-Time Intruder Tracing through Self-Replication / Heejin Jang ; Sangwook Kim
On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon
Intrusion Detection with Support Vector Machines and Generative Models / John S. Baras ; Maben Rabi
Cryptographic Algorithm and Attack Implementation
Small and High-Speed Hardware Architectures for the 3GPP StandardCipher KASUMI / Akashi Satoh ; Sumio Morioka
Fast Software Implementations of SC2000 / Helger Lipmaa
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 / Tim Grembowski ; Roar Lien ; Kris Gaj ; Nghi Nguyen ; Peter Bellows ; Jaroslav Flidr ; Tom Lehman ; Brian Schott
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG / Kahil Jallad ; Jonathan Katz ; Bruce Schneier
Access Control and Trust Management (I)
Role-Based Access Control for E-commerce Sea-of-Data Applications / G. Navarro ; S. Robles ; J. Borrell
An Access Control Model for Tree Data Structures / Alban Gabillon ; Manuel Munier ; Jean-Jacques Bascou ; Laurent Gallon ; Emmanuel Bruno
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI / Ed Dawson ; Javier Lopez ; Jose A. Montenegro ; Eiji Okamoto
Authentication and Privacy
Password Authenticated Key Exchange Based on RSA for ImbalancedWireless Networks / Feng Zhu ; Duncan S. Wong ; Agnes H. Chan ; Robbie Ye
Quantifying Privacy Leakage through Answering Database Queries / Tsan-sheng Hsu ; Churn-Jung Liau ; Da-Wei Wang ; Jeremy K.-P. Chen
A New Offline Privacy Protecting E-cash System with Revokable Anonymity / Weidong Qiu ; Kefei Chen ; Dawu Gu
E-commerce Protocols (I)
Receipt-Free Sealed-Bid Auction / Masayuki Abe ; Koutarou Suzuki
Exclusion-Freeness in Multi-party Exchange Protocols / Nicolás González-Deleito ; Olivier Markowitch
A Realistic Protocol for Multi-party Certified Electronic Mail / Josep Lluís Ferrer-Gomila ; Magdalena Payeras-Capellà ; Llorenç Huguet-Rotger
Signature Schemes
A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification / Shunsuke Araki
Comments to the UNCITRAL Model Law on Electronic Signatures / Apol-lònia Martínez-Nadal
An Anonymous Loan System Based on Group Signature Scheme / Rie Shigetomi ; Akira Otsuka ; Takahide Ogawa ; Hideki Imai
Traceability Schemes for Signed Documents / Shoko Yonezawa ; Goichiro Hanaoka ; Junji Shikata
Cryptography (I)
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications / Emmanuel Bresson ; Jacques Stern
Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m) / Nam-Yeun Kim ; Dae-Ghon Kho ; Kee-Young Yoo
Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m) / Soonhak Kwon ; Heuisu Ryu
Access Control and Trust Management (II)
Conditional Cryptographic Delegation for P2P Data Sharing / Yuji Watanabe ; Masayuki Numao
Certification of Public Keys within an Identity Based System / L. Chen ; K. Harrison ; A. Moss ; D. Soldera ; N.P. Smart
A New Public Key Cryptosystem for Constrained Hardware / Jiande Zheng
Key Management
A Distributed and Computationally Secure Key Distribution Scheme / Vanesa Daza ; Javier Herranz ; Carles Padró ; Germán Sáez
On Optimal Hash Tree Traversal for Interval Time-Stamping
An Efficient Dynamic and Distributed Cryptographic Accumulator / Michael T. Goodrich ; Roberto Tamassia ; Jasminka Hasić
Security Analysis
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks / Katsuyuki Okeya ; Kouichi Sakurai
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks / Bodo Möller
Automated Analysis of Some Security Mechanisms of SCEP / Fabio Martinelli ; Marinella Petrocchi ; Anna Vaccarelli
An Attack on a Protocol for Certified Delivery / José R.M. Monteiro ; Ricardo Dahab
E-commerce Protocols (II)
Oblivious Counter and Majority Protocol / Hiroaki Kikuchi
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network / Wai Han Soo ; Azman Samsudin ; Alwyn Goh
Fingerprinting Concatenated Codes with Efficient Identification / M. Fernandez ; M. Soriano
Cryptography (II)
A Provably Secure Additive and Multiplicative Privacy Homomorphism / Josep Domingo-Ferrer
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars / Yasuyuki Sakai
Author Index
Intrusion Detection and Tamper Resistance
Real-Time Intruder Tracing through Self-Replication / Heejin Jang ; Sangwook Kim
On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon
70.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c2002  ix, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2467
所蔵情報: loading…
目次情報: 続きを見る
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion)
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello ; Steven M. Bellovin ; Matt Blaze ; Ran Canetti ; John Ioannidis ; Angelos D. Keromytis ; Omer Reingold
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion)
Thwarting Timing Attacks Using ATM Networks / Geraint Price
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion)
Towards a Survivable Security Architecture for Ad-Hoc Networks / Tuomas Aura ; Silja Mäki
Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion)
PIM Security / Dieter Gollmann
PIM Security (Transcript of Discussion)
Merkle Puzzles Revisited - Finding Matching Elements between Lists / Bruce Christianson ; David Wheeler
Merkle Puzzles Revisited (Transcript of Discussion)
Encapsulating Rules of Prudent Security Engineering (Position Paper) / Jan Jürjens
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)
A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura ; Kunihiko Miyazaki ; Shinji Itoh ; Kazuo Takaragi ; Ryoichi Sasaki
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion)
A Proof of Non-repudiation / Giampaolo Bella ; Lawrence C. Paulson
A Proof of Non-repudiation (Transcript of Discussion) / Larry Paulson
Using Authority Certificates to Create Management Structures / Babak Sadighi Firozabadi ; Marek Sergot ; Olav Bandmann
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion)
Trust Management and Whether to Delegate / Simon N. Foley
Trust Management and Whether to Delegate (Transcript of Discussion)
You Can't Take It with You (Transcript of Discussion) / Mark Lomas
Protocols Using Keys from Faulty Data
Protocols Using Keys from Faulty Data (Transcript of Discussion)
On the Negotiation of Access Control Policies / Virgil D. Gligor ; Himanshu Khurana ; Radostina K. Koleva ; Vijay G. Bharadwaj ; John S. Baras
Negotiation of Access Control Policies (Transcript of Discussion)
Intrusion-Tolerant Group Management in Enclaves (Transcript of Discussion) / Hassen Sa¿idi
Lightweight Authentication in a Mobile Network (Transcript of Discussion) / James Malcolm
Bluetooth Security - Fact or Fiction? (Transcript of Discussion) / Peter Drabwell
Concluding Discussion When Does Confidentiality Harm Security? / Chair: Bruce Christianson
The Last Word / Thucydides
Author Index
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
71.

図書

図書
Dieter Gollmann, Günter Karjoth, Michael Waidner (eds.)
出版情報: Berlin : Springer, c2002  x, 279 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2502
所蔵情報: loading…
72.

図書

図書
Andreas Wespi, Giovanni Vigna, Luca Deri (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  x, 326 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2516
所蔵情報: loading…
73.

図書

図書
George Davida, Yair Frankel, Owen Rees (eds.)
出版情報: Berlin : Springer, c2002  xi, 337 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2437
所蔵情報: loading…
74.

図書

図書
Maria Marinaro, Roberto Tagliaferri (eds.)
出版情報: Berlin : Springer, c2002  ix, 252 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2486
所蔵情報: loading…
目次情報: 続きを見る
Review Papers
Ensembles of Learning Machines / Giorgio Valentini ; Francesco Masulli
Eduardo R. Caianiello Lecture
Learning Preference Relations from Data / Theodoros Evgniou ; Massimiliano Pontil
Francesco E. Lauria Lecture
Increasing the Biological Inspiration of Neural Networks / Francesco E. Lauria
Architectures and Algorithms
Hybrid Automatic Trading Systems: Technical Analysis & Group Method of Data Handling / Marco Corazza ; Paolo Vanni ; Umberto Loschi
Interval TOPSIS for Multicriteria Decision Making / Silvio Giove
A Distributed Algorithm for Max Independent Set Problem Based on Hopfield Networks / Giuliano Grossi ; Roberto Posenato
Extended Random Neural Networks / G. Martinelli ; F. M. Frattale Mascioli ; M. Panella ; A. Rizzi
Generalized Independent Component Analysis as Density Estimation / Francesco Palmieri ; Alessandra Budillon
Spline Recurrent Neural Networks for Quad-Tree Video Coding / Lorenzo Topi ; Raffaele Parisi ; Aurelio Uncini
MLP Neural Network Implementation on a SIMD Architecture / Salvatore Vitabile ; Antonio Gentile ; G. B. Dammone ; Filippo Sorbello
Image and Signal Processing
A New Approach to Detection of Muscle Activation by Independent Component Analysis and Wavelet Transform / Bruno Azzerboni ; Giovanni Finocchio ; Maurizio Ipsale ; Fabio La Foresta ; Francesco Carlo Morabito
Learning to Balance Upright Posture: What can be Learnt Using Adaptive NN Models? / N. Alberto Borghese
Detection of Facial Features / Paola Campadelli ; Elena Casiraghi ; Raffaella Lanzarotti
A Two Stage Neural Architecture for Segmentation and Superquadrics Recovery from Range Data / Antonio Chella ; Roberto Pirrone
Automatic Discrimination of Earthquakes and False Events in Seismological Recording for Volcanic Monitoring / E. C. Ezin ; Flora Giudicepietro ; Simona Petrosino ; S. Scarpetta ; A. Vanacore
A Comparison of Signal Compression Methods by Sparse Solution of Linear Systems / Davide Mattera ; Michele Di Monte
Fuzzy Time Series for Forecasting Pollutants Concentration in the Air / Mario Versaci
Real-Time Perceptual Coding of Wideband Speech by Competitive Neural Networks / Eros Pasero ; Alfonso Montuori
Sound Synthesis by Flexible Activation Function Recurrent Neural Networks
Special Session on "Learning in Neural Networks: Limitations and Future Trends" Chaired by Marco Gori Mathematical Modelling of Generalization / Martin Anthony
Structural Complexity and Neural Networks / Alberto Bertoni ; Beatrice Palano
Bayesian Learning Techniques: Application to Neural Networks with Constraints on Weight Space / A. Eleuteri ; R. Tagliaferri ; L. Milano ; F. Acernese ; M. De Laurentiis
A Short Review of Statistical Learning Theory
Author Index / Domenico Parisi
Review Papers
Ensembles of Learning Machines / Giorgio Valentini ; Francesco Masulli
Eduardo R. Caianiello Lecture
75.

