close
1.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Sushil Jajodia, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
2.

電子ブック

EB
ISPEC 2005, Robert Deng, Takeo Kanade, Robert H. Deng, HweeHwa Pang, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
3.

電子ブック

EB
Kefei Chen, Robert Deng, Takeo Kanade, Xuejia Lai, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
4.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
5.

電子ブック

EB
Claudio A. Ardagna, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
6.

電子ブック

EB
Jos? A. Onieva, Javier Lopez, Jose A. Onieva, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction
Introduction to E-commerce
Multi-party Non-Repudiation Protocols: Analysis
New Design Approaches for MNR
Multi-Party Non-Repudiation and Its Applications
Scenarios Supported by MNR Services
Index
Preface
Introduction
Introduction to E-commerce
7.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Yan Chen, Yang Chen, Tassos D. Dimitriou, Jianying Zhou
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks / Mansoor Alicherry ; Angelos D. Keromytis ; Angelos Stavrou
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documents / Brian M. Bowen ; Shlomo Hershkop ; Salvatore J. Stolfo
MULAN: Multi-Level Adaptive Network Filter / Shimrit Tzur-David ; Danny Dolev ; Tal Anker
Automated Classification of Network Traffic Anomalies / Guilherme Fernandes ; Philippe Owezarski
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets / Magdalena Payeras-Capellà ; Macià Mut-Puigserver ; Andreu Pere Isern-Deyà ; Josep L. Ferrer-Gomila ; Llorenç Huguet-Rotger
On the Security of Bottleneck Bandwidth Estimation Techniques / Ghassan Karame ; David Gubler ; Srdjan čapkun
An Eavesdropping Game with SINR as an Objective Function / Andrey Garnaev ; Wade Trappe
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applications / Feng Qian ; Zhiyun Qian ; Z. Morley Mao ; Atul Prakash
Using Failure Information Analysis to Detect Enterprise Zombies / Zhaosheng Zhu ; Vinod Yegneswaran ; Yan Chen
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games / William Kozma Jr. ; Loukas Lazos
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks / Toni Perković ; Ivo Stančić ; Luka MaliÜa ; Mario Čagalj
Aggregated Authentication (AMAC) Using Universal Hash Functions / Wassim Znaidi ; Marine Minier ; Cédric Lauradoux
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN / Andrea Gabrielli ; Maura Conti ; Roberto Di Pietro ; Luigi V. Mancini
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks / Yanjiang Yang ; Jianying Zhou ; Robert H. Deng ; Feng Bao
Key Management, Credentials, Authentications
User-Centric Identity Using ePassports / Martijn Oostdijk ; Dirk-Jan van Dijk ; Maarten Wegdam
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems / Shucheng Yu ; Kui Ren ; Wenjing Lou ; Jin Li
Breaking and Building of Group Inside Signature / S. Sree Vivek ; S. Sharmila Deva Selvi ; S. Gopi Nath ; C. Pandu Rangan
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources / Thanassis Tiropanis ; Tassos Dimitriou
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks / Julien Freudiger ; Maxim Raya ; Jean-Pierre Hubaux
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures / Yi Yang ; Sencun Zhu ; Guohong Cao ; Thomas LaPorta
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC / Aravind Venkataraman ; Raheem Beyah
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Network / Yawen Wei ; Zhen Yu ; Yong Guan
Reliable Resource Searching in P2P Networks / Michael T. Goodrich ; Jonathan Z. Sun ; Roberto Tamassia ; Nikos Triandopoulos
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems / Eric Chan-Tin ; Daniel Feldman ; Nicholas Hopper ; Yongdae Kim
Author Index
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
8.

電子ブック

EB
Jianying Zhou, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York NY : ACM, 2015
所蔵情報: loading…
9.

電子ブック

EB
Jianying Zhou, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York NY : ACM, 2016
所蔵情報: loading…
10.

電子ブック

EB
Jianying Zhou, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , New York NY : ACM, 2017
所蔵情報: loading…
11.

電子ブック

EB
ISC 2005, Takeo Kanade, Jianying Zhou, Robert H. Deng, Javier Lopez
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
12.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
13.

