Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Lin Jiao, Bin Zhang, Mingsheng Wang |
Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings, pp. 169-184, 2013, Springer, 978-3-319-27658-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiangang Wang, Xiaohong Li 0001, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng 0002 |
An Empirical Study of Dangerous Behaviors in Firefox Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 188-203, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Noboru Kunihiro |
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 55-69, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Oscar Esparza, Juanjo Alins |
On the Self-similarity Nature of the Revocation Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 387-400, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jinwei Hu, Khaled M. Khan, Yun Bai 0001, Yan Zhang 0003 |
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 290-305, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Essam Ghadafi, Nigel P. Smart |
Efficient Two-Move Blind Signatures in the Common Reference String Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 274-289, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer |
Differential Attacks on Reduced RIPEMD-160. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 23-38, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Taiichi Saito, Keita Xagawa |
Secure Hierarchical Identity-Based Identification without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 258-273, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ciprian-Petrisor Pungila, Viorel Negru |
A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 354-369, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Bösch, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
Selective Document Retrieval from Encrypted Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 224-241, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler |
Domain-Specific Pseudonymous Signatures for the German Identity Card. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 104-119, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser 0001 |
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 242-257, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari |
Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 204-223, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhao, Debin Gao, Lina Wang 0001 |
Learning Fine-Grained Structured Input for Memory Corruption Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 151-167, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan Groza, Bogdan Warinschi |
Revisiting Difficulty Notions for Client Puzzles and DoS Resilience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 39-54, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter Drábik, Fabio Martinelli, Charles Morisset |
A Quantitative Approach for Inexact Enforcement of Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 306-321, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nezar Nassr, Nidal Aboudagga, Eric Steegmans |
OSDM: An Organizational Supervised Delegation Model for RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 322-337, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Falko Strenzke |
Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 120-135, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser 0001 |
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 168-187, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dieter Gollmann, Felix C. Freiling (eds.) |
Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![Springer, 978-3-642-33382-8 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Manas A. Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso |
Privacy-Preserving Speaker Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 1-22, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lisa Rajbhandari, Einar Snekkenes |
Intended Actions: Risk Is Conflicting Incentives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 370-386, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Samiran Bag, Aritra Dhar, Pinaki Sarkar |
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 136-150, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sanna Suoranta, André Andrade, Tuomas Aura |
Strong Authentication with Mobile Phone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 70-85, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Gilger, Johannes Barnickel, Ulrike Meyer |
GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 338-353, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot |
Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings, pp. 86-103, 2012, Springer, 978-3-642-33382-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0009, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer |
APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 293-308, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu 0005, Sencun Zhu, Bing Mao, Li Xie 0001 |
Replacement Attacks on Behavior Based Software Birthmark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 1-16, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sha Ma, Bo Yang, Kangshun Li, Feng Xia 0004 |
A Privacy-Preserving Join on Outsourced Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 278-292, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima |
MASHA - Low Cost Authentication with a New Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 63-78, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xuejia Lai, Jianying Zhou 0001, Hui Li (eds.) |
Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![Springer, 978-3-642-24860-3 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sven Laur, Jan Willemson, Bingsheng Zhang |
Round-Efficient Oblivious Database Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 262-277, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jaewoo Lee, Chris Clifton |
How Much Is Enough? Choosing ε for Differential Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 325-340, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen |
Hello rootKitty: A Lightweight Invariance-Enforcing Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 213-228, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Serdar Pehlivanoglu |
Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 17-31, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qiong Huang 0001, Duncan S. Wong, Willy Susilo, Bo Yang 0003 |
An Efficient Construction of Time-Selective Convertible Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 355-371, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fanyu Kong, Jia Yu 0003, Lei Wu |
Security Analysis of an RSA Key Generation Algorithm with a Large Private Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 95-101, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang |
Multi-stage Binary Code Obfuscation Using Improved Virtual Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 168-181, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos |
SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 197-212, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Zhou 0008, Haifeng Qian, Xiangxue Li |
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 341-354, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hu Xiong, Qianhong Wu, Zhong Chen 0001 |
Toward Pairing-Free Certificateless Authenticated Key Exchanges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 79-94, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Atefeh Mashatan, Khaled Ouafi |
Efficient Fail-Stop Signatures from the Factoring Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 372-385, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Moritz Y. Becker, Masoud Koleini |
Opacity Analysis in Trust Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 229-245, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu |
Detection and Analysis of Cryptographic Data Inside Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 182-196, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, Dirk von Suchodoletz |
Assessing Location Privacy in Mobile Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 309-324, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Marcel Preuß, Lena Wiese |
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 246-261, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Atsuko Miyaji |
How to Find Short RC4 Colliding Key Pairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 32-46, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Yu Chen 0003 |
The n-Diffie-Hellman Problem and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 119-134, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz |
RatBot: Anti-enumeration Peer-to-Peer Botnets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 135-151, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keita Emura, Atsuko Miyaji, Kazumasa Omote |
