Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr |
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai |
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra |
Unconditionally-Secure Oblivious Transfer / Bo Yan ; Shixiong Zhu ; Yumin Wang |
Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang ; Iuon-Chang Lin |
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Kuo-Feng Hwang |
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo ; Lincheng Shen ; Wensen Chang |
A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki ; Fumitaka Hoshino ; Tetsutaro Kobayashi |
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang ; Futai Zhang |
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye ; Junhui Yang ; Zongduo Dai ; Haiwen Ou |
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura |
A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim |
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim ; Hae-Kyung Rhee ; Tai M. Chung ; Young Ik Eom ; Ung-Mo Kim |
Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho ; Zbigniew Ciechanowicz |
RBAC for XML Document Stores / Michael Hitchens ; Vijay Varadharajan |
Cheating Immune Secret Sharing / Xian-Mo Zhang ; JosefPieprzyk |
Encryption Sticks (Randomats) / Gideon Samid |
Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song ; Sihan Qing |
Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono ; Ingo Liebhardt |
Enforcing Obligation with Security Monitors / Carlos Ribeiro ; Andre Zuquete ; Paulo Ferreira |
Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning ; Yiqun Lisa Yin |
Playing Lottery on the Internet / Jianying Zhou ; Chunfu Tan |
Privacy Protection for Transactions of Digital Goods / Feng Bao ; Robert Deng |
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lua Xu ; Han-liang Xu ; Yan Wang ; Shu-Wang Lu |
Threshold Undeniable RSA Signature Scheme / Guilin Wang ; Mingsheng Wang ; Zhanfei Zhou |
Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang ; Cheng-Chi Lee ; Yuan-Liang Tang |
Square Attack on Reduced Camellia Cipher / Yeping He |
Generalization of Elliptic Curve Digital Signature Schemes / Lin You ; Yi Xian Yang ; Chun Qi Zhang |
Reasoning about Accountability within Delegation / Bruno Crispo ; Giancarlo Ruffo |
A Novel Data Hiding Method for Two-Color Images / Gang Pan ; Yijun Wu ; Zhaohui Wu |
An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee ; X. Deng ; H. Zhu |
Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari |
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu ; Yoshiaki Takata ; Hiroyuki Seki ; Katsuro Inoue |
Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye |
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang ; Harald Lukhaub ; Werner Zorn |
A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp ; Chaiwat Rujimethabhas |
Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen ; Adam Bargteil ; David Bindel ; Randy H. Katz ; John Kubiatowicz |
A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto ; Colin Boyd ; Ed Dawson |
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong ; Chul Kim |
NIDS Research Based on Artificial Immunology / Wenjian Luo ; Xianbin Cao ; Xufa Wang |
AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Cánovas ; Antonio F. Gómez |
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou ; Byrav Ramamurthy ; Spyros S. Magliveras |
Dispatching Mobile Agents with Secure Routes in Parallel / Kian-Lee Tan |
TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen ; Qian Fang ; Zhihui Du ; Zhenchun Huang ; Sanli Li |
Cryptography and Middleware Security / Ulrich Lang ; Dieter Gollmann ; Rudolf Schreiner |
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng ; Chung-Huang Yang ; T.R.N. Rao |
A Role-Based Model for Access Control in Database Federations / Eric Disson ; Danielle Boulanger ; Gilles Dubois |
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li ; Lianli Chang ; Xinmei Wang |
A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park ; Im-Yeong Lee |
Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi ; Tae Ho Cho |
Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland |
Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu |
SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park ; Jang-Se Lee ; Hwan Kuk Kim ; Jeong-Rye Jeong ; Dong-Bok Yeom ; Sung-Do Chi |
A New Semantics of Authentication Logic / Yifa Li |
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park ; Sook Ee Jeong ; Chang Soo Kim |
Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram |
Author Index |
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr |
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai |
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra |