close
1.

電子ブック

EB
Kyo-Il Chung, Takeo Kanade, Kiwook Sohn, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
2.

電子ブック

EB
Moti Yung, Takeo Kanade, Dongdai Lin, Peng Liu
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
3.

電子ブック

EB
Pierangela Samarati, Claudio A. Ardagna, Takeo Kanade, Fabio Martinelli, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
4.

電子ブック

EB
Heung Youl Youm, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
Device Security
Application Management Framework in User Centric Smart Card Ownership Model / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes
When Compromised Readers Meet RFID / Gildas Avoine ; Cédric Lauradoux ; Tania Martin
HW Implementation Security
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? / Marcel Medwed ; Jörn-Marc Schmidt
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules / Takeshi Sugawara ; Yu-ichi Hayashi ; Naofumi Homma ; Takaaki Mizuki ; Takafumi Aoki ; Hideaki Sone ; Akashi Satoh
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment / Timo Kasper ; David Oswald ; Christof Paar
Applied Cryptography
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles / Pairat Thorncharoensri ; Willy Susilo ; Yi Mu
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity / Shaojing Fu ; Longjiang Qu ; Chao Li
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy / Kun Peng ; Feng Bao
ID-Based Adaptive Oblivious Transfer / Fangguo Zhang ; Xingwen Zhao ; Xiaofeng Chen
Side Channel Attacks
Unknown Plaintext Template Attacks / Neil Hanley ; Michael Tunstall ; William P. Marnane
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices / Thomas Plos ; Michael Hutter ; Martin Feldhofer
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation / J. Pan ; J.I den Hartog ; Jiqiang Lu
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption / Amir Moradi ; Nima Mousavi ; Mahmoud Salmasizadeh
Cryptograptanalysis
Finding Collisions for a 45-Step Simplified HAS-V / Nicky Mouha ; Christophe De Cannière ; Sebastiaan Indesteege ; Bart Preneel
Non-linear Error Detection for Finite State Machines / Kahraman D. Akdemir ; Ghaith Hammouri ; Berk Sunar
Quadratic Equations from a Kind of S-boxes / Jia Xie ; Weiwei Cao ; TianZe Wang
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure / Lei Hu
Anonymity / Authentication / Access Control
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET / Rasheed Hussain ; Sangjin Kim ; Heekuck Oh
A Selectable k-Times Relaxed Anonymous Authentication Scheme / Keita Emura ; Atsuko Miyaji ; Kazumasa Omote
PUF-Based Authentication Protocols - Revisited / Heike Busch ; Stefan Kaizenbeisser ; Paul Baecher
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application / Luan Ibraimi ; Milan Petkovic ; Svetla Nikova ; Pieter Hartel ; Willem Jonker
Network Security
Securing Remote Access Inside Wireless Mesh Networks / Mark Manulis
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers / Dae Hyun Yum ; Sun Young Kim ; HoKun Moon ; Mi-Yeon Kim ; Jae-Hoon Roh ; Pil Joong Lee
USN Middleware Security Model / Mijoo Kim ; Mi Yeon Yoon ; Heung Youl Youm
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs / Chae Hoon Lim
Author Index
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
5.

電子ブック

EB
Pierangela Samarati, Claudio A. Ardagna, Takeo Kanade, Fabio Martinelli, Moti Yung, Claudio Agostino Ardagna
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
6.

電子ブック

EB
Kyo-Il Chung, Takeo Kanade, Kiwook Sohn, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
7.

電子ブック

EB
Heung Youl Youm, Takeo Kanade, Moti Yung, Josef Kittler
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
目次情報: 続きを見る
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
Device Security
Application Management Framework in User Centric Smart Card Ownership Model / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes
When Compromised Readers Meet RFID / Gildas Avoine ; Cédric Lauradoux ; Tania Martin
HW Implementation Security
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? / Marcel Medwed ; Jörn-Marc Schmidt
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules / Takeshi Sugawara ; Yu-ichi Hayashi ; Naofumi Homma ; Takaaki Mizuki ; Takafumi Aoki ; Hideaki Sone ; Akashi Satoh
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment / Timo Kasper ; David Oswald ; Christof Paar
Applied Cryptography
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles / Pairat Thorncharoensri ; Willy Susilo ; Yi Mu
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity / Shaojing Fu ; Longjiang Qu ; Chao Li
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy / Kun Peng ; Feng Bao
ID-Based Adaptive Oblivious Transfer / Fangguo Zhang ; Xingwen Zhao ; Xiaofeng Chen
Side Channel Attacks
Unknown Plaintext Template Attacks / Neil Hanley ; Michael Tunstall ; William P. Marnane
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices / Thomas Plos ; Michael Hutter ; Martin Feldhofer
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation / J. Pan ; J.I den Hartog ; Jiqiang Lu
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption / Amir Moradi ; Nima Mousavi ; Mahmoud Salmasizadeh
Cryptograptanalysis
Finding Collisions for a 45-Step Simplified HAS-V / Nicky Mouha ; Christophe De Cannière ; Sebastiaan Indesteege ; Bart Preneel
Non-linear Error Detection for Finite State Machines / Kahraman D. Akdemir ; Ghaith Hammouri ; Berk Sunar
Quadratic Equations from a Kind of S-boxes / Jia Xie ; Weiwei Cao ; TianZe Wang
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure / Lei Hu
Anonymity / Authentication / Access Control
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET / Rasheed Hussain ; Sangjin Kim ; Heekuck Oh
A Selectable k-Times Relaxed Anonymous Authentication Scheme / Keita Emura ; Atsuko Miyaji ; Kazumasa Omote
PUF-Based Authentication Protocols - Revisited / Heike Busch ; Stefan Kaizenbeisser ; Paul Baecher
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application / Luan Ibraimi ; Milan Petkovic ; Svetla Nikova ; Pieter Hartel ; Willem Jonker
Network Security
Securing Remote Access Inside Wireless Mesh Networks / Mark Manulis
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers / Dae Hyun Yum ; Sun Young Kim ; HoKun Moon ; Mi-Yeon Kim ; Jae-Hoon Roh ; Pil Joong Lee
USN Middleware Security Model / Mijoo Kim ; Mi Yeon Yoon ; Heung Youl Youm
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs / Chae Hoon Lim
Author Index
Multimedia Security
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong
8.

電子ブック

EB
Moti Yung, Takeo Kanade, Dongdai Lin, Peng Liu
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