close
1.

電子ブック

EB
WISA 2004, Takeo Kanade, Chae Hoon Lim, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Encrypted Watermarks and Linux Laptop Security / Markku-Juhani O. Saarinen
Inconsistency Detection of Authorization Policies in Distributed Component Environment / Chang-Joo Moon ; Hoh Peter In
Public Key Schemes I
Custodian-Hiding Verifiable Encryption / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong
Proving Key Usage / Malek Bechlaghem ; Vincent Rijmen
Public Key Encryption with Conjunctive Field Keyword Search / Dong Jin Park ; Kihyun Kim ; Pil Joong Lee
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior / Kohei Tatara ; Toshihiro Tabata ; Kouichi Sakurai
Service Discrimination and Audit File Reduction for Effective Intrusion Detection / Fernando Godínez ; Dieter Hutter ; Raúl Monroy
IDS False Alarm Filtering Using KNN Classifier / Kwok Ho Law ; Lam For Kwok
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking / Hae-Yeoun Lee ; Jong-Tae Kim ; Heung-Kyu Lee ; Young-Ho Suh
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment / Manabu Iwanaga
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups / Kui Ren ; Hyunrok Lee ; Kwangjo Kim ; Taewhan Yoo
A Ring Signature Scheme Using Bilinear Pairings / Jing Xu ; Zhenfeng Zhang ; Dengguo Feng
Verifiable Pairing and Its Applications / Sherman S.M. Chow
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading / Bart Haagdorens ; Tim Vermeiren ; Marnix Goossens
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks / Seok Bong Jeong ; Young Woo Choi ; Sehun Kim
Application of Content Computing in Honeyfarm / Yi-Yuan Huang ; Kwok-Yan Lam ; Siu-Leung Chung ; Chi-Hung Chi ; Jia-Guang Sun
Digital Rights Management
License Protection with a Tamper-Resistant Token / Cheun Ngen Chong ; Bin Ren ; Jeroen Doumen ; Sandro Etalle ; Pieter H. Hartel ; Ricardo Corin
An Adaptive Approach to Hardware Alteration for Digital Rights Management / Yinyan Yu ; Zhi Tang
Dynamic Fingerprinting over Broadcast Using Revocation Scheme / Mira Kim ; Kazukuni Kobara ; Hideki Imai
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels / Chong Hee Kim ; Yong Ho Hwang
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002 / Sang Cheol Hwang ; Dong Hoon Lee ; Daewan Han ; Jae-Cheol Ryou
Fair Offline Payment Using Verifiable Encryption / Sangjin Kim ; Heekuck Oh
A Limited-Use Key Generation Scheme for Internet Transactions / Supakorn Kungpisdan ; Phu Dung Le ; Bala Srinivasan
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes / Kishan Chand Gupta ; Palash Sarkar
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II / Soonhak Kwon
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors / Masanobu Katagi ; Izuru Kitamura ; Toru Akishita ; Tsuyoshi Takagi
Hyperelliptic Curve Coprocessors on a FPGA / HoWon Kim ; Thomas Wollinger ; YongJe Choi ; KyoIl Chung ; Christof Paar
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID / Kenji Imamoto
A New k-Anonymous Message Transmission Protocol / Gang Yao
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack / Marcin Gomulkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
Side-Channel Attacks
Side Channel Cryptanalysis on SEED / HyungSo Yoo ; ChangKyun Kim ; JaeCheol Ha ; SangJae Moon ; IlHwan Park
Secure and Efficient AES Software Implementation for Smart Cards / Elena Trichina ; Lesya Korkishko
Practical Template Attacks / Christian Rechberger ; Elisabeth Oswald
Evaluation and Improvement of the Tempest Fonts / Hidema Tanaka ; Osamu Takizawa ; Akihiro Yamamura
Author Index
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
2.

電子ブック

EB
Reihaneh Safavi-Naini, Takeo Kanade, Reihanah Safavi-Naini, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
3.

電子ブック

EB
Dingyi Pei, Takeo Kanade, Dongdai Lin, Chuankun Wu, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
4.

電子ブック

EB
Helger Lipmaa, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
5.

電子ブック

EB
Joo-Seok Song, Takeo Kanade, Taekyoung Kwon, JooSeok Song, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
6.

電子ブック

EB
Moti Yung, Yevgeniy Dodis, Takeo Kanade, Aggelos Kiayias, Tal Malkin
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
7.

電子ブック

EB
Roberto Prisco, Roberto De Prisco, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
Signature Schemes Variants
Relations Among Security Notions for Undeniable Signature Schemes / Kaoru Kurosawa ; Swee-Huay Heng
Concurrent Blind Signatures Without Random Oracles / Aggelos Kiayias ; Hong-Sheng Zhou
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions / Fabien Laguillaumie ; Benoit Libert ; Jean-Jacques Quisquater
Block Ciphers Analysis
Understanding Two-Round Differentials in AES / Joan Daemen ; Vincent Rijmen
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b / Jiqiang Lu ; Changhoon Lee ; Jongsung Kim
Anonymity and E-Commerce
Constant-Size Dynamic k-TAA / Man Ho Au ; Willy Susilo ; Yi Mu
On Secure Orders in the Presence of Faults / Amir Herzberg ; Igal Yoffe
Balancing Accountability and Privacy Using E-Cash / Jan Camenisch ; Susan Hohenberger ; Anna Lysyanskaya
Public Key Encryption and Key Exchange
About the Security of MTI/CO and MQV / Sebastien Kunz-Jacques ; David Pointcheval
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles / David Galindo ; Eike Kiltz
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Secret Sharing
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants / Jaume Marti-Farre ; Carles Padro
Cheating Immune (2, n)-Threshold Visual Secret Sharing / Roberto Be Prisco ; Alfredo De Santis
Rational Secret Sharing, Revisited / S. Dov Gordon ; Jonathan Katz
Symmetric Key Cryptanalysis and Randomness
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 / Alex Biryukov ; Bart Preneel ; Seokhie Hong
Distinguishing Stream Ciphers with Convolutional Filters / Gilles Van Assche
On Statistical Testing of Random Numbers Generators / Fida El Haje ; Yuri Golubev ; Pierre-Yvan Liardet ; Yannick Teglia
Applied Authentication
Lightweight Email Signatures / Ben Adida ; David Chau ; Ronald L. Rivest
Shoehorning Security into the EPC Tag Standard / Daniel V. Bailey ; Art Juels
Proof-Carrying Proxy Certificates / Walid Bagga ; Stefano Crosta ; Refik Molva
Public Key Related Cryptanalysis
Cryptanalysis of Rainbow / Olivier Billet ; Henri Gilbert
An Improved LPN Algorithm / Eric Levieil ; Pierre-Alain Fouque
Invited Talk
Theory and Practice of Multiparty Computation / Ivan Damgard
Author Index
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
8.

