default search action
ISPEC 2009: Xi'an, China
- Feng Bao, Hui Li, Guilin Wang:
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings. Lecture Notes in Computer Science 5451, Springer 2009, ISBN 978-3-642-00842-9
Public Key Encryption
- Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. 1-12 - Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi:
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. 13-23 - Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou:
RSA-Based Certificateless Public Key Encryption. 24-34
Digital Signatures
- Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:
Strongly Unforgeable ID-Based Signatures without Random Oracles. 35-46 - Jianhong Zhang:
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings. 47-58
System Security
- Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang:
An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems. 59-70 - Xianggen Wang, Dengguo Feng, Purui Su:
Reconstructing a Packed DLL Binary for Static Analysis. 71-82 - Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang:
Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework. 83-92
Applied Cryptography
- Guifang Huang, Dongdai Lin, Yanshuo Zhang:
Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge. 93-101 - Huafei Zhu:
New Constructions for Reusable, Non-erasure and Universally Composable Commitments. 102-111 - Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Certificateless Hybrid Signcryption. 112-123 - Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu:
On Non-representable Secret Sharing Matroids. 124-135
Multimedia Security and DRM
- Shaomin Zhu, Jianming Liu:
A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization. 136-146 - Hongxia Jin, Jeffrey B. Lotspiech:
Defending against the Pirate Evolution Attack. 147-158 - Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won:
Security Specification for Conversion Technologies of Heterogeneous DRM Systems. 159-170
Security Protocols
- Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven:
Analysing Protocol Implementations. 171-182 - Xiaojuan Cai, Yonggen Gu:
Measuring Anonymity. 183-194 - Kun Peng:
A Hybrid E-Voting Scheme. 195-206
Key Exchange and Management
- Shuhua Wu, Yuefei Zhu:
A Framework for Authenticated Key Exchange in the Standard Model. 207-218 - Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta:
Secret Handshake: Strong Anonymity Definition and Construction. 219-229 - Farshid Farhat, Somayeh Salimi, Ahmad Salahi:
An Extended Authentication and Key Agreement Protocol of UMTS. 230-244 - Mohamed Karroumi, Ayoub Massoudi:
Hash-Based Key Management Schemes for MPEG4-FGS. 245-256
Hash Functions and MACs
- Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:
Twister- A Framework for Secure and Fast Hash Functions. 257-273 - Gaoli Wang, Shaohui Wang:
Preimage Attack on Hash Function RIPEMD. 274-284 - Hongbo Yu, Xiaoyun Wang:
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. 285-297
Cryptanalysis
- Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher. 298-309 - Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2. 310-323 - Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard. 324-335 - Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Correctness of an Approach against Side-Channel Attacks. 336-344
Network Security
- Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi:
Ranking Attack Graphs with Graph Neural Networks. 345-359 - Feng Cheng, Sebastian Roschke, Christoph Meinel:
Implementing IDS Management on Lock-Keeper. 360-371
Security Applications
- Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng:
Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems. 372-383 - Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu:
Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing. 384-395 - Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy:
Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing. 396-407
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.