Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski |
Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ke Xu, Stephen R. Tate |
Universally Composable Secure Mobile Agent Computation. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Elena Ferrari, Giovanni Mella |
An XML-Based Approach to Document Flow Verification. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ginger Myles, Christian S. Collberg |
Detecting Software Theft via Whole Program Path Birthmarks. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
copyright protection, software piracy, software birthmark |
1 | Michael Backes 0001, Dennis Hofheinz |
How to Break and Repair a Universally Composable Signature Functionality. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dimitar P. Guelev, Mark Ryan 0001, Pierre-Yves Schobbens |
Model-Checking Access Control Policies. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Monica Chew, J. D. Tygar |
Image Recognition CAPTCHAs. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu |
Radix-r Non-Adjacent Form. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
radix-r representation, signed window method, elliptic curve cryptosystem, pairing based cryptosystem, Non-adjacent form |
1 | Kelly Heffner, Christian S. Collberg |
The Obfuscation Executive. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Teodoro Leggieri, Evimaria Terzi |
Securing DBMS: Characterizing and Detecting Query Floods. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mark Foster, Joseph N. Wilson, Shigang Chen |
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon |
Security Analysis of Two Signcryption Schemes. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
digital signature, encryption, Signcryption |
1 | Xiaofeng Chen 0001, Fangguo Zhang, Kwangjo Kim |
Chameleon Hashing Without Key Exposure. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Raphael Chung-Wei Phan, Helena Handschuh |
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai |
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Akashi Satoh, Sumio Morioka |
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | José Luis Vivas, José A. Montenegro, Javier López 0001 |
Towards a Business Process-Driven Framework for Security Engineering with the UML. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto |
A Fast Signature Scheme Based on New On-line Computation. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata |
Divisible Voting Scheme. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
Secure electronic voting and homomorphic encryption |
1 | Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee 0002, Jongin Lim 0001 |
Designated Verification of Non-invertible Watermark. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001 |
Security Analysis of a Password Authenticated Key Exchange Protocol. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar |
Easy Verifiable Primitives and Practical Public Key Cryptosystems. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Toru Akishita, Tsuyoshi Takagi |
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem |
1 | Javier Herranz, Carles Padró, Germán Sáez |
Distributed RSA Signature Schemes for General Access Structures. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Peter James Leadbitter, Nigel P. Smart |
Analysis of the Insecurity of ECMQV with Partially Known Nonces. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Paul C. van Oorschot |
Revisiting Software Protection. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sigrid Gürgens, Carsten Rudolph, Holger Vogt |
On the Security of Fair Non-repudiation Protocols. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto |
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David A. Wagner 0001 |
Cryptanalysis of an Algebraic Privacy Homomorphism. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Hongxia Jin, Jeffery Lotspiech |
Proactive Software Tampering Detection. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai |
The Role of Arbiters in Asymmetric Authentication Schemes. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yongdong Wu |
Zero-Distortion Authentication Watermarking. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tomasz Tyksinski |
Foundations of Differential Cryptanalysis in Abelian Groups. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta |
Trust and Authorization in Pervasive B2E Scenarios. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng |
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yvo Desmedt, Kaoru Kurosawa, Tri Van Le |
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 |
A Logic Model for Temporal Authorization Delegation with Negation. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Aura |
Cryptographically Generated Addresses (CGA). |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Wenbo Mao (eds.) |
Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Baldwin, Simon Shiu |
Enabling Shared Audit Data. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tri Van Le, Mike Burmester, Jiangyi Hu |
Short c-Secure Fingerprinting Codes. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
collusion secure, Fingerprinting, copyright protection |
1 | Ueli M. Maurer |
Intrinsic Limitations of Digital Signatures and How to Cope with Them. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Pashalidis, Chris J. Mitchell |
Single Sign-On Using Trusted Platforms. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
TCPA, authentication, single sign-on |
1 | Tim Kindberg, Kan Zhang |
Validating and Securing Spontaneous Associations between Wireless Devices. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
A Note on Weak Keys of PES, IDEA, and Some Extended Variants. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee |
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Reactively Secure Signature Schemes. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Shunsuke Araki |
A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic |
An Efficient Dynamic and Distributed Cryptographic Accumulator. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Kikuchi |
Oblivious Counter and Majority Protocol. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart |
Certification of Public Keys within an Identity Based System. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Guillermo Navarro 0001, Sergi Robles, Joan Borrell |
Role-Based Access Control for E-commerce Sea-of-Data Applications. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger |
A Realistic Protocol for Multi-party Certified Electronic Mail. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Soonhak Kwon, Heuisu Ryu |
Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2m). |
