close
1.

電子ブック

EB
WISA 2004, Takeo Kanade, Chae Hoon Lim, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Encrypted Watermarks and Linux Laptop Security / Markku-Juhani O. Saarinen
Inconsistency Detection of Authorization Policies in Distributed Component Environment / Chang-Joo Moon ; Hoh Peter In
Public Key Schemes I
Custodian-Hiding Verifiable Encryption / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong
Proving Key Usage / Malek Bechlaghem ; Vincent Rijmen
Public Key Encryption with Conjunctive Field Keyword Search / Dong Jin Park ; Kihyun Kim ; Pil Joong Lee
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior / Kohei Tatara ; Toshihiro Tabata ; Kouichi Sakurai
Service Discrimination and Audit File Reduction for Effective Intrusion Detection / Fernando Godínez ; Dieter Hutter ; Raúl Monroy
IDS False Alarm Filtering Using KNN Classifier / Kwok Ho Law ; Lam For Kwok
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking / Hae-Yeoun Lee ; Jong-Tae Kim ; Heung-Kyu Lee ; Young-Ho Suh
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment / Manabu Iwanaga
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups / Kui Ren ; Hyunrok Lee ; Kwangjo Kim ; Taewhan Yoo
A Ring Signature Scheme Using Bilinear Pairings / Jing Xu ; Zhenfeng Zhang ; Dengguo Feng
Verifiable Pairing and Its Applications / Sherman S.M. Chow
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading / Bart Haagdorens ; Tim Vermeiren ; Marnix Goossens
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks / Seok Bong Jeong ; Young Woo Choi ; Sehun Kim
Application of Content Computing in Honeyfarm / Yi-Yuan Huang ; Kwok-Yan Lam ; Siu-Leung Chung ; Chi-Hung Chi ; Jia-Guang Sun
Digital Rights Management
License Protection with a Tamper-Resistant Token / Cheun Ngen Chong ; Bin Ren ; Jeroen Doumen ; Sandro Etalle ; Pieter H. Hartel ; Ricardo Corin
An Adaptive Approach to Hardware Alteration for Digital Rights Management / Yinyan Yu ; Zhi Tang
Dynamic Fingerprinting over Broadcast Using Revocation Scheme / Mira Kim ; Kazukuni Kobara ; Hideki Imai
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels / Chong Hee Kim ; Yong Ho Hwang
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002 / Sang Cheol Hwang ; Dong Hoon Lee ; Daewan Han ; Jae-Cheol Ryou
Fair Offline Payment Using Verifiable Encryption / Sangjin Kim ; Heekuck Oh
A Limited-Use Key Generation Scheme for Internet Transactions / Supakorn Kungpisdan ; Phu Dung Le ; Bala Srinivasan
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes / Kishan Chand Gupta ; Palash Sarkar
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II / Soonhak Kwon
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors / Masanobu Katagi ; Izuru Kitamura ; Toru Akishita ; Tsuyoshi Takagi
Hyperelliptic Curve Coprocessors on a FPGA / HoWon Kim ; Thomas Wollinger ; YongJe Choi ; KyoIl Chung ; Christof Paar
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID / Kenji Imamoto
A New k-Anonymous Message Transmission Protocol / Gang Yao
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack / Marcin Gomulkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
Side-Channel Attacks
Side Channel Cryptanalysis on SEED / HyungSo Yoo ; ChangKyun Kim ; JaeCheol Ha ; SangJae Moon ; IlHwan Park
Secure and Efficient AES Software Implementation for Smart Cards / Elena Trichina ; Lesya Korkishko
Practical Template Attacks / Christian Rechberger ; Elisabeth Oswald
Evaluation and Improvement of the Tempest Fonts / Hidema Tanaka ; Osamu Takizawa ; Akihiro Yamamura
Author Index
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
2.

電子ブック

EB
Reihaneh Safavi-Naini, Takeo Kanade, Reihanah Safavi-Naini, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
3.

電子ブック

EB
Dingyi Pei, Takeo Kanade, Dongdai Lin, Chuankun Wu, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
4.

電子ブック

EB
Helger Lipmaa, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
5.

電子ブック

EB
Joo-Seok Song, Takeo Kanade, Taekyoung Kwon, JooSeok Song, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
6.

電子ブック

EB
Moti Yung, Yevgeniy Dodis, Takeo Kanade, Aggelos Kiayias, Tal Malkin
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
7.

電子ブック

EB
Roberto Prisco, Roberto De Prisco, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
Signature Schemes Variants
Relations Among Security Notions for Undeniable Signature Schemes / Kaoru Kurosawa ; Swee-Huay Heng
Concurrent Blind Signatures Without Random Oracles / Aggelos Kiayias ; Hong-Sheng Zhou
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions / Fabien Laguillaumie ; Benoit Libert ; Jean-Jacques Quisquater
Block Ciphers Analysis
Understanding Two-Round Differentials in AES / Joan Daemen ; Vincent Rijmen
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b / Jiqiang Lu ; Changhoon Lee ; Jongsung Kim
Anonymity and E-Commerce
Constant-Size Dynamic k-TAA / Man Ho Au ; Willy Susilo ; Yi Mu
On Secure Orders in the Presence of Faults / Amir Herzberg ; Igal Yoffe
Balancing Accountability and Privacy Using E-Cash / Jan Camenisch ; Susan Hohenberger ; Anna Lysyanskaya
Public Key Encryption and Key Exchange
About the Security of MTI/CO and MQV / Sebastien Kunz-Jacques ; David Pointcheval
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles / David Galindo ; Eike Kiltz
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Secret Sharing
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants / Jaume Marti-Farre ; Carles Padro
Cheating Immune (2, n)-Threshold Visual Secret Sharing / Roberto Be Prisco ; Alfredo De Santis
Rational Secret Sharing, Revisited / S. Dov Gordon ; Jonathan Katz
Symmetric Key Cryptanalysis and Randomness
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 / Alex Biryukov ; Bart Preneel ; Seokhie Hong
Distinguishing Stream Ciphers with Convolutional Filters / Gilles Van Assche
On Statistical Testing of Random Numbers Generators / Fida El Haje ; Yuri Golubev ; Pierre-Yvan Liardet ; Yannick Teglia
Applied Authentication
Lightweight Email Signatures / Ben Adida ; David Chau ; Ronald L. Rivest
Shoehorning Security into the EPC Tag Standard / Daniel V. Bailey ; Art Juels
Proof-Carrying Proxy Certificates / Walid Bagga ; Stefano Crosta ; Refik Molva
Public Key Related Cryptanalysis
Cryptanalysis of Rainbow / Olivier Billet ; Henri Gilbert
An Improved LPN Algorithm / Eric Levieil ; Pierre-Alain Fouque
Invited Talk
Theory and Practice of Multiparty Computation / Ivan Damgard
Author Index
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
8.

