close
1.

電子ブック

EB
WISA 2004, Takeo Kanade, Chae Hoon Lim, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
目次情報: 続きを見る
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
Encrypted Watermarks and Linux Laptop Security / Markku-Juhani O. Saarinen
Inconsistency Detection of Authorization Policies in Distributed Component Environment / Chang-Joo Moon ; Hoh Peter In
Public Key Schemes I
Custodian-Hiding Verifiable Encryption / Joseph K. Liu ; Victor K. Wei ; Duncan S. Wong
Proving Key Usage / Malek Bechlaghem ; Vincent Rijmen
Public Key Encryption with Conjunctive Field Keyword Search / Dong Jin Park ; Kihyun Kim ; Pil Joong Lee
Intrusion Detection I
A Probabilistic Method for Detecting Anomalous Program Behavior / Kohei Tatara ; Toshihiro Tabata ; Kouichi Sakurai
Service Discrimination and Audit File Reduction for Effective Intrusion Detection / Fernando Godínez ; Dieter Hutter ; Raúl Monroy
IDS False Alarm Filtering Using KNN Classifier / Kwok Ho Law ; Lam For Kwok
Watermarking/Anti-spamming
Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking / Hae-Yeoun Lee ; Jong-Tae Kim ; Heung-Kyu Lee ; Young-Ho Suh
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment / Manabu Iwanaga
Public Key Schemes II
Efficient Authenticated Key Agreement Protocol for Dynamic Groups / Kui Ren ; Hyunrok Lee ; Kwangjo Kim ; Taewhan Yoo
A Ring Signature Scheme Using Bilinear Pairings / Jing Xu ; Zhenfeng Zhang ; Dengguo Feng
Verifiable Pairing and Its Applications / Sherman S.M. Chow
Intrusion Detection II
Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading / Bart Haagdorens ; Tim Vermeiren ; Marnix Goossens
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks / Seok Bong Jeong ; Young Woo Choi ; Sehun Kim
Application of Content Computing in Honeyfarm / Yi-Yuan Huang ; Kwok-Yan Lam ; Siu-Leung Chung ; Chi-Hung Chi ; Jia-Guang Sun
Digital Rights Management
License Protection with a Tamper-Resistant Token / Cheun Ngen Chong ; Bin Ren ; Jeroen Doumen ; Sandro Etalle ; Pieter H. Hartel ; Ricardo Corin
An Adaptive Approach to Hardware Alteration for Digital Rights Management / Yinyan Yu ; Zhi Tang
Dynamic Fingerprinting over Broadcast Using Revocation Scheme / Mira Kim ; Kazukuni Kobara ; Hideki Imai
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels / Chong Hee Kim ; Yong Ho Hwang
e-Commerce Security
Vulnerability of a Mobile Payment System Proposed at WISA 2002 / Sang Cheol Hwang ; Dong Hoon Lee ; Daewan Han ; Jae-Cheol Ryou
Fair Offline Payment Using Verifiable Encryption / Sangjin Kim ; Heekuck Oh
A Limited-Use Key Generation Scheme for Internet Transactions / Supakorn Kungpisdan ; Phu Dung Le ; Bala Srinivasan
Efficient Implementation
Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes / Kishan Chand Gupta ; Palash Sarkar
Signed Digit Representation with NAF and Balanced Ternary Form and Efficient Exponentiation in GF(qn) Using a Gaussian Normal Basis of Type II / Soonhak Kwon
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors / Masanobu Katagi ; Izuru Kitamura ; Toru Akishita ; Tsuyoshi Takagi
Hyperelliptic Curve Coprocessors on a FPGA / HoWon Kim ; Thomas Wollinger ; YongJe Choi ; KyoIl Chung ; Christof Paar
Anonymous Communication
Key-Exchange Protocol Using Pre-agreed Session-ID / Kenji Imamoto
A New k-Anonymous Message Transmission Protocol / Gang Yao
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack / Marcin Gomulkiewicz ; Marek Klonowski ; Mirosław Kutyłowski
Side-Channel Attacks
Side Channel Cryptanalysis on SEED / HyungSo Yoo ; ChangKyun Kim ; JaeCheol Ha ; SangJae Moon ; IlHwan Park
Secure and Efficient AES Software Implementation for Smart Cards / Elena Trichina ; Lesya Korkishko
Practical Template Attacks / Christian Rechberger ; Elisabeth Oswald
Evaluation and Improvement of the Tempest Fonts / Hidema Tanaka ; Osamu Takizawa ; Akihiro Yamamura
Author Index
Network/Computer Security
Impacts of Security Protocols on Real-Time Multimedia Communications / Kihun Hong ; Souhwan Jung ; Luigi Lo Iacono ; Christoph Ruland
An Improvement on Privacy and Authentication in GSM / Young Jae Choi ; Soon Ja Kim
2.