電子ブック

EB
Steven M. Bellovin, Rosario Gennaro, Takeo Kanade, Angelos Keromytis, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
9.

電子ブック

EB
Kyo-Il Chung, Takeo Kanade, Kiwook Sohn, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
10.

電子ブック

EB
Moti Yung, Takeo Kanade, Dongdai Lin, Peng Liu
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
11.

電子ブック

EB
Pierangela Samarati, Claudio A. Ardagna, Takeo Kanade, Fabio Martinelli, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
12.

電子ブック

EB
Heung Youl Youm, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
Device Security
Application Management Framework in User Centric Smart Card Ownership Model / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes
When Compromised Readers Meet RFID / Gildas Avoine ; Cédric Lauradoux ; Tania Martin
HW Implementation Security
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? / Marcel Medwed ; Jörn-Marc Schmidt
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules / Takeshi Sugawara ; Yu-ichi Hayashi ; Naofumi Homma ; Takaaki Mizuki ; Takafumi Aoki ; Hideaki Sone ; Akashi Satoh
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment / Timo Kasper ; David Oswald ; Christof Paar
Applied Cryptography
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles / Pairat Thorncharoensri ; Willy Susilo ; Yi Mu
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity / Shaojing Fu ; Longjiang Qu ; Chao Li
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy / Kun Peng ; Feng Bao
ID-Based Adaptive Oblivious Transfer / Fangguo Zhang ; Xingwen Zhao ; Xiaofeng Chen
Side Channel Attacks
Unknown Plaintext Template Attacks / Neil Hanley ; Michael Tunstall ; William P. Marnane
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices / Thomas Plos ; Michael Hutter ; Martin Feldhofer
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation / J. Pan ; J.I den Hartog ; Jiqiang Lu
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption / Amir Moradi ; Nima Mousavi ; Mahmoud Salmasizadeh
Cryptograptanalysis
Finding Collisions for a 45-Step Simplified HAS-V / Nicky Mouha ; Christophe De Cannière ; Sebastiaan Indesteege ; Bart Preneel
Non-linear Error Detection for Finite State Machines / Kahraman D. Akdemir ; Ghaith Hammouri ; Berk Sunar
Quadratic Equations from a Kind of S-boxes / Jia Xie ; Weiwei Cao ; TianZe Wang
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure / Lei Hu
Anonymity / Authentication / Access Control
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET / Rasheed Hussain ; Sangjin Kim ; Heekuck Oh
A Selectable k-Times Relaxed Anonymous Authentication Scheme / Keita Emura ; Atsuko Miyaji ; Kazumasa Omote
PUF-Based Authentication Protocols - Revisited / Heike Busch ; Stefan Kaizenbeisser ; Paul Baecher
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application / Luan Ibraimi ; Milan Petkovic ; Svetla Nikova ; Pieter Hartel ; Willem Jonker
Network Security
Securing Remote Access Inside Wireless Mesh Networks / Mark Manulis
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers / Dae Hyun Yum ; Sun Young Kim ; HoKun Moon ; Mi-Yeon Kim ; Jae-Hoon Roh ; Pil Joong Lee
USN Middleware Security Model / Mijoo Kim ; Mi Yeon Yoon ; Heung Youl Youm
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs / Chae Hoon Lim
Author Index
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
13.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
14.

電子ブック

EB
Liqun Chen, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
15.

電子ブック

EB
Shlomi Dolev, Jorge Cobb, Michael Fischer, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
A Geometry of Networks / Yechiam Yemini
Contributed Papers
Systematic Correct Construction of Self-stabilizing Systems: A Case Study / Ananda Basu ; Borzoo Bonakdarpour ; Marius Bozga ; Joseph Sifakis
A Fault-Resistant Asynchronous Clock Function / Ezra N. Hoch ; Michael Ben-Or ; Danny Dolev
Self-stabilizing Leader Election in Dynamic Networks / Ajoy K. Datta ; Lawrence L. Larmore ; Hema Piniganti
Loop-Free Super-Stabilizing Spanning Tree Construction / Lélia Blin ; Maria Gradinariu Potop-Butucaru ; Stephane Rovedakis ; Sébastien Tixeuil
A New Technique for Proving Self-stabilizing under the Distributed Scheduler / Sven Köhler ; Volker Turau
Tranformational Approach for Designing Scheduler-Oblivious Self-stabilizing Algorithms / Abhishek Dhama ; Oliver Theel
On Byzantine Containment Properties of the min+1 Protocol / Swan Dubois ; Toshimitsu Masuzawa
Efficient Self-stabilizing Graph Searching in Tree Networks / Jean Blair ; Fredrik Manne ; Rodica Mihai
Adaptive Containment of Time-Bounded Byzantine Faults / Yukiko Yamauchi ; Doina Bein
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
Self-stabilizing Algorithm of Two-Hop Conflict Resolution / Stéphane Pomportes ; Joanna Tomasik ; Anthony Busson ; Véronique Vèque
Low Memory Distributed Protocols for 2-Coloring / Amos Israeli ; Mathew D. McCubbins ; Ramamohan Paturi ; Andrea Vattani
Connectivity-Preserving Scattering of Mobile Robots with Limited Visibility / Taisuke Izumi
Computing in Social Networks / Andrei Giurgiu ; Rachid Guerraoui ; Kévin Huguenin ; Anne-Marie Kermarrec
On Transactional Scheduling in Distributed Transactional Memory Systems / Junwhan Kim ; Binoy Ravindran
Recursion in Distributed Computing / Eli Gafni ; Sergio Rajsbaum
On Adaptive Renaming under Eventually Limited Contention / Damien Imbs ; Michel Raynal
RobuSTM: A Robust Software Transactional Memory / Jons-Tobias Wamhoff ; Torvald Riegel ; Christof Fetzer ; Pascal Felber
A Provably Starvation-Free Distributed Directory Protocol / Hagit Attiya ; Vincent Gramoli ; Alessia Milani
Lightweight Live Migration for High Availability Cluster Service / Bo Jiang ; Changsoo Kim
Approximation of ?-Timeliness / Carole Delporte-Gallet ; Stéphane Devismes ; Hugues Fauconnier
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
16.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
17.