電子ブック

EB
Steven M. Bellovin, Rosario Gennaro, Takeo Kanade, Angelos Keromytis, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
9.

電子ブック

EB
Kyo-Il Chung, Takeo Kanade, Kiwook Sohn, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
10.

電子ブック

EB
Moti Yung, Takeo Kanade, Dongdai Lin, Peng Liu
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
11.

電子ブック

EB
Pierangela Samarati, Claudio A. Ardagna, Takeo Kanade, Fabio Martinelli, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
12.

電子ブック

EB
Heung Youl Youm, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
Device Security
Application Management Framework in User Centric Smart Card Ownership Model / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes
When Compromised Readers Meet RFID / Gildas Avoine ; Cédric Lauradoux ; Tania Martin
HW Implementation Security
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? / Marcel Medwed ; Jörn-Marc Schmidt
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules / Takeshi Sugawara ; Yu-ichi Hayashi ; Naofumi Homma ; Takaaki Mizuki ; Takafumi Aoki ; Hideaki Sone ; Akashi Satoh
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment / Timo Kasper ; David Oswald ; Christof Paar
Applied Cryptography
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles / Pairat Thorncharoensri ; Willy Susilo ; Yi Mu
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity / Shaojing Fu ; Longjiang Qu ; Chao Li
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy / Kun Peng ; Feng Bao
ID-Based Adaptive Oblivious Transfer / Fangguo Zhang ; Xingwen Zhao ; Xiaofeng Chen
Side Channel Attacks
Unknown Plaintext Template Attacks / Neil Hanley ; Michael Tunstall ; William P. Marnane
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices / Thomas Plos ; Michael Hutter ; Martin Feldhofer
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation / J. Pan ; J.I den Hartog ; Jiqiang Lu
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption / Amir Moradi ; Nima Mousavi ; Mahmoud Salmasizadeh
Cryptograptanalysis
Finding Collisions for a 45-Step Simplified HAS-V / Nicky Mouha ; Christophe De Cannière ; Sebastiaan Indesteege ; Bart Preneel
Non-linear Error Detection for Finite State Machines / Kahraman D. Akdemir ; Ghaith Hammouri ; Berk Sunar
Quadratic Equations from a Kind of S-boxes / Jia Xie ; Weiwei Cao ; TianZe Wang
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure / Lei Hu
Anonymity / Authentication / Access Control
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET / Rasheed Hussain ; Sangjin Kim ; Heekuck Oh
A Selectable k-Times Relaxed Anonymous Authentication Scheme / Keita Emura ; Atsuko Miyaji ; Kazumasa Omote
PUF-Based Authentication Protocols - Revisited / Heike Busch ; Stefan Kaizenbeisser ; Paul Baecher
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application / Luan Ibraimi ; Milan Petkovic ; Svetla Nikova ; Pieter Hartel ; Willem Jonker
Network Security
Securing Remote Access Inside Wireless Mesh Networks / Mark Manulis
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers / Dae Hyun Yum ; Sun Young Kim ; HoKun Moon ; Mi-Yeon Kim ; Jae-Hoon Roh ; Pil Joong Lee
USN Middleware Security Model / Mijoo Kim ; Mi Yeon Yoon ; Heung Youl Youm
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs / Chae Hoon Lim
Author Index
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
13.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
14.

電子ブック

EB
Liqun Chen, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
15.

電子ブック

EB
Shlomi Dolev, Jorge Cobb, Michael Fischer, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
A Geometry of Networks / Yechiam Yemini
Contributed Papers
Systematic Correct Construction of Self-stabilizing Systems: A Case Study / Ananda Basu ; Borzoo Bonakdarpour ; Marius Bozga ; Joseph Sifakis
A Fault-Resistant Asynchronous Clock Function / Ezra N. Hoch ; Michael Ben-Or ; Danny Dolev
Self-stabilizing Leader Election in Dynamic Networks / Ajoy K. Datta ; Lawrence L. Larmore ; Hema Piniganti
Loop-Free Super-Stabilizing Spanning Tree Construction / Lélia Blin ; Maria Gradinariu Potop-Butucaru ; Stephane Rovedakis ; Sébastien Tixeuil
A New Technique for Proving Self-stabilizing under the Distributed Scheduler / Sven Köhler ; Volker Turau
Tranformational Approach for Designing Scheduler-Oblivious Self-stabilizing Algorithms / Abhishek Dhama ; Oliver Theel
On Byzantine Containment Properties of the min+1 Protocol / Swan Dubois ; Toshimitsu Masuzawa
Efficient Self-stabilizing Graph Searching in Tree Networks / Jean Blair ; Fredrik Manne ; Rodica Mihai
Adaptive Containment of Time-Bounded Byzantine Faults / Yukiko Yamauchi ; Doina Bein
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
Self-stabilizing Algorithm of Two-Hop Conflict Resolution / Stéphane Pomportes ; Joanna Tomasik ; Anthony Busson ; Véronique Vèque
Low Memory Distributed Protocols for 2-Coloring / Amos Israeli ; Mathew D. McCubbins ; Ramamohan Paturi ; Andrea Vattani
Connectivity-Preserving Scattering of Mobile Robots with Limited Visibility / Taisuke Izumi
Computing in Social Networks / Andrei Giurgiu ; Rachid Guerraoui ; Kévin Huguenin ; Anne-Marie Kermarrec
On Transactional Scheduling in Distributed Transactional Memory Systems / Junwhan Kim ; Binoy Ravindran
Recursion in Distributed Computing / Eli Gafni ; Sergio Rajsbaum
On Adaptive Renaming under Eventually Limited Contention / Damien Imbs ; Michel Raynal
RobuSTM: A Robust Software Transactional Memory / Jons-Tobias Wamhoff ; Torvald Riegel ; Christof Fetzer ; Pascal Felber
A Provably Starvation-Free Distributed Directory Protocol / Hagit Attiya ; Vincent Gramoli ; Alessia Milani
Lightweight Live Migration for High Availability Cluster Service / Bo Jiang ; Changsoo Kim
Approximation of ?-Timeliness / Carole Delporte-Gallet ; Stéphane Devismes ; Hugues Fauconnier
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
16.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
17.