電子ブック

EB
ACNS 2003, Yongfei Han, Moti Yung, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2003
所蔵情報: loading…
目次情報: 続きを見る
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
Anonymity-Enhanced Pseudonym System / Yuko Tamura
Intrusion Detection
Using Feedback to Improve Masquerade Detection / Kwong H. Yung
Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services / Zhi Guo ; Kwok-Yan Lam ; Siu-Leung Chung ; Ming Gu ; Jia-Guang Sun
An IP Traceback Scheme Integrating DPM and PPM / Fan Min ; Jun-yan Zhang ; Guo-wie Yang
Cryptographic Algorithms
Improved Scalable Hash Chain Traversal / Sung-Ryul Kim
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem / Rui Zhang ; Hideki Imai
On the Security of Two Threshold Signature Schemes with Traceable Signers / Guilin Wang ; Xiaoxi Han ; Bo Zhu
Digital Signature
Proxy and Threshold One-Time Signatures / Mohamed Al-Ibrahim ; Anton Cerny
A Threshold GQ Signature Scheme / Li-Shan Liu ; Cheng-Kang Chu ; Wen-Guey Tzeng
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary / Gene Itkis ; Peng Xie
A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme / Chong-zhi Gao ; Zheng-an Yao ; Lei Li
Security Modelling
Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems / Ching Lin ; Vijay Varadharajan
An Authorization Model for E-consent Requirement in a Health Care Application / Chun Ruan
PLI: A New Framework to Protect Digital Content for P2P Networks / Guofei Gu ; Bin B. Zhu ; Shipeng Li ; Shiyong Zhang
Web Security
Improved Algebraic Traitor Tracing Scheme / Chunyan Bai ; Guiliang Feng
Common Vulnerability Markup Language / Haitao Tian ; Liusheng Huang ; Zhi Zhou ; Hui Zhang
Trust on Web Browser: Attack vs. Defense / Tie-Yan Li ; Yongdong Wu
Security Protocols
Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards / Luciano Rila ; Chris J. Mitchell
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party / Jae-Gwi Choi ; Kouichi Sakurai ; Ji-Hwan Park
Using OCSP to Secure Certificate-Using Transactions in M-commerce / Jose L. Muñoz ; Jordi Forné ; Oscar Esparza ; Bernabe Miguel Soriano
Cryptanalysis
Differential Fault Analysis on A.E.S / Pierre Dusart ; Gilles Letourneux ; Olivier Vivolo
Side-Channel Attack on Substitution Blocks / Roman Novak
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation / Yasuyuki Sakai
A Fast Correlation Attack for LFSR-Based Stream Ciphers / Sarbani Palit ; Bimal K. Roy ; Arindom De
Key Management
Making the Key Agreement Protocol in Mobile Ad Hoc Network
More Efficient / Gang Yao ; Kui Ren ; Feng Bao ; Robert H. Deng ; Dengguo Feng
An Efficient Tree-Based Group Key Agreement Using Bilinear Map / Sangwon Lee ; Yongdae Kim ; Kwangjo Kim ; Dae-Hyun Ryu
A Key Recovery Mechanism for Reliable Group Key Management / Taenam Cho ; Sang-Ho Lee
Efficient Implementations
Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model / Sandeepan Chowdhury ; Subhamoy Maitra
Efficient Distributed Signcryption Scheme as Group Signcryption / DongJin Kwak ; SangJae Moon
Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors / Johann Großschädl ; Guy-Armand Kamendje
Author Index
Cryptographic Applications
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
Optimized ? 2-Attack against RC6 / Norihisa Isogai ; Takashi Matsunaka ; Atsuko Miyaji
14.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
15.