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 102-118, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete |
A Formal Approach to Distance-Bounding RFID Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 47-62, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ge Zhang 0001, Simone Fischer-Hübner |
Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, pp. 152-167, 2011, Springer, 978-3-642-24860-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic (eds.) |
Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![Springer, 978-3-642-18177-1 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré |
Double Spending Protection for E-Cash Based on Risk Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 394-408, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede |
Privacy-Preserving ECC-Based Grouping Proofs for RFID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 159-165, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis |
Crimeware Swindling without Virtual Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 196-202, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhiwei Li, Weichao Wang |
Deciding Recognizability under Dolev-Yao Intruder Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 416-429, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo |
CRePE: Context-Related Policy Enforcement for Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 331-345, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Guajardo, Bart Mennink |
On Side-Channel Resistant Block Cipher Usage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 254-268, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xinyuan Wang 0005, Xuxian Jiang |
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 166-180, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Feng Bao 0001 |
Efficient Multiplicative Homomorphic E-Voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 381-393, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes |
Security Implications of Crosstalk in Switching CMOS Gates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 269-275, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy |
Privilege Escalation Attacks on Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 346-360, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elena Andreeva 0001, Bart Mennink, Bart Preneel |
Security Reductions of the Second Round SHA-3 Candidates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 39-53, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow |
Implicit Authentication through Learning User Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 99-113, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Wachsmann, Liqun Chen 0002, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter |
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 84-98, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama |
Indifferentiable Security Reconsidered: Role of Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 430-444, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Julien Cathalo, Christophe Petit 0001 |
One-Time Trapdoor One-Way Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 283-298, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani 0001 |
Selective Regular Expression Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 226-240, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Georg Neugebauer, Ulrike Meyer, Susanne Wetzel |
Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 136-151, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yi Lu 0002, Yvo Desmedt |
Improved Distinguishing Attack on Rabbit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 17-23, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento |
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 299-306, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ping Yu 0005, Rui Xue 0001 |
A Short Signature Scheme from the RSA Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 307-318, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos |
An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 203-209, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wei 0004, Michael K. Reiter, Ketan Mayer-Patel |
Summary-Invisible Networking: Techniques and Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 210-225, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu 0005 |
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 409-415, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo |
Efficient Message Space Extension for Automorphic Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 319-330, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski |
Walk the Walk: Attacking Gait Biometrics by Imitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 361-380, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nadhem J. AlFardan, Kenneth G. Paterson |
An Analysis of DepenDNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 31-38, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. S. Machado, Charles B. Prado, Luiz F. R. C. Carmo |
Traceability of Executable Codes Using Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 241-253, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ye Zhu 0001 |
On Privacy Leakage through Silence Suppression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 276-282, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho |
Revisiting the Security of the Alred Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 69-83, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kota Ideguchi, Elmar Tischhauser, Bart Preneel |
Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 1-16, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang |
Cryptanalysis of the Convex Hull Click Human Identification Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 24-30, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan T. Trostle, Andy Parrish |
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 114-128, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Arne Tauber, Thomas Rössler |
Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 152-158, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie 0001 |
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 181-195, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee |
Video Streaming Forensic - Content Identification with Traffic Snooping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 129-135, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Özgür Dagdelen, Marc Fischlin |
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers, pp. 54-68, 2010, Springer, 978-3-642-18177-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Yuan Chen, Ruby B. Lee |
Hardware-Assisted Application-Level Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 363-378, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux |
Analysis and Optimization of Cryptographically Generated Addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 17-32, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mirco Marchetti, Michele Messori, Michele Colajanni |
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 475-490, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 151-166, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Conditional proxy re-encryption, random oracle, chosen-ciphertext security |
1 | Joachim Biskup, Lena Wiese |
Combining Consistency and Confidentiality Requirements in First-Order Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 121-134, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh |
A2M: Access-Assured Mobile Desktop Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 186-201, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jens Bender, Marc Fischlin, Dennis Kügler |
Security Analysis of the PACE Key-Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 33-48, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jianfeng Lu, Ruixuan Li 0001, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma |
Secure Interoperation in Multidomain Environments Employing UCON Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 395-402, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multidomain, cyclic inheritance, interoperation, separation of duty, usage control |
1 | Florian Mendel, Martin Schläffer |
On Free-Start Collisions and Collisions for TIB3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 95-106, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-3 competition, TIB3, free-start collision, Hash function, collision attack |
1 | Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater |
Practical Algebraic Attacks on the Hitag2 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 167-176, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis |
1 | Sebastian Gajek, Jörg Schwenk, Michael Steiner 0001, Chen Xuan |
Risks of the CardSpace Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 278-293, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
analysis, identity management, CardSpace |