close
1.

電子ブック

EB
WISA 2004, Takeo Kanade, Chae Hoon Lim, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Encrypted Watermarks and Linux Laptop Security / Markku-Juhani O. Saarinen
Inconsistency Detection of Authorization Policies in Distributed Component Environment / Chang-Joo Moon ; Hoh Peter In
Public Key Schemes I
Custodian-Hiding Verifiable Encryption / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong
Proving Key Usage / Malek Bechlaghem ; Vincent Rijmen
Public Key Encryption with Conjunctive Field Keyword Search / Dong Jin Park ; Kihyun Kim ; Pil Joong Lee
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior / Kohei Tatara ; Toshihiro Tabata ; Kouichi Sakurai
Service Discrimination and Audit File Reduction for Effective Intrusion Detection / Fernando Godínez ; Dieter Hutter ; Raúl Monroy
IDS False Alarm Filtering Using KNN Classifier / Kwok Ho Law ; Lam For Kwok
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking / Hae-Yeoun Lee ; Jong-Tae Kim ; Heung-Kyu Lee ; Young-Ho Suh
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment / Manabu Iwanaga
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups / Kui Ren ; Hyunrok Lee ; Kwangjo Kim ; Taewhan Yoo
A Ring Signature Scheme Using Bilinear Pairings / Jing Xu ; Zhenfeng Zhang ; Dengguo Feng
Verifiable Pairing and Its Applications / Sherman S.M. Chow
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading / Bart Haagdorens ; Tim Vermeiren ; Marnix Goossens
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks / Seok Bong Jeong ; Young Woo Choi ; Sehun Kim
Application of Content Computing in Honeyfarm / Yi-Yuan Huang ; Kwok-Yan Lam ; Siu-Leung Chung ; Chi-Hung Chi ; Jia-Guang Sun
Digital Rights Management
License Protection with a Tamper-Resistant Token / Cheun Ngen Chong ; Bin Ren ; Jeroen Doumen ; Sandro Etalle ; Pieter H. Hartel ; Ricardo Corin
An Adaptive Approach to Hardware Alteration for Digital Rights Management / Yinyan Yu ; Zhi Tang
Dynamic Fingerprinting over Broadcast Using Revocation Scheme / Mira Kim ; Kazukuni Kobara ; Hideki Imai
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels / Chong Hee Kim ; Yong Ho Hwang
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002 / Sang Cheol Hwang ; Dong Hoon Lee ; Daewan Han ; Jae-Cheol Ryou
Fair Offline Payment Using Verifiable Encryption / Sangjin Kim ; Heekuck Oh
A Limited-Use Key Generation Scheme for Internet Transactions / Supakorn Kungpisdan ; Phu Dung Le ; Bala Srinivasan
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes / Kishan Chand Gupta ; Palash Sarkar
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II / Soonhak Kwon
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors / Masanobu Katagi ; Izuru Kitamura ; Toru Akishita ; Tsuyoshi Takagi
Hyperelliptic Curve Coprocessors on a FPGA / HoWon Kim ; Thomas Wollinger ; YongJe Choi ; KyoIl Chung ; Christof Paar
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID / Kenji Imamoto
A New k-Anonymous Message Transmission Protocol / Gang Yao
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack / Marcin Gomulkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
Side-Channel Attacks
Side Channel Cryptanalysis on SEED / HyungSo Yoo ; ChangKyun Kim ; JaeCheol Ha ; SangJae Moon ; IlHwan Park
Secure and Efficient AES Software Implementation for Smart Cards / Elena Trichina ; Lesya Korkishko
Practical Template Attacks / Christian Rechberger ; Elisabeth Oswald
Evaluation and Improvement of the Tempest Fonts / Hidema Tanaka ; Osamu Takizawa ; Akihiro Yamamura
Author Index
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
2.

電子ブック

EB
Reihaneh Safavi-Naini, Takeo Kanade, Reihanah Safavi-Naini, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
3.

電子ブック

EB
Dingyi Pei, Takeo Kanade, Dongdai Lin, Chuankun Wu, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
4.

電子ブック

EB
Helger Lipmaa, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
5.

電子ブック

EB
Joo-Seok Song, Takeo Kanade, Taekyoung Kwon, JooSeok Song, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
6.

電子ブック

EB
Moti Yung, Yevgeniy Dodis, Takeo Kanade, Aggelos Kiayias, Tal Malkin
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
7.

電子ブック

EB
Roberto Prisco, Roberto De Prisco, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
Signature Schemes Variants
Relations Among Security Notions for Undeniable Signature Schemes / Kaoru Kurosawa ; Swee-Huay Heng
Concurrent Blind Signatures Without Random Oracles / Aggelos Kiayias ; Hong-Sheng Zhou
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions / Fabien Laguillaumie ; Benoit Libert ; Jean-Jacques Quisquater
Block Ciphers Analysis
Understanding Two-Round Differentials in AES / Joan Daemen ; Vincent Rijmen
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b / Jiqiang Lu ; Changhoon Lee ; Jongsung Kim
Anonymity and E-Commerce
Constant-Size Dynamic k-TAA / Man Ho Au ; Willy Susilo ; Yi Mu
On Secure Orders in the Presence of Faults / Amir Herzberg ; Igal Yoffe
Balancing Accountability and Privacy Using E-Cash / Jan Camenisch ; Susan Hohenberger ; Anna Lysyanskaya
Public Key Encryption and Key Exchange
About the Security of MTI/CO and MQV / Sebastien Kunz-Jacques ; David Pointcheval
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles / David Galindo ; Eike Kiltz
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Secret Sharing
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants / Jaume Marti-Farre ; Carles Padro
Cheating Immune (2, n)-Threshold Visual Secret Sharing / Roberto Be Prisco ; Alfredo De Santis
Rational Secret Sharing, Revisited / S. Dov Gordon ; Jonathan Katz
Symmetric Key Cryptanalysis and Randomness
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 / Alex Biryukov ; Bart Preneel ; Seokhie Hong
Distinguishing Stream Ciphers with Convolutional Filters / Gilles Van Assche
On Statistical Testing of Random Numbers Generators / Fida El Haje ; Yuri Golubev ; Pierre-Yvan Liardet ; Yannick Teglia
Applied Authentication
Lightweight Email Signatures / Ben Adida ; David Chau ; Ronald L. Rivest
Shoehorning Security into the EPC Tag Standard / Daniel V. Bailey ; Art Juels
Proof-Carrying Proxy Certificates / Walid Bagga ; Stefano Crosta ; Refik Molva
Public Key Related Cryptanalysis
Cryptanalysis of Rainbow / Olivier Billet ; Henri Gilbert
An Improved LPN Algorithm / Eric Levieil ; Pierre-Alain Fouque
Invited Talk
Theory and Practice of Multiparty Computation / Ivan Damgard
Author Index
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
8.

電子ブック

EB
Steven M. Bellovin, Rosario Gennaro, Takeo Kanade, Angelos Keromytis, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
9.

電子ブック

EB
Kyo-Il Chung, Takeo Kanade, Kiwook Sohn, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
10.

電子ブック

EB
Moti Yung, Takeo Kanade, Dongdai Lin, Peng Liu
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