default search action
4. ISC 2001: Malaga, Spain
- George I. Davida, Yair Frankel:
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings. Lecture Notes in Computer Science 2200, Springer 2001, ISBN 3-540-42662-0
Key Distribution
- Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró:
Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 1-17 - Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky:
Privacy Amplification Theorem for Noisy Main Channel. 18-26
Protocols
- Giovanni Di Crescenzo, Olga Kornievskaia:
Efficient Kerberized Multicast in a Practical Distributed Setting. 27-45 - Sigrid Gürgens, Javier López:
Suitability of a Classical Analysis Method for E-commerce Protocols. 46-62
Enhancing Technologies
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi:
Hyppocrates. 63-80 - Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi:
Lenient/Strict Batch Verification in Several Groups. 81-94
Privacy
- Dmitri Asonov, Markus Schaal, Johann Christoph Freytag:
Absolute Privacy in Voting. 95-109 - Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
A Logical Model for Privacy Protection. 110-124
Software Protection
- Enriquillo Valdez, Moti Yung:
DISSECT: DIStribution for SECurity Tool. 125-143 - Stanley Chow, Yuan Xiang Gu, Harold Johnson, Vladimir A. Zakharov:
An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. 144-155
Message Hiding I
- Mark Chapman, George I. Davida, Marc Rennhard:
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. 156-165 - David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra:
Robust New Method in Frequency Domain Watermarking. 166-182
PKI Issues and Protocols
- Diana Berbecaru, Antonio Lioy, Marius Marian:
On the Complexity of Public-Key Certificate Validation. 183-203 - Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila:
Liability of Certification Authorities: A Juridical Point of View. 204-219
Hardware Implementations
- Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott:
Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. 220-234 - Kazumaro Aoki, Fumitaka Hoshino, Tetsutaro Kobayashi, Hiroaki Oguro:
Elliptic Curve Arithmetic Using SIMD. 235-247 - Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi:
On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. 248-265 - Sheng-Bo Xu, Lejla Batina:
Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator. 266-279
Cryptanalysis and Prevention
- Rainer Steinwandt, Willi Geiselmann, Thomas Beth:
A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. 280-293 - Routo Terada, Paulo G. Pinheiro:
Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. 294-309 - Ismael Jiménez Calvo, Germán Sáez:
Approximate Power Roots in Zm. 310-323 - Bodo Möller:
Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. 324-334
Implementations
- Sofia K. Tzelepi, George Pangalos:
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. 335-346 - Elisa Bertino, Barbara Carminati, Elena Ferrari:
A Secure Publishing Service for Digital Libraries of XML Documents. 347-362
Non-repudiation Techniques
- Olivier Markowitch, Steve Kremer:
An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. 363-378 - Aris Anagnostopoulos, Michael T. Goodrich, Roberto Tamassia:
Persistent Authenticated Dictionaries and Their Applications. 379-393
Contracts and Auctions
- Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
Efficient Optimistic N-Party Contract Signing Protocol. 394-407 - Koji Chida, Kunio Kobayashi, Hikaru Morita:
Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison. 408-419
Message Hiding II
- Francesc Sebé, Josep Domingo-Ferrer:
Oblivious Image Watermarking Robust against Scaling and Geometric Distortions. 420-432 - Christian Damsgaard Jensen:
Fingerprinting Text in Logical Markup Languages. 433-445
Payments
- Antonio Ruiz-Martínez, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta:
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery. 446-461 - Ik Rae Jeong, Dong Hoon Lee, Jong In Lim:
Efficient Transferable Cash with Group Signatures. 462-474
Network and OS Security
- Liqun Chen, Wenbo Mao:
An Auditable Metering Scheme for Web Advertisement Applications. 475-485 - Jaime Delgado, Isabel Gallego, Xavier Perramon:
Broker-Based Secure Negotiation of Intellectual Property Rights. 486-496
Network and OS Security
- Jae Seung Lee, Sang-Choon Kim:
Design of the Decision Support System for Network Security Management to Secure Enterprise Network. 497-511 - Jia Wang, Insup Lee:
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. 512-535 - Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki:
Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. 536-553
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.