図書

図書
Hassan Shafazand, A Min Tjoa (eds.)
出版情報: Berlin : Springer, c2002  xxiii, 1020 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2510
所蔵情報: loading…
目次情報: 続きを見る
Artificial Intelligence I
Speaker Model and Decision Threshold Updating in Speaker Verification / M. Mehdi Homayounpour
Application of Constraint Hierarchy to Timetabling Problems / Tatyana Yakhno ; Evren Tekin
An Intelligent System for Therapy Control in a Distributed Organization / José Joaquín Cañadas ; Isabel María del Águila ; Alfonso Bosch ; Samuel Túnez
Data Mining
Discovering Local Patterns from Multiple Temporal Sequences / Xiaoming Jin ; Yuchang Lu ; Chunyi Shi
The Geometric Framework for Exact and Similarity Querying XML Data / Michal Krátký ; Jaroslav Pokorný ; Tomáš Skopal ; Václav Snášel
A Mobile System for Extracting and Visualizing Protein-Protein Interactions / Kyungsook Han ; Hyoungguen Kim
Discovering Temporal Relation Rules Mining from Interval Data / Jun Wook Lee ; Yong Joon Lee ; Hey Kyu Kim ; Bu Hun Hwang ; Keun Ho Ryu
Multimedia I
An Abstract Image Representation Based on Edge Pixel Neighborhood Information (EPNI) / Abdolah Chalechale ; Alfred Mertins
Motion Estimation Based on Temporal Correlations / H.S. Yoon ; G.S. Lee ; S.H. Kim ; J.Y. Chang
A New Boundary Matching Algorithm Based on Edge Detection / NamRye Son ; YoJin Yang ; GueeSang Lee ; SungJu Park
Lookmark: A 2.5D Web Information Visualization System / Christian Breiteneder ; Horst Eidenberger ; Geert Fiedler ; Markus Raab
Artificial Intelligence II
Different Local Search Algorithms in STAGE for Solving Bin Packing Problem / Saeed Bagheri Shouraki ; Gholamreza Haffari
A Prototype for Functionality Based Network Management System / V. Neelanarayanan ; N. Satyanarayana ; N. Subramanian ; E. Usha Rani
Coaching a Soccer Simulation Team in RoboCup Environment / J. Habibi ; E. Chiniforooshan ; A. HeydarNoori ; M. Mirzazadeh ; M.A. Safari ; H.R. Younesy
Security I
Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme / Dongyang Long
A New Scheme Based on Semiconductor Lasers with Phase-Conjugate Feedback for Cryptographic Communications / A. Iglesias
Parallel Algorithm and Architecture for Public-Key Cryptosystem / Hyun-Sung Kim ; Kee-Young Yoo
Specification and Verification of Security Policies in Firewalls / Rasool Jalili ; Mohsen Rezvani
Multimedia II
Image Segmentation Based on Shape Space Modeling / Daehee Kim ; Yo-Sung Ho
HERMES: File System Support for Multimedia Streaming in Information Home Appliance / Youjip Won ; Jinyoun Park ; Sangback Ma
Motion Vector Recovery for Error Concealment Based on Macroblock Distortion Modeling / Jae-Won Suh
A Memory Copy Reduction Scheme for Networked Multimedia Service in Linux Kernel / JeongWon Kim ; YoungUhg Lho ; YoungJu Kim ; KwangBaek Kim ; SeungWon Lee
Neural Network
Hidden Markov Model and Neural Network Hybrid / Dongsuk Yook
Neural Network Based Algorithms for IP Lookup and Packet Classification / Mehran Mahramian ; Nasser Yazdani ; Karim Faez ; Hassan Taheri
Non-linear Prediction of Speech Signal Using Artificial Neural Nets / K. Ashouri ; M. Amini ; M.H. Savoji
Security II
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server / Won Bo Shim ; Seog Park
Development of UML Descriptions with USE / Martin Gogolla ; Mark Richters
FPGA Implementation of Digital Chaotic Cryptography / Dewi Utami ; Hadi Suwastio ; Bambang Sumadjudin
Multimedia III
Stereo for Recovering Sharp Object Boundaries / Jeonghee Jeon ; Choongwon Kim
Priority Vantage Points Structures for Similarity Queries in Metric Spaces / Cengiz Celik
A High Performance Image Coding Using Uniform Morphological Sampling, Residues Classifying, and Vector Quantization / Saeid Saryazdi ; Mostafa Jafari
A Genetic Algorithm for Steiner Tree Optimization with Multiple Constraints Using Prüfer Number / A.T. Haghighat ; K. Faez ; M. Dehghan ; A. Mowlaei ; Y. Ghahremani
Data and Knowledge Engineering I
A New Technique for Participation of Non-CORBA Independent Persistent Objects in OTS Transactions / Mohsen Sharifi ; S.F. Noorani ; F. Orooji
Compositional Modelling of Workflow Processes / Khodakaram Salimifard ; Mike B. Wright
EDMIS: Metadata Interchange System for OLAP / In-Gi Lee ; Minsoo Lee ; Hwan-Seung Yong
An Efficient Method for Controlling Access in Object-Oriented Databases / Woochun Jun ; Le Gruenwald
XML I
Extracting Information from XML Documents by Reverse Generating a DTD / Jong-Seok Jung ; Dong-Ik Oh ; Yong-Hae Kong ; Jong-Keun Ahn
Mapping XML-Schema to Relational Schema / Sun Hongwei ; Zhang Shusheng ; Zhou Jingtao ; Wang Jing
Flexible Modification of Relational Schema by X2RMap in Storing XML into Relations / Jaehoon Kim
B2B Integration - Aligning ebXML and Ontology Approaches / Birgit Hofreiter ; Christian Huemer
Mobile Communication I
An Agent Based Service Discovery Architecture for Mobile Environments / Zhou Wang ; Jochen Seitz
Location Management Using Multicasting HLR in Mobile Networks / Dong Chun Lee
Packet Error Probability of Multi-carrier CDMA System in Fast/Slow Correlated Fading Plus Interference Channel / Jae-Sung Roh ; Chang-Heon Oh ; Heau-Jo Kang ; Sung-Joon Cho
Computer Graphics
A Distributed Low-Cost Dynamic Multicast Routing Algorithm with Delay Constraints / Min-Woo Shin ; Nak-Keun Joo ; Hyeong-Seok Lim
A New Bandwidth Reduction Method for Distributed Rendering Systems / Won-Jong Lee ; Hyung-Rae Kim ; Woo-Chan Park ; Jung-Woo Kim ; Tack-Don Han ; Sung-Bong Yang
Neural Networks Based Mesh Generation Method in 2-D / Çinar Ahmet ; Arslan Ahmet
Image Denoising Using Hidden Markov Models / Leila Ghabeli ; Hamidreza Amindavar
Data and Knowledge Engineering II
Anaphoric Definitions in Description Logic / Maarten Marx ; Mehdi Dastani
Storage and Querying of High Dimensional Sparsely Populated Data in Compressed Representation / Abu Sayed M. Latiful Hoque
The GlobData Fault-Tolerant Replicated Distributed Object Database / Luís Rodrigues ; Hugo Miranda ; Ricardo Almeida ; João Martins ; Pedro Vicente
XML II
A Levelized Schema Extraction for XML Document Using User-Defined Graphs / Sungrim Kim ; Yong-ik Yoon
Extracting, Interconnecting, and Accessing Heterogeneous Data Sources: An XML Query Based Approach / Gilles Nachouki ; Mohamed Quafafou
Mobile Communication II
Call Admission Control in Cellular Mobile Networks: A Learning Automata Approach / Hamid Beigy ; M.R. Meybodi
An Adaptive Flow Control Scheme for Improving TCP Performance in Wireless Internet / Seung-Joon Seok ; Sung-Min Hong ; Chul-Hee Kang
An Adaptive TCP Protocol for Lossy Mobile Environment / Choong Seon Hong ; YingXia Niu ; Jae-Jo Lee
Design and Implementation of Application-Level Multicasting Services over ATM Networks / Sung-Yong Park ; Jihoon Yang ; Yoonhee Kim
Digital Libraries and Natural Language Issues
Bon: The Persian Stemmer / Masoud Tashakori ; Mohammadreza Meybodi ; Farhad Oroumchian
Current and Future Features of Digital Journals / Harald Krottmaier
Solving Language Problems in a Multilingual Digital Library Federation / Nieves R. Brisaboa ; José R. Paramá ; MiguelR. Penabad ; Ángeles S. Places ; Francisco J. Rodríguez
Internet and Quality of Service
Performing IP Lookup on Very High Line Speed / Nazila Salimi
A Study of Marking Aggregated TCP and UDP Flows Using Generalized Marking Scheme
Information Society
Towards the Global Information Society: The Enactment of a Regulatory Framework as a Factor of Transparency and Social Cohesion / Panagiotes S. Anastasiades
E-learning
On the Application of the Semantic Web Concepts to Adaptive E-learning / Juan M. Santos ; Luis Anido ; Martín Llamas ; Judith S. Rodríguez
An Integrated Programming Environment for Teaching the Object-Oriented Programming Paradigm / Stelios Xinogalos ; Maya Satratzemi
The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EU / Hamid Jahankhani ; John A. Lynch ; Jonathan Stephenson
Mobile Communication III
Monte Carlo Soft Handoff Modeling / Alexey S. Rodionov ; Hyunseung Choo
A QoS Provision Architecture for Mobile IPv6 over MPLS Using HMAT / Zhao Wei Qu ; Sungyoung Lee
A New Propagation Model for Cellular Mobile Radio Communications in Urban Environments Including Tree Effects / Reza Arablouei ; Ayaz Ghorbani
Mobile Web Information Systems
A Secure Mobile Agent System Applying Identity-Based Digital Signature Scheme / Seongyeol Kim ; Ilyong Chung
Transmission Time Analysis of WAP over CDMA System Using Turbo Code Scheme / Il-Young Moon
On the Use of New Technologies in Health Care / Fernando Aguado ; Olga Folgueiras ; Manuel Caeiro
Wireless Communication Technology I
Hybrid Queuing Strategy to Reduce Call Blocking in Multimedia Wireless Networks / Il-Sun Hwang ; Robert Young Chul Kim
A Dynamic Backoff Scheme to Guarantee QoS over IEEE 802.11 Wireless Local Area Networks / Kil-Woong Jang ; Sung-Ho Hwang ; Ki-Jun Han
Performance Evaluation of Serial/Parallel Block Coded CDMA Systemwith Complex Spreading in Near/Far Multiple-Access Interference and Multi-path Nakagami Fading Channel / Choon-Gil Kim
A Learning Automata Based Dynamic Guard Channel Scheme
Web-Based Application
Dynamic System Simulation on the Web / Khaled Mahbub ; M.S.J. Hashmi
Using Proximity Information for Load Balancing in Geographically Distributed Web Server Systems / Dheeraj Sanghi ; Pankaj Jalote ; Puneet Agarwal
Strategie Tool for Assessment of the Supply and Demand Relationship between ASPs and SMEs for Competitive Advantage / Babak Akhgar ; Jawed Siddiqi ; Mehrdad Naderi
Intelligent Agents I
Trust and Commitment in Dynamic Logic / Jan Broersen ; Zhisheng Huang ; Leendert van der Torre
Modelling Heterogeneity in Multi Agent Systems / Stefania Bandini ; Sara Manzoni ; Carla Simone
Pricing Agents for a Group Buying System / Yong Kyu Lee ; Shin Woo Kim ; Min Jung Ko ; Sung Eun Park
Evolution of Cooperation in Multiagent Systems / Brian Mayoh
Real-Time Systems
A Dynamic Window-Based Approximate Shortest Path Re-computation Method for Digital Road Map Databases in Mobile Environments / Jaehun Kim ; Sungwon Jung
Web-Based Process Control Systems: Architectural Patterns, Data Models, and Services / Mykola V. Tkachuk ; Heinrich C. Mayr ; Dmytro V. Kuklenko ; MichailD. Godlevsky
A Comparison of Techniques to Estimate Response Time for Data Placement / Shahram Ghandeharizadeh ; Shan Gao ; Chris Gahagan
Using a Real-Time Web-Based Pattern Recognition System to Search for Component Patterns Database / Sung-Jung Hsiao ; Kuo-Chin Fan ; Wen-Tsai Sung ; Shih-Ching Ou
Wireless Communication Technology II
An Adaptive Call Admission Control to Support Flow Handover in Wireless Ad Hoc Networks / Joo-Hwan Seo
Design of Optimal LA in Personal Communication Services Network Using Simulated Annealing Technique / Madhubanti Maitra ; Ranjan Kumar Pradhan ; Debasish Saha ; Amitava Mukherjee
Secure Bluetooth Piconet Using Non-anonymous Group Key / Dae-Hee Seo ; Im-Yeong Lee ; Dong-ik Oh ; Doo-soon Park
Differentiated Bandwidth Allocation and Power Saving for Wireless Personal Area Networks / Tae-Jin Lee ; Yongsuk Kim
Software Engineering I
Combining Extreme Programming with ISO 9000 / Jerzy R. Nawrocki ; Michał Jasiñski ; Bartosz Walter ; Adam Wojciechowski
The Class Cohesion Using the Reference Graph G1 and G2 / Wan-Kyoo Choi ; Il-Yong Chung Sung-Joo Lee ; Hong-Sang Yoon
Process-Oriented Interactive Simulation of Software Acquisition Projects / Tobias Häberlein ; Thomas Gantner
Automatic Design Patterns Identification of C++ Programs / Félix Agustín Castro Espinoza ; Gustavo Núñez Esquer ; Joel Suárez Cansino
Intelligent Agents II
Specifying the Merging of Desires into Goals in the Context of Beliefs
The Illegal Copy Protection Using Hidden Agent / Deok-Gyu Lee
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System / Tae-Kyung Kim ; Dong-Young Lee ; T.M. Chung
Algorithm and Computer Theory
H-Colorings of Large Degree Graphs / Josep Díaz ; Jaroslav Nešetřil ; Maria Serna ; Dimitrios M. Thilikos
Hyper-Star Graph: A New Interconnection Network Improving the Network Cost of the Hypercube / Hyeong-Ok Lee ; Jong-Seok Kim ; Eunseuk Oh
Sequential Consistency as Lazy Linearizability / Michel Raynal
Embedding Full Ternary Trees into Recursive Circulants / Cheol Kim ; Jung Choi
Wireless Communication Technology III
A Handoff Priority Scheme for TDMA/FDMA-Based Cellular Networks / Sun-Woo Lee
On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling Policies / Jelena Mišić ; Vojislav B. Mišić
Intelligent Paging Strategy in 3G Personal Communication Systems / I. Saha Misra ; S. Karmakar ; M.S. Mahapatra ; P.S. Bhattacharjee ; D. Saha ; A. Mukhertjee
Experience from Mobile Application Service Framework in WIP / Shinyoung Lim ; Youjin Song
An Efficient Approach to Improve TCP Performance over Wireless Networks / Satoshi Utsumi ; Salahuddin M.S. Zabir ; Norio Shiratori
Extended Hexagonal Constellations as a Means of Multicarrier PAPR Reduction / Ali Pezeshk ; Babak H. Khalaj
Software Engineering II
Adaptive Application-Centric Management in Meta-computing Environments
The Weakest Failure Detector for Solving Election Problems in Asynchronous Distributed Systems / Sung-Hoon Park
From Lens to Flow Structure / David Fauthoux ; Jean-Paul Bahsoun
ADML: A Language for Automatic Generation of Migration Plans / Jennifer Pérez ; José A. Carsí ; Isidro Ramos
Considerations for Using Domain-Specific Modeling in the Analysis Phase of Software Development Process / Kalle Korhonen
Organizations and Normative Agents / Virginia Dignum ; Frank Dignum
A Framework for Agent-Based Software Development / Behrouz Homayoun Far
Application of Agent Technologies in Extended Enterprise Production Planning / V. Marík ; M. Pechoucek ; J. Vokrínek ; A. Ríha
Zamin: An Artificial Ecosystem / Ramin Halavati
Author Index
Artificial Intelligence I
Speaker Model and Decision Threshold Updating in Speaker Verification / M. Mehdi Homayounpour
Application of Constraint Hierarchy to Timetabling Problems / Tatyana Yakhno ; Evren Tekin
76.

