close
1.

図書

図書
Yongfei Han, Tatsuaki Okamoto, Sihan Qing, (eds.)
出版情報: Berlin : Springer, c1997  x, 484 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1334
所蔵情報: loading…
2.

図書

図書
Robert Deng ... [et al.] (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xii, 496 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2513
所蔵情報: loading…
3.

図書

図書
Peng Ning, Sihan Qing, Ninghui Li (eds.)
出版情報: Berlin : Springer, c2006  xiv, 558 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4307
所蔵情報: loading…
4.

図書

図書
Sihan Qing ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xiv, 492 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3783
所蔵情報: loading…
5.

図書

図書
Vijay Varadharajan, Yi Mu (eds.)
出版情報: Berlin : Springer, c1999  xi, 323 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1726
所蔵情報: loading…
目次情報: 続きを見る
Keynote Speech
International Cryptography / Doug McGowan
Cryptanalysis
Reaction attacks against several public key cryptosystems / C. Hall ; I. Goldberg ; B. Schneier
Cryptanalysis of some AES candidate algorithms / W. Wu ; B. Li ; D. Feng ; S. Qing
Language Based Approach to Security
Issues in the design of a language for role based access control / M. Hitchens ; V. Varadharajan
Extending Erlang for safe mobile code execution / L. Brown ; D. Sahlin
Electronic Commerce and Secret Sharing
Detachable electronic coins / C. Pavlovski ; C. Boyd ; E. Foo
Linear secret sharing with divisible shares / J. Pieprzyk
Efficient publicly verifiable secret sharing schemes with fast or delayed recovery / F. Boudot ; J. Traore
Digital Signatures
Zero-knowledge proofs of possession of ElGamal-like digital signatures and its applications / K. Q. Nguyen ; F. Bao ; Y. Mu
Signature scheme for controlled environments / K. Viswanathan ; E. Dawson
On the cryptographic value of the Qth root problem / C. L. Beaver ; P. S. Gemmell ; A. M. Johnston ; W. Neumann
Protecting Critical Information Systems / Sushil Jajodia
Security Protocols
Delegation chains secure up to constant length / M. Abe ; T. Okamoto
Optimal construction of unconditionally secured ID-based key sharing scheme for large-scale networks / G. Hanaoka ; T. Nishioka ; Y. Zheng ; H. Imai
Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack / S. Hirose ; K. Matsuura
An extended logic for analyzing timed-release public-key protocols / M. Kudo ; A. Mathuria
Applications
Bringing together X.509 and EDIFACT public key infrastructures: The DEDICA project / M. Rubia ; J. C. Cruellas ; M. Medina
User identification system based on biometrics for keystroke / K. Omote ; E. Okamoto
Boundary conditions that influence decisions about log file formats in multi-application smart cards / C. Markantonakis
Sending message into a definite future / W. Mao
Cryptography
Efficient accumulators without trapdoor / T. Sander
Evolutionary heuristics for finding cryptographically strong S-Boxes / W. Millan ; L. Burnett ; G. Garter ; A. Clark
Incremental authentication of tree-structured documents / P. Ekdahl ; B. Smeets
Complexity and Security Functions
Plateaued Functions / X.-M. Zhang
On the linear complexity of the Naor-Reingold pseudo-random function / F. Griffin ; I. E. Shparlinski
On the channel capacity of narrow-band subliminal channels / K. Kobara
Author Index
Keynote Speech
International Cryptography / Doug McGowan
Cryptanalysis
6.

