default search action
ISPEC 2011: Guangzhou, China
- Feng Bao, Jian Weng:
Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings. Lecture Notes in Computer Science 6672, Springer 2011, ISBN 978-3-642-21030-3
Public Key Encryption
- Huafei Zhu:
Public-Key Encryptions Tolerating Adaptive and Composable Adversaries. 1-13 - Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia:
Encryption Simulatability Reconsidered. 14-23 - Junzuo Lai, Robert H. Deng, Yingjiu Li:
Fully Secure Cipertext-Policy Hiding CP-ABE. 24-39 - Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. 40-54 - Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen:
New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. 55-70
Cloud Security
- Imad M. Abbadi:
Toward Trustworthy Clouds' Internet Scale Critical Infrastructure. 71-82 - Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. 83-97 - Jun-e Liu, Zhiguo Wan, Ming Gu:
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing. 98-107
Security Applications
- Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova:
Privacy Enhanced Access Control by Means of Policy Blinding. 108-122 - Yikai Wang, Yi Mu, Minjie Zhang:
Policy-Based Authentication for Mobile Agents. 123-137 - Xuhua Zhou, Xuhua Ding, Kefei Chen:
Lightweight Delegated Subset Test with Privacy Protection. 138-151
Post-quantum Cryptography and Side-Channel Attack
- Michael Rose, Thomas Plantard, Willy Susilo:
Improving BDD Cryptosystems in General Lattices. 152-167 - Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin:
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. 168-180 - Guangdong Yang, Shaohua Tang, Li Yang:
A Novel Group Signature Scheme Based on MPKC. 181-195 - Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng:
How to Characterize Side-Channel Leakages More Accurately? 196-207
Block Ciphers and MACs
- Jorge Nakahara Jr.:
New Impossible Differential and Known-Key Distinguishers for the 3D Cipher. 208-221 - Yongzhuang Wei, Jiqiang Lu, Yupu Hu:
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. 222-232 - Bo Liang, Wenling Wu, Liting Zhang:
BCBC: A More Efficient MAC Algorithm. 233-246 - Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng:
On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs. 247-256
Signature, Secrete Sharing and Traitor Tracing
- Qiong Huang, Duncan S. Wong:
Short Convertible Undeniable Signature in the Standard Model. 257-272 - Mahabir Prasad Jhanwar:
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme. 273-287 - Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian:
An Efficient Group-Based Secret Sharing Scheme. 288-301 - Xingwen Zhao, Fangguo Zhang:
Traitor Tracing against Public Collaboration. 302-316
System Security and Network Security
- Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. 317-332 - Tristan Allard, Benjamin Nguyen, Philippe Pucheral:
Sanitizing Microdata without Leak: Combining Preventive and Curative Actions. 333-342 - Jonghoon Kwon, Jehyun Lee, Heejo Lee:
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. 343-361 - Quan Pham, Jason Reid, Ed Dawson:
A Model for Constraint and Delegation Management. 362-371
Security Protocols
- Huafei Zhu:
Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries. 372-385 - An Wang, Zheng Li, Xianwen Yang, Yanyan Yu:
A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. 386-400 - Ning Ding, Dawu Gu:
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware. 401-416 - Jiaxin Pan, Libin Wang, Changshe Ma:
Analysis and Improvement of an Authenticated Key Exchange Protocol. 417-431 - Lijun Zhang, Kunpeng Wang, Hong Wang, Dingfeng Ye:
Another Elliptic Curve Model for Faster Pairing Computation. 432-446
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.