図書

図書
Don Batory, Charles Consel, Walid Taha (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  viii, 334 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2487
所蔵情報: loading…
目次情報: 続きを見る
Invited Papers
Program Generation, Termination, and Binding-Time Analysis / Neil D. Jones ; Arne J. Glenstrup
Generative Programming for Embedded Systems / Janos Sztipanovits ; Gabor Karsai
Regular Papers
Self Reflection for Adaptive Programming / Giuseppe Attardi ; Antonio Cisternino
DataScript - A Specification and Scripting Language for Binary Data / Godmar Back
Memoization in Type-Directed Partial Evaluation / Vincent Balat ; Olivier Danvy
A Protocol Stack Development Tool Using Generative Programming / Michel Barbeau ; Francis Bordeleau
Building Composable Aspect-Specific Languages with Logic Metaprogramming / Johan Brichau ; Kim Mens ; Kris De Volder
Architectural Refactoring in Framework Evolution: A Case Study / Greg Butler
Towards a Modular Program Derivation via Fusion and Tupling / Wei-Ngan Chin ; Zhenjiang Hu
Generative Programming for Embedded Software: An Industrial Experience Report / Krzysztof Czarnecki ; Thomas Bednasch ; Peter Unger ; Ulrich Eisenecker
A Framework for the Detection and Resolution of Aspect Interactions / Remi Douence ; Pascal Fradet ; Mario Sudholt
Aspect-Oriented Modeling: Bridging the Gap between Implementation and Design / Tzilla Elrad ; Omar Aldawud ; Atef Bader
Macros That Compose: Systematic Macro Programming / Oleg Kiselyov
Program Termination Analysis in Polynomial Time / Chin Soon Lee
Generators for Synthesis of QoS Adaptation in Distributed Real-Time Embedded Systems / Sandeep Neema ; Ted Bapty ; Jeff Gray ; Aniruddha Gokhale
Optimizing Content Management System Pipelines (Separation and Merging of Concerns) / Markus Noga ; Florian Krüper
Component-Based Programming for Higher-Order Attribute Grammars / João Saraiva
Altering Java Semantics via Bytecode Manipulation / E ric Tanter ; Marc Segura-Devillechaise ; Jacques Noyé ; José Piquer
Meta-programming with Concrete Object Syntax / Eelco Visser
Managing Dynamic Changes in Multi-stage Program Generation Systems / Zhenghao Wang ; Richard R. Muntz
Author Index
Invited Papers
Program Generation, Termination, and Binding-Time Analysis / Neil D. Jones ; Arne J. Glenstrup
Generative Programming for Embedded Systems / Janos Sztipanovits ; Gabor Karsai
77.