図書

図書
Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 416 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2836
所蔵情報: loading…
目次情報: 続きを見る
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST / Duncan S. Wong ; Karyin Fung ; Joseph K. Liu ; Victor K. Wei
A Policy Based Framework for Access Control / Ricardo Nabhen ; Edgard Jamhour ; Carlos Maziero
Trading-Off Type-Inference Memory Complexity against Communication / Konstantin Hyppönen ; David Naccache ; Elena Trichina ; Alexei Tchoulkine
Security Remarks on a Group Signature Scheme with Member Deletion / Guilin Wang ; Feng Bao ; Jianying Zhou ; Robert H. Deng
An Efficient Known Plaintext Attack on FEA-M / Hongjun Wu
An Efficient Public-Key Framework / Robert Deng
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature / Jong-Phil Yang ; Chul Sur ; Kyung Hyune Rhee
Practical Service Charge for P2P Content Distribution / Jose Antonio Onieva ; Javier Lopez
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback / Henry C.J. Lee ; Vrizlynn L.L. Thing ; Yi Xu ; Miao Ma
A Lattice Based General Blind Watermark Scheme / Yongliang Liu ; Wen Gao ; Zhao Wang ; Shaohui Liu
Role-Based Access Control and the Access Control Matrix / Gregory Saunders ; Michael Hitchens ; Vijay Varadharajan
Broadcast Encryption Schemes Based on the Sectioned Key Tree / Miodrag J. Mihaljevic
Research on the Collusion Estimation / Gang Li ; Jie Yang
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains / Mohsen Ashourian ; Yo-Sung Ho
Protocols for Malicious Host Revocation / Oscar Esparza ; Miguel Soriano ; Jose L. Muñoz ; Jordi Forne
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code / Pik-Wah Chan ; Michael R. Lyu
A Novel Two-Level Trust Model for Grid / Tie-Yan Li ; HuaFei Zhu ; Kwok-Yan Lam
Practical t-out-n Oblivious Transfer and Its Applications / Qian-Hong Wu ; Jian-Hong Zhang ; Yu-Min Wang
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme / Yongdong Wu
ID-Based Distributed "Magic Ink" Signature from Pairings / Yan Xie ; Fangguo Zhang ; Xiaofeng Chen
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature / Shuwang Lü ; Zhenhua Liu
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives / Yang Cui ; Kazukuni Kobara ; Hideki Imai
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems / Xiao-dong Yi ; Xue-jun Yang
A Novel Efficient Group Signature Scheme with Forward Security / Jianhong Zhang ; Qianhong Wu ; Yumin Wang
Variations of Diffie-Hellman Problem
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine / Taeshik Sohn ; JungTaek Seo ; Jongsub Moon
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine / Min Luo ; Lina Wang ; Huanguo Zhang ; Jin Chen
UC-RBAC: A Usage Constrained Role-Based Access Control Model / Zhen Xu ; Dengguo Feng ; Lan Li ; Hua Chen
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography / Mathieu Ciet ; Marc Joye
An Optimized Multi-bits Blind Watermarking Scheme / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
A Compound Intrusion Detection Model / Jianhua Sun ; Hai Jin ; Hao Chen ; Qian Zhang ; Zongfen Han
An Efficient Convertible Authenticated Encryption Scheme and Its Variant / Hui-Feng Huang ; Chin-Chen Chang
Space-Economical Reassembly for Intrusion Detection System / Meng Zhang ; Jiu-bin Ju
A Functional Decomposition of Virus and Worm Programs / J. Krishna Murthy
Author Index
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
7.