電子ブック

EB
Yongwha Chung, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets / Wenpan Jing ; Haixia Xu ; Bao Li
Distributed Paillier Cryptosystem without Trusted Dealer / Takashi Nishide ; Kouichi Sakurai
Implementation
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains / Colin D. Walter
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs / Boufeldja Allailou ; Abdelaziz Marjane ; Abdellah Mokrane
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices / Erich Wenger ; Martin Feldhofer ; Nobert Felber
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling / Takehiko Amaki ; Masanori Hashimoto ; Yukio Mitsuyama ; Takao Onoye
Mobile Security/Secure Coding
Using Special Use Cases for Security in the Software Development Life Cycle / Jean-Marie Kabasele Tenday
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Atsuko Miyaji ; Kazumasa Omote
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6 / Jae-hoon Jang ; Don-Gu Yeo ; Dong-hee Lee ; Heung-Youl Youm
Hidden Credential Retrieval without Random Oracles / Mohammad Shahriar Rahman ; Masakazu Soshi
Attack
Combined Side-Channel Attacks / M. Abdelaziz Elaabid ; Olivier Meynard ; Sylvain Guilley ; Jean-Luc Danger
Correlation Power Analysis Based on Switching Glitch Model / Hongying Liu ; Guoyu Qian ; Satoshi Goto ; Yukiyasu Tsunoo
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity / Nico Döttling ; Dejan Lazich ; Jörn Müller-Quade ; Antonio Sobreira de Almeida
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks / Kehua Bao ; Zhenfeng Zhang
Full-Round Differential Attact on TWIS Block Clipher / Bozhan Su ; Wenling Wu ; Lei Zhang ; Yanjun Li
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations / Jean-François Gallais ; Ilya Kizhvatov ; Michael Tunstall
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis / Daisuke Nakatsu ; Yang Li ; Kazuo Sakiyama ; Kazuo Ohta
Biometrics
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram / Hansung Lee ; Yunsu Chung ; Jeongnyeo Kim ; Daihee Park
Fingerprint Liveness Detection Based on Multiple Image Quality Features / Changlong Jin ; Shengazhe Li ; Hakil Kim ; Ensoo Park
Robust Feature Extraction for Facial Image Quality Assessment / Thi Hai Binh Nguyen ; Van Huan Nguyen
Secure Protocol
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother / Rafael Dowsley ; Goichiro Hanaoka ; Hideki Imai ; Anderson C.A. Nascimento
Cross-Realm Password-Based Server Aided Key Exchange
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product / Jeroen van de Graaf ; Davidson Marques
Author Index
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
18.

電子ブック

EB
Xuejia Lai, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
19.

電子ブック

EB
Liqun Chen, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
20.

電子ブック

EB
ACM Workshop on Digital Rights Management, Reihanah Safavi-Naini, Moti Yung, Association for Computing Machinery-Digital Library., Association for Computing Machinery.
出版情報: ACM Digital Library Proceedings , ACM, 2005
所蔵情報: loading…
21.

電子ブック

EB
CISC 2005, Dengguo Feng, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
22.

電子ブック

EB
Jonathan Katz, David Hutchison, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
23.

電子ブック

EB
Sehun Kim, Takeo Kanade, Hyung-Woo Lee, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
24.

電子ブック

EB
Jae Kwang Lee, Takeo Kanade, Okyeon Yi, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
Identity-Based Key Issuing Without Secure Channel in a Broad Area / Saeran Kwon ; Sang-Ho Lee
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution / Ki Hun Lee ; Yuna Kim ; Sung Je Hong ; Jong Kim
Cyber Indication/Intrusion Detection
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks / Jianqing Ma ; Shiyong Zhang ; Yiping Zhong ; Xiaowen Tong
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment / Jae-Chul Park ; Bong-Nam Noh
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm / Seung-Hyun Paek ; Yoon-Keun Oh ; Do-Hoon Lee
Biometrics/Security Trust Management
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords / Daesung Moon ; Sungju Lee ; Seunghwan Jung ; Yongwha Chung ; Okyeon Yi ; Namil Lee ; Kiyoung Moon
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification / Byungkwan Park ; Jin-Won Park
Quality Assurance for Evidence Collection in Network Forensics / Bo-Chao Cheng ; Huan Chen
Secure Software/Systems
Visualization of Permission Checks in Java Using Static Analysis / Yoonkyung Kim ; Byeong-Mo Chang
Deployment of Virtual Machines in Lock-Keeper / Feng Cheng ; Christoph Meinel
Smart Cards/Secure Hardware
Investigations of Power Analysis Attacks and Countermeasures for ARIA / HyungSo Yoo ; Christoph Herbst ; Stefan Mangard ; Elisabeth Oswald ; SangJae Moon
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols / Mun-Kyu Lee ; Jung Ki Min ; Seok Hun Kang ; Sang-Hwa Chung ; Howon Kim ; Dong Kyue Kim
A Novel Key Agreement Scheme in a Multiple Server Environment / Chin-Chen Chang ; Chia-Chi Wu
Mobile Security
Cost-Effective IDS Operating Scheme in MANETs / Youngok Jeong ; Younggoo Han ; Hyunwoo Kim ; Woochul Shim ; Jaehong Kim ; Sehun Kim
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 / Hyun-Sun Kang ; Chang-Seop Park
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones / Michiru Tanaka ; Yoshimi Teshigawara
DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
Distributed Management of OMA DRM Domains / Harikrishna Vasanta ; Reihaneh Safavi-Naini ; Nicholas Paul Sheppard ; Jan Martin Surminen
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting / Hideki Yagi ; Toshiyasu Matsushima ; Shigeichi Hirasawa
A Key Management Based on Multiple Regression in Hierarchical Sensor Network / Mihui Kim ; Inshil Doh ; Kijoon Chae
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks / Jabeom Gu ; Jaehoon Nah ; Cheoljoo Chae ; Jaekwang Lee ; Jongsoo Jang
Privacy/Anonymity
Privacy Protection in PKIs: A Separation-of-Authority Approach / Taekyoung Kwon ; Jung Hee Cheon ; Yongdae Kim ; Jae-Il Lee
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise / Dong Hoon Lee
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature / Takayuki Tobita ; Hironori Yamamoto ; Hiroshi Doi ; Keigo Majima
Secret Handshake with Multiple Groups / Naoyuki Yamashita ; Keisuke Tanaka
Internet and Wireless Security
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs / Chanil Park ; Junbeom Hur ; Chanoe Kim ; Young-joo Shin ; Hyunsoo Yoon
EAP Using the Split Password-Based Authenticated Key Agreement / Jongho Ryu
How Many Malicious Scanners Are in the Internet? / Hiroaki Kikuchi ; Masato Terada
E-Passport: The Global Traceability Or How to Feel Like a UPS Package / Dario Carluccio ; Kerstin Lemke-Rust ; Christof Paar ; Ahmad-Reza Sadeghi
Author Index
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
25.

