close
1.

図書

図書
Stuart Anderson, Sandro Bologna, Massimo Felici (eds.)
出版情報: Berlin : Springer, c2002  xx, 346 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2434
所蔵情報: loading…
2.

図書

図書
Agnes Hui Chan, Virgil Gligor (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xii, 502 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2433
所蔵情報: loading…
目次情報: 続きを見る
Intrusion Detection and Tamper Resistance
Real-Time Intruder Tracing through Self-Replication / Heejin Jang ; Sangwook Kim
On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon
Intrusion Detection with Support Vector Machines and Generative Models / John S. Baras ; Maben Rabi
Cryptographic Algorithm and Attack Implementation
Small and High-Speed Hardware Architectures for the 3GPP StandardCipher KASUMI / Akashi Satoh ; Sumio Morioka
Fast Software Implementations of SC2000 / Helger Lipmaa
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512 / Tim Grembowski ; Roar Lien ; Kris Gaj ; Nghi Nguyen ; Peter Bellows ; Jaroslav Flidr ; Tom Lehman ; Brian Schott
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG / Kahil Jallad ; Jonathan Katz ; Bruce Schneier
Access Control and Trust Management (I)
Role-Based Access Control for E-commerce Sea-of-Data Applications / G. Navarro ; S. Robles ; J. Borrell
An Access Control Model for Tree Data Structures / Alban Gabillon ; Manuel Munier ; Jean-Jacques Bascou ; Laurent Gallon ; Emmanuel Bruno
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI / Ed Dawson ; Javier Lopez ; Jose A. Montenegro ; Eiji Okamoto
Authentication and Privacy
Password Authenticated Key Exchange Based on RSA for ImbalancedWireless Networks / Feng Zhu ; Duncan S. Wong ; Agnes H. Chan ; Robbie Ye
Quantifying Privacy Leakage through Answering Database Queries / Tsan-sheng Hsu ; Churn-Jung Liau ; Da-Wei Wang ; Jeremy K.-P. Chen
A New Offline Privacy Protecting E-cash System with Revokable Anonymity / Weidong Qiu ; Kefei Chen ; Dawu Gu
E-commerce Protocols (I)
Receipt-Free Sealed-Bid Auction / Masayuki Abe ; Koutarou Suzuki
Exclusion-Freeness in Multi-party Exchange Protocols / Nicolás González-Deleito ; Olivier Markowitch
A Realistic Protocol for Multi-party Certified Electronic Mail / Josep Lluís Ferrer-Gomila ; Magdalena Payeras-Capellà ; Llorenç Huguet-Rotger
Signature Schemes
A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification / Shunsuke Araki
Comments to the UNCITRAL Model Law on Electronic Signatures / Apol-lònia Martínez-Nadal
An Anonymous Loan System Based on Group Signature Scheme / Rie Shigetomi ; Akira Otsuka ; Takahide Ogawa ; Hideki Imai
Traceability Schemes for Signed Documents / Shoko Yonezawa ; Goichiro Hanaoka ; Junji Shikata
Cryptography (I)
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications / Emmanuel Bresson ; Jacques Stern
Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m) / Nam-Yeun Kim ; Dae-Ghon Kho ; Kee-Young Yoo
Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m) / Soonhak Kwon ; Heuisu Ryu
Access Control and Trust Management (II)
Conditional Cryptographic Delegation for P2P Data Sharing / Yuji Watanabe ; Masayuki Numao
Certification of Public Keys within an Identity Based System / L. Chen ; K. Harrison ; A. Moss ; D. Soldera ; N.P. Smart
A New Public Key Cryptosystem for Constrained Hardware / Jiande Zheng
Key Management
A Distributed and Computationally Secure Key Distribution Scheme / Vanesa Daza ; Javier Herranz ; Carles Padró ; Germán Sáez
On Optimal Hash Tree Traversal for Interval Time-Stamping
An Efficient Dynamic and Distributed Cryptographic Accumulator / Michael T. Goodrich ; Roberto Tamassia ; Jasminka Hasić
