close
1.

電子ブック

EB
Michele Bugliesi, Takeo Kanade, Bart Preneel, Vladimiro Sassone, Ingo Wegener, European Association for Theoretical Computer Science.
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Invited Lectures
Additive Approximation for Edge-Deletion Problems / Noga Alon ; Asaf Shapira ; Benny Sudakov
Graph Theory I
Testing Graph Isomorphism in Parallel by Playing a Game / Martin Grohe ; Oleg Verbitsky
The Spectral Gap of Random Graphs with Given Expected Degrees / Amin Coja-Oghlan ; Andre Lanka
Embedding Bounded Bandwidth Graphs into l[subscript 1] / Douglas E. Carroll ; Ashish Goel ; Adam Meyerson
On Counting Homomorphisms to Directed Acyclic Graphs / Martin Dyer ; Leslie Ann Goldberg ; Mike Paterson
Quantum Computing
Fault-Tolerance Threshold for a Distance-Three Quantum Code / Ben W. Reichardt
Lower Bounds on Matrix Rigidity Via a Quantum Argument / Ronald de Wolf
Self-testing of Quantum Circuits / Frederic Magniez ; Dominic Mayers ; Michele Mosca ; Harold Ollivier
Randomness
Deterministic Extractors for Independent-Symbol Sources / Chia-Jung Lee ; Chi-Jen Lu ; Shi-Chun Tsai
Gap Amplification in PCPs Using Lazy Random Walks / Jaikumar Radhakrishnan
Stopping Times, Metrics and Approximate Counting / Magnus Bordewich ; Marek Karpinski
Formal Languages
Algebraic Characterization of the Finite Power Property / Michal Kunc
P-completeness of Cellular Automaton Rule 110 / Turlough Neary ; Damien Woods
Small Sweeping 2NFAs Are Not Closed Under Complement / Christos A. Kapoutsis
Expressive Power of Pebble Automata / Mikotaj Bojanczyk ; Mathias Samuelides ; Thomas Schwentick ; Luc Segoufin
Delegate and Conquer: An LP-Based Approximation Algorithm for Minimum Degree MSTs / R. Ravi ; Mohit SinghApproximation Algorithms I:
Better Algorithms for Minimizing Average Flow-Time on Related Machines / Naveen Garg ; Amit Kumar
A Push-Relabel Algorithm for Approximating Degree Bounded MSTs / Kamalika Chaudhuri ; Satish Rao ; Samantha Riesenfeld ; Kunal Talwar
Edge Disjoint Paths in Moderately Connected Graphs / Shuheng Zhou
A Robust APTAS for the Classical Bin Packing Problem / Leah Epstein ; Asaf LevinApproximation Algorithms II:
Better Inapproximability Results for MaxClique, Chromatic Number and Min-3Lin-Deletion / Subhash Khot ; Ashok Kumar Ponnuswami
Approximating the Orthogonal Knapsack Problem for Hypercubes / Rolf Harren
A Faster Deterministic Algorithm for Minimum Cycle Bases in Directed Graphs / Ramesh Hariharan ; Telikepalli Kavitha ; Kurt MehlhornGraph Algorithms I:
Finding the Smallest H-Subgraph in Real Weighted Graphs and Related Problems / Virginia Vassilevska ; Ryan Williams ; Raphael Yuster
Weighted Bipartite Matching in Matrix Multiplication Time / Piotr Sankowski
Optimal Resilient Sorting and Searching in the Presence of Memory Faults / Irene Finocchi ; Fabrizio Grandoni ; Giuseppe F. ItalianoAlgorithms I:
Reliable and Efficient Computational Geometry Via Controlled Perturbation / Ralf Osbild ; Michael Sagraloff
Tight Bounds for Selfish and Greedy Load Balancing / Ioannis Caragiannis ; Michele Flammini ; Christos Kaklamanis ; Panagiotis Kanellopoulos ; Luca Moscardelli
Lower Bounds of Static Lovasz-Schrijver Calculus Proofs for Tseitin Tautologies / Arist Kojevnikov ; Dmitry ItsyksonComplexity I:
Extracting Kolmogorov Complexity with Applications to Dimension Zero-One Laws / Lance Fortnow ; John M. Hitchcock ; A. Pavan ; N. V. Vinodchandran ; Fengming Wang