電子ブック

EB
K. Srinathan, C. Pandu Rangan, C. Pandu Rangan, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Hashing / I:
Linearization Attacks Against Syndrome Based Hashes / Markku-Juhani O. Saarinen
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Multilane HMAC - Security Beyond the Birthday Limit / Kan Yasuda
Elliptic Curve / II:
On the Bits of Elliptic Curve Diffie-Hellman Keys / David Jao ; Dimitar Jetchev ; Ramarathnam Venkatesan
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography / Muralidhara V.N. ; Sandeep Sen
Cryptoanalysis / III:
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses / Gautham Sekar ; Souradyuti Paul ; Bart Preneel
Related-Key Differential-Linear Attacks on Reduced AES-192 / Wentao Zhang ; Lei Zhang ; Wenling Wu ; Dengguo Feng
Improved Meet-in-the-Middle Attacks on Reduced-Round DES / Orr Dunkelman
Information Theoretic Security / IV:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality / Kannan Srinathan ; Arpita Patra ; Ashish Choudhary ; C. Pandu Rangan
Secret Swarm Unit Reactive [kappa]-Secret Sharing (Extended Abstract) / Shlomi Dolev ; Limor Lahiani ; Moti Yung
Elliptic Curve Cryptography / V:
New Formulae for Efficient Elliptic Curve Arithmetic / Huseyin Hisil ; Gary Carter ; Ed Dawson
A Graph Theoretic Analysis of Double Base Number Systems / Pradeep Kumar Mishra ; Vassil Dimitrov
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication / Daniel J. Bernstein ; Peter Birkner ; Tanja Lange ; Christiane Peters
Signature / VI:
Transitive Signatures from Braid Groups / Licheng Wang ; Zhenfu Cao ; Shihui Zheng ; Xiaofang Huang ; Yixian Yang
Proxy Re-signature Schemes Without Random Oracles / Jun Shao ; Xiaohui Liang
Side Channel Attack / VII:
First-Order Differential Power Analysis on the Duplication Method / Guillaume Fumaroli ; Emmanuel Mayer ; Renaud Dubois
Solving Discrete Logarithms from Partial Knowledge of the Key / K. Gopalakrishnan ; Nicolas Theriault ; Chui Zhi Yao
Symmetric Cryptosystem / VIII:
New Description of SMS4 by an Embedding over GF(2[superscript 8]) / Wen Ji ; Lei Hu
Tweakable Enciphering Schemes from Hash-Sum-Expansion / Kazuhiko Minematsu ; Toshiyasu Matsushima
A Framework for Chosen IV Statistical Analysis of Stream Ciphers / Hakan Englund ; Thomas Johansson ; Meltem Sonmez Turan
Asymmetric Cryptosystem / IX:
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols / Giovanni Di Crescenzo ; Vishal Saraswat
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power / Lihua Wang ; Masahiro Mambo ; Akihiro Yamamura
Short Presentation / X:
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues / Muxiang Zhang
On the [kappa]-Operation Linear Complexity of Periodic Sequences (Extended Abstract) / Ramakanth Kavuluru ; Andrew Klapper
Trade-Off Traitor Tracing / Kazuto Ogawa ; Go Ohtake ; Goichiro Hanaoka ; Hideki Imai
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs / Francois Arnault ; Thierry P. Berger ; Cedric Lauradoux ; Marine Minier
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System / Rana Barua ; Sumit Kumar Pandey ; Ravi Pankaj
Extended Multi-Property-Preserving and ECM-Construction / Lei Duo ; Chao Li
Design of a Differential Power Analysis Resistant Masked AES S-Box / Kundan Kumar ; Debdeep Mukhopadhyay ; Dipanwita Roy Chowdhury
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks / Sanjay Burman ; Kamakoti Veezhinathan
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions / Praveen Gauravaram ; Katsuyuki Okeya
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function / Frederic Didier
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware / Cuauhtemoc Mancillas-Lopez ; Debrup Chakraborty ; Francisco Rodriguez-Henriquez
Author Index
Hashing / I:
Linearization Attacks Against Syndrome Based Hashes / Markku-Juhani O. Saarinen
A Meet-in-the-Middle Collision Attack Against the New FORK-256
26.

電子ブック

EB
ACNS 2005, John Ioannidis, Takeo Kanade, Angelos Keromytis, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
27.

電子ブック

EB
FC 2005, Takeo Kanade, Andrew S. Patrick, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
28.

電子ブック

EB
Languages, and Programming International Colloquium on Automata, Lu?s Caires, Takeo Kanade, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
29.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
30.

電子ブック

EB
Reihaneh Safavi-Naini, Takeo Kanade, Reihanah Safavi-Naini, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
31.

電子ブック

EB
FC 2005, Takeo Kanade, Andrew S. Patrick, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
32.

電子ブック

EB
CRYPTO 2002, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2002
所蔵情報: loading…
33.