電子ブック

EB
Yongwha Chung, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets / Wenpan Jing ; Haixia Xu ; Bao Li
Distributed Paillier Cryptosystem without Trusted Dealer / Takashi Nishide ; Kouichi Sakurai
Implementation
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains / Colin D. Walter
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs / Boufeldja Allailou ; Abdelaziz Marjane ; Abdellah Mokrane
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices / Erich Wenger ; Martin Feldhofer ; Nobert Felber
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling / Takehiko Amaki ; Masanori Hashimoto ; Yukio Mitsuyama ; Takao Onoye
Mobile Security/Secure Coding
Using Special Use Cases for Security in the Software Development Life Cycle / Jean-Marie Kabasele Tenday
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Atsuko Miyaji ; Kazumasa Omote
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6 / Jae-hoon Jang ; Don-Gu Yeo ; Dong-hee Lee ; Heung-Youl Youm
Hidden Credential Retrieval without Random Oracles / Mohammad Shahriar Rahman ; Masakazu Soshi
Attack
Combined Side-Channel Attacks / M. Abdelaziz Elaabid ; Olivier Meynard ; Sylvain Guilley ; Jean-Luc Danger
Correlation Power Analysis Based on Switching Glitch Model / Hongying Liu ; Guoyu Qian ; Satoshi Goto ; Yukiyasu Tsunoo
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity / Nico Döttling ; Dejan Lazich ; Jörn Müller-Quade ; Antonio Sobreira de Almeida
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks / Kehua Bao ; Zhenfeng Zhang
Full-Round Differential Attact on TWIS Block Clipher / Bozhan Su ; Wenling Wu ; Lei Zhang ; Yanjun Li
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations / Jean-François Gallais ; Ilya Kizhvatov ; Michael Tunstall
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis / Daisuke Nakatsu ; Yang Li ; Kazuo Sakiyama ; Kazuo Ohta
Biometrics
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram / Hansung Lee ; Yunsu Chung ; Jeongnyeo Kim ; Daihee Park
Fingerprint Liveness Detection Based on Multiple Image Quality Features / Changlong Jin ; Shengazhe Li ; Hakil Kim ; Ensoo Park
Robust Feature Extraction for Facial Image Quality Assessment / Thi Hai Binh Nguyen ; Van Huan Nguyen
Secure Protocol
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother / Rafael Dowsley ; Goichiro Hanaoka ; Hideki Imai ; Anderson C.A. Nascimento
Cross-Realm Password-Based Server Aided Key Exchange
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product / Jeroen van de Graaf ; Davidson Marques
Author Index
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
18.

電子ブック

EB
Xuejia Lai, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
19.

電子ブック

EB
CISC 2005, Dengguo Feng, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
20.

電子ブック

EB
Jonathan Katz, David Hutchison, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
21.

電子ブック

EB
Sehun Kim, Takeo Kanade, Hyung-Woo Lee, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
22.

電子ブック

EB
Jae Kwang Lee, Takeo Kanade, Okyeon Yi, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
Identity-Based Key Issuing Without Secure Channel in a Broad Area / Saeran Kwon ; Sang-Ho Lee
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution / Ki Hun Lee ; Yuna Kim ; Sung Je Hong ; Jong Kim
Cyber Indication/Intrusion Detection
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks / Jianqing Ma ; Shiyong Zhang ; Yiping Zhong ; Xiaowen Tong
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment / Jae-Chul Park ; Bong-Nam Noh
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm / Seung-Hyun Paek ; Yoon-Keun Oh ; Do-Hoon Lee
Biometrics/Security Trust Management
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords / Daesung Moon ; Sungju Lee ; Seunghwan Jung ; Yongwha Chung ; Okyeon Yi ; Namil Lee ; Kiyoung Moon
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification / Byungkwan Park ; Jin-Won Park
Quality Assurance for Evidence Collection in Network Forensics / Bo-Chao Cheng ; Huan Chen
Secure Software/Systems
Visualization of Permission Checks in Java Using Static Analysis / Yoonkyung Kim ; Byeong-Mo Chang
Deployment of Virtual Machines in Lock-Keeper / Feng Cheng ; Christoph Meinel
Smart Cards/Secure Hardware
Investigations of Power Analysis Attacks and Countermeasures for ARIA / HyungSo Yoo ; Christoph Herbst ; Stefan Mangard ; Elisabeth Oswald ; SangJae Moon
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols / Mun-Kyu Lee ; Jung Ki Min ; Seok Hun Kang ; Sang-Hwa Chung ; Howon Kim ; Dong Kyue Kim
A Novel Key Agreement Scheme in a Multiple Server Environment / Chin-Chen Chang ; Chia-Chi Wu
Mobile Security
Cost-Effective IDS Operating Scheme in MANETs / Youngok Jeong ; Younggoo Han ; Hyunwoo Kim ; Woochul Shim ; Jaehong Kim ; Sehun Kim
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 / Hyun-Sun Kang ; Chang-Seop Park
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones / Michiru Tanaka ; Yoshimi Teshigawara
DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
Distributed Management of OMA DRM Domains / Harikrishna Vasanta ; Reihaneh Safavi-Naini ; Nicholas Paul Sheppard ; Jan Martin Surminen
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting / Hideki Yagi ; Toshiyasu Matsushima ; Shigeichi Hirasawa
A Key Management Based on Multiple Regression in Hierarchical Sensor Network / Mihui Kim ; Inshil Doh ; Kijoon Chae
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks / Jabeom Gu ; Jaehoon Nah ; Cheoljoo Chae ; Jaekwang Lee ; Jongsoo Jang
Privacy/Anonymity
Privacy Protection in PKIs: A Separation-of-Authority Approach / Taekyoung Kwon ; Jung Hee Cheon ; Yongdae Kim ; Jae-Il Lee
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise / Dong Hoon Lee
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature / Takayuki Tobita ; Hironori Yamamoto ; Hiroshi Doi ; Keigo Majima
Secret Handshake with Multiple Groups / Naoyuki Yamashita ; Keisuke Tanaka
Internet and Wireless Security
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs / Chanil Park ; Junbeom Hur ; Chanoe Kim ; Young-joo Shin ; Hyunsoo Yoon
EAP Using the Split Password-Based Authenticated Key Agreement / Jongho Ryu
How Many Malicious Scanners Are in the Internet? / Hiroaki Kikuchi ; Masato Terada
E-Passport: The Global Traceability Or How to Feel Like a UPS Package / Dario Carluccio ; Kerstin Lemke-Rust ; Christof Paar ; Ahmad-Reza Sadeghi
Author Index
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
23.

電子ブック

EB
ACNS 2005, John Ioannidis, Takeo Kanade, Angelos Keromytis, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
24.

電子ブック

EB
FC 2005, Takeo Kanade, Andrew S. Patrick, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
25.

電子ブック

EB
Languages, and Programming International Colloquium on Automata, Lu?s Caires, Takeo Kanade, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
26.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
27.

電子ブック

EB
Reihaneh Safavi-Naini, Takeo Kanade, Reihanah Safavi-Naini, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
28.

電子ブック

EB
FC 2005, Takeo Kanade, Andrew S. Patrick, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
29.

電子ブック

EB
ACNS 2005, John Ioannidis, Takeo Kanade, Angelos Keromytis, Moti Yung, Angelos D. Keromytis
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
30.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
31.