ISC |
2002 |
DBLP DOI BibTeX RDF |
bit serial multiplication, optimal normal basis of type II, Finite field, dual basis |
1 | Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai |
Traceability Schemes for Signed Documents. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott |
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Weidong Qiu, Kefei Chen, Dawu Gu |
A New Offline Privacy Protecting E-cash System with Revokable Anonymity. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
revokable anonymity, fair off-line system, Privacy protecting, E-Cash, electronic payment |
1 | Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004, Jeremy K.-P. Chen |
Quantifying Privacy Leakage through Answering Database Queries. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Value of information, Privacy, Data table, Quantitative model, Decision logic |
1 | Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo |
Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | José R. M. Monteiro, Ricardo Dahab |
An Attack on a Protocol for Certified Delivery. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno |
An Access Control Model for Tree Data Structures. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Access Control, Security Policy, Tree Data Structures, Permission, Authorization Rule |
1 | Nicolás González-Deleito, Olivier Markowitch |
Exclusion-Freeness in Multi-party Exchange Protocols. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Wai Han Soo, Azman Samsudin, Alwyn Goh |
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
mental card game, Benes permutation network, Shuffle, mix-net |
1 | Ed Dawson, Javier López 0001, José A. Montenegro, Eiji Okamoto |
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli |
Automated Analysis of Some Security Mechanisms of SCEP. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Heejin Jang, Sangwook Kim |
Real-Time Intruder Tracing through Self-Replication. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jiande Zheng |
A New Public Key Cryptosystem for Constrained Hardware. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai |
An Anonymous Loan System Based on Group Signature Scheme. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Group Signature, Privacy Protection, Optimistic Protocol, Timed-release Encryption, Anonymity Revocation |
1 | Emmanuel Bresson, Jacques Stern |
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa |
On Optimal Hash Tree Traversal for Interval Time-Stamping. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
interval time-stamping, Laplace's method for integrals, Analysis of algorithms, tree traversal, implementation complexity |
1 | Akashi Satoh, Sumio Morioka |
Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Abe, Koutarou Suzuki |
Receipt-Free Sealed-Bid Auction. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
bid-rigging, receipt-free, chameleon bit-commitment, Sealed-bid auction |
1 | John S. Baras, Maben Rabi |
Intrusion Detection with Support Vector Machines and Generative Models. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Katsuyuki Okeya, Kouichi Sakurai |
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems |
1 | Bodo Möller |
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Agnes Hui Chan, Virgil D. Gligor (eds.) |
Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Yuji Watanabe, Masayuki Numao |
Conditional Cryptographic Delegation for P2P Data Sharing. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Kahil Jallad, Jonathan Katz, Bruce Schneier |
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Taekyoung Kwon 0002 |
On the Difficulty of Protecting Private Keys in Software. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Josep Domingo-Ferrer |
A Provably Secure Additive and Multiplicative Privacy Homomorphism. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Encrypted data processing, Delegation of computing and data, E-gambling, Cryptography, Multilevel security, Privacy homomorphisms |
1 | Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila |
Comments to the UNCITRAL Model Law on Electronic Signatures. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez |
A Distributed and Computationally Secure Key Distribution Scheme. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye |
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Helger Lipmaa |
Fast Software Implementations of SC2000. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Block cipher design, large S-boxes, SC2000, fast implementation |
1 | Yasuyuki Sakai, Kouichi Sakurai |
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Elliptic Curve Cryptosystems, Scalar Multiplication |
1 | Marcel Fernandez, Miguel Soriano |
Fingerprinting Concatenated Codes with Efficient Identification. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ismael Jiménez Calvo, Germán Sáez |
Approximate Power Roots in Zm. |
ISC |
2001 |
DBLP BibTeX RDF |
|
1 | Sofia K. Tzelepi, George Pangalos |
A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Ruiz-Martínez, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Barbara Carminati, Elena Ferrari |
A Secure Publishing Service for Digital Libraries of XML Documents. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Sigrid Gürgens, Javier López 0001 |
Suitability of a Classical Analysis Method for E-commerce Protocols. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
electronic commerce, cryptographic protocol, Security analysis, automatic theorem proving, protocol validation |
1 | Dmitri Asonov, Markus Schaal, Johann Christoph Freytag |
Absolute Privacy in Voting. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Carlo Blundo, Paolo D'Arco, Alfredo De Santis, Clemente Galdi |
Hyppocrates. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jae Seung Lee, Sang-Choon Kim |
Design of the Decision Support System for Network Security Management to Secure Enterprise Network. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang 0004 |
A Logical Model for Privacy Protection. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
Privacy, Epistemic logic, Data table |
1 | Mark Chapman, George I. Davida, Marc Rennhard |
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Liqun Chen 0002, Wenbo Mao |
An Auditable Metering Scheme for Web Advertisement Applications. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
Auditable metering, Tamper-resistant software, Lightweight security, Web advertisement |
1 | George I. Davida, Yair Frankel (eds.) |
Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi |
Lenient/Strict Batch Verification in Several Groups. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|