電子ブック

EB
ACNS 2003, Yongfei Han, Moti Yung, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2003
所蔵情報: loading…
目次情報: 続きを見る
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
Anonymity-Enhanced Pseudonym System / Yuko Tamura
Intrusion Detection
Using Feedback to Improve Masquerade Detection / Kwong H. Yung
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services / Zhi Guo ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun
An IP Traceback Scheme Integrating DPM and PPM / Fan Min ; Jun-yan Zhang ; Guo-wie Yang
Cryptographic Algorithms
Improved Scalable Hash Chain Traversal / Sung-Ryul Kim
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem / Rui Zhang ; Hideki Imai
On the Security of Two Threshold Signature Schemes with Traceable Signers / Guilin Wang ; Xiaoxi Han ; Bo Zhu
Digital Signature
Proxy and Threshold One-Time Signatures / Mohamed Al-Ibrahim ; Anton Cerny
A Threshold GQ Signature Scheme / Li-Shan Liu ; Cheng-Kang Chu ; Wen-Guey Tzeng
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary / Gene Itkis ; Peng Xie
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme / Chong-zhi Gao ; Zheng-an Yao ; Lei Li
Security Modelling
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems / Ching Lin ; Vijay Varadharajan
An Authorization Model for E-consent Requirement in a Health Care Application / Chun Ruan
PLI: A New Framework to Protect Digital Content for P2P Networks / Guofei Gu ; Bin B. Zhu ; Shipeng Li ; Shiyong Zhang
Web Security
Improved Algebraic Traitor Tracing Scheme / Chunyan Bai ; Guiliang Feng
Common Vulnerability Markup Language / Haitao Tian ; Liusheng Huang ; Zhi Zhou ; Hui Zhang
Trust on Web Browser: Attack vs. Defense / Tie-Yan Li ; Yongdong Wu
Security Protocols
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards / Luciano Rila ; Chris J. Mitchell
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party / Jae-Gwi Choi ; Kouichi Sakurai ; Ji-Hwan Park
Using OCSP to Secure Certificate-Using Transactions in M-commerce / Jose L. Muñoz ; Jordi Forné ; Oscar Esparza ; Bernabe Miguel Soriano
Cryptanalysis
Differential Fault Analysis on A.E.S / Pierre Dusart ; Gilles Letourneux ; Olivier Vivolo
Side-Channel Attack on Substitution Blocks / Roman Novak
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation / Yasuyuki Sakai
A Fast Correlation Attack for LFSR-Based Stream Ciphers / Sarbani Palit ; Bimal K. Roy ; Arindom De
Key Management
Making the Key Agreement Protocol in Mobile Ad Hoc Network
More Efficient / Gang Yao ; Kui Ren ; Feng Bao ; Robert H. Deng ; Dengguo Feng
An Efficient Tree-Based Group Key Agreement Using Bilinear Map / Sangwon Lee ; Yongdae Kim ; Kwangjo Kim ; Dae-Hyun Ryu
A Key Recovery Mechanism for Reliable Group Key Management / Taenam Cho ; Sang-Ho Lee
Efficient Implementations
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model / Sandeepan Chowdhury ; Subhamoy Maitra
Efficient Distributed Signcryption Scheme as Group Signcryption / DongJin Kwak ; SangJae Moon
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors / Johann Großschädl ; Guy-Armand Kamendje
Author Index
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
34.

電子ブック

EB
ACNS 2005, John Ioannidis, Takeo Kanade, Angelos Keromytis, Moti Yung, Angelos D. Keromytis
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
35.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
36.

電子ブック

EB
Steven M. Bellovin, Rosario Gennaro, Takeo Kanade, Angelos Keromytis, Moti Yung, Angelos D. Keromytis
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
37.

電子ブック

EB
Jonathan Katz, David Hutchison, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
38.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
39.

電子ブック

EB
Languages, and Programming International Colloquium on Automata, Luís Caires, Takeo Kanade, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
40.

電子ブック

EB
David Hutchison, Takeo Kanade, Fabio Martinelli, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
41.

電子ブック

EB
Liqun Chen, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
42.

電子ブック

EB
Liqun Chen, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
43.

電子ブック

EB
David Hutchison, Takeo Kanade, Moti Yung, Liehuang Zhu
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Trusted Services
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang
Enforcing Sticky Policies with TPM and Virtualization / Gina Kounga ; Liqun Chen
Mobile Trusted Systems
Mass Transit Ticketing with NFC Mobile Phones / Jan-Erik Ekberg ; Sandeep Tamrakar
Anonymous Ticketing for NFC-Enabled Mobile Phones / David Derler ; Klaus Potzmader ; Kurt Dietrich
Security Analysis
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks / Qinggang Yue ; Feng Liu ; Rui Xue
Fault Detection of the MacGuffin Cipher against Differential Fault Attack / Wei Li ; Dawu Gu ; Zhiqiang Liu ; Ya Liu ; Xiaohu Huang
Computationally Sound Symbolic Analysis of EAP-TNC Protocol / Zijian Zhang ; Liehuang Zhu ; Feng Wang ; Lejian Liao ; Gong Guo ; Hongyuan Wang
A Technique for Remote Detection of Certain Virtual Machine Monitors / Christopher Jämthagen ; Martin Hell ; Ben Smeets
Cryptographic Aspects
Indifferentiability of Domain Extension Modes for Hash Functions / Yiyuam Luo ; Xuejia Lai ; Zheng Gong
Multicollisions and Graph-Based Hash Functions / Kimmo Halunen
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng
MQQ-SIG: An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme / Danilo Gligoroski ; Rune Steinsmo ; Ødegard ; Rune Erlend Jensen ; Ludovic Perret ; Jean-Charles Faugère ; Svein Johan Knapskog ; Smile Markovski
Multifactor Authenticated Key Renewal / Shin'ichiro Matsuo ; Daisuke Moriyama ; Moti Yung
Restricted Identification Scheme and Diffie-Hellman Linking Problem / Miroslaw Kutylowski ; Lukasz Krzywiecki ; Przemyslaw Kubiak ; Michal Koza
Trusted Networks
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks / Dong Hao ; Avishek Adhikari ; Kouichi Sakurai
Hash Chains at the Basis of a Secure Reactive Routing Protocol / Thouraya Bouabana-Tebibel
Implementation
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM / Patrick Koeberl ; Jiangtao Li ; Roel Maes ; Anand Rajan ; Claire Vishik ; Marcin Wójcik
A Performance Analysis of Identity-Based Encryption Schemes / Pengqi Cheng ; Yan Gu ; Zihong Lu ; Jianfei Wang ; Wenlei Zhu ; Zhen Chen ; Jiwei Huang
Direct Anonymous Attestation
A (Corrected) DAA Scheme Using Batch Proof and Verification / Ernie Brickell
DAA Protocol Analysis and Verification / Yu Qin ; Xiaobo Chu ; Dengguo Feng ; Wei Feng
Author Index
Trusted Services
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang
44.