電子ブック

EB
Steven M. Bellovin, Rosario Gennaro, Takeo Kanade, Angelos Keromytis, Moti Yung, Angelos D. Keromytis
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
32.

電子ブック

EB
Jonathan Katz, David Hutchison, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
33.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
34.

電子ブック

EB
Languages, and Programming International Colloquium on Automata, Luís Caires, Takeo Kanade, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
35.

電子ブック

EB
David Hutchison, Takeo Kanade, Fabio Martinelli, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
36.

電子ブック

EB
Liqun Chen, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
37.

電子ブック

EB
David Hutchison, Takeo Kanade, Moti Yung, Liehuang Zhu
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Trusted Services
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang
Enforcing Sticky Policies with TPM and Virtualization / Gina Kounga ; Liqun Chen
Mobile Trusted Systems
Mass Transit Ticketing with NFC Mobile Phones / Jan-Erik Ekberg ; Sandeep Tamrakar
Anonymous Ticketing for NFC-Enabled Mobile Phones / David Derler ; Klaus Potzmader ; Kurt Dietrich
Security Analysis
Some Improvements to the Cost-Based Framework for Analyzing Denial of Service Attacks / Qinggang Yue ; Feng Liu ; Rui Xue
Fault Detection of the MacGuffin Cipher against Differential Fault Attack / Wei Li ; Dawu Gu ; Zhiqiang Liu ; Ya Liu ; Xiaohu Huang
Computationally Sound Symbolic Analysis of EAP-TNC Protocol / Zijian Zhang ; Liehuang Zhu ; Feng Wang ; Lejian Liao ; Gong Guo ; Hongyuan Wang
A Technique for Remote Detection of Certain Virtual Machine Monitors / Christopher Jämthagen ; Martin Hell ; Ben Smeets
Cryptographic Aspects
Indifferentiability of Domain Extension Modes for Hash Functions / Yiyuam Luo ; Xuejia Lai ; Zheng Gong
Multicollisions and Graph-Based Hash Functions / Kimmo Halunen
A General, Flexible and Efficient Proof of Inclusion and Exclusion / Kun Peng
MQQ-SIG: An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme / Danilo Gligoroski ; Rune Steinsmo ; Ødegard ; Rune Erlend Jensen ; Ludovic Perret ; Jean-Charles Faugère ; Svein Johan Knapskog ; Smile Markovski
Multifactor Authenticated Key Renewal / Shin'ichiro Matsuo ; Daisuke Moriyama ; Moti Yung
Restricted Identification Scheme and Diffie-Hellman Linking Problem / Miroslaw Kutylowski ; Lukasz Krzywiecki ; Przemyslaw Kubiak ; Michal Koza
Trusted Networks
Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks / Dong Hao ; Avishek Adhikari ; Kouichi Sakurai
Hash Chains at the Basis of a Secure Reactive Routing Protocol / Thouraya Bouabana-Tebibel
Implementation
Evaluation of a PUF Device Authentication Scheme on a Discrete 0.13um SRAM / Patrick Koeberl ; Jiangtao Li ; Roel Maes ; Anand Rajan ; Claire Vishik ; Marcin Wójcik
A Performance Analysis of Identity-Based Encryption Schemes / Pengqi Cheng ; Yan Gu ; Zihong Lu ; Jianfei Wang ; Wenlei Zhu ; Zhen Chen ; Jiwei Huang
Direct Anonymous Attestation
A (Corrected) DAA Scheme Using Batch Proof and Verification / Ernie Brickell
DAA Protocol Analysis and Verification / Yu Qin ; Xiaobo Chu ; Dengguo Feng ; Wei Feng
Author Index
Trusted Services
A Flexible Software Development and Emulation Framework for ARM TrustZone / Johannes Winter ; Paul Wiegele ; Martin Pirker ; Ronald Tögl
Building General Purpose Security Services on Trusted Computing / Chunhua Chen ; Chris J. Mitchell ; Shaohua Tang
38.

電子ブック

EB
Roberto Prisco, Roberto De Prisco, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
目次情報: 続きを見る
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
Signature Schemes Variants
Relations Among Security Notions for Undeniable Signature Schemes / Kaoru Kurosawa ; Swee-Huay Heng
Concurrent Blind Signatures Without Random Oracles / Aggelos Kiayias ; Hong-Sheng Zhou
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions / Fabien Laguillaumie ; Benoit Libert ; Jean-Jacques Quisquater
Block Ciphers Analysis
Understanding Two-Round Differentials in AES / Joan Daemen ; Vincent Rijmen
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b / Jiqiang Lu ; Changhoon Lee ; Jongsung Kim
Anonymity and E-Commerce
Constant-Size Dynamic k-TAA / Man Ho Au ; Willy Susilo ; Yi Mu
On Secure Orders in the Presence of Faults / Amir Herzberg ; Igal Yoffe
Balancing Accountability and Privacy Using E-Cash / Jan Camenisch ; Susan Hohenberger ; Anna Lysyanskaya
Public Key Encryption and Key Exchange
About the Security of MTI/CO and MQV / Sebastien Kunz-Jacques ; David Pointcheval
Chosen-Ciphertext Secure Threshold Identity-Based Key Encapsulation Without Random Oracles / David Galindo ; Eike Kiltz
A New Key Exchange Protocol Based on MQV Assuming Public Computations
Secret Sharing
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants / Jaume Marti-Farre ; Carles Padro
Cheating Immune (2, n)-Threshold Visual Secret Sharing / Roberto Be Prisco ; Alfredo De Santis
Rational Secret Sharing, Revisited / S. Dov Gordon ; Jonathan Katz
Symmetric Key Cryptanalysis and Randomness
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 / Alex Biryukov ; Bart Preneel ; Seokhie Hong
Distinguishing Stream Ciphers with Convolutional Filters / Gilles Van Assche
On Statistical Testing of Random Numbers Generators / Fida El Haje ; Yuri Golubev ; Pierre-Yvan Liardet ; Yannick Teglia
Applied Authentication
Lightweight Email Signatures / Ben Adida ; David Chau ; Ronald L. Rivest
Shoehorning Security into the EPC Tag Standard / Daniel V. Bailey ; Art Juels
Proof-Carrying Proxy Certificates / Walid Bagga ; Stefano Crosta ; Refik Molva
Public Key Related Cryptanalysis
Cryptanalysis of Rainbow / Olivier Billet ; Henri Gilbert
An Improved LPN Algorithm / Eric Levieil ; Pierre-Alain Fouque
Invited Talk
Theory and Practice of Multiparty Computation / Ivan Damgard
Author Index
Distributed Systems Security: Foundations
Edge Eavesdropping Games / Amos Beimel ; Matthew Franklin
Universally Composable Simultaneous Broadcast / Alejandro Hevia
39.

