default search action
12. ISC 2009: Pisa, Italy
- Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio A. Ardagna:
Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings. Lecture Notes in Computer Science 5735, Springer 2009, ISBN 978-3-642-04473-1
Analysis Techniques
- Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel:
A New Approach to chi2 Cryptanalysis of Block Ciphers. 1-16 - Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux:
Analysis and Optimization of Cryptographically Generated Addresses. 17-32 - Jens Bender, Marc Fischlin, Dennis Kügler:
Security Analysis of the PACE Key-Agreement Protocol. 33-48 - Amitabh Saxena, Brecht Wyseur, Bart Preneel:
Towards Security Notions for White-Box Cryptography. 49-58 - Bogdan Groza, Marius Minea:
A Calculus to Detect Guessing Attacks. 59-67
Hash Functions
- Mario Lamberger, Florian Mendel:
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. 68-78 - Yu Sasaki:
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. 79-94 - Florian Mendel, Martin Schläffer:
On Free-Start Collisions and Collisions for TIB3. 95-106
Database Security and Biometrics
- Suvasini Panigrahi, Shamik Sural:
Detection of Database Intrusion Using a Two-Stage Fuzzy System. 107-120 - Joachim Biskup, Lena Wiese:
Combining Consistency and Confidentiality Requirements in First-Order Databases. 121-134 - Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl:
Cancelable Iris Biometrics Using Block Re-mapping and Image Warping. 135-142 - Kaushik Roy, Prabir Bhattacharya:
Iris Recognition in Nonideal Situations. 143-150
Algebraic Attacks and Proxy Re-Encryption
- Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. 151-166 - Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater:
Practical Algebraic Attacks on the Hitag2 Stream Cipher. 167-176 - Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li:
A New Construction of Boolean Functions with Maximum Algebraic Immunity. 177-185
Distributed System Security
- Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh:
A2M: Access-Assured Mobile Desktop Computing. 186-201 - Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda:
Automated Spyware Collection and Analysis. 202-217 - Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel:
Towards Unifying Vulnerability Information for Attack Graph Construction. 218-233 - Hongxia Jin, Serdar Pehlivanoglu:
Traitor Tracing without A Priori Bound on the Coalition Size. 234-241 - Boris Rozenberg, Ehud Gudes, Yuval Elovici:
SISR - A New Model for Epidemic Spreading of Electronic Threats. 242-249
Identity Management and Authentication
- Gildas Avoine, Aslan Tchamkerten:
An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. 250-261 - Keith B. Frikken, Marina Blanton, Mikhail J. Atallah:
Robust Authentication Using Physically Unclonable Functions. 262-277 - Sebastian Gajek, Jörg Schwenk, Michael Steiner, Chen Xuan:
Risks of the CardSpace Protocol. 278-293
Applied Cryptography
- Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud:
Fair E-Cash: Be Compact, Spend Faster. 294-309 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
On the Security of Identity Based Ring Signcryption Schemes. 310-325 - Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi:
A Storage Efficient Redactable Signature in the Standard Model. 326-337 - Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai:
Generic Construction of Stateful Identity Based Encryption. 338-346
Access Control
- Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan:
Privacy-Aware Attribute-Based Encryption with User Accountability. 347-362 - Yu-Yuan Chen, Ruby B. Lee:
Hardware-Assisted Application-Level Access Control. 363-378 - Manachai Toahchoodee, Xing Xie, Indrakshi Ray:
Towards Trustworthy Delegation in Role-Based Access Control Model. 379-394 - Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma:
Secure Interoperation in Multidomain Environments Employing UCON Policies. 395-402 - Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, Xiaopu Ma:
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. 403-410
MAC and Nonces
- Erik Zenner:
Nonce Generators and the Nonce Reset Problem. 411-426 - Juan A. Garay, Vladimir Kolesnikov, Rae McLellan:
MAC Precomputation with Applications to Secure Memory. 427-442 - Kan Yasuda:
HMAC without the "Second" Key. 443-458
P2P and Web Services
- Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein:
Adding Trust to P2P Distribution of Paid Content. 459-474 - Mirco Marchetti, Michele Messori, Michele Colajanni:
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. 475-490 - Matthew Burnside, Angelos D. Keromytis:
F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. 491-506
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.