close
1.

電子ブック

EB
Javier Lopez, Takeo Kanade, Javier López, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
2.

電子ブック

EB
Sushil Jajodia, Takeo Kanade, Javier Lopez, Javier López
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
3.

電子ブック

EB
Joachim Biskup, Takeo Kanade, Javier López
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
4.

電子ブック

EB
TrustBus 2005, Takeo Kanade, Sokratis K. Katsikas, Javier López, Günther Pernul, GÃ〓nther Pernul
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
5.

電子ブック

EB
Jorge Cuellar, Gilles Barthe, Takeo Kanade, Javier López, Alexander Pretschner
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
6.

電子ブック

EB
Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Takeo Kanade, Javier López, Bart Preneel
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
Privacy and Anonymity
Low Latency Anonymity with Mix Rings / Matthew Burnside ; Angelos D. Keromytis
Breaking Four Mix-Related Schemes Based on Universal Re-encryption / George Danezis
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy / Maurizio Atzori
Protecting Data Privacy Through Hard-to-Reverse Negative Databases / Fernando Esponda ; Elena S. Ackley ; Paul Helman ; Haixia Jia ; Stephanie Forrest
Block Ciphers and Hash Functions
Related-Key Rectangle Attack on 42-Round SHACAL-2 / Jiqiang Lu ; Jongsung Kim ; Nathan Keller ; Orr Dunkelman
On the Collision Resistance of RIPEMD-160 / Florian Mendel ; Norbert Pramstaller ; Christian Rechberger ; Vincent Rijmen
Digital Signatures
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption / Javier Herranz ; Fabien Laguillaumie
Multi-party Concurrent Signatures / Dongvu Tonien ; Willy Susilo ; Reihaneh Safavi-Naini
Formal Security Model of Multisignatures / Yuichi Komano ; Kazuo Ohta ; Atsushi Shimbo ; Shinichi Kawamura
Cryptanalysis of Variants of UOV / Yuh-Hua Hu ; Chun-Yen Chou ; Lih-Ghung Wang ; Feipei Lai
Stream Ciphers
Trivium: a Stream Cipher Construction Inspired by Block Cipher Design Principles / Christophe De Canniere
Cryptanalysis of the Bluetooth E[subscrpit o] Cipher Using OBDD's / Yaniv Shaked ; Avishai Wool
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice / Ellen Jochemsz ; Benne de WegerEncryption I:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search / Joonsang Baek
Collusion-Free Policy-Based Encryption / Walid Bagga ; Refik Molva
Pervasive Computing
Using Multiple Smart Cards for Signing Messages at Malicious Terminals / Istvan Zsolt Berta
Diverging Keys in Wireless Sensor Networks / Michal Ren ; Tanmoy Kanti Das ; Jianying Zhou
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption / Ulrich Huber ; Ahmad-Reza SadeghiEncryption II:
Transparent Image Encryption Using Progressive JPEG / Thomas Stutz ; Andreas Uhl
Network Security
Preserving TCP Connections Across Host Address Changes / Vassilis Prevelakis ; Sotiris Ioannidis
A Security Architecture for Protecting LAN Interactions / Andre Zuquete ; Hugo Marques
Simulation of Internet DDoS Attacks and Defense / Igor Kotenko ; Alexander Ulanov
Snooze: Toward a Stateful NetwOrk prOtocol fuzZEr / Greg Banks ; Marco Cova ; Viktoria Felmetsger ; Kevin Almeroth ; Richard Kemmerer
Watermarking and DRM
Rights Protection for Data Cubes / Jie Guo ; Yingjiu Li ; Robert H. Deng ; Kefei Chen
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) / Huifang Yin ; Jun Li
Intrusion Detection and Worms
Resistance Analysis to Intruders' Evasion of Detecting Intrusion / Jianhua Yang ; Yongzhong Zhang ; Shou-Hsuan Stephen Huang
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks / Luciano Bononi ; Carlo Tacconi
Anomaly Intrusion Detection Based on Clustering a Data Stream / Sang-Hyun Oh ; Jin-Suk Kang ; Yung-Cheol Byun ; Taikyeong T. Jeong ; Won-Suk Lee
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation / K. Anagnostakis ; S. Ioannidis ; A.D. Keromytis ; M.B. Greenwald
Key Exchange
An Authentication and Key Exchange Protocol for Secure Credential Services / SeongHan Shin ; Kazukuni Kobara ; Hideki Imai
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders / Yvo Desmedt ; Josef Pieprzyk ; Ron Steinfeld ; Huaxiong Wang
Security Protocols and Formal Methods
Formalising Receipt-Freeness / H.L. Jonker ; E.P. de Vink
Enhancing the Security and Efficiency of 3-D Secure / Mohammed Assora ; Ayoub Shirvani
Designing and Verifying Core Protocols for Location Privacy / David von Oheimb ; Jorge Cuellar
Information Systems Security
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches / Mila Katzarova ; Andrew Simpson
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness / Jose M Torres ; Jose M Sarriegi ; Javier Santos ; Nicolas Serrano
Author Index
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
7.

