close
1.

電子ブック

EB
Liqun Chen, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
2.

電子ブック

EB
Yongwha Chung, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets / Wenpan Jing ; Haixia Xu ; Bao Li
Distributed Paillier Cryptosystem without Trusted Dealer / Takashi Nishide ; Kouichi Sakurai
Implementation
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains / Colin D. Walter
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs / Boufeldja Allailou ; Abdelaziz Marjane ; Abdellah Mokrane
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices / Erich Wenger ; Martin Feldhofer ; Nobert Felber
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling / Takehiko Amaki ; Masanori Hashimoto ; Yukio Mitsuyama ; Takao Onoye
Mobile Security/Secure Coding
Using Special Use Cases for Security in the Software Development Life Cycle / Jean-Marie Kabasele Tenday
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Atsuko Miyaji ; Kazumasa Omote
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6 / Jae-hoon Jang ; Don-Gu Yeo ; Dong-hee Lee ; Heung-Youl Youm
Hidden Credential Retrieval without Random Oracles / Mohammad Shahriar Rahman ; Masakazu Soshi
Attack
Combined Side-Channel Attacks / M. Abdelaziz Elaabid ; Olivier Meynard ; Sylvain Guilley ; Jean-Luc Danger
Correlation Power Analysis Based on Switching Glitch Model / Hongying Liu ; Guoyu Qian ; Satoshi Goto ; Yukiyasu Tsunoo
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity / Nico Döttling ; Dejan Lazich ; Jörn Müller-Quade ; Antonio Sobreira de Almeida
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks / Kehua Bao ; Zhenfeng Zhang
Full-Round Differential Attact on TWIS Block Clipher / Bozhan Su ; Wenling Wu ; Lei Zhang ; Yanjun Li
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations / Jean-François Gallais ; Ilya Kizhvatov ; Michael Tunstall
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis / Daisuke Nakatsu ; Yang Li ; Kazuo Sakiyama ; Kazuo Ohta
Biometrics
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram / Hansung Lee ; Yunsu Chung ; Jeongnyeo Kim ; Daihee Park
Fingerprint Liveness Detection Based on Multiple Image Quality Features / Changlong Jin ; Shengazhe Li ; Hakil Kim ; Ensoo Park
Robust Feature Extraction for Facial Image Quality Assessment / Thi Hai Binh Nguyen ; Van Huan Nguyen
Secure Protocol
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother / Rafael Dowsley ; Goichiro Hanaoka ; Hideki Imai ; Anderson C.A. Nascimento
Cross-Realm Password-Based Server Aided Key Exchange
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product / Jeroen van de Graaf ; Davidson Marques
Author Index
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
3.

電子ブック

EB
David Hutchison, Takeo Kanade, Josef Kittler, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward / Chiaki Ohtahara ; Keita Okada ; Yu Sasaki ; Takeshi Shimoyama
Known-Key Distinguisher on Round-Reduced 3D Block Cipher / Le Dong ; Shuang Wu ; Jian Zou
Identity-Based Signcryption from Identity-Based Cryptography / Woomyo Lee ; Jae Woo Seo ; Pil Joong Lee
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts / Dae Hyun Yum ; Duk Soo Kim ; Jin Seok Kim ; Sung Je Hong
Solving a DLP with Auxiliary Input with the ρ-Algorithm / Yumi Sakemi ; Tetsuya Izu ; Masahiko Takenaka ; Masaya Yasuda
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems / Yanbin Pan ; Yingpu Deng
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage / Tatsuyuki Matsushita ; Shinji Yamanaka ; Fangming Zhao
Rule Indexing for Efficient Intrusion Detection Systems / Boojoong Kang ; Hye Seon Kim ; Ji Su Yang ; Eul Gyu Im
Security Data Extraction from LEC 61850 ACSI Models for Network and System Management / Chung-Hyo Kim ; Moon-Seok Choi ; Seong-Ho Ju ; Yong-Hun Lim ; Jong-Mock Baek
Lightweight Middleware-Based ZigBee Security in Building Energy Management System / Insung Hong ; Jisung Byun ; Sehyun Park
A Map-Layer-Based Access Control Model / Yingjun Zhang ; Yang Zhang ; Kai Chen
Application Authentication for Hybrid Services of Broadcasting and Communications Networks / Go Ohtake ; Kazuto Ogawa
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols / Naoto Kiribuchi ; Ryo Kato ; Takashi Nishide ; Tsukasa Endo ; Hiroshi Yoshiura
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks / Kwantae Cho ; Dong Hoon Lee
Mutual Private Set Intersection with Linear Complexity / Myungsun Kim ; Hyung Tae Lee ; Jung Hee Cheon
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs / Chung Il Sun ; Tae Ho Cho
Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation / Jarno Salonen
Exploiting Routing Tree Construction in CTP / Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson
Author Index
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