The Connectivity of Boolean Satisfiability: Computational and Structural Dichotomies / Parikshit Gopalan ; Phokion G. Kolaitis ; Elitza N. Maneva ; Christos H. Papadimitriou
Data Structures and Linear Algebra
Suffix Trays and Suffix Trists: Structures for Faster Text Indexing / Richard Cole ; Tsvi Kopelowitz ; Moshe Lewenstein
Optimal Lower Bounds for Rank and Select Indexes / Alexander Golynski
Dynamic Interpolation Search Revisited / Alexis Kaporis ; Christos Makris ; Spyros Sioutas ; Athanasios Tsakalidis ; Kostas Tsichlas ; Christos Zaroliagis
Dynamic Matrix Rank / Gudmund Skovbjerg Frandsen ; Peter Frands Frandsen
Graphs
Nearly Optimal Visibility Representations of Plane Graphs / Xin He ; Huaming Zhang
Planar Crossing Numbers of Genus g Graphs / Hristo Djidjev ; Imrich Vrt'o
How to Trim an MST: A 2-Approximation Algorithm for Minimum Cost Tree Cover / Toshihiro Fujito
Tight Approximation Algorithm for Connectivity Augmentation Problems / Guy Kortsarz ; Zeev Nutov
On the Bipartite Unique Perfect Matching Problem / Thanh Minh Hoang ; Meena Mahajan ; Thomas ThieraufComplexity II:
Comparing Reductions to NP-Complete Sets
Design Is as Easy as Optimization / Deeparnab Chakrabarty ; Aranyak Mehta ; Vijay V. Vazirani
On the Complexity of 2D Discrete Fixed Point Problem / Xi Chen ; Xiaotie Deng
Routing (Un-) Splittable Flow in Games with Player-Specific Linear Latency Functions / Martin Gairing ; Burkhard Monien ; Karsten TiemannGame Theory I:
The Game World Is Flat: The Complexity of Nash Equilibria in Succinct Games / Constantinos Daskalakis ; Alex Fabrikant
Network Games with Atomic Players / Roberto Cominetti ; Jose R. Correa ; Nicolas E. Stier-Moses
Finite-State Dimension and Real Arithmetic / David Doty ; Jack H. Lutz ; Satyadev NandakumarAlgorithms II:
Exact Algorithms for Exact Satisfiability and Number of Perfect Matchings / Andreas Bjorklund ; Thore Husfeldt
The Myriad Virtues of Wavelet Trees / Paolo Ferragina ; Raffaele Giancarlo ; Giovanni Manzini
Atomic Congestion Games Among Coalitions / Dimitris Fotakis ; Spyros Kontogiannis ; Paul SpirakisGame Theory II:
Computing Equilibrium Prices in Exchange Economies with Tax Distortions / Bruno Codenotti ; Luis Rademacher ; Kasturi Varadarajan
New Constructions of Mechanisms with Verification / Vincenzo Auletta ; Roberto De Prisco ; Paolo Penna ; Giuseppe Persiano ; Carmine Ventre
Networks, Circuits and Regular Expressions
On the Price of Stability for Designing Undirected Networks with Fair Cost Allocations / Amos Fiat ; Haim Kaplan ; Meital Levy ; Svetlana Olonetsky ; Ronen Shabo
Dynamic Routing Schemes for General Graphs / Amos Korman ; David Peleg
Energy Complexity and Entropy of Threshold Circuits / Kei Uchizawa ; Rodney Douglas ; Wolfgang Maass
New Algorithms for Regular Expression Matching / Philip Bille
Fixed Parameter Complexity and Approximation Algorithms
A Parameterized View on Matroid Optimization Problems / Daniel Marx
Fixed Parameter Tractability of Binary Near-Perfect Phylogenetic Tree Reconstruction / Guy E. Blelloch ; Kedar Dhamdhere ; Eran Halperin ; Russell Schwartz ; Srinath Sridhar
Length-Bounded Cuts and Flows / Georg Baier ; Thomas Erlebach ; Alexander Hall ; Ekkehard Kohler ; Heiko Schilling ; Martin Skutella
An Adaptive Spectral Heuristic for Partitioning Random Graphs / Graph Algorithms II:
Some Results on Matchgates and Holographic Algorithms / Jin- Yi Cai ; Vinay Choudhary
Weighted Popular Matchings / Julian Mestre
Author Index
Invited Lectures
Additive Approximation for Edge-Deletion Problems / Noga Alon ; Asaf Shapira ; Benny Sudakov
Graph Theory I
2.