図書

図書
Chris George, Huaikou Miao (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xi, 626 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2495
所蔵情報: loading…
78.

図書

図書
Roger Dingledine, Paul Syverson (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2482
所蔵情報: loading…
79.

図書

図書
Pil Joong Lee, Chae Hoon Lim (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c2003  xi, 536 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2587
所蔵情報: loading…
80.

図書

図書
Yvo G. Desmedt (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xi, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2567
所蔵情報: loading…
目次情報: 続きを見る
Diffie-Hellman Based Schemes
Efficient Construction of (Distributed) Verifiable Random Functions / Yevgeniy Dodis
An Identity-Based Signature from Gap Diffie-Hellman Groups / Jae Choon Cha ; Jung Hee Cheon
Threshold Cryptography
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme / Alexandra Boldyreva
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack / Philip MacKenzie
Reduction Proofs
On the Bit Security of NTRUEncrypt / Mats Näslund ; Igor E. Shparlinski ; William Whyte
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks / Yodai Watanabe ; Junji Shikata ; Hideki Imai
Broadcast and Tracing
Randomness Re-use in Multi-recipient Encryption Schemes / Mihir Bellare ; Jessica Staddon
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / Nelly Fazio
Digital Signatures
The Cramer-Shoup Strong-RSA Signature Scheme Revisited / Marc Fischlin
Strong Key-Insulated Signature Schemes / Jonathan Katz ; Shouhuai Xu ; Moti Yung
Specialized Multiparty Cryptography
A Verifiable Secret Shuffle of Homomorphic Encryptions / Jens Groth
Round-Optimal Contributory Conference Key Agreement / Colin Boyd ; Juan Manuel González Nieto
Cryptanalysis I
Security Analysis of the MORCryptosystem / Christian Tobias
A Practical Attack on Some Braid Group Based Cryptographic Primitives / Dennis Hofheinz ; Rainer Steinwandt
Elliptic Curves: Implementation Attacks
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems / Louis Goubin
Validation of Elliptic Curve Public Keys / Adrian Antipa ; Daniel Brown ; Alfred Menezes ; René Struik ; Scott Vanstone
Exceptional Procedure Attack on Elliptic Curve Cryptosystems / Tetsuya Izu ; Tsuyoshi Takagi
Implementation and Hardware Issues
A Dedicated Sieving Hardware / Martijn Stam ; Willi Geiselmann
A Fast and Secure Implementation of Sflash / Mehdi-Laurent Akkar ; Nicolas T. Courtois ; Romain Duteuil
New Public Key Schemes
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes / David Galindo ; Sebastià Martín ; Paz Morillo ; Jorge L. Villar
A Lattice Based Public Key Cryptosystem Using Polynomial Representations / Seong-Hun Paeng ; Bae Eun Jung ; Kil-Chan Ha
Elliptic Curves: General Issues
The Security of DSA and ECDSA (Bypassing the Standard Elliptic Curve Certification Scheme) / Serge Vaudenay
Cryptanalysis II
Side-Channel Attacks on Textbook RSA and ElGamal Encryption / Ulrich Kuhn
On the Security of HFE, HFEv- and Quartz / Magnus Daum ; Patrick Felke
Generic Attacks and the Security of Quartz
Author Index
Diffie-Hellman Based Schemes
Efficient Construction of (Distributed) Verifiable Random Functions / Yevgeniy Dodis
An Identity-Based Signature from Gap Diffie-Hellman Groups / Jae Choon Cha ; Jung Hee Cheon
81.

図書

図書
Fabien A.P. Petitcolas (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  ix, 426 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2578
所蔵情報: loading…
目次情報: 続きを見る
Information Hiding and Networking / Neil JohnsonSession 1:
Hiding Intrusions: From the Abnormal to the Normal and Beyond / Kymie Tan ; John McHugh ; Kevin Killourhy
Eliminating Steganography in Internet Traffic with Active Wardens / Gina Fisk ; Mike Fisk ; Christos Papadopoulos ; Joshua Neil
Anonymity / Andreas PfitzmannSession 2:
From a Trickle to a Flood: Active Attacks on Several Mix Types / Andrei Serjantov ; Roger Dingledine ; Paul Syverson
Limits of Anonymity in Open Environments / Dogan Kedogan ; Dakshi Agrawal ; Stefan Penz
Chaffinch: Confidentiality in the Face of Legal Threats / Richard Clayton ; George Danezis
Watermarking Fundamentals / Job OostveenSession 3:
Nothing But a Kiss: A Novel and Accurate Approach to Assessing the Performance of Multidimensional Distortion-Compensated Dither Modulation / Fernando Pérez-González ; Félix Balado
Robustness and Efficiency of Non-linear Side-Informed Watermarking / Guénolé C.M. Silvestre ; Neil J. Hurley ; Teddy Furon
Security of Public Watermarking Schemes for Binary Sequences / Qiming Li ; Ee-Chien Chang
Watermarking Algorithms I / Hyoung Joong KimSession 4:
Direct Embedding and Detection of RST Invariant Watermarks / Peter A. Fletcher ; Kieran G. Larkin
Robust Image Watermark Using Radon Transform and Bispectrum Invariants / Hyung-Shin Kim ; Yunju Baek ; Heung-Kyu Lee ; Young-Ho Suh
Audio Watermark Robustness to Desynchronization via Beat Detection / Darko Kirovski ; Hagai Attias
Watermarking Algorithms II / Ton KalkerSession 5:
Robust Watermarking and Affine Registration of 3D Meshes / Oliver Benedens
Natural Language Watermarking and Tamperproofing / Mikhail J. Atallah ; Victor Raskin ; Christian F. Hempelmann ; Mercan Karahan ; Radu Sion ; Umut Topkara ; Katrina E. Triezenberg
Attacks on Watermarking Algorithms / Fabien A. P. PetitcolasSession 6:
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection / Tri Van Le ; Yvo Desmedt
Cryptanalysis of Discrete-Sequence Spread Spectrum Watermarks / M. Kivanc Mihcak ; Ramarathnam Venkatesan ; Mustafa Kesal
Detectors for Echo Hiding Systems / Scott Craver ; Bede Liu ; Wayne Wolf
Steganography Algorithms / Jessica FridrichSession 7:
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis / Richard E. Newman ; Ira S. Moskowitz ; LiWu Chang ; Murali M. Brahmadesam
Steganography Preserving Statistical Properties / Elke Franz
Bit-Plane Decomposition Steganography Combined with JPEG2000 Compression / Hideki Noda ; Jeremiah Spaulding ; Mahdad N. Shirazi ; Michiharu Niimi ; Eiji Kawaguchi
Steganalysis I / Session 8:
Steganalysis of JPEG Images: Breaking the F5 Algorithm / Miroslav Goljan ; Dorin Hogea
Detecting Low Embedding Rates / Andreas Westfeld
Steganalysis II / Session 9:
Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines / Siwei Lyu ; Hany Farid
Detection of LSB Steganography via Sample Pair Analysis / Sorina Dumitrescu ; Xiaolin Wu ; Zhe Wang
Hiding Information in Unusual Content I / Christian S. CollbergSession 10:
Hiding Data in DNA / Boris Shimanovsky ; Jessica Feng ; Miodrag Potkonjak
Tracing the Source of a Shredded Document / Jack Brassil
Hiding Information in Unusual Content II / Caroline FontaineSession 11:
Oblivious Hashing: A Stealthy Software Integrity Verification Primitive / Yuqun Chen ; Matthew Cary ; Ruoming Pang ; Saurabh Sinha ; Mariusz H. Jakubowski
Practical Oblivious Transfer Protocols / Christian Tobias
Author Index
Information Hiding and Networking / Neil JohnsonSession 1:
Hiding Intrusions: From the Abnormal to the Normal and Beyond / Kymie Tan ; John McHugh ; Kevin Killourhy
Eliminating Steganography in Internet Traffic with Active Wardens / Gina Fisk ; Mike Fisk ; Christos Papadopoulos ; Joshua Neil
82.

図書

図書
Yuliang Zheng (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiii, 578 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2501
所蔵情報: loading…
83.

図書

図書
Robert Deng ... [et al.] (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xii, 496 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2513
所蔵情報: loading…
84.