電子ブック

EB
Roberto Prisco, Roberto De Prisco, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
Signature Schemes Variants
Relations Among Security Notions for Undeniable Signature Schemes / Kaoru Kurosawa ; Swee-Huay Heng
Concurrent Blind Signatures Without Random Oracles / Aggelos Kiayias ; Hong-Sheng Zhou
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions / Fabien Laguillaumie ; Benoit Libert ; Jean-Jacques Quisquater
Block Ciphers Analysis
Understanding Two-Round Differentials in AES / Joan Daemen ; Vincent Rijmen
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b / Jiqiang Lu ; Changhoon Lee ; Jongsung Kim
Anonymity and E-Commerce
Constant-Size Dynamic k-TAA / Man Ho Au ; Willy Susilo ; Yi Mu
On Secure Orders in the Presence of Faults / Amir Herzberg ; Igal Yoffe
Balancing Accountability and Privacy Using E-Cash / Jan Camenisch ; Susan Hohenberger ; Anna Lysyanskaya
Public Key Encryption and Key Exchange
About the Security of MTI/CO and MQV / Sebastien Kunz-Jacques ; David Pointcheval
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles / David Galindo ; Eike Kiltz
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Secret Sharing
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants / Jaume Marti-Farre ; Carles Padro
Cheating Immune (2, n)-Threshold Visual Secret Sharing / Roberto Be Prisco ; Alfredo De Santis
Rational Secret Sharing, Revisited / S. Dov Gordon ; Jonathan Katz
Symmetric Key Cryptanalysis and Randomness
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 / Alex Biryukov ; Bart Preneel ; Seokhie Hong
Distinguishing Stream Ciphers with Convolutional Filters / Gilles Van Assche
On Statistical Testing of Random Numbers Generators / Fida El Haje ; Yuri Golubev ; Pierre-Yvan Liardet ; Yannick Teglia
Applied Authentication
Lightweight Email Signatures / Ben Adida ; David Chau ; Ronald L. Rivest
Shoehorning Security into the EPC Tag Standard / Daniel V. Bailey ; Art Juels
Proof-Carrying Proxy Certificates / Walid Bagga ; Stefano Crosta ; Refik Molva
Public Key Related Cryptanalysis
Cryptanalysis of Rainbow / Olivier Billet ; Henri Gilbert
An Improved LPN Algorithm / Eric Levieil ; Pierre-Alain Fouque
Invited Talk
Theory and Practice of Multiparty Computation / Ivan Damgard
Author Index
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
45.

電子ブック

EB
Shlomi Dolev, Jorge Cobb, Michael Fischer, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
A Geometry of Networks / Yechiam Yemini
Contributed Papers
Systematic Correct Construction of Self-stabilizing Systems: A Case Study / Ananda Basu ; Borzoo Bonakdarpour ; Marius Bozga ; Joseph Sifakis
A Fault-Resistant Asynchronous Clock Function / Ezra N. Hoch ; Michael Ben-Or ; Danny Dolev
Self-stabilizing Leader Election in Dynamic Networks / Ajoy K. Datta ; Lawrence L. Larmore ; Hema Piniganti
Loop-Free Super-Stabilizing Spanning Tree Construction / Lélia Blin ; Maria Gradinariu Potop-Butucaru ; Stephane Rovedakis ; Sébastien Tixeuil
A New Technique for Proving Self-stabilizing under the Distributed Scheduler / Sven Köhler ; Volker Turau
Tranformational Approach for Designing Scheduler-Oblivious Self-stabilizing Algorithms / Abhishek Dhama ; Oliver Theel
On Byzantine Containment Properties of the min+1 Protocol / Swan Dubois ; Toshimitsu Masuzawa
Efficient Self-stabilizing Graph Searching in Tree Networks / Jean Blair ; Fredrik Manne ; Rodica Mihai
Adaptive Containment of Time-Bounded Byzantine Faults / Yukiko Yamauchi ; Doina Bein
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
Self-stabilizing Algorithm of Two-Hop Conflict Resolution / Stéphane Pomportes ; Joanna Tomasik ; Anthony Busson ; Véronique Vèque
Low Memory Distributed Protocols for 2-Coloring / Amos Israeli ; Mathew D. McCubbins ; Ramamohan Paturi ; Andrea Vattani
Connectivity-Preserving Scattering of Mobile Robots with Limited Visibility / Taisuke Izumi
Computing in Social Networks / Andrei Giurgiu ; Rachid Guerraoui ; Kévin Huguenin ; Anne-Marie Kermarrec
On Transactional Scheduling in Distributed Transactional Memory Systems / Junwhan Kim ; Binoy Ravindran
Recursion in Distributed Computing / Eli Gafni ; Sergio Rajsbaum
On Adaptive Renaming under Eventually Limited Contention / Damien Imbs ; Michel Raynal
RobuSTM: A Robust Software Transactional Memory / Jons-Tobias Wamhoff ; Torvald Riegel ; Christof Fetzer ; Pascal Felber
A Provably Starvation-Free Distributed Directory Protocol / Hagit Attiya ; Vincent Gramoli ; Alessia Milani
Lightweight Live Migration for High Availability Cluster Service / Bo Jiang ; Changsoo Kim
Approximation of ?-Timeliness / Carole Delporte-Gallet ; Stéphane Devismes ; Hugues Fauconnier
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
46.

電子ブック

EB
Phan, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2017
所蔵情報: loading…
47.