Security Analysis
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks / Katsuyuki Okeya ; Kouichi Sakurai
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks / Bodo Möller
Automated Analysis of Some Security Mechanisms of SCEP / Fabio Martinelli ; Marinella Petrocchi ; Anna Vaccarelli
An Attack on a Protocol for Certified Delivery / José R.M. Monteiro ; Ricardo Dahab
E-commerce Protocols (II)
Oblivious Counter and Majority Protocol / Hiroaki Kikuchi
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network / Wai Han Soo ; Azman Samsudin ; Alwyn Goh
Fingerprinting Concatenated Codes with Efficient Identification / M. Fernandez ; M. Soriano
Cryptography (II)
A Provably Secure Additive and Multiplicative Privacy Homomorphism / Josep Domingo-Ferrer
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars / Yasuyuki Sakai
Author Index
Intrusion Detection and Tamper Resistance
Real-Time Intruder Tracing through Self-Replication / Heejin Jang ; Sangwook Kim
On the Difficulty of Protecting Private Keys in Software / Taekyoung Kwon
3.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c2002  ix, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2467
所蔵情報: loading…
目次情報: 続きを見る
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion)
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello ; Steven M. Bellovin ; Matt Blaze ; Ran Canetti ; John Ioannidis ; Angelos D. Keromytis ; Omer Reingold
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion)
Thwarting Timing Attacks Using ATM Networks / Geraint Price
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion)
Towards a Survivable Security Architecture for Ad-Hoc Networks / Tuomas Aura ; Silja Mäki
Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion)
PIM Security / Dieter Gollmann
PIM Security (Transcript of Discussion)
Merkle Puzzles Revisited - Finding Matching Elements between Lists / Bruce Christianson ; David Wheeler
Merkle Puzzles Revisited (Transcript of Discussion)
Encapsulating Rules of Prudent Security Engineering (Position Paper) / Jan Jürjens
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)
A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura ; Kunihiko Miyazaki ; Shinji Itoh ; Kazuo Takaragi ; Ryoichi Sasaki
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion)
A Proof of Non-repudiation / Giampaolo Bella ; Lawrence C. Paulson
A Proof of Non-repudiation (Transcript of Discussion) / Larry Paulson
Using Authority Certificates to Create Management Structures / Babak Sadighi Firozabadi ; Marek Sergot ; Olav Bandmann
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion)
Trust Management and Whether to Delegate / Simon N. Foley
Trust Management and Whether to Delegate (Transcript of Discussion)
You Can't Take It with You (Transcript of Discussion) / Mark Lomas
Protocols Using Keys from Faulty Data
Protocols Using Keys from Faulty Data (Transcript of Discussion)
On the Negotiation of Access Control Policies / Virgil D. Gligor ; Himanshu Khurana ; Radostina K. Koleva ; Vijay G. Bharadwaj ; John S. Baras
Negotiation of Access Control Policies (Transcript of Discussion)
Intrusion-Tolerant Group Management in Enclaves (Transcript of Discussion) / Hassen Sa¿idi
Lightweight Authentication in a Mobile Network (Transcript of Discussion) / James Malcolm
Bluetooth Security - Fact or Fiction? (Transcript of Discussion) / Peter Drabwell
Concluding Discussion When Does Confidentiality Harm Security? / Chair: Bruce Christianson
The Last Word / Thucydides
Author Index
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
4.