電子ブック

EB
Jianying Zhou, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions / Xavier Boyen ; Brent Waters
Digital Signature
Trapdoor Sanitizable Signatures Made Easy / Dae Hyun Yum ; Jae Woo Seo ; Pil Joong Lee
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs / Markus Rückert ; Michael Schneider ; Dominique Schröder
Redactable Signatures for Tree-Structured Data: Definitions and Constructions / Christina Brzuska ; Heike Busch ; Oezguer Dagdelen ; Marc Fischlin ; Martin Franz ; Stefan Katzenbeisser ; Mark Manulis ; Cristina Onete ; Andreas Peter ; Bertram Poettering
Block Ciphers and Hash Functions
Impossible Differential Cryptanalysis on Feistel Ciphers with S P and S P S Round Functions / Yuechuan Wei ; Ping Li ; Bing Sun ; Chao Li
Multi-trail Statistical Saturation Attacks / Baudoin Collard ; Francois-Xavier Standaert
Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G / Alex Biryukov ; Deike Priemuth-Schmid ; Bin Zhang
High Performance GHASH Function for Long Messages / Nicolas Méloni ; Christophe Négre ; M. Anwar Hasan
Side-Channel Attacks
Principles on the Security of AES against First and Second-Order Differential Power Analysis / Jiqiang Lu ; Jing Pan ; Jerry den Hartog
Adaptive Chosen-Message Side-Channel Attacks / Nicolas Veyrat-Charvillon ; François-Xavier Standaert
Secure Multiplicative Masking of Power Functions / Laurie Genelle ; Emmanuel Prouff ; Michaël Quisquater
Zero Knowledge and Multi-party Protocols
Batch Groth-Sahai / Olivier Blazy ; Georg Fuchsbauer ; Malika Izabachène ; Amandine Jambert ; Hervé Sibert
Efficient and Secure Evaluation of Multivariate Polynomials and Applications / Matthew Franklin ; Payman Mohassel
Efficient Implementation of the Orlandi Protocol / Thomas P. Jakobsen ; Marc X. Makkes ; Janus Dam Nielsen
Improving the Round Complexity of Traitor Tracing Schemes / Aggelos Kiayias ; Serdar Pehlivanoglu
Key Management
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters / Julien Bringer ; Hervé Chabanne ; Thomas Icart
Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead / Rosario Gennaro ; Hugo Krawczyk ; Tal Rabin
Deniable Internet Key Exchange / Andrew C. Yao ; Yunlei Zhao
Authentication and Identification
A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm / Hassan Jameel Asghar ; Josef Pieprzyk ; Huaxiong Wang
Secure Sketch for Multiple Secrets / Chengfang Fang ; Qiming Li ; Ee-Chien Chang
A Message Recognition Protocol Based on Standard Assumptions / Atefeh Mashatan ; Serge Vaudenay
Privacy and Anonymity
Affiliation-Hiding Key Exchange with Untrusted Group Authorities / Gene Tsudik
Privacy-Preserving Group Discovery with Linear Complexity / Benny Pinkas
Two New Efficient PIR-writing Protocols / Helger Lipmaa ; Bingsheng Zhang
Regulatory Compliant Oblivious RAM / Bogdan Carbunar ; Radu Sion
RFID Security and Privacy
Revisiting Unpredictability-Based RFID Privacy Models / Junzuo Lai ; Robert H. Deng ; Yingjiu Li
On RFID Privacy with Mutual Authentication and Tag Corruption / Frederik Armknecht ; Ahmad-Reza Sadeghi ; Ivan Visconti ; Christian Wachsmann
Internet Security
Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures / Erhan J. Kartaltepe ; Jose Andre Morales ; Shouhuai Xu ; Ravi Sandhu
COP: A Step toward Children Online Privacy / Wei Xu ; Sencun Zhu ; Heng Xu
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising / Xuhua Ding
Author Index
Public Key Encryption
On the Broadcast and Validity-Checking Security of PKCS#1 v1.5 Encryption / Aurélie Bauer ; Jean-Sébastien Coron ; David Naccache ; Mehdi Tibouchi ; Damien Vergnaud
How to Construct Interval Encryption from Binary Tree Encryption / Huang Lin ; Zhenfu Cao ; Xiaohui Liang ; Muxin Zhou ; Haojin Zhu ; Dongsheng Xing
16.

電子ブック

EB
David Hutchison, Takeo Kanade, Pierangela Samarati, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2012
所蔵情報: loading…
17.