電子ブック

EB
Alexander W.; Zheng, Yuliang; Young, Moti Dent, Alexander W. Dent, Yuliang Zheng, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Introduction / Yuliang Zheng1:
Historical Development of Signcryption / 1.1:
Coded Modulation / 1.1.1:
Musings on Blending / 1.1.2:
Signcryption / 1.1.3:
Provably Secure Signcryption / 1.1.4:
Extensions, Standardization, and Future Research Directions / 1.2:
Notation and Security Notions / 1.3:
Algorithms and Assignment / 1.3.1:
Signature Schemes / 1.3.2:
Public Key Encryption / 1.3.3:
Symmetric Encryption / 1.3.4:
Message Authentication Codes / 1.3.5:
Security Models for Signcryption / Part I:
Security for Signcryption: The Two-User Model / Jee Hea An ; Tal Rabin2:
Definition of Signcryption in the Two-User Setting / 2.1:
Two Security Notions in the Two-User Setting / 2.2.1:
Discussions on the Security Notions / 2.2.2:
Generic Compositions of Signature and Encryption / 2.3:
Construction / 2.3.1:
Security of the Parallel Composition Method / 2.3.2:
Security of the Sequential Composition Methods / 2.3.3:
Multi-user Setting / 2.4:
Syntax / 2.4.1:
Security / 2.4.2:
Extending Signcryption / 2.4.3:
Security for Signcryption: The Multi-User Model / Joonsang Baek ; Ron Steinfeld3:
The BSZ Model / 3.1:
Confidentiality of Signcryption in the Multi-User BSZ Model / 3.2.1:
Unforgeability of Signcryption in the Multi-User BSZ Model / 3.2.2:
Further Discussions on the Multi-User BSZ Model / 3.2.3:
Example: The Security of Zheng's Signcryption Scheme in the BSZ Model / 3.3:
Signcryption Schemes / Part II:
Signcryption Schemes Based on the Diffie-Hellman Problem / Paulo S.L.M. Barreto ; Benoît Libert ; Noel McCullagh ; Jean-Jacques Quisquater4:
Diffie-Hellman Problems / 4.1:
Zheng's Construction and Its Variants / 4.3:
Zheng's Original Scheme / 4.3.1:
The Bao-Deng Modification / 4.3.2:
A Modification with Public Verifiability / 4.3.3:
An Encrypt-then-Sign Composition / 4.4:
A Scheme with Unforgeability Based on Factoring / 4.5:
Schemes with Non-repudiation / 4.6:
A DSA-Based Construction / 4.6.1:
A Scheme Built on Schnorr's Signature Scheme / 4.6.2:
The CM Scheme / 4.7:
Signcryption Schemes Based on Bilinear Maps / 5:
Bilinear Map Groups / 5.1:
Assumptions / 5.3:
Signcryption for Anonymous Communications / 5.4:
Message Privacy / 5.4.1:
Ciphertext Unforgeability and Signature Unforgeability / 5.4.2:
Anonymity / 5.4.3:
A Tightly Secure Scheme / 5.5:
The Scheme / 5.5.1:
Efficiency / 5.5.2:
A Scheme with Short Detachable Signatures / 5.5.3:
Anonymous Communications / 5.6.1:
Signcryption Schemes Based on the RSA Problem / Alexander W. Dent ; John Malone-Lee5.6.3:
The RSA Transform / 6.1:
Dedicated RSA-Based Signcryption Schemes / 6.3:
Signcryption from Padding Schemes / 6.4:
Trapdoor Permutations / 6.4.1:
Extractable Commitments / 6.4.2:
Padding-Based Signcryption Schemes / 6.4.3:
Proof Intuition / 6.4.4:
Signcryption Based on RSA-TBOS / 6.5:
The TBOS Construction / 6.5.1:
Security Proof for the TBOS Signcryption Scheme / 6.5.2:
Construction Techniques / Part III:
Hybrid Signcryption / Tor E. Bjørstad7:
Background / 7.1:
A Brief Word on Notation / 7.1.1:
Preliminaries / 7.2:
The Hybrid Framework / 7.2.1:
Security Criteria for Data Encapsulation Mechanisms / 7.2.2:
Hybrid Signcryption with Outsider Security / 7.3:
An Outsider-Secure Signcryption KEM / 7.3.1:
Security Criteria for Outsider-Secure Signcryption KEMs / 7.3.2:
Security of the SKEM+DEM Construction / 7.3.3:
Outsider-Secure Hybrid Signcryption in Practice / 7.3.4:
Hybrid Signcryption with Insider Security / 7.4:
From Outsider to Insider Security / 7.4.1:
Signcryption Tag-KEMs / 7.4.2:
Security Criteria for Signcryption Tag-KEMs / 7.4.3:
Security of the SCTK+DEM Construction / 7.4.4:
Insider-Secure Hybrid Signcryption in Practice / 7.4.5:
Concealment and Its Applications to Authenticated Encryption / Yevgeniy Dodis8:
Domain Extension of Authenticated Encryption / 8.1:
Remotely Keyed Authenticated Encryption / 8.1.2:
Definition of Concealment / 8.2:
Security of Concealment / 8.2.1:
Relaxed Concealments / 8.2.3:
Super-Relaxed Concealments / 8.2.4:
Comparison to Commitment / 8.2.5:
Constructing Concealment Schemes / 8.3:
Achieving Hiding / 8.3.1:
Achieving Binding / 8.3.2:
Necessity of Assumptions / 8.3.3:
Applications to Authenticated Encryption / 8.4:
Definition of Authenticated Encryption / 8.4.1:
Authenticated Encryption of Long Messages / 8.4.2:
Parallel Signcryption / Josef Pieprzyk ; David Pointcheval8.4.3:
Concept of Parallel Signcryption / 9.1:
Overview of Constructions / 9.3:
Generic Parallel Signcryption / 9.4:
Description of the Scheme / 9.4.1:
Security Analysis / 9.4.2:
Optimal Parallel Signcryption / 9.5:
Extensions of Signcryption / 9.5.1:
Identity-Based Signcryption / Xavier Boyen10:
Identity-Based Cryptography / 10.1:
Advantages and Disadvantages / 10.1.2:
From IBE to Signcryption / 10.1.3:
Specifying an IBSC System / 10.1.4:
Concrete IBSC from Pairings / 10.1.5:
The Identity-Based Signcryption Primitive / 10.2:
Security Definitions / 10.3:
Message Confidentiality / 10.3.1:
Signature Non-repudiation / 10.3.2:
Ciphertext Unlinkability / 10.3.3:
Ciphertext Authentication / 10.3.4:
Ciphertext Anonymity / 10.3.5:
A Concrete IBSC Scheme / 10.4:
The Boneh-Franklin Framework / 10.4.1:
Fully Secure IBSC Construction / 10.4.2:
A Performance/Security Trade-Off / 10.4.3:
Signcrypting for Multiple Recipients / 10.4.4:
Key Establishment Using Signcryption Techniques / 11:
Formal Security Models for Key Establishment / 11.1:
Motivation / 11.2.1:
Sessions / 11.2.2:
The Formal Security Model / 11.2.3:
Entity Authentication / 11.2.4:
Forward Secrecy / 11.2.5:
Key Compromise Impersonation Attacks / 11.2.6:
Notation / 11.2.7:
Key Transport / 11.3:
Key Establishment Based on Zheng's Signcryption Scheme / 11.4:
Key Agreement Based on Signcryption KEMs / 11.5:
Key Agreement Based on Signcryption Tag-KEMs / 11.5.1:
Security Proof for the Bjørstad-Dent Protocol / 11.5.3:
Key Establishment Based on Timestamps / 11.6:
Applications of Signcryption / Yang Cui ; Goichiro Hanaoka12:
Applications Fields of Signcryption / 12.1:
Example Applications of Signcryption / 12.2:
Secure Multicasting Over the Internet / 12.2.1:
Authenticated Key Recovery / 12.2.2:
Secure ATM Networks / 12.2.3:
Secure Routing for Mobile Ad Hoc Networks / 12.2.4:
Encrypted and Authenticated E-mail by Firewalls / 12.2.5:
Signcryption in Secure VoIP / 12.2.6:
Applications to Electronic Payment / 12.2.7:
References
Index
Introduction / Yuliang Zheng1:
Historical Development of Signcryption / 1.1:
Coded Modulation / 1.1.1:
48.