図書

図書
Lynn Batten, Jennifer Seberry (eds.)
出版情報: Berlin : Springer, c2002  xii, 514 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2384
所蔵情報: loading…
5.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2002  viii, 331 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Information Flow I
Approximate Non-Interference / A. Di Pierro ; C. Hankin ; H. Wiklicky
Quantifying Information Flow / G. Lowe
Secrecy in Multiagent Systems / J. Halpern ; K. O'Neill
Intrusion
Two Formal Analyses of Attack Graphs / S. Jha ; O. Sheyner ; J. Wing
Formal Specification of Intrusion Signatures and Detection Rules / J.-P. Pouzol ; M. Ducasse
Protocols I
Types and Effects for Asymmetric Cryptographic Protocols / A. D. Gordon ; A. Jeffrey
Security Protocol Design via Authentication Tests / J. D. Guttman
Strand Spaces and Rank Functions: More Than Distant Cousins / J. Heather
Applications of Model-Checking
Probabilistic Analysis of Anonymity / V. Shmatikov
Analysis of SPKI/SDSI Certificates Using Model Checking / T. Reps
Protocols II
Capturing Parallel Attacks within the Data Independence Framework / P. J. Broadfoot ; A. W. Roscoe
Polynomial Fairness and Liveness / M. Backes ; B. Pfitzmann ; M. Steiner ; M. Waidner
A Formal Analysis of Some Properties of Kerberos 5 Using MSR / F. Butler ; I. Cervesato ; A. D. Jaggard ; A. Scedrov
Games
A Formal Analysis of Syverson's Rational Exchange Protocol / L. Buttyan ; J.-P. Hubaux ; S. Capkun
Game Analysis of Abuse-Free Contract Signing / S. Kremer ; J.-F. Raskin
Language-Based Security
Fine-Grained Information Flow Analysis for a [lambda]-Calculus with Sum Types / V. Simonet
Cryptographic Types / D. Duggan
Secure Information Flow and Pointer Confinement in a Java-Like Language / A. Banerjee ; D. A. Naumann
Distributed Rights, Access Control, and Watermarking
A Privacy Policy Model for Enterprises / G. Karjoth ; M. Schunter
A Logic for Reasoning about Digital Rights / R. Pucella ; V. Weissman
Hiding Functions and Computational Security of Image Watermarking Systems / N. Tran
Information Flow II
Information Flow Security in Dynamic Contexts / R. Focardi ; S. Rossi
A Simple View of Type-Secure Information Flow in the [pi]-Calculus / F. Pottier
Author Index
Preface
Workshop Committee
Information Flow I
6.

図書

図書
Moti Yung (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 626 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2442
所蔵情報: loading…
7.

図書

図書
George I. Davida, Yair Frankel (eds.)
出版情報: Berlin : Springer, c2001  xiii, 554 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2200
所蔵情報: loading…
8.