電子ブック

EB
Shlomi Dolev, Jorge Cobb, Michael Fischer, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
A Geometry of Networks / Yechiam Yemini
Contributed Papers
Systematic Correct Construction of Self-stabilizing Systems: A Case Study / Ananda Basu ; Borzoo Bonakdarpour ; Marius Bozga ; Joseph Sifakis
A Fault-Resistant Asynchronous Clock Function / Ezra N. Hoch ; Michael Ben-Or ; Danny Dolev
Self-stabilizing Leader Election in Dynamic Networks / Ajoy K. Datta ; Lawrence L. Larmore ; Hema Piniganti
Loop-Free Super-Stabilizing Spanning Tree Construction / Lélia Blin ; Maria Gradinariu Potop-Butucaru ; Stephane Rovedakis ; Sébastien Tixeuil
A New Technique for Proving Self-stabilizing under the Distributed Scheduler / Sven Köhler ; Volker Turau
Tranformational Approach for Designing Scheduler-Oblivious Self-stabilizing Algorithms / Abhishek Dhama ; Oliver Theel
On Byzantine Containment Properties of the min+1 Protocol / Swan Dubois ; Toshimitsu Masuzawa
Efficient Self-stabilizing Graph Searching in Tree Networks / Jean Blair ; Fredrik Manne ; Rodica Mihai
Adaptive Containment of Time-Bounded Byzantine Faults / Yukiko Yamauchi ; Doina Bein
Brief Announcement: Fast Convergence in Route-Preservation / Jorge A. Cobb
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure / S. Dov Gordon ; Jonathan Katz ; Ranjit Kumaresan ; Arkady Yerukhimovich
On Applicability of Random Graphs for Modeling Random Key Predistribution for Wireless Sensor Networks / Tuan Manh Vu ; Reihaneh Safavi-Naini ; Carey Williamson
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses / Mahesh Arumugam ; Murat Demirbas ; Sandeep S. Kulkarni
Modeling and Analyzing Periodic Distributed Computations / Anurag Agarwal ; Vijay K. Garg ; Vinit Ogale
Complexity Issues in Automated Model Revision without Explicit Legitimate State / Fuad Abujarad
Algorithmic Verification of Population Protocols / Ioannis Chatzigiannakis ; Othon Michail ; Paul G. Spirakis
Energy Management for Time-Critical Energy Harvesting Wireless Sensor Networks / Bo Zhang ; Robert Simon ; Hakan Aydin
Stably Decidable Graph Languages by Mediated Population Protocols
Broadcasting in Sensor Networks of Unknown Topology in the Presence of Swamping / Evangelos Kranakis ; Michel Paquette
Brief Announcement: Configuration of Actuated Camera Networks for Multi-target Coverage / Matthew P. Johnson ; Amotz Bar-Noy ; Mani Srivastava
Brief Announcement: On the Hardness of Topology Inference / H.B. Acharya ; Mohamed Gouda
Self-stabilizing Algorithm of Two-Hop Conflict Resolution / Stéphane Pomportes ; Joanna Tomasik ; Anthony Busson ; Véronique Vèque
Low Memory Distributed Protocols for 2-Coloring / Amos Israeli ; Mathew D. McCubbins ; Ramamohan Paturi ; Andrea Vattani
Connectivity-Preserving Scattering of Mobile Robots with Limited Visibility / Taisuke Izumi
Computing in Social Networks / Andrei Giurgiu ; Rachid Guerraoui ; Kévin Huguenin ; Anne-Marie Kermarrec
On Transactional Scheduling in Distributed Transactional Memory Systems / Junwhan Kim ; Binoy Ravindran
Recursion in Distributed Computing / Eli Gafni ; Sergio Rajsbaum
On Adaptive Renaming under Eventually Limited Contention / Damien Imbs ; Michel Raynal
RobuSTM: A Robust Software Transactional Memory / Jons-Tobias Wamhoff ; Torvald Riegel ; Christof Fetzer ; Pascal Felber
A Provably Starvation-Free Distributed Directory Protocol / Hagit Attiya ; Vincent Gramoli ; Alessia Milani
Lightweight Live Migration for High Availability Cluster Service / Bo Jiang ; Changsoo Kim
Approximation of ?-Timeliness / Carole Delporte-Gallet ; Stéphane Devismes ; Hugues Fauconnier
A Framework for Adaptive Optimization of Remote Synchronous CSCW in the Cloud Computing Era / Ji Lu ; Yaoxue Zhang ; Yuezhi Zhou
Chameleon-MAC: Adaptive and Self-* Algorithms for Media Access Control in Mobile Ad Hoc Networks / Pierre Leone ; Marina Papatriantafilou ; Elad M. Schiller ; Gongxi Zhu
A Comparative Study of Rateless Codes for P2P Persistent Storage / Heverson B. Ribeiro ; Emmanuelle Anceaume
Dynamically Reconfigurable Filtering Architectures / Mathieu Valero ; Luciana Arantes ; Pierre Sens
A Quantitative Analysis of Redundancy Schemes for Peer-to-Peer Storage Systems / Yaser Houri ; Bernhard Amann ; Thomas Fuhrmann
A Framework for Secure and Private P2P Publish/Subscribe / Samuel Bernard
Snap-Stabilizing Linear Message Forwarding / Alain Cournier ; Anissa Lamani ; Franck Petit ; Vincent Villain
Vulnerability Analysis of High Dimensional Complex Systems / Vedant Misra ; Dion Harmon ; Yaneer Bar-Yam
Storage Capacity of Labeled Graphs / Dana Angluin ; James Aspnes ; Rida A. Bazzi ; Jiang Chen ; David Eisenstat ; Goran Konjevod
Safe Flocking in Spite of Actuator Faults / Taylor Johnson ; Sayan Mitra
Author Index
Invited Talks Abstracts
Arcane Information, Solving Relations, and Church Censorship / Leonid A. Levin
Computation of Equilibria and Stable Solutions / Mihalis Yannakakis
40.

電子ブック

EB
Pierangela Samarati, Claudio A. Ardagna, Takeo Kanade, Fabio Martinelli, Moti Yung, Claudio Agostino Ardagna
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
41.