電子ブック

EB
K. Srinathan, C. Pandu Rangan, C. Pandu Rangan, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Hashing / I:
Linearization Attacks Against Syndrome Based Hashes / Markku-Juhani O. Saarinen
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Multilane HMAC - Security Beyond the Birthday Limit / Kan Yasuda
Elliptic Curve / II:
On the Bits of Elliptic Curve Diffie-Hellman Keys / David Jao ; Dimitar Jetchev ; Ramarathnam Venkatesan
A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography / Muralidhara V.N. ; Sandeep Sen
Cryptoanalysis / III:
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses / Gautham Sekar ; Souradyuti Paul ; Bart Preneel
Related-Key Differential-Linear Attacks on Reduced AES-192 / Wentao Zhang ; Lei Zhang ; Wenling Wu ; Dengguo Feng
Improved Meet-in-the-Middle Attacks on Reduced-Round DES / Orr Dunkelman
Information Theoretic Security / IV:
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality / Kannan Srinathan ; Arpita Patra ; Ashish Choudhary ; C. Pandu Rangan
Secret Swarm Unit Reactive [kappa]-Secret Sharing (Extended Abstract) / Shlomi Dolev ; Limor Lahiani ; Moti Yung
Elliptic Curve Cryptography / V:
New Formulae for Efficient Elliptic Curve Arithmetic / Huseyin Hisil ; Gary Carter ; Ed Dawson
A Graph Theoretic Analysis of Double Base Number Systems / Pradeep Kumar Mishra ; Vassil Dimitrov
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication / Daniel J. Bernstein ; Peter Birkner ; Tanja Lange ; Christiane Peters
Signature / VI:
Transitive Signatures from Braid Groups / Licheng Wang ; Zhenfu Cao ; Shihui Zheng ; Xiaofang Huang ; Yixian Yang
Proxy Re-signature Schemes Without Random Oracles / Jun Shao ; Xiaohui Liang
Side Channel Attack / VII:
First-Order Differential Power Analysis on the Duplication Method / Guillaume Fumaroli ; Emmanuel Mayer ; Renaud Dubois
Solving Discrete Logarithms from Partial Knowledge of the Key / K. Gopalakrishnan ; Nicolas Theriault ; Chui Zhi Yao
Symmetric Cryptosystem / VIII:
New Description of SMS4 by an Embedding over GF(2[superscript 8]) / Wen Ji ; Lei Hu
Tweakable Enciphering Schemes from Hash-Sum-Expansion / Kazuhiko Minematsu ; Toshiyasu Matsushima
A Framework for Chosen IV Statistical Analysis of Stream Ciphers / Hakan Englund ; Thomas Johansson ; Meltem Sonmez Turan
Asymmetric Cryptosystem / IX:
Public Key Encryption with Searchable Keywords Based on Jacobi Symbols / Giovanni Di Crescenzo ; Vishal Saraswat
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power / Lihua Wang ; Masahiro Mambo ; Akihiro Yamamura
Short Presentation / X:
Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues / Muxiang Zhang
On the [kappa]-Operation Linear Complexity of Periodic Sequences (Extended Abstract) / Ramakanth Kavuluru ; Andrew Klapper
Trade-Off Traitor Tracing / Kazuto Ogawa ; Go Ohtake ; Goichiro Hanaoka ; Hideki Imai
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs / Francois Arnault ; Thierry P. Berger ; Cedric Lauradoux ; Marine Minier
Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System / Rana Barua ; Sumit Kumar Pandey ; Ravi Pankaj
Extended Multi-Property-Preserving and ECM-Construction / Lei Duo ; Chao Li
Design of a Differential Power Analysis Resistant Masked AES S-Box / Kundan Kumar ; Debdeep Mukhopadhyay ; Dipanwita Roy Chowdhury
LFSR Based Stream Ciphers Are Vulnerable to Power Attacks / Sanjay Burman ; Kamakoti Veezhinathan
An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions / Praveen Gauravaram ; Katsuyuki Okeya
Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function / Frederic Didier
Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware / Cuauhtemoc Mancillas-Lopez ; Debrup Chakraborty ; Francisco Rodriguez-Henriquez
Author Index
Hashing / I:
Linearization Attacks Against Syndrome Based Hashes / Markku-Juhani O. Saarinen
A Meet-in-the-Middle Collision Attack Against the New FORK-256
49.

電子ブック

EB
Pierangela Samarati, Claudio A. Ardagna, Takeo Kanade, Fabio Martinelli, Moti Yung, Claudio Agostino Ardagna
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
50.

電子ブック

EB
WISA 2003, Kijoon Chae, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2004
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