Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jie Guo, Yingjiu Li, Robert H. Deng, Kefei Chen |
Rights Protection for Data Cubes. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yuh-Hua Hu, Chun-yen Chou, Lih-Chung Wang, Feipei Lai |
Cryptanalysis of Variants of UOV. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
multivariate quadratic, UOV, XL, digital signature |
1 | Mila Katzarova, Andrew Simpson |
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yaniv Shaked, Avishai Wool |
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream cipher, Bluetooth, BDD |
1 | Zhiqiang Lin, Nai Xia, Guole Li, Bing Mao, Li Xie 0001 |
Transparent Run-Time Prevention of Format-String Attacks Via Dynamic Taint and Flexible Validation. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Igor V. Kotenko, Alexander Ulanov |
Simulation of Internet DDoS Attacks and Defense. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Security modeling and architecture, Security models for ambient intelligence environments, Security simulation, DDoS, Infrastructure security |
1 | Walid Bagga, Refik Molva |
Collusion-Free Policy-Based Encryption. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Policy, Credentials, Pairing-Based Cryptography |
1 | Sang Hyun Oh, Jin-Suk Kang, Yung-Cheol Byun, Taikyeong T. Jeong, Won Suk Lee |
Anomaly Intrusion Detection Based on Clustering a Data Stream. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Data mining, Clustering, Intrusion detection, Data stream, Anomaly detection |
1 | Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna |
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Assora, Ayoub Shirvani |
Enhancing the Security and Efficiency of 3-D Secure. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
3-D Secure, password based authentication and key exchange, online transaction security, SSL/TLS |
1 | Javier Herranz, Fabien Laguillaumie |
Blind Ring Signatures Secure Under the Chosen-Target-CDH Assumption. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
blind ring signatures, e-cash systems, provable security |
1 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
On the Collision Resistance of RIPEMD-160. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack |
1 | Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang |
A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | José Manuel Torres 0001, Jose M. Sarriegi, Javier Santos 0001, Nicolás Serrano |
Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
critical success factors and indicators, Information systems, security management |
1 | Luciano Bononi, Carlo Tacconi |
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System |
1 | Jianhua Yang, Yongzhong Zhang, Shou-Hsuan Stephen Huang |
Resistance Analysis to Intruders' Evasion of Detecting Intrusion. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
time perturbation, chaff, intrusion detection, Network security, stepping-stone, evasion |
1 | Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini |
Multi-party Concurrent Signatures. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairings, ring signature, concurrent signature |
1 | George Danezis |
Breaking Four Mix-Related Schemes Based on Universal Re-encryption. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Universal re-encryption, re-encryption mix networks, traffic analysis, anonymous communications |
1 | Huifang Yin, Jun Li |
An Efficient Probabilistic Packet Marking Scheme (NOD-PPM). |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura |
Formal Security Model of Multisignatures. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
multisignature scheme, claw-free permutation, random oracle model, formal security model |
1 | Fernando Esponda, Elena S. Ackley, Paul Helman, Haixia Jia, Stephanie Forrest |
Protecting Data Privacy Through Hard-to-Reverse Negative Databases. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald |
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
Related-Key Rectangle Attack on 42-Round SHACAL-2. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
SHACAL-2, Block cipher, Differential cryptanalysis, Related-key rectangle attack |
1 | Christophe De Cannière |
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Burnside, Angelos D. Keromytis |
Low Latency Anonymity with Mix Rings. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | André Zúquete, Hugo Marques |
A Security Architecture for Protecting LAN Interactions. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Hugo L. Jonker, Erik P. de Vink |
Formalising Receipt-Freeness. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
online voting schemes, formal methods, eGovernment, receipt-freeness |
1 | Ellen Jochemsz, Benne de Weger |
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction |
1 | Michal Ren, Tanmoy Kanti Das, Jianying Zhou 0001 |
Diverging Keys in Wireless Sensor Networks. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Node Compromise Attack, Diverging Keys, Sensor Network Security |
1 | Vassilis Prevelakis, Sotiris Ioannidis |
Preserving TCP Connections Across Host Address Changes. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna |
Extending .NET Security to Unmanaged Code. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | István Zsolt Berta |
Using Multiple Smart Cards for Signing Messages at Malicious Terminals. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Authentication and Key Exchange Protocol for Secure Credential Services. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | David von Oheimb, Jorge Cuéllar |
Designing and Verifying Core Protocols for Location Privacy. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Geopriv, privacy, model checking, exploration, location information |
1 | Sokratis K. Katsikas, Javier López 0001, Michael Backes 0001, Stefanos Gritzalis, Bart Preneel (eds.) |
Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Stütz, Andreas Uhl |
Transparent Image Encryption Using Progressive JPEG. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ulrich Huber 0001, Ahmad-Reza Sadeghi |
A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Adam L. Young |
Building a Cryptovirus Using Microsoft's Cryptographic API. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee |
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Victor K. Wei |
Tracing-by-Linking Group Signatures. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yanjiang Yang, Beng Chin Ooi |
A Privacy Preserving Rental System. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Javier López 0001, Robert H. Deng, Feng Bao 0001 (eds.) |
Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Changshe Ma, Kefei Chen, Dong Zheng 0001, Shengli Liu 0001 |
Efficient and Proactive Threshold Signcryption. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
threshold signcryption, threshold approach, Network security, provable security, asynchronous network |
1 | Nam Su Chang, Chang Han Kim, Young-Ho Park 0001, Jongin Lim 0001 |
A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
Karatsuba-Ofman Algorithm, Non-Redundant Karatsuba-Ofman Algorithm, Hardware Architecture, Polynomial Multiplication |
1 | Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis |
A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Guomin Yang, Duncan S. Wong, Xiaotie Deng |
Analysis and Improvement of a Signcryption Scheme with Key Privacy. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Gary S.-W. Yeo, Raphael Chung-Wei Phan |
On the Security of the WinRAR Encryption Method. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku |
ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
tripartite, multilinear forms, authentication, key agreement protocol, ID-based |
1 | Chi-Ming Hu, Wen-Guey Tzeng |
Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
On the Security of Tweakable Modes of Operation: TBC and TAE. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher |
1 | Ratna Dutta, Rana Barua |
Constant Round Dynamic Group Key Agreement. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
DDH problem, provable security, group key agreement |
1 | Stephen T. Chou, Angelos Stavrou, John Ioannidis, Angelos D. Keromytis |
gore: Routing-Assisted Defense Against DDoS Attacks. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev |
Evaluating Access Control Policies Through Model Checking. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
access control policy language, model checking, verification, access control, access control model, access control policy |
1 | Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
A Practical Voting Scheme with Receipts. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Certificateless Public Key Encryption Without Pairing. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Daoxi Xiu, Zhaoyu Liu |
A Formal Definition for Trust in Distributed Systems. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Souhwan Jung, Jaeduck Choi, Younghan Kim 0002, Sungi Kim |
IPSec Support in NAT-PT Scenario for IPv6 Transition. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
NAT-PT, IPSec, IKE, IPv6 transition |
1 | Chris J. Mitchell |
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu 0004 |
A Cryptographic Solution for General Access Control. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy |
A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Ginger Myles, Jeffery Lotspiech |
Towards Better Software Tamper Resistance. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jean Monnerat, Serge Vaudenay |
Chaum's Designated Confirmer Signature Revisited. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson |
Universally Composable Time-Stamping Schemes with Audit. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa |
An Oblivious Transfer Protocol with Log-Squared Communication. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
Computationally-private information retrieval, length-flexible additively homomorphic public-key cryptosystem, oblivious transfer |
1 | Akashi Satoh |
Hardware Architecture and Cost Estimates for Breaking SHA-1. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Kaoru Kurosawa |
Electronic Voting: Starting Over? |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung |
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar |
Device-Enabled Authorization in the Grey-System. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Alexander W. Dent |
Hybrid Signcryption Schemes with Outsider Security. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dennis Hofheinz, Dominique Unruh |
On the Notion of Statistical Security in Simulatability Definitions. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zhenghong Wang, Ruby B. Lee |
New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolan Joy Zhang, Brian King |
Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Colin Boyd, Ed Dawson |
A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn |
Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Deholo Nali, Carlisle M. Adams, Ali Miri |
Time-Based Release of Confidential Information in Hierarchical Settings. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani 0001 |
SVision: A Network Host-Centered Anomaly Visualization Technique. |
ISC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Low-Level Ideal Signatures and General Integrity Idealization. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kan Zhang, Yuliang Zheng 0001 (eds.) |
Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Zhengyi Le, Yi Ouyang 0001, James Ford, Fillia Makedon |
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater |
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
Verifiably Committed Signatures, Optimistic Fair Exchange, GPS Signature, Cryptanalysis |
1 | Deholo Nali, Carlisle M. Adams, Ali Miri |
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Taekyoung Kwon 0002 |
Practical Authenticated Key Agreement Using Passwords. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Heejae Park, Jong Kim 0001 |
Modifiable Digital Content Protection in P2P. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | William Ku, Chi-Hung Chi |
Survey on the Technological Aspects of Digital Rights Management. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Craig Gentry, Zulfikar Ramzan |
RSA Accumulator Based Broadcast Encryption. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Toru Nakanishi 0001, Mitsuaki Shiota, Yuji Sugiyama |
An Efficient Online Electronic Cash with Unlinkable Exact Payments. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Qianhong Wu, Xiaofeng Chen 0001, Changjie Wang, Yumin Wang |
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Qinglin Jiang, Douglas S. Reeves, Peng Ning |
Certificate Recommendations to Improve the Robustness of Web of Trust. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
PGP keyrings, Authentication, certificates, graph connectivity |
1 | Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato |
On The Security of Key Derivation Functions. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ajay Chander, Drew Dean, John C. Mitchell |
A Distributed High Assurance Reference Monitor. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Alex Hai Wang, Peng Liu 0005, Lunquan Li |
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Zouheir Trabelsi, Hamza Rahmani |
Detection of Sniffers in an Ethernet Network. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | HongQian Karen Lu, Asad M. Ali |
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Michael Meier 0001 |
A Model for the Semantics of Attack Signatures in Misuse Detection Systems. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Thitima Srivatanakul, John A. Clark, Fiona Polack |
Effective Security Requirements Analysis: HAZOP and Use Cases. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
HAZOP, use case, requirement analysis, security analysis |
1 | Pan Wang, Peng Ning, Douglas S. Reeves |
Storage-Efficient Stateless Group Key Revocation. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Richard Bergmair, Stefan Katzenbeisser 0001 |
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). |
ISC |
2004 |
DBLP DOI BibTeX RDF |
lexical, word-sense ambiguity, learning, natural language, text, linguistic, CAPTCHA, HIP |
1 | Muxiang Zhang |
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen |
Re-thinking Security in IP Based Micro-Mobility. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|