図書

図書
Thomas Johansson, Subhamoy Maitra (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 429 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2904
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
Linear Complexity and Related Complexity Measures for Sequences / H. Niederreiter
Forensic Computing / X. Li ; J. Seberry
Stream Cipher
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation / P. Sarkar
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator / S. Paul ; B. Preneel
Block Cipher
Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA / H.M. Yildirim
Impossible Differential Cryptanalysis for Block Cipher Structures / J. Kim ; S. Hong ; J. Sung ; S. Lee ; J. Lim ; S. Sung
Impossible Differential Attack on 30-Round SHACAL-2 / G. Kim ; C. Lee
Boolean Function
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria / K.C. Gupta
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria / S. Kavut ; M.D. Yücel
Secrect Sharing
On Multiplicative Linear Secret Sharing Schemes / V. Nikov ; S. Nikova
A New (2,n)-Visual Threshold Scheme for Color Images / A. Adhikari ; S. Sikdar
On the Power of Computational Secret Sharing / V. Vinod ; A. Narayanan ; K. Srinathan ; C.P. Rangan ; K. Kim
Bilinear Pairing
Identity-Based Broadcasting / Y. Mu ; W. Susilo ; Y.-X. Lin
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings / F. Zhang ; R. Safavi-Naini
Extending Joux's Protocol to Multi Party Key Agreement / R. Barua ; R. Dutta
Public Key
Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups / P.J. Abisha ; D.G. Thomas ; K.G. Subramanian
Prime Numbers of Diffie-Hellman Groups for IKE-MODP / I. Yie ; S. Lim ; S. Kim ; D. Kim
Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems / F. Levy-dit-Vehel ; L. Perret
Signature Scheme
Security Analysis of Several Group Signature Schemes / G. Wang
Forking Lemmas for Ring Signature Schemes / J. Herranz ; G. Saez
Protocol
Practical Mental Poker Without a TTP Based on Homomorphic Encryption / J. Castellà-Roca ; J. Domingo-Ferrer ; A. Riera ; J. Borrell
Lightweight Mobile Credit-Card Payment Protocol / S. Kungpisdan ; B. Srinivasan ; P.D. Le
Elliptic Curve & Algebraic Geometry
On the Construction of Prime Order Elliptic Curves / E. Konstantinou ; Y.C. Stamatiou ; C. Zaroliagis
Counting Points on an Abelian Variety over a Finite Field / F.A. Izadi ; V.K. Murty
Implementation & Digital Watermarking
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication / K. Okeya ; D.-G. Han
Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm) / G. Bertoni ; J. Guajardo ; G. Orlando
Cryptanalysis of Block Based Spatial Domain Watermarking Schemes / T.K. Das
Authentication
More Efficient Password Authenticated Key Exchange Based on RSA / D.S. Wong ; A.H. Chan ; F. Zhu
A Password-Based Authenticator: Security Proof and Applications / Y. Hitchcock ; Y.S.T. Tin ; J.M. Gonzalez-Nieto ; C. Boyd ; P. Montague
Stronger Security Bounds for OMAC, TMAC, and XCBC / T. Iwata ; K. Kurosawa
Progressive Verification: The Case of Message Authentication / M. Fischlin
Author Index
Invited Talks
Linear Complexity and Related Complexity Measures for Sequences / H. Niederreiter
Forensic Computing / X. Li ; J. Seberry
85.

図書

図書
Ali E. Abdallah, Peter Ryan, Steve Schneider (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  x, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2629
所蔵情報: loading…
目次情報: 続きを見る
Keynote Talk
Lifting Reference Monitors from the Kernel / F.B. Schneider
Invited Talks I
Authenticity Types for Cryptographic Protocols / A. Gordon
Verifying the SET Protocol: Overview / L.C. Paulson
Protocol Verification
Interacting State Machines: A Stateful Approach to Proving Security / D. von Oheimb
Automatic Approximation for the Verification of Cryptographic Protocols / F. Oehl ; G. Cece ; O. Kouchnarenko ; D. Sinclair
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis / C. Boyd ; K. Viswanathan
Invited Talks II
Critical Critical Systems / S. Stepney
Analysing Security Protocols / D. Gollmann
Analysis of Protocols
Analysis of Probabilistic Contract Signing / G. Norman ; V. Shmatikov
Security Analysis of (Un-) Fair Non-repudiation Protocols / S. Gurgens ; C. Rudolph
Modeling Adversaries in a Logic for Security Protocol Analysis / J.Y. Halpern ; R. Pucella
Security Modelling and Reasonning
Secure Self-certified Code for Java / M. Debbabi ; J. Desharnais ; M. Fourati ; E. Menif ; F. Painchaud ; N. Tawbi
Z Styles for Security Properties and Modern User Interfaces / A. Hall
Invited Talks III
Cryptographic Challenges: The Past and the Future / B. Preneel
TAPS: The Last Few Slides / E. Cohen
Intrusion Detection Systems and Liveness
Formal Specification for Fast Automatic IDS Training / A. Durante ; R. Di Pietro ; L.V. Mancini
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area / G.T. Rohrmair ; G. Lowe
Revisiting Liveness Properties in the Context of Secure Systems / F.C. Gartner
Author Index
Keynote Talk
Lifting Reference Monitors from the Kernel / F.B. Schneider
Invited Talks I
86.

図書

図書
Roger Dingledine (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 221 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2760
所蔵情報: loading…
目次情報: 続きを見る
Mix-Networks with Restricted Routes / George Danezis
Generalising Mixes / Claudia D'iaz ; Andrei Serjantov
Modelling Unlinkability / Sandra Steinbrecher ; Stefan Kopsell
Metrics for Traffic Analysis Prevention / Richard E. Newman ; Ira S. Moskowitz ; Paul Syverson
Breaking and Mending Resilient Mix-Nets / Lan Nguyen ; Rei Safavi-Naini
Improving Onion Notation / Richard Clayton
Engineering Privacy in Public: Confounding Face Recognition / James Alexander ; Jonathan Smith
From Privacy Legislation to Interface Design: Implementing Information Privacy in Human-Computer Interactions / Andrew S. Patrick ; Steve Kenny
Thwarting Web Censorship with Untrusted Messenger Discovery / Nick Feamster ; Magdalena Balazinska ; Winston Wang ; Hari Balakrishnan ; David Karger
gap - Practical Anonymous Networking / Krista Bennett ; Christian Grothoff
An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks / Dennis Kügler
A Component Architecture for Dynamically Managing Privacy Constraints in Personalized Web-Based Systems / Alfred Kobsa
Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon / Birgit Pfitzmann
From P3P to Data Licenses / Shi-Cho Cha ; Yuh-Jzer Joung
Author Index
Mix-Networks with Restricted Routes / George Danezis
Generalising Mixes / Claudia D'iaz ; Andrei Serjantov
Modelling Unlinkability / Sandra Steinbrecher ; Stefan Kopsell
87.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  viii, 241 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2845
所蔵情報: loading…
88.