電子ブック

EB
ACNS 2005, John Ioannidis, Takeo Kanade, Angelos Keromytis, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
3.

電子ブック

EB
FC 2005, Takeo Kanade, Andrew S. Patrick, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
4.

電子ブック

EB
Languages, and Programming International Colloquium on Automata, Lu?s Caires, Takeo Kanade, Guiseppe F. Italiano, Luis Monteiro, Catuscia Palamidessi, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
5.

電子ブック

EB
CISC 2005, Dengguo Feng, Takeo Kanade, Dongdai Lin, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
6.

電子ブック

EB
Jonathan Katz, David Hutchison, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
7.

電子ブック

EB
Sehun Kim, Takeo Kanade, Hyung-Woo Lee, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
8.

電子ブック

EB
Jae Kwang Lee, Takeo Kanade, Okyeon Yi, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2007
所蔵情報: loading…
目次情報: 続きを見る
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
Identity-Based Key Issuing Without Secure Channel in a Broad Area / Saeran Kwon ; Sang-Ho Lee
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution / Ki Hun Lee ; Yuna Kim ; Sung Je Hong ; Jong Kim
Cyber Indication/Intrusion Detection
SAID: A Self-Adaptive Intrusion Detection System in Wireless Sensor Networks / Jianqing Ma ; Shiyong Zhang ; Yiping Zhong ; Xiaowen Tong
SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment / Jae-Chul Park ; Bong-Nam Noh
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm / Seung-Hyun Paek ; Yoon-Keun Oh ; Do-Hoon Lee
Biometrics/Security Trust Management
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords / Daesung Moon ; Sungju Lee ; Seunghwan Jung ; Yongwha Chung ; Okyeon Yi ; Namil Lee ; Kiyoung Moon
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification / Byungkwan Park ; Jin-Won Park
Quality Assurance for Evidence Collection in Network Forensics / Bo-Chao Cheng ; Huan Chen
Secure Software/Systems
Visualization of Permission Checks in Java Using Static Analysis / Yoonkyung Kim ; Byeong-Mo Chang
Deployment of Virtual Machines in Lock-Keeper / Feng Cheng ; Christoph Meinel
Smart Cards/Secure Hardware
Investigations of Power Analysis Attacks and Countermeasures for ARIA / HyungSo Yoo ; Christoph Herbst ; Stefan Mangard ; Elisabeth Oswald ; SangJae Moon
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols / Mun-Kyu Lee ; Jung Ki Min ; Seok Hun Kang ; Sang-Hwa Chung ; Howon Kim ; Dong Kyue Kim
A Novel Key Agreement Scheme in a Multiple Server Environment / Chin-Chen Chang ; Chia-Chi Wu
Mobile Security
Cost-Effective IDS Operating Scheme in MANETs / Youngok Jeong ; Younggoo Han ; Hyunwoo Kim ; Woochul Shim ; Jaehong Kim ; Sehun Kim
Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6 / Hyun-Sun Kang ; Chang-Seop Park
A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones / Michiru Tanaka ; Yoshimi Teshigawara
DRM/Information Hiding/Ubiquitous Computing Security/P2P Security
Distributed Management of OMA DRM Domains / Harikrishna Vasanta ; Reihaneh Safavi-Naini ; Nicholas Paul Sheppard ; Jan Martin Surminen
New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting / Hideki Yagi ; Toshiyasu Matsushima ; Shigeichi Hirasawa
A Key Management Based on Multiple Regression in Hierarchical Sensor Network / Mihui Kim ; Inshil Doh ; Kijoon Chae
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks / Jabeom Gu ; Jaehoon Nah ; Cheoljoo Chae ; Jaekwang Lee ; Jongsoo Jang
Privacy/Anonymity
Privacy Protection in PKIs: A Separation-of-Authority Approach / Taekyoung Kwon ; Jung Hee Cheon ; Yongdae Kim ; Jae-Il Lee
Three-Party Password Authenticated Key Agreement Resistant to Server Compromise / Dong Hoon Lee
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature / Takayuki Tobita ; Hironori Yamamoto ; Hiroshi Doi ; Keigo Majima
Secret Handshake with Multiple Groups / Naoyuki Yamashita ; Keisuke Tanaka
Internet and Wireless Security
Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs / Chanil Park ; Junbeom Hur ; Chanoe Kim ; Young-joo Shin ; Hyunsoo Yoon
EAP Using the Split Password-Based Authenticated Key Agreement / Jongho Ryu
How Many Malicious Scanners Are in the Internet? / Hiroaki Kikuchi ; Masato Terada
E-Passport: The Global Traceability Or How to Feel Like a UPS Package / Dario Carluccio ; Kerstin Lemke-Rust ; Christof Paar ; Ahmad-Reza Sadeghi
Author Index
Public Key Crypto Applications/Virus Protection
Controllable Ring Signatures / Wei Gao ; Guilin Wang ; Xueli Wang ; Dongqing Xie
Efficient User Authentication and Key Agreement in Wireless Sensor Networks / Wen-Shenq Juang
9.