電子ブック

EB
WISA 2004, Takeo Kanade, Chae Hoon Lim, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Encrypted Watermarks and Linux Laptop Security / Markku-Juhani O. Saarinen
Inconsistency Detection of Authorization Policies in Distributed Component Environment / Chang-Joo Moon ; Hoh Peter In
Public Key Schemes I
Custodian-Hiding Verifiable Encryption / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong
Proving Key Usage / Malek Bechlaghem ; Vincent Rijmen
Public Key Encryption with Conjunctive Field Keyword Search / Dong Jin Park ; Kihyun Kim ; Pil Joong Lee
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior / Kohei Tatara ; Toshihiro Tabata ; Kouichi Sakurai
Service Discrimination and Audit File Reduction for Effective Intrusion Detection / Fernando Godínez ; Dieter Hutter ; Raúl Monroy
IDS False Alarm Filtering Using KNN Classifier / Kwok Ho Law ; Lam For Kwok
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking / Hae-Yeoun Lee ; Jong-Tae Kim ; Heung-Kyu Lee ; Young-Ho Suh
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment / Manabu Iwanaga
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups / Kui Ren ; Hyunrok Lee ; Kwangjo Kim ; Taewhan Yoo
A Ring Signature Scheme Using Bilinear Pairings / Jing Xu ; Zhenfeng Zhang ; Dengguo Feng
Verifiable Pairing and Its Applications / Sherman S.M. Chow
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading / Bart Haagdorens ; Tim Vermeiren ; Marnix Goossens
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks / Seok Bong Jeong ; Young Woo Choi ; Sehun Kim
Application of Content Computing in Honeyfarm / Yi-Yuan Huang ; Kwok-Yan Lam ; Siu-Leung Chung ; Chi-Hung Chi ; Jia-Guang Sun
Digital Rights Management
License Protection with a Tamper-Resistant Token / Cheun Ngen Chong ; Bin Ren ; Jeroen Doumen ; Sandro Etalle ; Pieter H. Hartel ; Ricardo Corin
An Adaptive Approach to Hardware Alteration for Digital Rights Management / Yinyan Yu ; Zhi Tang
Dynamic Fingerprinting over Broadcast Using Revocation Scheme / Mira Kim ; Kazukuni Kobara ; Hideki Imai
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels / Chong Hee Kim ; Yong Ho Hwang
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002 / Sang Cheol Hwang ; Dong Hoon Lee ; Daewan Han ; Jae-Cheol Ryou
Fair Offline Payment Using Verifiable Encryption / Sangjin Kim ; Heekuck Oh
A Limited-Use Key Generation Scheme for Internet Transactions / Supakorn Kungpisdan ; Phu Dung Le ; Bala Srinivasan
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes / Kishan Chand Gupta ; Palash Sarkar
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II / Soonhak Kwon
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors / Masanobu Katagi ; Izuru Kitamura ; Toru Akishita ; Tsuyoshi Takagi
Hyperelliptic Curve Coprocessors on a FPGA / HoWon Kim ; Thomas Wollinger ; YongJe Choi ; KyoIl Chung ; Christof Paar
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID / Kenji Imamoto
A New k-Anonymous Message Transmission Protocol / Gang Yao
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack / Marcin Gomulkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
Side-Channel Attacks
Side Channel Cryptanalysis on SEED / HyungSo Yoo ; ChangKyun Kim ; JaeCheol Ha ; SangJae Moon ; IlHwan Park
Secure and Efficient AES Software Implementation for Smart Cards / Elena Trichina ; Lesya Korkishko
Practical Template Attacks / Christian Rechberger ; Elisabeth Oswald
Evaluation and Improvement of the Tempest Fonts / Hidema Tanaka ; Osamu Takizawa ; Akihiro Yamamura
Author Index
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
42.

電子ブック

EB
Joo-Seok Song, Takeo Kanade, Taekyoung Kwon, JooSeok Song, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
43.

電子ブック

EB
Jae Kwang Lee, Takeo Kanade, Okyeon Yi, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
Identity-Based Key Issuing Without Secure Channel in a Broad Area / Saeran Kwon ; Sang-Ho Lee
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution / Ki Hun Lee ; Yuna Kim ; Sung Je Hong ; Jong Kim
Cyber Indication/Intrusion Detection
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks / Jianqing Ma ; Shiyong Zhang ; Yiping Zhong ; Xiaowen Tong
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment / Jae-Chul Park ; Bong-Nam Noh
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm / Seung-Hyun Paek ; Yoon-Keun Oh ; Do-Hoon Lee
Biometrics/Security Trust Management
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords / Daesung Moon ; Sungju Lee ; Seunghwan Jung ; Yongwha Chung ; Okyeon Yi ; Namil Lee ; Kiyoung Moon
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification / Byungkwan Park ; Jin-Won Park
Quality Assurance for Evidence Collection in Network Forensics / Bo-Chao Cheng ; Huan Chen
Secure Software/Systems
Visualization of Permission Checks in Java Using Static Analysis / Yoonkyung Kim ; Byeong-Mo Chang
Deployment of Virtual Machines in Lock-Keeper / Feng Cheng ; Christoph Meinel
Smart Cards/Secure Hardware
Investigations of Power Analysis Attacks and Countermeasures for ARIA / HyungSo Yoo ; Christoph Herbst ; Stefan Mangard ; Elisabeth Oswald ; SangJae Moon
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols / Mun-Kyu Lee ; Jung Ki Min ; Seok Hun Kang ; Sang-Hwa Chung ; Howon Kim ; Dong Kyue Kim
A Novel Key Agreement Scheme in a Multiple Server Environment / Chin-Chen Chang ; Chia-Chi Wu
Mobile Security
Cost-Effective IDS Operating Scheme in MANETs / Youngok Jeong ; Younggoo Han ; Hyunwoo Kim ; Woochul Shim ; Jaehong Kim ; Sehun Kim
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 / Hyun-Sun Kang ; Chang-Seop Park
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones / Michiru Tanaka ; Yoshimi Teshigawara
DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
Distributed Management of OMA DRM Domains / Harikrishna Vasanta ; Reihaneh Safavi-Naini ; Nicholas Paul Sheppard ; Jan Martin Surminen
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting / Hideki Yagi ; Toshiyasu Matsushima ; Shigeichi Hirasawa
A Key Management Based on Multiple Regression in Hierarchical Sensor Network / Mihui Kim ; Inshil Doh ; Kijoon Chae
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks / Jabeom Gu ; Jaehoon Nah ; Cheoljoo Chae ; Jaekwang Lee ; Jongsoo Jang
Privacy/Anonymity
Privacy Protection in PKIs: A Separation-of-Authority Approach / Taekyoung Kwon ; Jung Hee Cheon ; Yongdae Kim ; Jae-Il Lee
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise / Dong Hoon Lee
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature / Takayuki Tobita ; Hironori Yamamoto ; Hiroshi Doi ; Keigo Majima
Secret Handshake with Multiple Groups / Naoyuki Yamashita ; Keisuke Tanaka
Internet and Wireless Security
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs / Chanil Park ; Junbeom Hur ; Chanoe Kim ; Young-joo Shin ; Hyunsoo Yoon
EAP Using the Split Password-Based Authenticated Key Agreement / Jongho Ryu
How Many Malicious Scanners Are in the Internet? / Hiroaki Kikuchi ; Masato Terada
E-Passport: The Global Traceability Or How to Feel Like a UPS Package / Dario Carluccio ; Kerstin Lemke-Rust ; Christof Paar ; Ahmad-Reza Sadeghi
Author Index
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
44.