図書

図書
sponsored by DARPA
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  2 vol. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Papers by Program Order / Volume I:
Composable High Assurance Trusted Systems (CHATS)
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance
Defcon Capture the Flag: Defending Vulnerable Code from Intense Attack / C. Cowan ; S. Arnold ; S. Beattie ; C. Wright ; J. Viega
Cyber Panel
Finding the Vocabulary of Program Behavior Data for Anomaly Detection / C. Michael
Detecting Spoofed Packets / S. Templeton ; K. Levitt
Modeling Multistep Cyber Attacks for Scenario Recognition / S. Cheung ; U. Lindqvist ; M. Fong
Cooperative Response Strategies for Large Scale Attack Mitigation / D. Nojiri ; J. Rowe
Dynamic Coalitions (DC)
Dynamic Authorization and Intrusion Response in Distributed Systems / T. Ryutov ; C. Neuman ; D. Kim
The STRONGMAN Architecture / A. Keromytis ; S. Ioannidis ; M. Greenwald ; J. Smithy
Dynamic PKI and Secure Tuplespaces for Distributed Coalitions / T. Smith ; G. Byrd ; X. Wu ; H. Xin ; K. Thangavelu ; R. Wang ; A. Shah
RT: A Role-Based Trust-Management Framework / N. Li ; J. Mitchell
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer / Y. Amir ; C. Nita-Rotaru ; J. Stanton ; G. Tsudik
MuCAPSL / J. Millen ; G. Denker
Leader Election Algorithms for Wireless Ad Hoc Networks / S. Vasudevan ; B. DeCleene ; N. Immerman ; J. Kurose ; D. Towsley
Fault Tolerant Networking (FTN)
COSSACK: Coordinated Suppression of Simultaneous Attacks / C. Papadopoulos ; R. Lindell ; J. Mehringer ; A. Hussain ; R. Govindan
NetBouncer: Client-Legitimacy-Based High-Performance DDoS Filtering / R. Thomas ; B. Mark ; T. Johnson ; J. Croall
Analyzing Interaction between Distributed Denial of Service Attacks and Mitigation Technologies / W. Blackert ; D. Gregg ; A. Castner ; E. Kyle ; R. Hom ; R. Jokerst
Design and Analysis of an IP-Layer Anonymizing Infrastructure / H. Kung ; C. Cheng ; K. Tan ; S. Bradner
Prophylactic, Treatment and Containment Techniques for Ensuring Active Network Security / S. Murphy ; A. Hayatnagarkar ; S. Krishnaswamy ; W. Morrison
Understanding BGP Behavior through a Study of DoD Prefixes / X. Zhao ; D. Massey ; S. Wu ; M. Lad ; D. Pei ; L. Wang ; L. Zhang
Efficient Alarm Management in Optical Networks / S. Stanic ; S. Subramaniam ; H. Choi ; G. Sahin
Interactions Between TCP and the IEEE 802.11 MAC Protocol / R. Jiang ; V. Gupta ; C. Ravishankar
Statistical Approaches to DDoS Attack Detection and Response / L. Feinstein ; D. Schnackenberg ; R. Balupari ; D. Kindred
Organic and Survivable Information Systems (OASIS)
Towards a Rigorous Definition of Information System Survivability / J. Knight ; E. Strunk ; K. Sullivan
Intrusion Tolerance via Network Layer Controls / D. O'Brien ; R. Smith ; T. Kappel ; C. Bitzer
Operational Experimentation (OPX)
Lessons Learned in Using Live Red Teams in IA Experiments / D. Levin
Surveillance Detection in High Bandwidth Environments / S. Robertson ; E. Siegel ; M. Miller ; S. Stolfo
Detecting Novel Scans through Pattern Anomaly Detection / A. Valdes
Author Index
DARPA Information Survivability Conference and Exposition--DISCEX 2003 / Volume II:
Foreword
Acknowledgments
Demonstration Abstracts / Part I:
Open-Source PKI on SELinux--A Technology Description / E. Bubnis ; S. Evans ; P. Fischer ; E. Meighan ; A. Almeida
Demonstration of COSAK Static Analysis Tools / D. DaCosta ; C. Dahn ; S. Mancoridis ; V. Prevelakis
MYSEA Technology Demonstration / C. Irvine ; D. Shifflett ; P. Clark ; T. Levin ; G. Dinolt
The TrustedBSD MAC Framework
Visualization as an Aid for Assessing the Mission Impact of Information Security Breaches / A. D'Amico ; S. Salas
A Controller-Based Autonomic Defense System / D. Armstrong ; S. Carter ; G. Frazier ; T. Frazier
Scyllarus Intrusion Detection Report Correlator and Analyzer / W. Heimerdinger
System Health and Intrusion Monitoring: Technology Description / C. Ko
CIRCADIA Demonstration: Active Adaptive Defense / D. Musliner
An Integrated Cyber Panel System / L. Tinnel ; O. Saydjari ; J. Haines
Intelligence Preparation of the Information Battlespace (IPIB) / J. Williams
Integrated Security Services for Dynamic Coalitions / H. Khurana ; S. Gavrila ; R. Bobba ; R. Koleva ; A. Sonalker ; E. Dinu ; V. Gligor ; J. Baras
Key Management for Secure Multicast Group Communication in Mobile Networks / T. Kostas ; D. Kiwior ; G. Rajappan ; M. Dalal
Antigone: Policy-Based Secure Group Communication System and AmirD: Antigone-Based Secure File Mirroring System / J. Irrer ; A. Prakash ; P. McDaniel
Federated Security Management for Dynamic Coalitions / S. Bhatt ; S. Rajagopalan ; P. Rao
TrustBuilder: Negotiating Trust in Dynamic Coalitions / K. Seamons ; T. Chan ; E. Child ; M. Halcrow ; A. Hess ; J. Holt ; J. Jacobson ; R. Jarvis ; A. Patty ; B. Smith ; T. Sundelin ; L. Yu
Yalta: A Dynamic PKI and Secure Tuplespaces for Distributed Coalitions
A Toolkit for Building Secure, Fault-Tolerant Virtual Private Networks / W. Stephens ; B. Coan ; S. Narain ; V. Kaul ; K. Parmeswaran ; T. Cheng
Distributed Data Authentication / M. Goodrich ; M. Shin ; C. Straub ; R. Tamassia
Automated Trust Negotiation Technology with Attribute-Based Access Control / W. Winsborough ; J. Jacobs
Fault Tolerant Networks (FTN)
The Wackamole Approach to Fault Tolerant Networks / R. Caudy ; A. Munjal ; T. Schlossnagle ; C. Tutu
Distributed Denial of Service Defense Attack Tradeoff Analysis (DDOS-DATA)
NCAC: Network Congestion Analyzer and Controller
DDoS Tolerant Networks
Guaranteed Internet Stack Utilization (GINSU) Building Blocks / R. Knobbe ; A. Purtell
ANON: An IP-Layer Anonymizing Infrastructure
Distributed Embedded Firewalls with Virtual Private Groups / T. Markham ; L. Meredith ; C. Payne
Fault-Tolerant Mesh of Trust Applied to DNS Security / W. Griffin ; R. Mundy ; S. Weiler ; N. Vora
Demonstration of Fault Tolerance for CORBA Applications / L. Moser ; M. Melliar-Smith
Dynamic Trust-Based Resource Allocation / T. Hughes ; M. Junod ; P. Muckelbauer
Active Network Fault Response
Scalable DDoS Protection Using Route-Based Filtering / K. Park
Techniques for Intrusion-Resistant Ad Hoc Routing Algorithms (TIARA) / R. Ramanujan ; S. Kudige ; T. Nguyen
DefCOM: Defensive Cooperative Overlay Mesh / M. Robinson ; J. Mirkovic ; S. Michel ; M. Schnaider ; P. Reiher
Improving Failure Responsiveness in Jini Leasing / S. Rose ; K. Bowers ; S. Quirolgico ; K. Mills
SPIE Demonstration: Single Packet Traceback / W. Strayer ; C. Jones ; F. Tchakountio ; A. Snoeren ; B. Schwartz ; R. Clements ; M. Condell ; C. Partridge
Onion Routing for Resistance to Traffic Analysis / P. Syverson
TetherNet Anti-NAT--Secure Internet Subnet Rental System / H. Zhu ; T. Huck ; J. Touch ; L. Eggert ; Y. Wang
Organically Assured and Survivable Information Systems (OASIS)
Safe Email, Safe Office, and Safe Web Browser / R. Balzer
Access Control on the Web Using Proof-Carrying Authorization / L. Bauer ; M. Schneider ; E. Felten ; A. Appel
Enterprise Wrappers for Information Assurance / M. Feldman
Willow System Demonstration / J. Hill ; P. Varner ; A. Wolf ; D. Heimbigner ; P. Devanbu
Camouflage of Network Traffic to Resist Attack (CONTRA) / W. Weinstein ; J. Lepanto
Dependable Intrusion Tolerance: Technology Demo / M. Almgren ; Y. Deswarte ; B. Dutertre ; J. Levy ; H. Saidi ; V. Stavridou ; T. Uribe
ITDB: An Attack Self-Healing Database System Prototype / P. Liu
Intrustion Tolerant Web Servers via Network Layer Controls
Demonstrating Intrusion Tolerance with ITUA / P. Pal
VPNshield: Protecting VPN Services from Denial-of-Service (DoS) Attacks / M. Kaddoura ; J. Wu ; C. Sanders ; K. Millikin
On-Line Attack Prevention and Continual Recovery / J. Reynolds
An Aspect-Oriented Security Solution / V. Shah ; F. Hill
OmniVPN / J. Shukla
Efficient Code Certification for Open Firmware / M. Stillerman ; D. Kozen
Intrusion Tolerant Distributed Object Systems / G. Tally ; B. Whitmore ; D. Sames ; B. Matt ; B. Niebuhr ; D. Bakken
SPMA--Java Binary Enhancement Tool / T. Van Vleck ; A. Reisse
SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services / F. Wang ; R. Uppalli
System Detection's Hawkeye Platform
Research Summaries / Part II:
Modeling Security-Enhanced Linux Policy Specifications for Analysis / M. Archer ; E. Leonard ; M. Pradella
Open-Source PKI on SELinux
Monterey Security Enhanced Architecture Project
Achieving Principled Assuredly Trustworthy Composable Systems and Networks / P. Neumann
Enhancing ReiserFS Security in Linux / H. Reiser
LLSIM: Network Simulation for Correlation and Response Testing / S. Goulet ; R. Durst ; T. Champion
System Health and Intrusion Monitoring (SHIM): Project Summary
Predicting the Impact of Cyber-Attacks on BMC[subscript 3] Enterprises / J. Shaw
A Framework for Automated Negotiation of Access Control Policies / V. Bharadwaj
Recommendations in Using Group Key Management Algorithms / W. Chen ; L. Dondeti
DyCER: A Lightweight Data Sharing System Using Replication / J. Kay ; S. Crocker
A Flexible Architecture for Security Policy Enforcement
Trust Negotiation in Dynamic Coalitions / M. Winslett ; T. Yu
Efficient and Scalable Infrastructure Support for Dynamic Coalitions
Automated Trust Negotiation in Attribute-Based Access Control
A Summary of the Autonomic Distributed Firewalls (ADF) Project
Traceback of Single IP Packets Using SPIE
DynaBone: Dynamic Defense Using Multi-Layer Internet Overlays / G. Finn
A Summary of Detection of Denial-of-QoS Attacks on DiffServ Networks / V. Mahadik ; D. Reeves
Engineering a Distributed Intrusion Tolerant Database System Using COTS Components
EMT/MET: Systems for Modeling and Detecting Errant Email / S. Hershkop ; K. Wang ; O. Nimeskern
Papers by Program Order / Volume I:
Composable High Assurance Trusted Systems (CHATS)
Design and Implementation of the TrustedBSD MAC Framework / R. Watson ; B. Feldman ; A. Migus ; C. Vance
89.

