Multimedia Security |
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo |
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong |
Device Security |
Application Management Framework in User Centric Smart Card Ownership Model / Raja Naeem Akram ; Konstantinos Markantonakis ; Keith Mayes |
When Compromised Readers Meet RFID / Gildas Avoine ; Cédric Lauradoux ; Tania Martin |
HW Implementation Security |
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? / Marcel Medwed ; Jörn-Marc Schmidt |
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules / Takeshi Sugawara ; Yu-ichi Hayashi ; Naofumi Homma ; Takaaki Mizuki ; Takafumi Aoki ; Hideaki Sone ; Akashi Satoh |
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment / Timo Kasper ; David Oswald ; Christof Paar |
Applied Cryptography |
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles / Pairat Thorncharoensri ; Willy Susilo ; Yi Mu |
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity / Shaojing Fu ; Longjiang Qu ; Chao Li |
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy / Kun Peng ; Feng Bao |
ID-Based Adaptive Oblivious Transfer / Fangguo Zhang ; Xingwen Zhao ; Xiaofeng Chen |
Side Channel Attacks |
Unknown Plaintext Template Attacks / Neil Hanley ; Michael Tunstall ; William P. Marnane |
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices / Thomas Plos ; Michael Hutter ; Martin Feldhofer |
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation / J. Pan ; J.I den Hartog ; Jiqiang Lu |
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption / Amir Moradi ; Nima Mousavi ; Mahmoud Salmasizadeh |
Cryptograptanalysis |
Finding Collisions for a 45-Step Simplified HAS-V / Nicky Mouha ; Christophe De Cannière ; Sebastiaan Indesteege ; Bart Preneel |
Non-linear Error Detection for Finite State Machines / Kahraman D. Akdemir ; Ghaith Hammouri ; Berk Sunar |
Quadratic Equations from a Kind of S-boxes / Jia Xie ; Weiwei Cao ; TianZe Wang |
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure / Lei Hu |
Anonymity / Authentication / Access Control |
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET / Rasheed Hussain ; Sangjin Kim ; Heekuck Oh |
A Selectable k-Times Relaxed Anonymous Authentication Scheme / Keita Emura ; Atsuko Miyaji ; Kazumasa Omote |
PUF-Based Authentication Protocols - Revisited / Heike Busch ; Stefan Kaizenbeisser ; Paul Baecher |
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application / Luan Ibraimi ; Milan Petkovic ; Svetla Nikova ; Pieter Hartel ; Willem Jonker |
Network Security |
Securing Remote Access Inside Wireless Mesh Networks / Mark Manulis |
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers / Dae Hyun Yum ; Sun Young Kim ; HoKun Moon ; Mi-Yeon Kim ; Jae-Hoon Roh ; Pil Joong Lee |
USN Middleware Security Model / Mijoo Kim ; Mi Yeon Yoon ; Heung Youl Youm |
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs / Chae Hoon Lim |
Author Index |
Multimedia Security |
Protecting IPTV Service Network against Malicious Rendezvous Point / Hyeokchan Kwon ; Yong-Hyuk Moon ; Jaehoon Nah ; Dongil Seo |
Design and Implementation of SIP-aware Security Management System / KyoungHee Ko ; Hwan-Kuk Kim ; Jeong Wook Kim ; Chang-Yong Lee ; Soo-Gil Cha ; Hyun Cheol Jeong |