default search action
3rd AsiaCCS 2008: Tokyo, Japan
- Masayuki Abe, Virgil D. Gligor:
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008. ACM 2008, ISBN 978-1-59593-979-1
Invited talk
- Gene Tsudik:
Confronting a mobile adversary in unattended sensor networks. 1 - Tsutomu Matsumoto:
Prototyping security test objects for use with advanced biometric authentication systems. 2
Hash and MAC
- Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A strict evaluation method on the number of conditions for the SHA-1 collision search. 10-20 - Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer:
HMAC is a randomness extractor and applications to TLS. 21-32
Side channel attacks
- Thanh-Ha Le, Cécile Canovas, Jessy Clédière:
An overview of side channel analysis attacks. 33-43 - Marcus Völp, Claude-Joachim Hamann, Hermann Härtig:
Avoiding timing channels in fixed-priority schedulers. 44-55
Block cipher
- Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung:
A block cipher based pseudo random number generator secure against side-channel key recovery. 56-65
Formal verification
- Cas Cremers:
On the protocol composition logic PCL. 66-76 - Marcin Olszewski, Lukasz Cyra:
An integrated framework for security protocol analysis. 77-86 - Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Computationally sound mechanized proofs for basic and public-key Kerberos. 87-99 - A. Prasad Sistla, V. N. Venkatakrishnan, Michelle Zhou, Hilary Branske:
CMV: automatic verification of complete mediation for java virtual machines. 100-111
Secure implementation
- Salvador Cavadini:
Secure slices of insecure programs. 112-122 - Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy:
Verified implementations of the information card federated identity-management protocol. 123-135
Network security (I)
- Guofei Gu, Alvaro A. Cárdenas, Wenke Lee:
Principled reasoning and practical applications of alert fusion in intrusion detection systems. 136-147 - Christoph Fuchs, Nils Aschenbruck, Felix Leder, Peter Martini:
Detecting VoIP based DoS attacks at the public safety answering point. 148-155 - Chetan Parampalli, R. Sekar, Rob Johnson:
A practical mimicry attack against powerful system-call monitors. 156-167
Network security (II)
- Bryan Parno, Adrian Perrig, Dave G. Andersen:
SNAPP: stateless network-authenticated path pinning. 168-178 - Liming Lu, Mun Choon Chan, Ee-Chien Chang:
A general model of probabilistic packet marking for IP traceback. 179-188 - Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux:
Secure neighbor discovery in wireless networks: formal investigation of possibility. 189-200 - Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. 201-204
Access control
- Liang Chen, Jason Crampton:
On spatio-temporal constraints and inheritance in role-based access control. 205-216 - Marina Blanton:
Online subscriptions with anonymous access. 217-227 - Adam J. Lee, Marianne Winslett:
Towards an efficient and language-agnostic compliance checker for trust negotiation systems. 228-239 - Alexander Pretschner, Manuel Hilty, David A. Basin, Christian Schaefer, Thomas Walter:
Mechanisms for usage control. 240-244 - Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang:
Usage control platformization via trustworthy SELinux. 245-248
Key exchange
- Emmanuel Bresson, Mark Manulis:
Securing group key exchange against strong corruptions. 249-260 - Alfred Menezes, Berkant Ustaoglu:
Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. 261-270 - Reihaneh Safavi-Naini, Shaoquan Jiang:
Non-interactive conference key distribution and its applications. 271-282
RFID security
- Mike Burmester, Breno de Medeiros, Rossana Motta:
Robust, anonymous RFID authentication with constant key-lookup. 283-291 - Radu-Ioan Paise, Serge Vaudenay:
Mutual authentication in RFID: security and privacy. 292-299
Protocols
- Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Provably secure browser-based user-aware mutual authentication over TLS. 300-311 - Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho:
Private combinatorial group testing. 312-320 - Stephen S. Yau, Yin Yin:
Controlled privacy preserving keyword search. 321-324
Digital signatures (I)
- Shouhuai Xu, Xiaohu Li, T. Paul Parker:
Exploiting social networks for threshold signing: attack-resilience vs. availability. 325-336 - Toru Nakanishi, Nobuo Funabiki:
A short anonymously revocable group signature scheme from decision linear assumption. 337-340
Digital signatures (II)
- Di Ma:
Practical forward secure sequential aggregate signatures. 341-352 - Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao:
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. 353-362 - Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Efficient designated confirmer signature from bilinear pairings. 363-368 - Manuel Barbosa, Pooya Farshim:
Certificateless signcryption. 369-372
Identity based encryption
- Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee:
Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. 373-380 - Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata:
Stateful identity-based encryption scheme: faster encryption and decryption. 381-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.