電子ブック

EB
Michele Bugliesi, Takeo Kanade, Bart Preneel, Vladimiro Sassone, Ingo Wegener
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Invited Papers
Differential Privacy / Cynthia Dwork
The One Way to Quantum Computation / Vincent Danos ; Elham Kashefi ; Prakash Panangaden
Zero-Knowledge and Signatures
Efficient Zero Knowledge on the Internet / Ivan Visconti
Independent Zero-Knowledge Sets / Rosario Gennaro ; Silvio Micali
An Efficient Compiler from [Sigma]-Protocol to 2-Move Deniable Zero-Knowledge / Jun Furukawa ; Kaoru Kurosawa ; Hideki Imai
New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures / Damien Vergnaud
Cryptographic Protocols
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption / Daniele Micciancio ; Saurabh Panjwani
Cryptographically Sound Implementations for Communicating Processes / Pedro Adao ; Cedric Fournet
A Dolev-Yao-Based Definition of Abuse-Free Protocols / Detlef Kahler ; Ralf Kusters ; Thomas Wilke
Secrecy and Protocol Analysis
Preserving Secrecy Under Refinement / Rajeev Alur ; Pavol Cerny ; Steve Zdancewic
Quantifying Information Leakage in Process Calculi / Michele Boreale
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or / Stephanie Delaune ; Pascal Lafourcade ; Denis Lugiez ; Ralf Treinen
Cryptographic Primitives
Generalized Compact Knapsacks Are Collision Resistant / Vadim Lyubashevsky
An Efficient Provable Distinguisher for HFE / Vivien Dubois ; Louis Granboulan ; Jacques Stern
A Tight Bound for EMAC / Krzysztof Pietrzak
Constructing Single- and Multi-output Boolean Functions with Maximal Algebraic Immunity / Frederik Armknecht ; Matthias Krause
Bounded Storage and Quantum Models
On Everlasting Security in the Hybrid Bounded Storage Model / Danny Harnik ; Moni Naor
On the Impossibility of Extracting Classical Randomness Using a Quantum Computer / Yevgeniy Dodis ; Renato Renner
Quantum Hardcore Functions by Complexity-Theoretical Quantum List Decoding / Akinori Kawachi ; Tomoyuki Yamakami
Foundations
Efficient Pseudorandom Generators from Exponentially Hard One-Way Functions / Iftach Haitner ; Omer Reingold
Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffle-Hellman Schemes / Pierre-Alain Fouque ; David Pointcheval ; Sebastien Zimmer
A Probabilistic Hoare-style Logic for Game-Based Cryptographic Proofs / Ricardo Corin ; Jerry den Hartog
Multi-party Protocols
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability / Duong Hieu Phan ; Reihaneh Safavi-Naini ; Dongvu Tonien
An Adaptively Secure Mix-Net Without Erasures / Douglas Wikstrom ; Jens Groth
