Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Lin Jiao, Bin Zhang, Mingsheng Wang |
Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited. |
ISC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jiangang Wang, Xiaohong Li 0001, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng 0002 |
An Empirical Study of Dangerous Behaviors in Firefox Extensions. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Noboru Kunihiro |
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Oscar Esparza, Juanjo Alins |
On the Self-similarity Nature of the Revocation Data. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jinwei Hu, Khaled M. Khan, Yun Bai 0001, Yan Zhang 0003 |
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Essam Ghadafi, Nigel P. Smart |
Efficient Two-Move Blind Signatures in the Common Reference String Model. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer |
Differential Attacks on Reduced RIPEMD-160. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Taiichi Saito, Keita Xagawa |
Secure Hierarchical Identity-Based Identification without Random Oracles. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ciprian-Petrisor Pungila, Viorel Negru |
A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Bösch, Qiang Tang 0001, Pieter H. Hartel, Willem Jonker |
Selective Document Retrieval from Encrypted Database. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler |
Domain-Specific Pseudonymous Signatures for the German Identity Card. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser 0001 |
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari |
Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhao, Debin Gao, Lina Wang 0001 |
Learning Fine-Grained Structured Input for Memory Corruption Detection. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan Groza, Bogdan Warinschi |
Revisiting Difficulty Notions for Client Puzzles and DoS Resilience. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter Drábik, Fabio Martinelli, Charles Morisset |
A Quantitative Approach for Inexact Enforcement of Security Policies. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Nezar Nassr, Nidal Aboudagga, Eric Steegmans |
OSDM: An Organizational Supervised Delegation Model for RBAC. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Falko Strenzke |
Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser 0001 |
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dieter Gollmann, Felix C. Freiling (eds.) |
Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Manas A. Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso |
Privacy-Preserving Speaker Authentication. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lisa Rajbhandari, Einar Snekkenes |
Intended Actions: Risk Is Conflicting Incentives. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Samiran Bag, Aritra Dhar, Pinaki Sarkar |
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Sanna Suoranta, André Andrade, Tuomas Aura |
Strong Authentication with Mobile Phone. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Gilger, Johannes Barnickel, Ulrike Meyer |
GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library. |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot |
Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? |
ISC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0009, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer |
APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu 0005, Sencun Zhu, Bing Mao, Li Xie 0001 |
Replacement Attacks on Behavior Based Software Birthmark. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sha Ma, Bo Yang, Kangshun Li, Feng Xia 0004 |
A Privacy-Preserving Join on Outsourced Database. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima |
MASHA - Low Cost Authentication with a New Stream Cipher. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xuejia Lai, Jianying Zhou 0001, Hui Li (eds.) |
Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sven Laur, Jan Willemson, Bingsheng Zhang |
Round-Efficient Oblivious Database Manipulation. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jaewoo Lee, Chris Clifton |
How Much Is Enough? Choosing ε for Differential Privacy. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen |
Hello rootKitty: A Lightweight Invariance-Enforcing Framework. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Serdar Pehlivanoglu |
Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qiong Huang 0001, Duncan S. Wong, Willy Susilo, Bo Yang 0003 |
An Efficient Construction of Time-Selective Convertible Undeniable Signatures. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fanyu Kong, Jia Yu 0003, Lei Wu |
Security Analysis of an RSA Key Generation Algorithm with a Large Private Key. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang |
Multi-stage Binary Code Obfuscation Using Improved Virtual Machine. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos |
SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Zhou 0008, Haifeng Qian, Xiangxue Li |
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hu Xiong, Qianhong Wu, Zhong Chen 0001 |
Toward Pairing-Free Certificateless Authenticated Key Exchanges. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Atefeh Mashatan, Khaled Ouafi |
Efficient Fail-Stop Signatures from the Factoring Assumption. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Moritz Y. Becker, Masoud Koleini |
Opacity Analysis in Trust Management Systems. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu |
Detection and Analysis of Cryptographic Data Inside Software. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, Dirk von Suchodoletz |
Assessing Location Privacy in Mobile Communication Networks. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Marcel Preuß, Lena Wiese |
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiageng Chen, Atsuko Miyaji |
How to Find Short RC4 Colliding Key Pairs. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Yu Chen 0003 |
The n-Diffie-Hellman Problem and Its Applications. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz |
RatBot: Anti-enumeration Peer-to-Peer Botnets. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keita Emura, Atsuko Miyaji, Kazumasa Omote |