図書

図書
Javier Lopez, Sihan Qing, Eiji Okamoto (eds.)
出版情報: Berlin : Springer, c2004  xi, 564 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3269
所蔵情報: loading…
目次情報: 続きを見る
On the Minimal Assumptions of Group Signature Schemes / Michel Abdalla ; Bogdan Warinschi
Perfect Concurrent Signature Schemes / Willy Susilo ; Yi Mu ; Fangguo Zhang
New Identity-Based Ring Signature Schemes / Javier Herranz ; Germán Sáez
On the Security of a Multi-party Certified Email Protocol / Jianying Zhou
Robust Metering Schemes for General Access Structures / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
PAYFLUX - Secure Electronic Payment in Mobile AdHoc Networks / Klaus Herrmann ; Michael A. Jaeger
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN / Tieyan Li ; Yongdong Wu ; Di Ma ; Huafei Zhu ; Robert H. Deng
Provably Secure Authenticated Tree Based Group Key Agreement / Ratna Dutta ; Rana Barua ; Palash Sarkar
Taxonomic Consideration to OAEP Variants and Their Security / Yuichi Komano ; Kazuo Ohta
Factorization-Based Fail-Stop Signatures Revisited / Katja Schmidt-Samoa
A Qualitative Evaluation of Security Patterns / Spyros T. Halkidis ; Alexander Chatzigeorgiou ; George Stephanides
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases / Yasunori Ishihara ; Yumi Shimakawa ; Toru Fujiwara
Volatile Memory Computer Forensics to Detect Kernel Level Compromise / Sandra Ring ; Eric Cole
A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet / Ilanit Moodahi ; Ehud Gudes ; Oz Lavee ; Amnon Meisels
Hydan: Hiding Information in Program Binaries / Rakan El-Khalil ; Angelos D. Keromytis
A Semi-fragile Steganographic Digital Signature for Images / Luke Hebbes ; Andrew Lenaghan
Identification of Traitors Using a Trellis / Marcel Fernandez ; Miguel Soriano
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation / Joaquin Garcia ; Fabien Autrel ; Joan Borrell ; Sergio Castillo ; Frederic Cuppens ; Guillermo Navarro
Reflector Attack Traceback System with Pushback Based iTrace Mechanism / Hyung-Woo Lee ; Sung-Hyun Yun ; Taekyoung Kwon ; Jae-Sung Kim ; Hee-Un Park ; Nam-Ho Oh
Automatic Covert Channel Analysis of a Multilevel Secure Component / Ruggero Lanotte ; Andrea Maggiolo-Schettini ; Simone Tini ; Angelo Troina ; Enrico Tronci
Sound Approximations to Diffie-Hellman Using Rewrite Rules / Christopher Lynch ; Catherine Meadows
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks / Anton Kargl ; Gotz Wiesend
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm / Sang Gyoo Sim ; Dong Jin Park ; Pil Joong Lee
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure / Dong-Guk Han ; Tetsuya Izu ; Jongin Lim ; Kouichi Sakurai
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Jari Veijalainen
Threat Analysis on NEtwork MObility (NEMO) / Souhwan Jung ; Fan Zhao ; S. Felix Wu ; HyunGon Kim
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept / Michelangelo Giansiracusa ; Selwyn Russell ; Andrew Clark ; Volker Roth
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) / Tao Wan ; Evangelos Kranakis ; Paul C. van Oorschot
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management / Miodrag J. Mihaljevic ; Marc P.C. Fossorier ; Hideki Imai
Security Analysis of the Generalized Self-shrinking Generator / Bin Zhang ; Hongjun Wu ; Dengguo Feng ; Feng Bao
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis / Bo-Yin Yang ; Jiun-Ming Chen ; Nicolas T. Courtois
On Some Weak Extensions of AES and BES / Jean Monnerat ; Serge Vaudenay
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario / Slobodan Petrovic ; Amparo Fúster-Sabater
Transient Fault Induction Attacks on XTR / Mathieu Ciet ; Christophe Giraud
Adaptive-CCA on OpenPGP Revisited / Hsi-Chung Lin ; Sung-Ming Yen ; Guan-Ting Chen
A New Key-Insulated Signature Scheme / Nicolás González-Deleito ; Olivier Markowitch ; Emmanuel Dall'Olio
Secure Hierarchical Identity Based Signature and Its Application / Sherman S.M. Chow ; Lucas C.K. Hui ; Siu Ming Yiu ; K.P. Chow
Multi-designated Verifiers Signatures / Fabien Laguillaumie ; Damien Vergnaud
Dynamic Access Control for Multi-privileged Group Communications
An Efficient Authentication Scheme Using Recovery Information in Signature / Kihun Hong
Time-Scoped Searching of Encrypted Audit Logs / Darren Davis ; Fabian Monrose ; Michael K. Reiter
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems / Habtamu Abie ; PÃ¥l Spilling ; Bent Foyn
Author Index
On the Minimal Assumptions of Group Signature Schemes / Michel Abdalla ; Bogdan Warinschi
Perfect Concurrent Signature Schemes / Willy Susilo ; Yi Mu ; Fangguo Zhang
New Identity-Based Ring Signature Schemes / Javier Herranz ; Germán Sáez
8.