電子ブック

EB
Sehun Kim, Takeo Kanade, Hyung-Woo Lee, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
45.

電子ブック

EB
Kyo-Il Chung, Takeo Kanade, Kiwook Sohn, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
46.

電子ブック

EB
Heung Youl Youm, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
Device Security
Application Management Framework in User Centric Smart Card Ownership Model / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes
When Compromised Readers Meet RFID / Gildas Avoine ; Cédric Lauradoux ; Tania Martin
HW Implementation Security
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? / Marcel Medwed ; Jörn-Marc Schmidt
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules / Takeshi Sugawara ; Yu-ichi Hayashi ; Naofumi Homma ; Takaaki Mizuki ; Takafumi Aoki ; Hideaki Sone ; Akashi Satoh
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment / Timo Kasper ; David Oswald ; Christof Paar
Applied Cryptography
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles / Pairat Thorncharoensri ; Willy Susilo ; Yi Mu
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity / Shaojing Fu ; Longjiang Qu ; Chao Li
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy / Kun Peng ; Feng Bao
ID-Based Adaptive Oblivious Transfer / Fangguo Zhang ; Xingwen Zhao ; Xiaofeng Chen
Side Channel Attacks
Unknown Plaintext Template Attacks / Neil Hanley ; Michael Tunstall ; William P. Marnane
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices / Thomas Plos ; Michael Hutter ; Martin Feldhofer
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation / J. Pan ; J.I den Hartog ; Jiqiang Lu
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption / Amir Moradi ; Nima Mousavi ; Mahmoud Salmasizadeh
Cryptograptanalysis
Finding Collisions for a 45-Step Simplified HAS-V / Nicky Mouha ; Christophe De Cannière ; Sebastiaan Indesteege ; Bart Preneel
Non-linear Error Detection for Finite State Machines / Kahraman D. Akdemir ; Ghaith Hammouri ; Berk Sunar
Quadratic Equations from a Kind of S-boxes / Jia Xie ; Weiwei Cao ; TianZe Wang
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure / Lei Hu
Anonymity / Authentication / Access Control
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET / Rasheed Hussain ; Sangjin Kim ; Heekuck Oh
A Selectable k-Times Relaxed Anonymous Authentication Scheme / Keita Emura ; Atsuko Miyaji ; Kazumasa Omote
PUF-Based Authentication Protocols - Revisited / Heike Busch ; Stefan Kaizenbeisser ; Paul Baecher
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application / Luan Ibraimi ; Milan Petkovic ; Svetla Nikova ; Pieter Hartel ; Willem Jonker
Network Security
Securing Remote Access Inside Wireless Mesh Networks / Mark Manulis
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers / Dae Hyun Yum ; Sun Young Kim ; HoKun Moon ; Mi-Yeon Kim ; Jae-Hoon Roh ; Pil Joong Lee
USN Middleware Security Model / Mijoo Kim ; Mi Yeon Yoon ; Heung Youl Youm
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs / Chae Hoon Lim
Author Index
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
47.

電子ブック

EB
Yongwha Chung, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets / Wenpan Jing ; Haixia Xu ; Bao Li
Distributed Paillier Cryptosystem without Trusted Dealer / Takashi Nishide ; Kouichi Sakurai
Implementation
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains / Colin D. Walter
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs / Boufeldja Allailou ; Abdelaziz Marjane ; Abdellah Mokrane
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices / Erich Wenger ; Martin Feldhofer ; Nobert Felber
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling / Takehiko Amaki ; Masanori Hashimoto ; Yukio Mitsuyama ; Takao Onoye
Mobile Security/Secure Coding
Using Special Use Cases for Security in the Software Development Life Cycle / Jean-Marie Kabasele Tenday
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks / Atsuko Miyaji ; Kazumasa Omote
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6 / Jae-hoon Jang ; Don-Gu Yeo ; Dong-hee Lee ; Heung-Youl Youm
Hidden Credential Retrieval without Random Oracles / Mohammad Shahriar Rahman ; Masakazu Soshi
Attack
Combined Side-Channel Attacks / M. Abdelaziz Elaabid ; Olivier Meynard ; Sylvain Guilley ; Jean-Luc Danger
Correlation Power Analysis Based on Switching Glitch Model / Hongying Liu ; Guoyu Qian ; Satoshi Goto ; Yukiyasu Tsunoo
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity / Nico Döttling ; Dejan Lazich ; Jörn Müller-Quade ; Antonio Sobreira de Almeida
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks / Kehua Bao ; Zhenfeng Zhang
Full-Round Differential Attact on TWIS Block Clipher / Bozhan Su ; Wenling Wu ; Lei Zhang ; Yanjun Li
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations / Jean-François Gallais ; Ilya Kizhvatov ; Michael Tunstall
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis / Daisuke Nakatsu ; Yang Li ; Kazuo Sakiyama ; Kazuo Ohta
Biometrics
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram / Hansung Lee ; Yunsu Chung ; Jeongnyeo Kim ; Daihee Park
Fingerprint Liveness Detection Based on Multiple Image Quality Features / Changlong Jin ; Shengazhe Li ; Hakil Kim ; Ensoo Park
Robust Feature Extraction for Facial Image Quality Assessment / Thi Hai Binh Nguyen ; Van Huan Nguyen
Secure Protocol
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother / Rafael Dowsley ; Goichiro Hanaoka ; Hideki Imai ; Anderson C.A. Nascimento
Cross-Realm Password-Based Server Aided Key Exchange
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product / Jeroen van de Graaf ; Davidson Marques
Author Index
Cryptosystem
Construction of Identify Based Signcryption Schemes / Sumit Kumar Pandey ; Rana Barua
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage / Atsushi Fujioka ; Koutarou Suzuki ; Kazuki Yoneyama
48.