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete |
A Formal Approach to Distance-Bounding RFID Protocols. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ge Zhang 0001, Simone Fischer-Hübner |
Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes. |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic (eds.) |
Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers |
ISC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré |
Double Spending Protection for E-Cash Based on Risk Management. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede |
Privacy-Preserving ECC-Based Grouping Proofs for RFID. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis |
Crimeware Swindling without Virtual Machines. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhiwei Li, Weichao Wang |
Deciding Recognizability under Dolev-Yao Intruder Model. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo |
CRePE: Context-Related Policy Enforcement for Android. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Guajardo, Bart Mennink |
On Side-Channel Resistant Block Cipher Usage. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xinyuan Wang 0005, Xuxian Jiang |
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Feng Bao 0001 |
Efficient Multiplicative Homomorphic E-Voting. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes |
Security Implications of Crosstalk in Switching CMOS Gates. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy |
Privilege Escalation Attacks on Android. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elena Andreeva 0001, Bart Mennink, Bart Preneel |
Security Reductions of the Second Round SHA-3 Candidates. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow |
Implicit Authentication through Learning User Behavior. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Wachsmann, Liqun Chen 0002, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter |
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kazuki Yoneyama |
Indifferentiable Security Reconsidered: Role of Scheduling. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Julien Cathalo, Christophe Petit 0001 |
One-Time Trapdoor One-Way Functions. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani 0001 |
Selective Regular Expression Matching. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Georg Neugebauer, Ulrike Meyer, Susanne Wetzel |
Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yi Lu 0002, Yvo Desmedt |
Improved Distinguishing Attack on Rabbit. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento |
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ping Yu 0005, Rui Xue 0001 |
A Short Signature Scheme from the RSA Family. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos |
An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wei 0004, Michael K. Reiter, Ketan Mayer-Patel |
Summary-Invisible Networking: Techniques and Defenses. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu 0005 |
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo |
Efficient Message Space Extension for Automorphic Signatures. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski |
Walk the Walk: Attacking Gait Biometrics by Imitation. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Nadhem J. AlFardan, Kenneth G. Paterson |
An Analysis of DepenDNS. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. S. Machado, Charles B. Prado, Luiz F. R. C. Carmo |
Traceability of Executable Codes Using Neural Networks. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ye Zhu 0001 |
On Privacy Leakage through Silence Suppression. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho |
Revisiting the Security of the Alred Design. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kota Ideguchi, Elmar Tischhauser, Bart Preneel |
Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang |
Cryptanalysis of the Convex Hull Click Human Identification Protocol. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan T. Trostle, Andy Parrish |
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Arne Tauber, Thomas Rössler |
Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie 0001 |
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee |
Video Streaming Forensic - Content Identification with Traffic Snooping. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Özgür Dagdelen, Marc Fischlin |
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Yuan Chen, Ruby B. Lee |
Hardware-Assisted Application-Level Access Control. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux |
Analysis and Optimization of Cryptographically Generated Addresses. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Mirco Marchetti, Michele Messori, Michele Colajanni |
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jian Weng 0001, Yanjiang Yang, Qiang Tang 0001, Robert H. Deng, Feng Bao 0001 |
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Conditional proxy re-encryption, random oracle, chosen-ciphertext security |
1 | Joachim Biskup, Lena Wiese |
Combining Consistency and Confidentiality Requirements in First-Order Databases. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh |
A2M: Access-Assured Mobile Desktop Computing. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jens Bender, Marc Fischlin, Dennis Kügler |
Security Analysis of the PACE Key-Agreement Protocol. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jianfeng Lu, Ruixuan Li 0001, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma |
Secure Interoperation in Multidomain Environments Employing UCON Policies. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Multidomain, cyclic inheritance, interoperation, separation of duty, usage control |
1 | Florian Mendel, Martin Schläffer |
On Free-Start Collisions and Collisions for TIB3. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
SHA-3 competition, TIB3, free-start collision, Hash function, collision attack |
1 | Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater |
Practical Algebraic Attacks on the Hitag2 Stream Cipher. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis |
1 | Sebastian Gajek, Jörg Schwenk, Michael Steiner 0001, Chen Xuan |
Risks of the CardSpace Protocol. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
analysis, identity management, CardSpace |