電子ブック

EB
Pierangela Samarati, Claudio A. Ardagna, Takeo Kanade, Fabio Martinelli, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
10.

電子ブック

EB
Heung Youl Youm, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
Device Security
Application Management Framework in User Centric Smart Card Ownership Model / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes
When Compromised Readers Meet RFID / Gildas Avoine ; Cédric Lauradoux ; Tania Martin
HW Implementation Security
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? / Marcel Medwed ; Jörn-Marc Schmidt
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules / Takeshi Sugawara ; Yu-ichi Hayashi ; Naofumi Homma ; Takaaki Mizuki ; Takafumi Aoki ; Hideaki Sone ; Akashi Satoh
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment / Timo Kasper ; David Oswald ; Christof Paar
Applied Cryptography
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles / Pairat Thorncharoensri ; Willy Susilo ; Yi Mu
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity / Shaojing Fu ; Longjiang Qu ; Chao Li
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy / Kun Peng ; Feng Bao
ID-Based Adaptive Oblivious Transfer / Fangguo Zhang ; Xingwen Zhao ; Xiaofeng Chen
Side Channel Attacks
Unknown Plaintext Template Attacks / Neil Hanley ; Michael Tunstall ; William P. Marnane
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices / Thomas Plos ; Michael Hutter ; Martin Feldhofer
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation / J. Pan ; J.I den Hartog ; Jiqiang Lu
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption / Amir Moradi ; Nima Mousavi ; Mahmoud Salmasizadeh
Cryptograptanalysis
Finding Collisions for a 45-Step Simplified HAS-V / Nicky Mouha ; Christophe De Cannière ; Sebastiaan Indesteege ; Bart Preneel
Non-linear Error Detection for Finite State Machines / Kahraman D. Akdemir ; Ghaith Hammouri ; Berk Sunar
Quadratic Equations from a Kind of S-boxes / Jia Xie ; Weiwei Cao ; TianZe Wang
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure / Lei Hu
Anonymity / Authentication / Access Control
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET / Rasheed Hussain ; Sangjin Kim ; Heekuck Oh
A Selectable k-Times Relaxed Anonymous Authentication Scheme / Keita Emura ; Atsuko Miyaji ; Kazumasa Omote
PUF-Based Authentication Protocols - Revisited / Heike Busch ; Stefan Kaizenbeisser ; Paul Baecher
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application / Luan Ibraimi ; Milan Petkovic ; Svetla Nikova ; Pieter Hartel ; Willem Jonker
Network Security
Securing Remote Access Inside Wireless Mesh Networks / Mark Manulis
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers / Dae Hyun Yum ; Sun Young Kim ; HoKun Moon ; Mi-Yeon Kim ; Jae-Hoon Roh ; Pil Joong Lee
USN Middleware Security Model / Mijoo Kim ; Mi Yeon Yoon ; Heung Youl Youm
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs / Chae Hoon Lim
Author Index
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