Multipartite Secret Sharing by Bivariate Interpolation / Tamir Tassa ; Nira Dyn
Identity-Based Encryption Gone Wild / Michel Abdalla ; Dario Catalano ; Alexander W. Dent ; John Malone-Lee ; Gregory Neven ; Nigel P. Smart
Games
Deterministic Priority Mean-Payoff Games as Limits of Discounted Games / Hugo Gimbert ; Wieslaw Zielonka
Recursive Concurrent Stochastic Games / Kousha Etessami ; Mihalis Yannakakis
Half-Positional Determinacy of Infinite Games / Eryk Kopczyriski
A Game-Theoretic Approach to Deciding Higher-Order Matching / Colin Stirling
Semantics
Descriptive and Relative Completeness of Logics for Higher-Order Functions / Kohei Honda ; Martin Berger ; Nobuko Yoshida
Interpreting Polymorphic FPC into Domain Theoretic Models of Parametric Polymorphism / Rasmus Ejlers Mogelberg
Typed GoI for Exponentials / Esfandiar Haghverdi
Commutative Locative Quantifiers for Multiplicative Linear Logic / Stefano Guerrini ; Patrizia Marzuoli
The Wadge Hierarchy of Deterministic Tree Languages / Filip MurlakAutomata I:
Timed Petri Nets and Timed Automata: On the Discriminating Power of Zeno Sequences / Patricia Bouyer ; Serge Haddad ; Pierre-Alain Reynier
On Complexity of Grammars Related to the Safety Problem / Tomasz Jurdzinski
Models
Jumbo [lambda]-Calculus / Paul Blain Levy
[lambda]-RBAC: Programming with Role-Based Access Control / Radha Jagadeesan ; Alan Jeffrey ; Corin Pitcher ; James Riely
Communication of Two Stacks and Rewriting / Juhani Karhumaki ; Michal Kunc ; Alexander Okhotin
Equations
On the Axiomatizability of Priority / Luca Aceto ; Taolue Chen ; Wan Fokkink ; Anna Ingolfsdottir
A Finite Equational Base for CCS with Left Merge and Communication Merge / Bas Luttik
Theories of HNN-Extensions and Amalgamated Products / Markus Lohrey ; Geraud Senizergues
On Intersection Problems for Polynomially Generated Sets / Wong Karianto ; Aloys Krieg ; Wolfgang Thomas
Logics
Invisible Safety of Distributed Protocols / Ittai Balaban ; Amir Pnueli ; Lenore D. Zuck
The Complexity of Enriched [mu]-Calculi / Piero A. Bonatti ; Carsten Lutz ; Aniello Murano ; Moshe Y. Vardi
Interpreting Tree-to-Tree Queries / Michael Benedikt ; Christoph Koch
Constructing Exponential-Size Deterministic Zielonka Automata / Blaise Genest ; Anca MuschollAutomata II:
Flat Parametric Counter Automata / Marius Bozga ; Radu Iosif ; Yassine Lakhnech
Lower Bounds for Complementation of [omega]-Automata Via the Full Automata Technique / Qiqi Yan
Author Index
Invited Papers
Differential Privacy / Cynthia Dwork
The One Way to Quantum Computation / Vincent Danos ; Elham Kashefi ; Prakash Panangaden
3.