図書

図書
Dieter Hutter ... [et al.]
出版情報: Berlin ; Tokyo : Springer-Verlag, c2004  xi, 289 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2802
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks (Abstracts)
The Age of Pervasive Computing - Everything Smart, Everything Connected? / Friedemann Mattern
Cyber Assist Project and Its Security Requirement / Hideyuki Nakashima
Security in Pervasive Computin / Frank Stajano
The Importance of High Assurance Security in Pervasive Computing / Paul A. Karger
Location Privacy A Methodological Assessment of Location Privacy Risks in Wireless Hotspot
Networks / Marco Gruteser ; Dirk Grunwald
Protecting Access to People Location Information / Urs Hengartner ; Peter Steenkiste
Security Requirements
Smart Devices and Software Agents: The Basics of Good Behaviour / Howard Chivers ; John A. Clark ; Susan Stepney
Dependability Issues of Pervasive Computing in a Healthcare Environment / JurgenBohn ; FelixGartner ; HaraldVogt
Security Policies and Protection
Protecting Security Policies in Ubiquitous Environments
Using One-Way Functions / HakanKvarnstrom ; HansHedbom ; ErlandJonsson
Enforcing Security Policies via Types / Daniele Gorla ; Rosario Pugliese
Towards Using Possibilistic Information Flow Control to Design Secure Multiagent Systems / Axel Schairer
Authentication and Trust
Authentication for Pervasive Computing / Sadie Creese ; Michael Goldsmith ; Bill Roscoe ; Irfan Zakiuddin
End-to-End Trust Starts with Recognition / Jean-Marc Seigneur ; Stephen Farrell ; Christian Damsgaard Jensen ; Elizabeth Gray ; Yong Chen
Embedding Distance-Bounding Protocols within Intuitive Interactions / Laurent Bussard and Yves Roudier
Secure Infrastructures
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments / Philip Robinson ; Michael Beigl
Time Constraint Delegation for P2P Data Decryption / Tie-Yan Li
SAOTS: A New Efficient Server Assisted Signature Scheme for Pervasive Computing / Kemal Bicakci ; Nazife Baykal
Smart Labels
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems / Stephen A. Weis ; Sanjay E. Sarma ; Ronald L. Rivest ; Daniel W. Engels
Verification
Implementing a Formally Verifiable Security Protocol in Java Card / Engelbert Hubbers ; Martijn Oostdijk ; Erik Poll
Hardware Architectures
Cellular Automata Based Multiplier for Public-Key Cryptosystem / Hyun-Sung Kim ; Kee-Young Yoo
Enlisting Hardware Architecture to Thwart Malicious Code Injection / Ruby B. Lee ; David K. Karig ; John P. McGregor ; Zhijie Shi
Optimized RISC Architecture for Multiple-Precision Modular Arithmetic / Johann Großschadl ; Guy-Armand Kamendje
Visual Crypto Displays Enabling Secure Communications / Pim Tuyls ; Tom Kevenaar ; Geert-Jan Schrijen ; Toine Staring ; Marten van Dijk
Workshop
Security and Privacy in Pervasive Computing State of the Art and Future Directions / Dieter Hutter ; Werner Stephan ; Markus Ullmann
Author Index
Invited Talks (Abstracts)
The Age of Pervasive Computing - Everything Smart, Everything Connected? / Friedemann Mattern
Cyber Assist Project and Its Security Requirement / Hideyuki Nakashima
90.

図書

図書
Moni Naor (Ed.)
出版情報: Berlin : Springer, c2004  xi, 521 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2951
所蔵情報: loading…
91.

図書

図書
Ton Kalker, Ingemar J. Cox, Yong Man Ro (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xii, 602 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2939
所蔵情報: loading…
92.

図書

東工大
目次DB

図書
東工大
目次DB
Feng Bao, Robert Deng, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 454 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2947
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439
Author Index 455
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
93.

図書

東工大
目次DB

図書
東工大
目次DB
Tatsuaki Okamoto (ed.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 386 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2964
所蔵情報: loading…
目次情報: 続きを見る
Symmetric Encryption
   Online Encryption Schemes: New Security Notions and Constructions Alexandra Boldyreva, Nut Taesombut 1
   Related-Key Attacks on Triple-DES and DESX Variants Raphael C.-W. Phan 15
   Design of AES Based on Dual Cipher and Composite Field Shee-Yau Wu, Shih-Chuan Lu, Chi Sung Laih 25
   Periodic Properties of Counter Assisted Stream Ciphers Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen 39
   A Fast Correlation Attack via Unequal Error Correcting LDPC Codes Maneli Noorkami, Faramarz Fekri 54
Aymmetric Encryption
   κ-Resilient Identity-Based Encryption in the Standard Model Swee-Huay Heng, Kaoru Kurosawa 67
   A Generic Construction for Intrusion-Resilient Public-Key Encryption Yevgeniy Dodis, Matt Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung 81
Digital Signatures
   A Certificate-Based Signature Scheme Bo Gyeong Kang, Je Hong Park, Sang Geun Hahn 99
   Identity Based Undeniable Signatures Benoit Libert, Jean-Jacques Quisquater 112
   Compressing Rabin Signatures Daniel Bleichenbacher 126
Protocols
   A Key Recovery System as Secure as Factoring Adam Young, Moti Yung 129
   Server Assisted Signatures Revisited Kemal Bicakci, Nazife Baykal 143
   Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 Jean-Sebastien Coron, David Naccache 157
   Universal Re-encryption for Mixnets Philippe Golle, Markus Jakobsson, Ari Juels, Paul Syverson 163
   Bit String Commitment Reductions with a Non-zero Rate Anderson C.A. Nascimento, Joern Mueller-Quade, Hideki Imai 179
   Improving Robustness of PGP Keyrings by Conflict Detection Qinglin Jiang, Douglas S. Reeves, Peng Ning 194
Side-Channel Attacks
   Issues of Security with the Oswald-Aigner Exponentiation Algorithm Colin D. Walter 208
   Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness Stefan Mangard 222
   Self-Randomized Exponentiation Algorithms Benoit Chevallier-Mames 236
Hardwares
   Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems Lejla Batina, Geeke Bruin-Muurling, Siddika Berna Oers 250
   High-Speed Modular Multiplication Wieland Fischer, Jean-Pierre Seifert 264
   Yet Another Sieving Device Willi Geiselmann, Rainer Steinwandt 278
Mode of Operations
   A Parallelizable Enciphering Mode Shai Halevi, Phillip Rogaway 292
   Padding Oracle Attacks on the ISO CBC Mode Encryption Standard Kenneth G. Paterson, Arnold Yau 305
Hash and Hash Chains
   A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512 Roar Lien, Tim Grembowski, Kris Gaj 324
   Fast Verification of Hash Chains Marc Fischlin 339
Visual Cryptography
   Almost Ideal Contrast Visual Cryptography with Reversing Duong Quang Viet, Kaoru Kurosawa 353
Ellictic Curve Cryptosystems
   Weak Fields for ECC Alfred Menezes, Edlyn Teske, Annegret Weng 366
Author Index 387
Symmetric Encryption
   Online Encryption Schemes: New Security Notions and Constructions Alexandra Boldyreva, Nut Taesombut 1
   Related-Key Attacks on Triple-DES and DESX Variants Raphael C.-W. Phan 15
94.

図書

図書
Vladimir Gorodetsky, Leonard Popyack, Victor Skormin (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xiv, 470 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2776
所蔵情報: loading…
目次情報: 続きを見る
Invited Papers
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park
Implementing a Calculus for Distributed Access Control in Higher Order Logic and HOL / T. Kosiyatrakul ; S. Older ; P. Humenn ; S.-K. Chin
Complexity Problems in the Analysis of Information Systems Security / A. Slissenko
A Behavior-Based Approach to Securing Email Systems / S.J. Stolfo ; S. Hershkop ; K. Wang ; O. Nimeskern ; C.-W. Hu
Real-Time Intrusion Detection with Emphasis on Insider Attacks / S. Upadhyaya
Mathematical Models and Architectures for Computer Network Security
Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols / S. Bistarelli ; I. Cervesato ; G. Lenzini ; F. Martinelli
GRID Security Review / L. Gymnopoulos ; S. Dritsas ; S. Gritzalis ; C. Lambrinoudakis
A Knowledge-Based Repository Model for Security Policies Management / S. Kokolakis ; D. Gritzalis
Symbolic Partial Model Checking for Security Analysis
Rule-Based Systems Security Model / M. Smirnov
Logical Resolving for Security Evaluation / P.D. Zegzhda ; D.P. Zegzhda ; M.O. Kalinin
Intrusion Detection
Enhanced Correlation in an Intrusion Detection Process / S. Benferhat ; F. Autrel ; F. Cuppens
Safeguarding SCADA Systems with Anomaly Detection / J. Bigham ; D. Gamez ; N. Lu
Experiments with Simulation of Attacks against Computer Networks / I. Kotenko ; E. Man'kov
Detecting Malicious Codes by the Presence of Their "Gene of Self-replication" / V.A. Skormin ; D.H. Summerville ; J.S. Moronski
Automatic Generation of Finite State Automata for Detecting Intrusions Using System Call Sequences / K. Wee ; B. Moon
Public Key Distribution, Authentication, Access Control
Distributed Access Control: A Logic-Based Approach / S. Barker
Advanced Certificate Status Protocol / D.H. Yum ; J.E. Kang ; P.J. Lee
Key History Tree: Efficient Group Key Management with Off-Line Members / A. Lain ; V. Borisov
A Certificate Status Checking Protocol for the Authenticated Dictionary / J.L. Munoz ; J. Forne ; O. Esparza ; M. Soriano
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach / R. Wolf ; M. Schneider
Cryptography
A Signcryption Scheme Based on Secret Sharing Technique / M. Al-Ibrahim
A Zero-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem / P. Caballero-Gil ; C. Hernández-Goya
Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property / Y.D. Ko ; D.J. Hong ; S.H. Hong ; S.J. Lee ; J.L. Lim
Achieveability of the Key-Capacity in a Scenario of Key Sharing by Public Discussion and in the Presence of Passive Eavesdropper / V. Korzhik ; V. Yakovlev ; A. Sinuk
On Cipher Design Based on Switchable Controlled Operations / N.A. Moldovyan
Elliptic Curve Point Multiplication / A. Rostovtsev ; E. Makhovenko
Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation / N. Sklavos ; A.A. Moldovyan ; O. Koufopavlou
Steganography
Simulation-Based Exploration of SVD-Based Technique for Hidden Communication by Image Steganography Channel / V. Gorodetsky ; V. Samoilov
Detection and Removal of Hidden Data in Images Embedded with Quantization Index Modulation / K. Zhang ; S. Wang ; X. Zhang
Digital Watermarking under a Filtering and Additive Noise Attack Condition / V. Korzhik, G ; . Morales-Luna ; I. Marakova ; C. Patino-Ruvalcaba
Data Hiding in Digital Audio by Frequency Domain Dithering
Steganography with Least Histogram Abnormality
Multi-bit Watermarking Scheme Based on Addition of Orthogonal Sequences
Short Papers
Authentication of Anycast Communication / A. Cerny
Two-Stage Orthogonal Network Incident Detection for the Adaptive Coordination with SMTP Proxy / R. Ando ; Y. Takefuji
Construction of the Covert Channels / A. Grusho ; E. Timonina
Privacy and Data Protection in Electronic Communications / L. Mitrou ; K. Moulinos
Multiplier for Public-Key Cryptosystem Based on Cellular Automata / H.S. Kim ; S.H. Hwang
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols / S. Kumar ; V. Marbukh
Alert Triage on the ROC / F.J. Martin ; E. Plaza
Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64 / N.D. Goots ; B.V. Izotov
Immunocomputing Model of Intrusion Detection / Y. Melnikov ; A. Tarakanov
Agent Platform Security Architecture / G. Santana ; L.B. Sheremetov ; M. Contreras
Support Vector Machine Based ICMP Covert Channel Attack Detection / T. Sohn ; T. Noh ; J. Moon
Computer Immunology System with Variable Configuration / S.P. Sokolova ; R.S. Ivlev
Author Index
Invited Papers
ForNet: A Distributed Forensics Network / K. Shanmugasundaram ; N. Memon ; A. Savant ; H. Bronnimann
Usage Control: A Vision for Next Generation Access Control / R. Sandhu ; J. Park
95.