図書

図書
Udo Voges (ed.)
出版情報: Berlin : Springer, c2001  xvi, 248 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2187
所蔵情報: loading…
目次情報: 続きを見る
Invited Paper
Designing Safety into Medical Decisions and Clinical Processes / John Fox
Reliability Assessment and Security
Security Assessments of Safety Critical Systems Using HAZOPs / Rune Winther ; Ole-Arnt Johnsen ; Bjørn Axel Gran
Network Security for Substation Automation Systems / Martin Naedele ; Dacfey Dzung ; Michael Stanimirov
A Bayesian Belief Network for Reliability Assessment / Atte Helminen
Safety Case and Safety Analysis
Checking General Safety Criteria on UML Statecharts / Zsigmond Pap ; István Majzik ; András Pataricza
Presenting a Safety Case - A Case Study / Odd Nordland
Safety Functions versus Control Functions / Hans R. Fankhauser
Medical Systems
A Fail-Safe Dual Channel Robot Control for Surgery Applications / Ulrich Laible ; Thomas Bürger ; Günter Pritschow
Modelling the Human in Human Factors / John Rushby
HHuman-Machine Interfac
Analyzing Human-Machine Interactions in Safety-Critical Systems: A Basic Applicable Approach / Oliver Mäckel ; Georg Hoever
Analysis of Incidents Involving Interactive Systems / Alberto Pasquini ; Antonio Rizzo ; Luca Save
COTS - Components off the Shelf
Experimental Evaluation of Fault Handling Mechanisms / Piotr Gawkowski ; Janusz Sosnowski
The COTS Debate in Perspective / Felix Redmill
Testing
An Investigation on Mutation Strategies for Fault Injection into RDD-100 Models / Mohamed Kaâniche ; Yannick Le Guédart ; Jean Arlat ; Thierry Boyer
A Comparison Study of the Behavior of Equivalent Algorithms in Fault Injection Experiments in Parallel Superscalar Architectures / Ioannis Vakalis
The Effectiveness of Statistical Testing when Applied to Logic Systems / Silke Kuball ; Gordon Hughes ; John H.R. May ; Julio Gallardo ; Andrew D. John ; Roy B. Carter
Formal Methods
A Classification Scheme for Software Verification Tools with Regard to RTCA/DO-178B / Gunther Zoffmann ; Manfred Gingerl ; Christian Reumann ; Gerald Sonneck
Safety Patterns - The Key to Formal Specification of Safety Requirements.. / Friedemann Bitsch
Formal Support for Fault Modeling and Analysis / Tadeusz Cichocki ; Janusz Górski
Project Experience with IEC 61508 and Its Consequences / Rainer Faller
Control Systems
About the Design of Distributed Control Systems: The Quasi-Synchronous Approach / Paul Caspi ; Christine Mazuet ; Natacha Reynaud Paligot
Dependability Evaluation - From Functional to Structural Modeling / Cláudia Betous-Almeida ; Karama Kanoun
Tuning of Database Audits to Improve Scheduled Maintenance in Communication Systems / Stefano Porcarelli ; Felicita Di Giandomenico ; Amine Chohra ; Andrea Bondavalli
Author Index
Invited Paper
Designing Safety into Medical Decisions and Clinical Processes / John Fox
Reliability Assessment and Security
9.

図書

図書
Wenke Lee, Ludovic Mé, Andreas Wespi (eds.)
出版情報: Berlin : Springer, c2001  x, 203 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2212
所蔵情報: loading…
目次情報: 続きを見る
Modeling Attacks
From Declarative Signatures to Misuse IDS / Jean-Philippe Pouzol ; Mireille Ducassé
Logging and IDS Integration
Application-Integrated Data Collection for Security Monitoring / Magnus Almgren ; Ulf Lindqvist
Interfacing Trusted Applications with Intrusion Detection Systems / Marc Welz ; Andrew Hutchison
IDS Cooperation
Probabilistic Alert Correlation / Alfonso Valdes ; Keith Skinner
Designing a Web of Highly-Configurable Intrusion Detection Sensors / Giovanni Vigna ; Richard A. Kemmerer ; Per Blix
Aggregation and Correlation of Intrusion-Detection Alerts / Hervé Debar ; Andreas Wespi
Anomaly Detection
Accurately Detecting Source Code of Attacks That Increase Privilege / Robert K. Cunningham ; Craig S. Stevenson
CDIS: Towards a Computer Immune System for Detecting Network Intrusions / Paul D. Williams ; Kevin P. Anchor ; John L. Bebo ; Gregg H. Gunsch ; Gary D. Lamont
Intrusion Tolerance
Autonomic Response to Distributed Denial of Service Attacks / Dan Sterne ; Kelly Djahandari ; Brett Wilson ; Bill Babson ; Dan Schnackenberg ; Harley Holliday ; Travis Reid
Legal Aspects
The Impact of Privacy and Data Protection Legislation on the Sharing of Intrusion Detection Information / Steven R. Johnston
Specification-Based IDS
Experiences with Specification-Based Intrusion Detection / Prem Uppuluri ; R. Sekar
System Health and Intrusion Monitoring Using a Hierarchy of Constraints / Calvin Ko ; Paul Brutch ; Jeff Rowe ; Guy Tsafnat ; Karl Levitt
Author Index
Modeling Attacks
From Declarative Signatures to Misuse IDS / Jean-Philippe Pouzol ; Mireille Ducassé
Logging and IDS Integration
10.