電子ブック

EB
Javier Lopez, Josep L. Ferrer, Takeo Kanade, Javier López, Pierangela Samarati
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
8.

電子ブック

EB
Miguel Soriano, Takeo Kanade, Javier López, Sihan Qing
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptographic Hash Functions: Theory and Practice (Invited Talk) / Bart Preneel
Access Control / Session 1A:
Rewriting of SPARQL/Update Queries for Securing Data Access / Said Oulmakhzoune ; Nora Cuppens-Boulahia ; Frederic Cuppens ; Stephane Morucci
Fine-Grained Disclosure of Access Policies / Claudio Agostino Ardagna ; Sabrina De Capitani di Vimercati ; Sara Foresti ; Gregory Neven ; Stefano Paraboschi ; Franz-Stefan Preiss ; Pierangela Samarati ; Mario Verdicchio
Public Key Cryptography and Cryptanalysis / Session 1B:
Manger's Attack Revisited / Falko Strenzke
Horizontal Correlation Analysis on Exponentiation / Christophe Clavier ; Benoit Feix ; Georges Gagnerot ; Mylène Roussellet ; Vincent Verneuil
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts / Bo Qin ; Qianhong Wu ; Lei Zhang ; Josep Domingo-Ferrer
Security in Distributed and Mobile Systems / Session 1C:
A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks / Jaydip Sen
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization / Flavio Lombardi ; Roberto Di Pietro
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms / Xinwen Zhang ; Jean-Pierre Seifert ; Onur Aciiçmez
Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol / Talal Alharbi ; Abdullah Almuhaideb ; Phu Dung Le
Compromise-Resilient Anti-jamming for Wireless Sensor Networks / Xuan Jiang ; Wenhui Hu ; Sencun Zhu ; Guohong Cao
Cryptanalysis / Session 1D:
On Practical Second-Order Power Analysis Attacks for Block Ciphers / Renato Menicocci ; Andrea Simonetti ; Giuseppe Scotti ; Alessandro Trifiletti
Consecutive S-Box Lookups: A Timing Attack on SNOW 3G / Billy Bob Brumley ; Risto M. Hakala ; Kaisa Nyberg ; Sampo Sovio
Authentication / Session 2A:
Efficient Authentication for Mobile and Pervasive Computing / Basel Alomair ; Radha Poovendran
Security Enhancement and Modular Treatment towards Authenticated Key Exchange / Jiaxin Pan ; Libin Wang ; Changshe Ma
Federated Secret Handshakes with Support for Revocation / Alessandro Sorniotti ; Refik Molva
Fair Exchange Protocols / Session 2B:
An Agent-Mediated Fair Exchange Protocol / Gerard Draper-Gil ; Jianying Zhou ; Josep Lluís Ferrer-Gomila
A New Method for Formalizing Optimistic Fair Exchange Protocols / Ming Chen ; Kaigui Wu ; Jie Xu ; Pan He
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme / Mehrdad Nojoumian ; Douglas R. Stinson
Anonymity and Privacy / Session 2C:
Proving Coercion-Resistance of Scantegrity II / Ralf Küsters ; Tomasz Truderung ; Andreas Vogt
Anonymity and Verifiability in Voting: Understanding (Un)Linkability / Lucie Langer ; Hugo Jonker ; Wolter Pieters
A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms / Kurt Dietrich ; Johannes Winter
Time Warp: How Time Affects Privacy in LBSs / Luciana Marconi ; Bruno Crispo ; Mauro Conti
Software Security / Session 2D:
Return-Oriented Rootkit without Returns (on the x86) / Ping Chen ; Xiao Xing ; Bing Mao ; Li Xie
Experimental Threat Model Reuse with Misuse Case Diagrams / Jostein Jensen ; Inger Anne Tøndel ; Per Håkon Meland
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis / Kai Chen ; Yifeng Lian ; Yingjun Zhang
Proxy Cryptosystems / Session 3A:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities / Lihua Wang ; Licheng Wang ; Masahiro Mambo ; Eiji Okamoto
Ciphertext Policy Attribute-Based Proxy Re-encryption / Song Luo ; Jianbin Hu ; Zhong Chen
Intrusion Detection Systems / Session 3B:
Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks / Rolando Salazar-Hernández ; Jesús E. Díaz-Verdejo
A Trust-Based IDS for the AODV Protocol / Mohamed Ali Ayachi ; Christophe Bidan ; Nicolas Prigent
IDS Alert Visualization and Monitoring through Heuristic Host Selection / Hadi Shiravi ; Ali Shiravi ; Ali A. Ghorbani
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method / Zhiyuan Tan ; Aruna Jamdagni ; Xiangjian He ; Priyadarsi Nanda ; Ren Ping Liu ; Wenjing Jia ; Wei-chang Yeh
Author Index
Cryptographic Hash Functions: Theory and Practice (Invited Talk) / Bart Preneel
Access Control / Session 1A:
Rewriting of SPARQL/Update Queries for Securing Data Access / Said Oulmakhzoune ; Nora Cuppens-Boulahia ; Frederic Cuppens ; Stephane Morucci
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