図書

図書
Colin D. Walter, Çetin K. Koç, Christof Paar (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xiii, 440 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2779
所蔵情報: loading…
96.

図書

図書
Stuart Anderson, Massimo Felici, Bev Littlewood (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xix, 426 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2788
所蔵情報: loading…
97.

図書

図書
Giovanni Vigna, Erland Jonsson, Christopher Kruegel (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  x, 237 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2820
所蔵情報: loading…
目次情報: 続きを見る
Network Infrastructure
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller / M. Tylutki ; K. Levitt
Topology-Based Detection of Anomalous BGP Messages / C. Kruegel ; D. Mutz ; W. Robertson ; F. Valeur
Anomaly Detection I
Detecting Anomalous Network Traffic with Self-organizing Maps / M. Ramadas ; S. Ostermann ; B. Tjaden
An Approach for Detecting Self-propagating Email Using Anomaly Detection / A. Gupta ; R. Sekar
Correlation
Statistical Causality Analysis of INFOSEC Alert Data / X. Qin ; W. Lee
Correlation of Intrusion Symptoms: An Application of Chronicles / B. Morin ; H. Debar
Modeling and Specification
Modehng Computer Attacks: An Ontology for Intrusion Detection / J. Undercoffer ; A. Joshi ; J. Pinkston
Using Specification-Based Intrusion Detection for Automated Response / I. Balepin ; S. Maltsev ; J. Rowe
IDS Sensors
Characterizing the Performance of Network Intrusion Detection Sensors / L. Schaelicke ; T. Slabach ; B. Moore ; C. Freeland
Using Decision Trees to Improve Signature-Based Intrusion Detection / T. Totti
Ambiguity Resolution via Passive OS Fingerprinting / G. Taleck
Anomaly Detection II
Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems / S.-B. Cho ; S.-J. Han
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection / M.V. Mahoney ; P.K. Chan
Author Index
Network Infrastructure
Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller / M. Tylutki ; K. Levitt
Topology-Based Detection of Anomalous BGP Messages / C. Kruegel ; D. Mutz ; W. Robertson ; F. Valeur
98.

図書

図書
Frank Pfenning, Yannis Smaragdakis (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  ix, 396 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2830
所蔵情報: loading…
目次情報: 続きを見る
Domain-Specific Languages
Spidle: A DSL Approach to Specifying Streaming Applications / Charles Consel ; Hedi Hamdi ; Laurent Réveillère ; Lenin Singaravelu ; Haiyan Yu ; Calton Pu
TDL: A Hardware Description Language for Retargetable Postpass Optimizations and Analyses / Daniel Kästner
Hume: A Domain-Specific Language for Real-Time Embedded Systems / Kevin Hammond ; Greg Michaelson
Staged Programming
Implementing Multi-stage Languages Using ASTs, Gensym, and Reflection / Cristiano Calcagno ; Walid Taha ; Liwen Huang ; Xavier Leroy
On Stage Ordering in Staged Computation / Zhenghao Wang ; Richard R. Muntz
Staged Notational Definitions / Patricia Johann
Invited Talk
A Journey from Interpreters to Compilers and Virtual Machines / Olivier Danvy
Modeling to Code
DAOP-ADL: An Architecture Description Language for Dynamic Component and Aspect-Based Development / Monica Pinto ; Lidia Fuentes ; Jose MarÆia Troya
ANEMIC: Automatic Interface Enabler for Model Integrated Computing / Steve Nordstrom ; Shweta Shetty ; Kumar Gaurav Chhokra ; Jonathan Sprinkle ; Brandon Eames ; Akos Ledeczi
Aspect-Orientation
An Approach for Supporting Aspect-Oriented Domain Modeling / Jeff Gray ; Ted Bapty ; Sandeep Neema ; Douglas C. Schmidt ; Aniruddha Gokhale ; Balachandran Natarajan
The Convergence of AOP and Active Databases: Towards Reactive Middleware / Mariano Cilia ; Michael Haupt ; Mira Mezini ; Alejandro Buchmann
A Selective, Just-in-Time Aspect Weaver / Yoshiki Sato ; Shigeru Chiba ; Michiaki Tatsubori
Meta-programming and Language Extension
An Extension to the Subtype Relationship in C== Implemented with Template Metaprogramming / Istvan Zolyomi ; Zoltan Porkolab ; Tamas Kozsik
Concept-Controlled Polymorphism / Jaakko Järvi ; Jeremiah Willcock ; Andrew Lumsdaine
Component-Based DSL Development / Thomas Cleenewerck
Towards a More Piece-ful World / Peri Tarr
Automating Design-to-Code Transitions
A Generative Approach to Framework Instantiation / Vaclav Cechticky ; Philippe Chevalley ; Alessandro Pasetti ; Walter Schaufelberger
Making Patterns Explicit with Metaprogramming / Daniel von Dincklage
Principled Domain-Specific Approaches
Generating Spreadsheet-Like Tools from Strong Attribute Grammars / João Saraiva ; Doaitse Swierstra
SynchNet: A Petri Net Based Coordination Language for Distributed Objects / Reza Ziaei ; Gul Agha
Partial Evaluation of MATLAB / Daniel Elphick ; Michael Leuschel ; Simon Cox
Generation and Translation
An Easy-to-Use Toolkit for Efficient Java Bytecode Translators / Muga Nishizawa
A Case for Test-Code Generation in Model-Driven Systems / Matthew J. Rutherford ; Alexander L. Wolf
Author Index
Domain-Specific Languages
Spidle: A DSL Approach to Specifying Streaming Applications / Charles Consel ; Hedi Hamdi ; Laurent Réveillère ; Lenin Singaravelu ; Haiyan Yu ; Calton Pu
TDL: A Hardware Description Language for Retargetable Postpass Optimizations and Analyses / Daniel Kästner
99.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2003  viii, 265 p. ; 28 cm
所蔵情報: loading…
100.

図書

図書
Antonio Lioy, Daniele Mazzocchi (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  viii, 263 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2828
所蔵情報: loading…
目次情報: 続きを見る
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection
Network Security
Securing the Border Gateway Protocol: A Status Update / Stephen T. Kent
Towards an IPv6-Based Security Framework for Distributed Storage Resources / Alessandro Bassi ; Julien Laganier
Operational Characteristics of an Automated Intrusion Response System / Maria Papadaki ; Steven Furnell ; Benn Lines ; Paul Reynolds
Mobile and Wireless Network Security
A Secure Multimedia System in Emerging Wireless Home Networks / Nut Taesombut ; Richard Huang ; Venkat P. Rangan
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents / Yusuke Sakabe ; Masakazu Soshi ; Atsuko Miyaji
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems / Michelle S. Wangham ; Joni da Silva Fraga ; Rafael R. Obelheiro
Trust and Privacy
Privacy and Trust in Distributed Networks / Thomas Rossler ; Arno Hollosi
Extending the SDSI / SPKI Model through Federation Webs / Altair Olivo Santin ; Carlos Maziero
Trust-X: An XML Framework for Trust Negotiations / Elisa Bertino ; Elena Ferrari ; Anna C. Squicciarini
Application Security
How to Specify Security Services: A Practical Approach / Javier Lopez ; Juan J. Ortega ; Jose Vivas ; Jose M. Troya
Application Level Smart Card Support through Networked Mobile Devices / Pierpaolo Baglietto ; Francesco Moggia ; Nicola Zingirian ; Massimo Maresca
Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage / Kuan W. Yip
Multimedia Security
Selective Encryption of the JPEG2000 Bitstream / Roland Norcen ; Andreas Uhl
Robust Spatial Data Hiding for Color Images / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
Watermark Security via Secret Wavelet Packet Subband Structures / Werner Dietl
A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression / David Megias ; Jordi Herrera-Joancomarti ; Julià Minguillón
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs / G.S. Poh
Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization / Bubi G. Flepp-Stars ; Herbert Stogner
Author Index
Cryptography
Computation of Cryptographic Keys from Face Biometrics / Alwyn Goh ; David C.L. Ngo
AUTHMAC DH: A New Protocol for Authentication and Key Distribution / Heba K. Aslan
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