電子ブック

EB
José A. Onieva, Javier Lopez, Jose A. Onieva, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer US, 2009
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction
Introduction to E-commerce
Multi-party Non-Repudiation Protocols: Analysis
New Design Approaches for MNR
Multi-Party Non-Repudiation and Its Applications
Scenarios Supported by MNR Services
Index
Preface
Introduction
Introduction to E-commerce
18.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Yan Chen, Yang Chen, Tassos D. Dimitriou, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks / Mansoor Alicherry ; Angelos D. Keromytis ; Angelos Stavrou
Network Intrusion Detection
Baiting Inside Attackers Using Decoy Documents / Brian M. Bowen ; Shlomo Hershkop ; Salvatore J. Stolfo
MULAN: Multi-Level Adaptive Network Filter / Shimrit Tzur-David ; Danny Dolev ; Tal Anker
Automated Classification of Network Traffic Anomalies / Guilherme Fernandes ; Philippe Owezarski
Security and Privacy for the General Internet
Formal Analysis of FPH Contract Signing Protocol Using Colored Petri Nets / Magdalena Payeras-Capellà ; Macià Mut-Puigserver ; Andreu Pere Isern-Deyà ; Josep L. Ferrer-Gomila ; Llorenç Huguet-Rotger
On the Security of Bottleneck Bandwidth Estimation Techniques / Ghassan Karame ; David Gubler ; Srdjan čapkun
An Eavesdropping Game with SINR as an Objective Function / Andrey Garnaev ; Wade Trappe
Malware and Misbehavior
Ensemble: Community-Based Anomaly Detection for Popular Applications / Feng Qian ; Zhiyun Qian ; Z. Morley Mao ; Atul Prakash
Using Failure Information Analysis to Detect Enterprise Zombies / Zhaosheng Zhu ; Vinod Yegneswaran ; Yan Chen
Dealing with Liars: Misbehavior Identification via Rényi-Ulam Games / William Kozma Jr. ; Loukas Lazos
Wireless Network Security II, Sensor Networks
Multichannel Protocols for User-Friendly and Scalable Initialization of Sensor Networks / Toni Perković ; Ivo Stančić ; Luka MaliÜa ; Mario Čagalj
Aggregated Authentication (AMAC) Using Universal Hash Functions / Wassim Znaidi ; Marine Minier ; Cédric Lauradoux
Sec-TMP: A Secure Topology Maintenance Protocol for Event Delivery Enforcement in WSN / Andrea Gabrielli ; Maura Conti ; Roberto Di Pietro ; Luigi V. Mancini
Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks / Yanjiang Yang ; Jianying Zhou ; Robert H. Deng ; Feng Bao
Key Management, Credentials, Authentications
User-Centric Identity Using ePassports / Martijn Oostdijk ; Dirk-Jan van Dijk ; Maarten Wegdam
Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems / Shucheng Yu ; Kui Ren ; Wenjing Lou ; Jin Li
Breaking and Building of Group Inside Signature / S. Sree Vivek ; S. Sharmila Deva Selvi ; S. Gopi Nath ; C. Pandu Rangan
Use of ID-Based Cryptography for the Efficient Verification of the Integrity and Authenticity of Web Resources / Thanassis Tiropanis ; Tassos Dimitriou
Wireless Network Security III
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks / Julien Freudiger ; Maxim Raya ; Jean-Pierre Hubaux
An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures / Yi Yang ; Sencun Zhu ; Guohong Cao ; Thomas LaPorta
Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC / Aravind Venkataraman ; Raheem Beyah
Secure Multicast, Emerging Technologies
A Novel Architecture for Secure and Scalable Multicast over IP Network / Yawen Wei ; Zhen Yu ; Yong Guan
Reliable Resource Searching in P2P Networks / Michael T. Goodrich ; Jonathan Z. Sun ; Roberto Tamassia ; Nikos Triandopoulos
The Frog-Boiling Attack: Limitations of Anomaly Detection for Secure Network Coordinate Systems / Eric Chan-Tin ; Daniel Feldman ; Nicholas Hopper ; Yongdae Kim
Author Index
Wireless Network Security I
Mitigating DoS Attacks on the Paging Channel by Efficient Encoding in Page Messages / Liang Cai ; Gabriel Maganis ; Hui Zang ; Hao Chen
FIJI: Fighting Implicit Jamming in 802.11 WLANs / Ioannis Broustis ; Konstantinos Pelechrinis ; Dimitris Syrivelis ; Srikanth V. Krishnamurthy ; Leandros Tassiulas
19.

