default search action
ISPEC 2008: Sydney, Australia
- Liqun Chen, Yi Mu, Willy Susilo:
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings. Lecture Notes in Computer Science 4991, Springer 2008, ISBN 978-3-540-79103-4 - Anongporn Salaiwarakul, Mark Dermot Ryan:
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. 1-13 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
An On-Line Secure E-Passport Protocol. 14-28 - Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. 29-44 - Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
1-out-of-. 45-55 - Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval:
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. 56-70 - Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings. 71-85 - Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere:
Towards Tamper Resistant Code Encryption: Practice and Experience. 86-100 - Jong Hwan Park, Dong Hoon Lee:
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. 101-115 - Marc Joye:
RSA Moduli with a Predetermined Portion: Techniques and Applications. 116-130 - Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma:
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. 131-145 - Patrick P. Tsang, Sean W. Smith:
Secure Cryptographic Precomputation with Insecure Memory. 146-160 - André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan:
Securing Peer-to-Peer Distributions for Mobile Devices. 161-175 - Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim:
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. 176-187 - Patrick P. Tsang, Sean W. Smith:
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. 188-202 - Minjin Kwon, Kyoochang Jeong, Heejo Lee:
PROBE: A Process Behavior-Based Host Intrusion Prevention System. 203-217 - Quoc-Cuong Le, Patrick Bellot, Akim Demaille:
Towards the World-Wide Quantum Network. 218-232 - Andrew Brown, Mark Ryan:
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. 233-247 - Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu:
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. 248-262 - Khaled Ouafi, Raphael C.-W. Phan:
Privacy of Recent RFID Authentication Protocols. 263-277 - Jihwan Lim, Heekuck Oh, Sangjin Kim:
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. 278-289 - Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. 290-303 - Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. 304-318 - Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk:
Secure Computation of the Vector Dominance Problem. 319-333 - Shaik Maleka, Amjed Shareef, C. Pandu Rangan:
Rational Secret Sharing with Repeated Games. 334-346 - Qingsong Ye, Huaxiong Wang, Josef Pieprzyk:
Distributed Private Matching and Set Operations. 347-360 - David Galindo, Flavio D. Garcia, Peter van Rossum:
Computational Soundness of Non-Malleable Commitments. 361-376 - Wen Ji, Lei Hu:
Square Attack on Reduced-Round Zodiac Cipher. 377-391 - Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu:
Analysis of Zipper as a Hash Function. 392-403 - Danilo Gligoroski, Suzana Andova, Svein J. Knapskog:
On the Importance of the Key Separation Principle for Different Modes of Operation. 404-418
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.