図書

図書
Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
出版情報: Berlin : Springer, c2001  xiv, 504 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2229
所蔵情報: loading…
目次情報: 続きを見る
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
Unconditionally-Secure Oblivious Transfer / Bo Yan ; Shixiong Zhu ; Yumin Wang
Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang ; Iuon-Chang Lin
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Kuo-Feng Hwang
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo ; Lincheng Shen ; Wensen Chang
A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki ; Fumitaka Hoshino ; Tetsutaro Kobayashi
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang ; Futai Zhang
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye ; Junhui Yang ; Zongduo Dai ; Haiwen Ou
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura
A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim ; Hae-Kyung Rhee ; Tai M. Chung ; Young Ik Eom ; Ung-Mo Kim
Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho ; Zbigniew Ciechanowicz
RBAC for XML Document Stores / Michael Hitchens ; Vijay Varadharajan
Cheating Immune Secret Sharing / Xian-Mo Zhang ; JosefPieprzyk
Encryption Sticks (Randomats) / Gideon Samid
Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song ; Sihan Qing
Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono ; Ingo Liebhardt
Enforcing Obligation with Security Monitors / Carlos Ribeiro ; Andre Zuquete ; Paulo Ferreira
Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning ; Yiqun Lisa Yin
Playing Lottery on the Internet / Jianying Zhou ; Chunfu Tan
Privacy Protection for Transactions of Digital Goods / Feng Bao ; Robert Deng
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lua Xu ; Han-liang Xu ; Yan Wang ; Shu-Wang Lu
Threshold Undeniable RSA Signature Scheme / Guilin Wang ; Mingsheng Wang ; Zhanfei Zhou
Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang ; Cheng-Chi Lee ; Yuan-Liang Tang
Square Attack on Reduced Camellia Cipher / Yeping He
Generalization of Elliptic Curve Digital Signature Schemes / Lin You ; Yi Xian Yang ; Chun Qi Zhang
Reasoning about Accountability within Delegation / Bruno Crispo ; Giancarlo Ruffo
A Novel Data Hiding Method for Two-Color Images / Gang Pan ; Yijun Wu ; Zhaohui Wu
An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee ; X. Deng ; H. Zhu
Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu ; Yoshiaki Takata ; Hiroyuki Seki ; Katsuro Inoue
Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang ; Harald Lukhaub ; Werner Zorn
A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp ; Chaiwat Rujimethabhas
Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen ; Adam Bargteil ; David Bindel ; Randy H. Katz ; John Kubiatowicz
A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto ; Colin Boyd ; Ed Dawson
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong ; Chul Kim
NIDS Research Based on Artificial Immunology / Wenjian Luo ; Xianbin Cao ; Xufa Wang
AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Cánovas ; Antonio F. Gómez
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou ; Byrav Ramamurthy ; Spyros S. Magliveras
Dispatching Mobile Agents with Secure Routes in Parallel / Kian-Lee Tan
TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen ; Qian Fang ; Zhihui Du ; Zhenchun Huang ; Sanli Li
Cryptography and Middleware Security / Ulrich Lang ; Dieter Gollmann ; Rudolf Schreiner
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng ; Chung-Huang Yang ; T.R.N. Rao
A Role-Based Model for Access Control in Database Federations / Eric Disson ; Danielle Boulanger ; Gilles Dubois
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li ; Lianli Chang ; Xinmei Wang
A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park ; Im-Yeong Lee
Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi ; Tae Ho Cho
Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland
Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu
SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park ; Jang-Se Lee ; Hwan Kuk Kim ; Jeong-Rye Jeong ; Dong-Bok Yeom ; Sung-Do Chi
A New Semantics of Authentication Logic / Yifa Li
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park ; Sook Ee Jeong ; Chang Soo Kim
Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Author Index
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