電子ブック

EB
Sokratis K. Katsikas, Michael Backes, Stefanos Gritzalis, Takeo Kanade, Javier López, Bart Preneel
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
Privacy and Anonymity
Low Latency Anonymity with Mix Rings / Matthew Burnside ; Angelos D. Keromytis
Breaking Four Mix-Related Schemes Based on Universal Re-encryption / George Danezis
Weak k-Anonymity: A Low-Distortion Model for Protecting Privacy / Maurizio Atzori
Protecting Data Privacy Through Hard-to-Reverse Negative Databases / Fernando Esponda ; Elena S. Ackley ; Paul Helman ; Haixia Jia ; Stephanie Forrest
Block Ciphers and Hash Functions
Related-Key Rectangle Attack on 42-Round SHACAL-2 / Jiqiang Lu ; Jongsung Kim ; Nathan Keller ; Orr Dunkelman
On the Collision Resistance of RIPEMD-160 / Florian Mendel ; Norbert Pramstaller ; Christian Rechberger ; Vincent Rijmen
Digital Signatures
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption / Javier Herranz ; Fabien Laguillaumie
Multi-party Concurrent Signatures / Dongvu Tonien ; Willy Susilo ; Reihaneh Safavi-Naini
Formal Security Model of Multisignatures / Yuichi Komano ; Kazuo Ohta ; Atsushi Shimbo ; Shinichi Kawamura
Cryptanalysis of Variants of UOV / Yuh-Hua Hu ; Chun-Yen Chou ; Lih-Ghung Wang ; Feipei Lai
Stream Ciphers
Trivium: a Stream Cipher Construction Inspired by Block Cipher Design Principles / Christophe De Canniere
Cryptanalysis of the Bluetooth E[subscrpit o] Cipher Using OBDD's / Yaniv Shaked ; Avishai Wool
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice / Ellen Jochemsz ; Benne de WegerEncryption I:
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search / Joonsang Baek
Collusion-Free Policy-Based Encryption / Walid Bagga ; Refik Molva
Pervasive Computing
Using Multiple Smart Cards for Signing Messages at Malicious Terminals / Istvan Zsolt Berta
Diverging Keys in Wireless Sensor Networks / Michal Ren ; Tanmoy Kanti Das ; Jianying Zhou
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption / Ulrich Huber ; Ahmad-Reza SadeghiEncryption II:
Transparent Image Encryption Using Progressive JPEG / Thomas Stutz ; Andreas Uhl
Network Security
Preserving TCP Connections Across Host Address Changes / Vassilis Prevelakis ; Sotiris Ioannidis
A Security Architecture for Protecting LAN Interactions / Andre Zuquete ; Hugo Marques
Simulation of Internet DDoS Attacks and Defense / Igor Kotenko ; Alexander Ulanov
Snooze: Toward a Stateful NetwOrk prOtocol fuzZEr / Greg Banks ; Marco Cova ; Viktoria Felmetsger ; Kevin Almeroth ; Richard Kemmerer
Watermarking and DRM
Rights Protection for Data Cubes / Jie Guo ; Yingjiu Li ; Robert H. Deng ; Kefei Chen
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM) / Huifang Yin ; Jun Li
Intrusion Detection and Worms
Resistance Analysis to Intruders' Evasion of Detecting Intrusion / Jianhua Yang ; Yongzhong Zhang ; Shou-Hsuan Stephen Huang
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks / Luciano Bononi ; Carlo Tacconi
Anomaly Intrusion Detection Based on Clustering a Data Stream / Sang-Hyun Oh ; Jin-Suk Kang ; Yung-Cheol Byun ; Taikyeong T. Jeong ; Won-Suk Lee
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation / K. Anagnostakis ; S. Ioannidis ; A.D. Keromytis ; M.B. Greenwald
Key Exchange
An Authentication and Key Exchange Protocol for Secure Credential Services / SeongHan Shin ; Kazukuni Kobara ; Hideki Imai
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders / Yvo Desmedt ; Josef Pieprzyk ; Ron Steinfeld ; Huaxiong Wang
Security Protocols and Formal Methods
Formalising Receipt-Freeness / H.L. Jonker ; E.P. de Vink
Enhancing the Security and Efficiency of 3-D Secure / Mohammed Assora ; Ayoub Shirvani
Designing and Verifying Core Protocols for Location Privacy / David von Oheimb ; Jorge Cuellar
Information Systems Security
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches / Mila Katzarova ; Andrew Simpson
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness / Jose M Torres ; Jose M Sarriegi ; Javier Santos ; Nicolas Serrano
Author Index
Software Security
Extending .NET Security to Unmanaged Code / Patrick Klinkoff ; Christopher Kruegel ; Engin Kirda ; Giovanni Vigna
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation / Zhiqiang Lin ; Nai Xia ; Guole Li ; Bing Mao ; Li Xie
4.

電子ブック

EB
Bart Preneel, Takeo Kanade, Stafford Tavares
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
5.

電子ブック

EB
Bart Preneel, Takeo Kanade
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
6.

電子ブック

EB
Viliam Geffert, Alberto Bertoni, Mária Bieliková, Takeo Kanade, Juhani Karhumäki, Pavol Návrat, Bart Preneel
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
7.