電子ブック

EB
Ozgur Akan, Paolo Bellavista, Sushil Jajodia, Jianying Zhou, Jiannong Cao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
Inexpensive Email Addresses An Email Spam-Combating System / Aram Yegenian ; Tassos Dimitriou
Anonymity and Privacy
Privacy Administration in Distributed Service Infrastructure / Nabil Ajam ; Nora Cuppens-Boulahia ; Frederic Cuppens
On the Formation of Historically k-Anonymous Anonymity Sets in a Continuous LBS / Rinku Dewri ; Indrakshi Ray ; Indrajit Ray ; Darrell Whitley
Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings / Ming Li ; Shucheng Yu ; Kui Ren ; Wenjing Lou
Wireless Security
A Study on False Channel Condition Reporting Attacks in Wireless Networks / Dongho Kim ; Yih-Chun Hu
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services / Patrick Traynor
Saving Energy on WiFi with Required IPsec / Youngsang Shin ; Steven Myers ; Minaxi Gupta
Systems Security - I
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization / Michael Grace ; Zhi Wang ; Deepa Srinivasan ; Jinku Li ; Xuxian Jiang ; Zhenkai Liang ; Siarhei Liakh
A Generic Construction of Dynamic Single Sign-on with Strong Security / Jinguang Han ; Yi Mu ; Willy Susilo ; Jun Yan
DeCore: Detecting Content Repurposing Attacks on Client' Systems / Smitha Sundareswaran ; Anna C. Squicciarini
Network Security - I
Realizing a Source Authentic Internet / Toby Ehrenkranz ; Jun Li ; Patrick McDaniel
Partial Deafness: A Novel Denial-of-Service Attack in 802.11 Networks / Jihyuk Choi ; Jerry T. Chiang
Attacking Beacon-Enabled 802.15.4 Networks / Sang Shin Jung ; Marco Valero ; Anu Bourgeois ; Raheem Beyah
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks / Mihaela Ion ; Giovanni Russello ; Bruno Crispo
Security Protocols - I
Impossibility of Finding Any Third Family of Server Protocols Integrating Byzantine Quorum Systems with Threshold Signature Schemes / Luciana Marconi ; Mauro Conti ; Roberto Di Pietro ; Jingqiang Lin ; Jiwu Jing ; Qiongxiao Wang
Context-Aware Usage Control for Android / Guangdong Bai ; Liang Gu ; Tao Feng ; Yao Guo ; Xiangqun Chen
System Security - II
Efficient Isolation of Trusted Subsystems in Embedded Systems / Raoul Strackx ; Frank Piessens ; Bart Preneel
Enhancing Host Security Using External Environment Sensors / Ee-Chien Chang ; Liming Lu ; Yongzheng Wu ; Roland H.C. Yap ; Jie Yu
FADE: Secure Overlay Cloud Storage with File Assured Deletion / Yang Tang ; Patrick P.C. Lee ; John C.S. Lui ; Radia Perlman
Security Protocols - II
A New Information Leakage Measure for Anonymity Protocols / Sami Zhioua
Hidden Markov Models for Automated Protocol Learning / Sean Whalen ; Matt Bishop ; James P. Crutchfield
Epistemic Model Checking for Knowledge-Based Program Implementation: An Application to Anonymous Broadcast / Omar I. Al-Bataineh ; Ronr van der Meyden
Network Security - II
Surveying DNS Wildcard Usage among the Good, the Bad, and the Ugly / Andrew Kalafut ; Pairoj Rattadilok ; Pragneshkumar Patel
The Hitchhiker's Guide to DNS Cache Poisoning / Sooel Son ; Vitaly Shmatikou
A Formal Definition of Online Abuse-Freeness / Ralf Küsters ; Henning Schnoor ; Tomasz Truderung
Author Index
Malware and Email Security
SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection / Deguang Kong ; Yoon-Chan Jhi ; Tao Gong ; Sencun Zhu ; Peng Liu ; Hongsheng Xi
Analyzing and Exploiting Network Behaviors of Malware / Jose Andre Morales ; Areej Al-Bataineh ; Shouhuai Xu ; Ravi Sandhu
20.

電子ブック

EB
Nguyen, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2017
所蔵情報: loading…
21.