電子ブック

EB
David Hutchison, Takeo Kanade, Josef Kittler, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
目次情報: 続きを見る
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward / Chiaki Ohtahara ; Keita Okada ; Yu Sasaki ; Takeshi Shimoyama
Known-Key Distinguisher on Round-Reduced 3D Block Cipher / Le Dong ; Shuang Wu ; Jian Zou
Identity-Based Signcryption from Identity-Based Cryptography / Woomyo Lee ; Jae Woo Seo ; Pil Joong Lee
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts / Dae Hyun Yum ; Duk Soo Kim ; Jin Seok Kim ; Sung Je Hong
Solving a DLP with Auxiliary Input with the ρ-Algorithm / Yumi Sakemi ; Tetsuya Izu ; Masahiko Takenaka ; Masaya Yasuda
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems / Yanbin Pan ; Yingpu Deng
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage / Tatsuyuki Matsushita ; Shinji Yamanaka ; Fangming Zhao
Rule Indexing for Efficient Intrusion Detection Systems / Boojoong Kang ; Hye Seon Kim ; Ji Su Yang ; Eul Gyu Im
Security Data Extraction from LEC 61850 ACSI Models for Network and System Management / Chung-Hyo Kim ; Moon-Seok Choi ; Seong-Ho Ju ; Yong-Hun Lim ; Jong-Mock Baek
Lightweight Middleware-Based ZigBee Security in Building Energy Management System / Insung Hong ; Jisung Byun ; Sehyun Park
A Map-Layer-Based Access Control Model / Yingjun Zhang ; Yang Zhang ; Kai Chen
Application Authentication for Hybrid Services of Broadcasting and Communications Networks / Go Ohtake ; Kazuto Ogawa
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols / Naoto Kiribuchi ; Ryo Kato ; Takashi Nishide ; Tsukasa Endo ; Hiroshi Yoshiura
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks / Kwantae Cho ; Dong Hoon Lee
Mutual Private Set Intersection with Linear Complexity / Myungsun Kim ; Hyung Tae Lee ; Jung Hee Cheon
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs / Chung Il Sun ; Tae Ho Cho
Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation / Jarno Salonen
Exploiting Routing Tree Construction in CTP / Islam Hegazy ; Reihaneh Safavi-Naini ; Carey Williamson
Author Index
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313 / Gautham Sekar ; Bart Preneel
Generalized Security Analysis of the Random Key Bits Leakage Attack / Jun Kogure ; Noboru Kunihiro ; Hirosuke Yamamoto
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher / Yanjun Li ; Wenling Wu ; Lei Zhang
49.

電子ブック

EB
CISC 2005, Dengguo Feng, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
50.

電子ブック

EB
Helger Lipmaa, Takeo Kanade, Dongdai Lin, Moti Yung, Donghai Lin
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2006
所蔵情報: loading…
51.

電子ブック

EB
Dingyi Pei, Takeo Kanade, Dongdai Lin, Chuankun Wu, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2008
所蔵情報: loading…
52.

電子ブック

EB
Moti Yung, Takeo Kanade, Dongdai Lin, Peng Liu
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
53.

電子ブック

EB
Feng Bao, Jiwu Jing, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
Differential-Multiple Linear Cryptanalysis / Zhiqiang Liu ; Dawu Gu ; Jing Zhang ; Wei Li
Differential Attack on Five Rounds of the SC2000 Block Cipher / Jiqiang Lu
Signature and Signcryption
Pairing-Based Nominative Signatures with Selective and Universal Convertibility / Wei Zhao ; Dingfeng Ye
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing / S. Sharmila Deva Selvi ; S. Sree Vivek ; C. Pandu Rangan
Sanitizable Signatures with Strong Transparency in the Standard Model / Shivank Agrawal ; Swarun Kumar ; Amjed Shareef
Breaking and Building of Threshold Signcryption Schemes / Shilpi Nayak
Key Exchange
Provably Secure Password-Authenticated Group Key Exchange with Different Passwords under Standard Assumption / Fengjiao Wang ; Yuqing Zhang
An Enhanced Password Authenticated Key Agreement Protocol for Wireless Mobile Network / Zhigang Gao ; Dengguo Feng
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework / Xuexian Hu ; Wenfen Liu
Private Computations
Efficient Generalized Selective Private Function Evaluation with Applications in Biometric Authentication / Helger Lipmaa ; Bingsheng Zhang
Optionally Identifiable Private Handshakes / Yanjiang Yang ; Jian Weng ; Jianying Zhou ; Ying Qiu
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience / Arpita Patra ; Ashish Choudhury
Cipher Design and Analysis
Gemstone: A New Stream Cipher Using Coupled Map Lattice / Ruming Yin ; Jian Yuan ; Qiuhua Yang ; Xiuming Shan ; Xiqin Wang
Proposition of Two Cipher Structures / Lei Zhang ; Wenling Wu ; Liting Zhang
Hardware Framework for the Rabbit Stream Cipher / Deian Stefan
Linearity within the SMS4 Block Cipher / Muhammad Reza Z'aba ; Leonie Simpson ; Ed Dawson ; Kenneth Wong
Algebraic Cryptanalysis of Curry and Flurry Using Correlated Messages / Jean-Charles Faugère ; Ludovic Perret
Public Key Cryptography
Weak Keys in RSA with Primes Sharing Least Significant Bits / Xianmeng Meng ; Jingguo Bi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption / Takeo Mizuno ; Hiroshi Doi
Constructing Better KEMs with Partial Message Recovery / Rui Zhang ; Hideki Imai
Network and System Security
A Novel Contagion-Like Patch Dissemination Mechanism against Peer-to-Peer File-Sharing Worms / Xiaofeng Nie ; Jiwu Jing ; Yuewu Wang
Remodeling Vulnerability Information / Feng Cheng ; Sebastian Roschke ; Robert Schuppenies ; Christoph Meinel
Using Strategy Objectives for Network Security Analysis / Elie Bursztein ; John C. Mitchell
Hardware Security
A DAA Scheme Requiring Less TPM Resources / Liqun Chen
Full-Custom VLSI Design of a Unified Multiplier for Elliptic Curve Cryptography on RFID Tags / Johann Gro?schädl
Weaknesses in Two Recent Lightweight RFID Authentication Protocols / Pedro Peris-Lopez ; Julio C. Hernandez-Castro ; Juan M.E. Tapiador ; Tieyan Li ; Jan C.A. van der Lubbe
Algebraic Side-Channel Attacks / Mathieu Renauld ; François-Xavier Standaert
Web Security
CAPTCHA Phishing: A Practical Attack on Human Interaction Proofing / Le Kang ; Ji Xiang
An Attack and Repair of Secure Web Transaction Protocol for Anonymous Mobile Agents / Saba Jalal ; Brian King
A Formal Language for Specifying Complex XML Authorisations with Temporal Constraints / Sean Policarpio ; Yan Zhang
Author Index
Cryptanalysis
Integral Cryptanalysis of ARIA / Ping Li ; Bing Sun ; Chao Li
Cryptanalysis of the ESSENCE Family of Hash Functions / Nicky Mouha ; Gautham Sekar ; Jean-Philippe Aumasson ; Thomas Peyrin ; Søren S. Thomsen ; Meltem Sönmez Turan ; Bart Preneel
54.

電子ブック

EB
Xuejia Lai, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
55.

電子ブック

EB
David Hutchison, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
56.

電子ブック

EB
Moti Yung, Yevgeniy Dodis, Takeo Kanade, Aggelos Kiayias, Tal Malkin
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