電子ブック

EB
Dimitris Gritzalis, Takeo Kanade, Bart Preneel, Marianthi Theoharidou
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
RFID and Privacy
A New Framework for RFID Privacy / Robert H. Deng ; Yingjiu Li ; Moti Yung ; Yunlei Zhao
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems / Rishab Nithyanand ; Gene Tsudik ; Ersin Uzun
Privacy-Preserving, Taxable Bank Accounts / Elli Androulaki ; Binh Vo ; Steven Bellovin
Formal Analysis of Privacy for Vehicular Mix-Zones / Morten Dahl ; Stéphanie Delaune ; Graham Steel
Software Security
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time / Chao Zhang ; Tielei Wang ; Tao Wei ; Yu Chen ; Wei Zou
A Theory of Runtime Enforcement, with Results / Jay Ligatti ; Srikar Reddy
Enforcing Secure Object Initialization in Java / Laurent Hubert ; Thomas Jensen ; Vincent Monfort ; David Pichardie
Flexible Scheduler-Independent Security / Heiko Mantel ; Henning Sudbrock
Cryptographic Protocols
Secure Multiparty Linear Programming Using Fixed-Point Arithmetic / Octavian Catrina ; Sebastiaan de Hoogh
A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on ?-Protocols / José Bacelar Almeida ; Endre Bangerter ; Manuel Barbosa ; Stephan Krenn ; Ahmad-Reza Sadeghi ; Thomas Schneider
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model / Joseph K. Liu ; Man Ho Au ; Willy Susilo ; Jianying Zhou
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems / Wenjuan Xu ; Gail-Joon Ahn ; Hongxin Hu ; Xinwen Zhang ; Jean-Pierre Seifert
Traffic Analysis
Website Fingerprinting and Identification Using Ordered Feature Sequences / Liming Lu ; Ee-Chien Chang ; Mun Choon Chan
Web Browser History Detection as a Real-World Privacy Threat / Artur Janc ; Lukasz Olejnik
On the Secrecy of Spread-Spectrum Flow Watermarks / Xiapu Luo ; Junjie Zhang ; Roberto Perdisci ; Wenke Lee
Traffic Analysis against Low-Latency Anonymity Networks Using Available Bandwidth Estimation / Sambuddho Chakravarty ; Angelos Stavrou ; Angelos D. Keromytis
End-User Security
A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection / Guang Xiang ; Bryan A. Pendleton ; Jason Hong ; Carolyn P. Rose
Kamouflage: Loss-Resistant Password Management / Hristo Bojinov ; Elie Bursztein ; Xavier Boyen ; Dan Boneh
Formal Analysis
Sequential Protocol Composition in Maude-NPA / Santiago Escobar ; Catherine Meadows ; José Meseguer ; Sonia Santiago
Verifying Security Property of Peer-to-Peer Systems Using CSP / Tien Tuan Anh Dinh ; Mark Ryan
Modeling and Analyzing Security in the Presence of Compromising Adversaries / David Basin ; Cas Cremers
On Bounding Problems of Quantitative Information Flow / Hirotoshi Yasuoka ; Tachio Terauchi
E-voting and Broadcast
On E-Vote Integrity in the Case of Malicious Voter Computers / Sven Heiberg ; Helger Lipmaa ; Filip van Laenen
Election Verifiability in Electronic Voting Protocols / Steve Kremer ; Ben Smyth
Pretty Good Democracy for More Expressive Voting Schemes / James Heather ; Peter Y.A. Ryan ; Vanessa Teague
Efficient Multi-dimensional Key Management in Broadcast Services / Marina Blanton ; Keith B. Frikke
Authentication, Access Control, Authorization and Attestation
Caught in the Maze of Security Standards / Jan Meier ; Dieter Gollmann
User-Role Reachability Analysis of Evolving Administrative Role Based Access Control / Mikhail I. Gofman ; Ruiqi Luo ; Ping Yang
An Authorization Framework Resilient to Policy Evaluation Failures / Jason Crampton ; Michael Huth
Optimistic Fair Exchange with Multiple Arbiters / Alptekin Küpçü ; Anna Lysyanskaya
Anonymity and Unlinkability
Speaker Recognition in Encrypted Voice Streams / Michael Backes ; Goran Doychev ; Markus Dürmuth ; Boris Köpf
Evaluating Adversarial Partitions / Andreas Pashalidis ; Stefan Schiffner
Providing Mobile Users' Anonymity in Hybrid Networks / Claudio A. Ardagna ; Sushil Jajodia ; Pierangela Samarati
Complexity of Anonymity for Security Protocols / Ferucio Laurentiu Tiplea ; Loredana Vamanu ; Cosmin Vârlan
Network Security and Economics
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks / Lingyu Wang ; Anoop Singhal ; Steven Noel
Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information / Benjamin Johnson ; Jens Grossklags ; Nicolas Christin ; John Chuang
RatFish: A File Sharing Protocol Provably Secure against Rational Users / Oana Ciobotaru ; Anton Krohmer
A Service Dependency Model for Cost-Sensitive Intrusion Response / Nizar Kheir ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Hervé Debar
Secure Update, DOS and Intrustion Detection
Secure Code Update for Embedded Devices via Proofs of Secure Erasure / Daniele Perito
Dial
RFID and Privacy
A New Framework for RFID Privacy / Robert H. Deng ; Yingjiu Li ; Moti Yung ; Yunlei Zhao
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems / Rishab Nithyanand ; Gene Tsudik ; Ersin Uzun
8.

電子ブック

EB
Fabio Martinelli, Takeo Kanade, Bart Preneel
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
9.

電子ブック

EB
Bart Preneel, Takeo Kanade, Tsuyoshi Takagi
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