close
1.

電子ブック

EB
ACM Workshop on Digital Rights Management, Moti Yung, Association for Computing Machinery-Digital Library., Association for Computing Machinery.
出版情報: ACM Digital Library Proceedings , ACM
所蔵情報: loading…
2.

電子ブック

EB
ACM Workshop on Digital Rights Management, Reihanah Safavi-Naini, Moti Yung, Association for Computing Machinery-Digital Library., Association for Computing Machinery.
出版情報: ACM Digital Library Proceedings , ACM
所蔵情報: loading…
3.

電子ブック

EB
Liqun Chen, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
4.

電子ブック

EB
Shlomi Dolev, Jorge Cobb, Michael Fischer, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
A Geometry of Networks / Yechiam Yemini
Contributed Papers
Systematic Correct Construction of Self-stabilizing Systems: A Case Study / Ananda Basu ; Borzoo Bonakdarpour ; Marius Bozga ; Joseph Sifakis
A Fault-Resistant Asynchronous Clock Function / Ezra N. Hoch ; Michael Ben-Or ; Danny Dolev
Self-stabilizing Leader Election in Dynamic Networks / Ajoy K. Datta ; Lawrence L. Larmore ; Hema Piniganti
Loop-Free Super-Stabilizing Spanning Tree Construction / Lélia Blin ; Maria Gradinariu Potop-Butucaru ; Stephane Rovedakis ; Sébastien Tixeuil
A New Technique for Proving Self-stabilizing under the Distributed Scheduler / Sven Köhler ; Volker Turau
Tranformational Approach for Designing Scheduler-Oblivious Self-stabilizing Algorithms / Abhishek Dhama ; Oliver Theel
On Byzantine Containment Properties of the min+1 Protocol / Swan Dubois ; Toshimitsu Masuzawa
Efficient Self-stabilizing Graph Searching in Tree Networks / Jean Blair ; Fredrik Manne ; Rodica Mihai
Adaptive Containment of Time-Bounded Byzantine Faults / Yukiko Yamauchi ; Doina Bein
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
Self-stabilizing Algorithm of Two-Hop Conflict Resolution / Stéphane Pomportes ; Joanna Tomasik ; Anthony Busson ; Véronique Vèque
Low Memory Distributed Protocols for 2-Coloring / Amos Israeli ; Mathew D. McCubbins ; Ramamohan Paturi ; Andrea Vattani
Connectivity-Preserving Scattering of Mobile Robots with Limited Visibility / Taisuke Izumi
Computing in Social Networks / Andrei Giurgiu ; Rachid Guerraoui ; Kévin Huguenin ; Anne-Marie Kermarrec
On Transactional Scheduling in Distributed Transactional Memory Systems / Junwhan Kim ; Binoy Ravindran
Recursion in Distributed Computing / Eli Gafni ; Sergio Rajsbaum
On Adaptive Renaming under Eventually Limited Contention / Damien Imbs ; Michel Raynal
RobuSTM: A Robust Software Transactional Memory / Jons-Tobias Wamhoff ; Torvald Riegel ; Christof Fetzer ; Pascal Felber
A Provably Starvation-Free Distributed Directory Protocol / Hagit Attiya ; Vincent Gramoli ; Alessia Milani
Lightweight Live Migration for High Availability Cluster Service / Bo Jiang ; Changsoo Kim
Approximation of ?-Timeliness / Carole Delporte-Gallet ; Stéphane Devismes ; Hugues Fauconnier
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
5.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
6.

電子ブック

EB
Yongwha Chung, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets / Wenpan Jing ; Haixia Xu ; Bao Li
Distributed Paillier Cryptosystem without Trusted Dealer / Takashi Nishide ; Kouichi Sakurai
Implementation
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains / Colin D. Walter
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs / Boufeldja Allailou ; Abdelaziz Marjane ; Abdellah Mokrane
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices / Erich Wenger ; Martin Feldhofer ; Nobert Felber
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling / Takehiko Amaki ; Masanori Hashimoto ; Yukio Mitsuyama ; Takao Onoye
Mobile Security/Secure Coding
Using Special Use Cases for Security in the Software Development Life Cycle / Jean-Marie Kabasele Tenday
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Atsuko Miyaji ; Kazumasa Omote
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6 / Jae-hoon Jang ; Don-Gu Yeo ; Dong-hee Lee ; Heung-Youl Youm
Hidden Credential Retrieval without Random Oracles / Mohammad Shahriar Rahman ; Masakazu Soshi
Attack
Combined Side-Channel Attacks / M. Abdelaziz Elaabid ; Olivier Meynard ; Sylvain Guilley ; Jean-Luc Danger
Correlation Power Analysis Based on Switching Glitch Model / Hongying Liu ; Guoyu Qian ; Satoshi Goto ; Yukiyasu Tsunoo
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity / Nico Döttling ; Dejan Lazich ; Jörn Müller-Quade ; Antonio Sobreira de Almeida
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks / Kehua Bao ; Zhenfeng Zhang
Full-Round Differential Attact on TWIS Block Clipher / Bozhan Su ; Wenling Wu ; Lei Zhang ; Yanjun Li
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations / Jean-François Gallais ; Ilya Kizhvatov ; Michael Tunstall
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis / Daisuke Nakatsu ; Yang Li ; Kazuo Sakiyama ; Kazuo Ohta
Biometrics
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram / Hansung Lee ; Yunsu Chung ; Jeongnyeo Kim ; Daihee Park
Fingerprint Liveness Detection Based on Multiple Image Quality Features / Changlong Jin ; Shengazhe Li ; Hakil Kim ; Ensoo Park
Robust Feature Extraction for Facial Image Quality Assessment / Thi Hai Binh Nguyen ; Van Huan Nguyen
Secure Protocol
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother / Rafael Dowsley ; Goichiro Hanaoka ; Hideki Imai ; Anderson C.A. Nascimento
Cross-Realm Password-Based Server Aided Key Exchange
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product / Jeroen van de Graaf ; Davidson Marques
Author Index
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
7.

電子ブック

EB
Xuejia Lai, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
8.

電子ブック

EB
Liqun Chen, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