図書

図書
Sihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
出版情報: Berlin : Springer, c2001  xiv, 504 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2229
所蔵情報: loading…
目次情報: 続きを見る
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
Unconditionally-Secure Oblivious Transfer / Bo Yan ; Shixiong Zhu ; Yumin Wang
Cryptanalysis of the Improved User Efficient Blind Signatures / Chin-Chen Chang ; Iuon-Chang Lin
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret / Kuo-Feng Hwang
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain / Xiaochen Bo ; Lincheng Shen ; Wensen Chang
A Cyclic Window Algorithm for ECC Defined over Extension Fields / Kazumaro Aoki ; Fumitaka Hoshino ; Tetsutaro Kobayashi
Fast Scalar Multiplication on the Jacobian of a Family of Hyperelliptic Curves / Fangguo Zhang ; Futai Zhang
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes / Dingfeng Ye ; Junhui Yang ; Zongduo Dai ; Haiwen Ou
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce / Kanta Matsuura
A New Approach for Secure Multicast Routing in a Large Scale Network / Young-Chul Shim
A Transaction Length-Sensitive Protocol Based on Altruistic Locking for Multilevel Secure Database Systems / Hee-Wan Kim ; Hae-Kyung Rhee ; Tai M. Chung ; Young Ik Eom ; Ung-Mo Kim
Dealing with Uncertainties in Risk Analysis Using Belief Functions / Sungbaek Cho ; Zbigniew Ciechanowicz
RBAC for XML Document Stores / Michael Hitchens ; Vijay Varadharajan
Cheating Immune Secret Sharing / Xian-Mo Zhang ; JosefPieprzyk
Encryption Sticks (Randomats) / Gideon Samid
Applying NCP Logic to the Analysis of SSL 3.0 / Zhimin Song ; Sihan Qing
Performance of WTLS and Its Impact on an M-commerce Transaction / Ian Herwono ; Ingo Liebhardt
Enforcing Obligation with Security Monitors / Carlos Ribeiro ; Andre Zuquete ; Paulo Ferreira
Efficient Software Implementation for Finite Field Multiplication in Normal Basis / Peng Ning ; Yiqun Lisa Yin
Playing Lottery on the Internet / Jianying Zhou ; Chunfu Tan
Privacy Protection for Transactions of Digital Goods / Feng Bao ; Robert Deng
Equivalent Characterizations and Applications of Multi-output Correlation-Immune Boolean Functions / Jie-lua Xu ; Han-liang Xu ; Yan Wang ; Shu-Wang Lu
Threshold Undeniable RSA Signature Scheme / Guilin Wang ; Mingsheng Wang ; Zhanfei Zhou
Two Simple Batch Verifying Multiple Digital Signatures / Min-Shiang Hwang ; Cheng-Chi Lee ; Yuan-Liang Tang
Square Attack on Reduced Camellia Cipher / Yeping He
Generalization of Elliptic Curve Digital Signature Schemes / Lin You ; Yi Xian Yang ; Chun Qi Zhang
Reasoning about Accountability within Delegation / Bruno Crispo ; Giancarlo Ruffo
A Novel Data Hiding Method for Two-Color Images / Gang Pan ; Yijun Wu ; Zhaohui Wu
An Identification Scheme Provably Secure against Reset Attack / C.-H. Lee ; X. Deng ; H. Zhu
Estimating the Scalability of the Internet Key Exchange / Sanna Kunnari
An Efficient Information Flow Analysis of Recursive Programs Based on a Lattice Model of Security Classes / Shigeta Kuninobu ; Yoshiaki Takata ; Hiroyuki Seki ; Katsuro Inoue
Defeating Denial-of-Service Attacks on the Internet / Baoqing Ye
A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications / Dianlong Zhang ; Harald Lukhaub ; Werner Zorn
A Unified Methodology for Verification and Synthesis of Firewall Configurations / Yongyuth Permpoontanalarp ; Chaiwat Rujimethabhas
Quantifying Network Denial of Service: A Location Service Case Study / Yan Chen ; Adam Bargteil ; David Bindel ; Randy H. Katz ; John Kubiatowicz
A Public Key Cryptosystem Based on the Subgroup Membership Problem / Juan Manuel Gonzalez Nieto ; Colin Boyd ; Ed Dawson
On a Network Security Model for the Secure Information Flow on Multilevel Secure Network / Ki-Yoong Hong ; Chul Kim
NIDS Research Based on Artificial Immunology / Wenjian Luo ; Xianbin Cao ; Xufa Wang
AMBAR Protocol: Access Management Based on Authorization Reduction / Oscar Cánovas ; Antonio F. Gómez
Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication / Xukai Zou ; Byrav Ramamurthy ; Spyros S. Magliveras
Dispatching Mobile Agents with Secure Routes in Parallel / Kian-Lee Tan
TH-SMS: Security Management System in Advanced Computational Infrastructure / Yu Chen ; Qian Fang ; Zhihui Du ; Zhenchun Huang ; Sanli Li
Cryptography and Middleware Security / Ulrich Lang ; Dieter Gollmann ; Rudolf Schreiner
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes / Kencheng Zeng ; Chung-Huang Yang ; T.R.N. Rao
A Role-Based Model for Access Control in Database Federations / Eric Disson ; Danielle Boulanger ; Gilles Dubois
A Useful Intrusion Detection System Prototype to Monitor Multi-processes Based on System Calls / Hongpei Li ; Lianli Chang ; Xinmei Wang
A Digital Nominative Proxy Signature Scheme for Mobile Communication / Hee-Un Park ; Im-Yeong Lee
Hierarchical Simulation Model with Animation for Large Network Security / Mi Ra Yi ; Tae Ho Cho
Fair Electronic Cash Based on a Group Signature Scheme / Greg Maitland
Fair Exchange of Digital Signatures with Offline Trusted Third Party / Chuan-Kun Wu
SECUSIM: A Tool for the Cyber-Attack Simulation / Jong Sou Park ; Jang-Se Lee ; Hwan Kuk Kim ; Jeong-Rye Jeong ; Dong-Bok Yeom ; Sung-Do Chi
A New Semantics of Authentication Logic / Yifa Li
Robust and Fragile Watermarking Techniques for Documents Using Bi-directional Diagonal Profiles / Ji Hwan Park ; Sook Ee Jeong ; Chang Soo Kim
Redundancy, Obscurity, Self-Containment & Independence / Seenil Gram
Author Index
Security of Blind Discrete Log Signatures against Interactive Attacks / Glaus Peter Schnorr
An Intelligent Intruder Model for Security Protocol Analysis / Dongxi Liu ; Xiaoyong Li ; Yingcai Bai
Primitive Polynomials over GF(2) - A Cryptologic Approach / Kishan Chand Gupta ; Subhamoy Maitra
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