電子ブック

EB
ISC 2005, Takeo Kanade, Jianying Zhou, Robert H. Deng, Javier Lopez, Feng Bao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
22.

電子ブック

EB
David Hutchison, Takeo Kanade, Hui Li, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
23.

電子ブック

EB
Jianying Zhou Xinyi Huang, Josef Kittler, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2014
所蔵情報: loading…
24.

電子ブック

EB
ISPEC 2005, Robert Deng, Takeo Kanade, Robert H. Deng, HweeHwa Pang, Jianying Zhou, Feng Bao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
25.

電子ブック

EB
Kefei Chen, Robert Deng, Takeo Kanade, Xuejia Lai, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
26.

電子ブック

EB
Claudio A. Ardagna, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
27.

電子ブック

EB
Lin, Moti Yung, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2015
所蔵情報: loading…
28.

電子ブック

EB
International Workshop on Practice and Theory in Public Key Cryptography, Feng Bao, Robert Deng, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2004
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA / Johannes Blömer ; Alexander May
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem / Jean-Sébastien Coron
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism / Roberto Maria Avanzi ; Mathieu Ciet ; Francesco Sica
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point / Pradeep Kumar Mishra ; Palash Sarkar
Fast Arithmetic on Jacobians of Picard Curves / Stéphane Flon ; Roger Oyono
Undeniable Signatures Based on Characters: How to Sign with One Bit / Jean Monnerat ; Serge Vaudenay
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures / Ron Steinfeld ; Huaxiong Wang ; Josef Pieprzyk
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model / Huafei Zhu
Constant Round Authenticated Group Key Agreement via Distributed Computation / Emmanuel Bresson ; Dario Catalano
Efficient ID-based Group Key Agreement with Bilinear Maps / Kyu Young Choi ; Jung Yeon Hwang ; Dong Hoon Lee
New Security Results on Encrypted Key Exchange / Olivier Chevassut ; David Pointcheval
New Results on the Hardness of Diffie-Hellman Bits / María Isabel González Vasco ; Mats Näslund ; Igor E. Shparlinski
Short Exponent Diffie-Hellman Problems / Takeshi Koshiba ; Kaoru Kurosawa
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups / Benoît Libert ; Jean-Jacques Quisquater
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" / Nicolas T. Courtois ; Reihaneh Safavi-Naini ; Luke McAven ; Moti Yung
From Digital Signature to ID-based Identification/Signature / Swee-Huay Heng
Identity-Based Threshold Decryption / Joonsang Baek ; Yuliang Zheng
An Efficient Signature Scheme from Bilinear Pairings and Its Applications / Fangguo Zhang ; Willy Susilo
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications / Ryotaro Hayashi ; Tatsuaki Okamoto ; Keisuke Tanaka
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation / Jintai Ding
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability / Jun Furukawa
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny / Brian King ; Toru Akishita ; Tsuyoshi Takagi
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? / Rui Zhang ; Goichiro Hanaoka ; Junji Shikata ; Hideki Imai
QuasiModo: Efficient Certificate Validation and Revocation / Farid F. Elwailly ; Craig Gentry ; Zulfikar Ramzan
A Distributed Online Certificate Status Protocol with a Single Public Key / Satoshi Koga ; Kouichi Sakurai
A First Approach to Provide Anonymity in Attribute Certificates / Vicente Benjumea ; Javier Lopez ; Jose A. Montenegro ; Jose M. Troya
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups / Arne Winterhof
Cryptographic Randomized Response Techniques / Andris Ambainis ; Markus Jakobsson ; Helger Lipmaa
A Correct, Private, and Efficient Mix Network / Kun Peng ; Colin Boyd ; Ed Dawson ; Kapali Viswanathan
Author Index
A Generalized Wiener Attack on RSA / Johannes Blömer ; Alexander May
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem / Jean-Sébastien Coron
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism / Roberto Maria Avanzi ; Mathieu Ciet ; Francesco Sica
29.

電子ブック

EB
David; Kanade, Takeo; Kittler, Josef; Ding, Liping Hutchison, Liping Ding, Dongmei Liu, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2013
所蔵情報: loading…
30.

電子ブック

EB
International Conference on Information and Communications Security, Robert Deng, Feng Bao, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2002
所蔵情報: loading…
31.

