default search action
11. ISC 2008: Taipei, Taiwan
- Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee:
Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings. Lecture Notes in Computer Science 5222, Springer 2008, ISBN 978-3-540-85884-3
Trusted Computing
- Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy:
Property-Based TPM Virtualization. 1-16 - Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi:
A Demonstrative Ad Hoc Attestation System. 17-30 - Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
Property-Based Attestation without a Trusted Third Party. 31-46 - David Champagne, Reouven Elbaz, Ruby B. Lee:
The Reduced Address Space (RAS) for Application Memory Authentication. 47-63
Database and System Security
- Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao:
An Efficient PIR Construction Using Trusted Hardware. 64-79 - Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos:
Athos: Efficient Authentication of Outsourced File Systems. 80-96 - Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang:
BotTracer: Execution-Based Bot-Like Malware Detection. 97-113
Intrusion Detection
- Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang:
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. 114-130 - Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng:
Distinguishing between FE and DDoS Using Randomness Check. 131-145
Network Security
- Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos:
Antisocial Networks: Turning a Social Network into a Botnet. 146-160 - Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos:
Compromising Anonymity Using Packet Spinning. 161-174 - Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis:
Behavior-Based Network Access Control: A Proof-of-Concept. 175-190 - Matthew Burnside, Angelos D. Keromytis:
Path-Based Access Control for Enterprise Networks. 191-203
Cryptanalysis
- Yi Lu, Huaxiong Wang, San Ling:
Cryptanalysis of Rabbit. 204-214 - Jintai Ding, Dieter Schmidt, Fabian Werner:
Algebraic Attack on HFE Revisited. 215-227 - Subhamoy Maitra, Santanu Sarkar:
Revisiting Wiener's Attack - New Weak Keys in RSA. 228-243 - Somitra Kumar Sanadhya, Palash Sarkar:
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. 244-259
Digital Signatures
- Sherman S. M. Chow, Raphael C.-W. Phan:
Proxy Re-signatures in the Standard Model. 260-276 - Pei-Yih Ting, Xiao-Wei Huang:
An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner. 277-284 - Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou:
Certificate-Based Signature Schemes without Pairings or Random Oracles. 285-297
AES Special Session
- Lei Zhang, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom:
Improved Impossible Differential Attacks on Large-Block Rijndael. 298-315 - Jianyong Huang, Jennifer Seberry, Willy Susilo:
A Five-Round Algebraic Property of the Advanced Encryption Standard. 316-330 - Shay Gueron, Michael E. Kounavis:
Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication. 331-340 - Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust:
Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip. 341-354
Symmetric Cryptography and Hash Functions
- Sebastiaan Indesteege, Bart Preneel:
Collisions for RC4-Hash. 355-366 - Jiali Choy, Khoongming Khoo:
New Applications of Differential Bounds of the SDS Structure. 367-384
Authentication
- Claudio Soriente, Gene Tsudik, Ersin Uzun:
HAPADEP: Human-Assisted Pure Audio Device Pairing. 385-400 - Dinei A. F. Florêncio, Cormac Herley:
One-Time Password Access to Any Server without Changing the Server. 401-420 - Baris Coskun, Cormac Herley:
Can "Something You Know" Be Saved?. 421-440
Security Protocols
- Helger Lipmaa:
New Communication-Efficient Oblivious Transfer Protocols Based on Pairings. 441-454 - Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. 455-470 - Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo:
Strong Accumulators from Collision-Resistant Hashing. 471-486 - Yali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal:
A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance. 487-501
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.