電子ブック

EB
International Conference on Information and Communications Security, Dieter Gollmann, Sihan Qing, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2003
所蔵情報: loading…
目次情報: 続きを見る
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST / Duncan S. Wong ; Karyin Fung ; Joseph K. Liu ; Victor K. Wei
A Policy Based Framework for Access Control / Ricardo Nabhen ; Edgard Jamhour ; Carlos Maziero
Trading-Off Type-Inference Memory Complexity against Communication / Konstantin Hyppönen ; David Naccache ; Elena Trichina ; Alexei Tchoulkine
Security Remarks on a Group Signature Scheme with Member Deletion / Guilin Wang ; Feng Bao ; Jianying Zhou ; Robert H. Deng
An Efficient Known Plaintext Attack on FEA-M / Hongjun Wu
An Efficient Public-Key Framework / Robert Deng
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature / Jong-Phil Yang ; Chul Sur ; Kyung Hyune Rhee
Practical Service Charge for P2P Content Distribution / Jose Antonio Onieva ; Javier Lopez
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback / Henry C.J. Lee ; Vrizlynn L.L. Thing ; Yi Xu ; Miao Ma
A Lattice Based General Blind Watermark Scheme / Yongliang Liu ; Wen Gao ; Zhao Wang ; Shaohui Liu
Role-Based Access Control and the Access Control Matrix / Gregory Saunders ; Michael Hitchens ; Vijay Varadharajan
Broadcast Encryption Schemes Based on the Sectioned Key Tree / Miodrag J. Mihaljevic
Research on the Collusion Estimation / Gang Li ; Jie Yang
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains / Mohsen Ashourian ; Yo-Sung Ho
Protocols for Malicious Host Revocation / Oscar Esparza ; Miguel Soriano ; Jose L. Muñoz ; Jordi Forne
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code / Pik-Wah Chan ; Michael R. Lyu
A Novel Two-Level Trust Model for Grid / Tie-Yan Li ; HuaFei Zhu ; Kwok-Yan Lam
Practical t-out-n Oblivious Transfer and Its Applications / Qian-Hong Wu ; Jian-Hong Zhang ; Yu-Min Wang
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme / Yongdong Wu
ID-Based Distributed "Magic Ink" Signature from Pairings / Yan Xie ; Fangguo Zhang ; Xiaofeng Chen
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature / Shuwang Lü ; Zhenhua Liu
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives / Yang Cui ; Kazukuni Kobara ; Hideki Imai
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems / Xiao-dong Yi ; Xue-jun Yang
A Novel Efficient Group Signature Scheme with Forward Security / Jianhong Zhang ; Qianhong Wu ; Yumin Wang
Variations of Diffie-Hellman Problem
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine / Taeshik Sohn ; JungTaek Seo ; Jongsub Moon
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine / Min Luo ; Lina Wang ; Huanguo Zhang ; Jin Chen
UC-RBAC: A Usage Constrained Role-Based Access Control Model / Zhen Xu ; Dengguo Feng ; Lan Li ; Hua Chen
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography / Mathieu Ciet ; Marc Joye
An Optimized Multi-bits Blind Watermarking Scheme / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
A Compound Intrusion Detection Model / Jianhua Sun ; Hai Jin ; Hao Chen ; Qian Zhang ; Zongfen Han
An Efficient Convertible Authenticated Encryption Scheme and Its Variant / Hui-Feng Huang ; Chin-Chen Chang
Space-Economical Reassembly for Intrusion Detection System / Meng Zhang ; Jiu-bin Ju
A Functional Decomposition of Virus and Worm Programs / J. Krishna Murthy
Author Index
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
32.

電子ブック

EB
International Conference on Information and Communications Security, Tatsuaki Okamoto, Sihan Qing, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2001
所蔵情報: loading…
目次情報: 続きを見る
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
Unconditionally-Secure Oblivious Transfer / Bo Yan ; Shixiong Zhu ; Yumin Wang
Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang ; Iuon-Chang Lin
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Kuo-Feng Hwang
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo ; Lincheng Shen ; Wensen Chang
A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki ; Fumitaka Hoshino ; Tetsutaro Kobayashi
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang ; Futai Zhang
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye ; Junhui Yang ; Zongduo Dai ; Haiwen Ou
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura
A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim ; Hae-Kyung Rhee ; Tai M. Chung ; Young Ik Eom ; Ung-Mo Kim
Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho ; Zbigniew Ciechanowicz
RBAC for XML Document Stores / Michael Hitchens ; Vijay Varadharajan
Cheating Immune Secret Sharing / Xian-Mo Zhang ; JosefPieprzyk
Encryption Sticks (Randomats) / Gideon Samid
Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song ; Sihan Qing
Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono ; Ingo Liebhardt
Enforcing Obligation with Security Monitors / Carlos Ribeiro ; Andre Zuquete ; Paulo Ferreira
Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning ; Yiqun Lisa Yin
Playing Lottery on the Internet / Jianying Zhou ; Chunfu Tan
Privacy Protection for Transactions of Digital Goods / Feng Bao ; Robert Deng
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lua Xu ; Han-liang Xu ; Yan Wang ; Shu-Wang Lu
Threshold Undeniable RSA Signature Scheme / Guilin Wang ; Mingsheng Wang ; Zhanfei Zhou
Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang ; Cheng-Chi Lee ; Yuan-Liang Tang
Square Attack on Reduced Camellia Cipher / Yeping He
Generalization of Elliptic Curve Digital Signature Schemes / Lin You ; Yi Xian Yang ; Chun Qi Zhang
Reasoning about Accountability within Delegation / Bruno Crispo ; Giancarlo Ruffo
A Novel Data Hiding Method for Two-Color Images / Gang Pan ; Yijun Wu ; Zhaohui Wu
An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee ; X. Deng ; H. Zhu
Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu ; Yoshiaki Takata ; Hiroyuki Seki ; Katsuro Inoue
Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang ; Harald Lukhaub ; Werner Zorn
A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp ; Chaiwat Rujimethabhas
Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen ; Adam Bargteil ; David Bindel ; Randy H. Katz ; John Kubiatowicz
A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto ; Colin Boyd ; Ed Dawson
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong ; Chul Kim
NIDS Research Based on Artificial Immunology / Wenjian Luo ; Xianbin Cao ; Xufa Wang
AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Cánovas ; Antonio F. Gómez
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou ; Byrav Ramamurthy ; Spyros S. Magliveras
Dispatching Mobile Agents with Secure Routes in Parallel / Kian-Lee Tan
TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen ; Qian Fang ; Zhihui Du ; Zhenchun Huang ; Sanli Li
Cryptography and Middleware Security / Ulrich Lang ; Dieter Gollmann ; Rudolf Schreiner
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng ; Chung-Huang Yang ; T.R.N. Rao
A Role-Based Model for Access Control in Database Federations / Eric Disson ; Danielle Boulanger ; Gilles Dubois
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li ; Lianli Chang ; Xinmei Wang
A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park ; Im-Yeong Lee
Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi ; Tae Ho Cho
Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland
Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu
SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park ; Jang-Se Lee ; Hwan Kuk Kim ; Jeong-Rye Jeong ; Dong-Bok Yeom ; Sung-Do Chi
A New Semantics of Authentication Logic / Yifa Li
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park ; Sook Ee Jeong ; Chang Soo Kim
Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Author Index
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
33.

電子ブック

EB
Rodrigo Roman, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2021
所蔵情報: loading…
34.

電子ブック

EB
Lopez, Jianying Zhou, Miguel Soriano, Miguel Soriano, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2018
所蔵情報: loading…
35.

電子ブック

EB
Lopez, Jianying Zhou, Miguel Soriano, Miguel Soriano, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2018
所蔵情報: loading…
36.

電子ブック

EB
Conti, Emiliano Casalicchio, Angelo Spognardi, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2020
所蔵情報: loading…
37.

電子ブック

EB
Conti, Emiliano Casalicchio, Angelo Spognardi, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2020
所蔵情報: loading…
38.

電子ブック

EB
Meng, Dieter Gollmann, Christian D. Jensen, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2020
所蔵情報: loading…
39.

電子ブック

EB
Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar
出版情報: SpringerLink Books - AutoHoldings , Springer International Publishing, 2021
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