ACNS B

33 papers

YearTitle / Authors
2003A Fast Correlation Attack for LFSR-Based Stream Ciphers.
Sarbani Palit, Bimal K. Roy, Arindom De
2003A Key Recovery Mechanism for Reliable Group Key Management.
Taenam Cho, Sang-Ho Lee
2003A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme.
Chong-zhi Gao, Zheng-an Yao, Lei Li
2003A Threshold GQ Signature Scheme.
Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng
2003An Authorization Model for E-consent Requirement in a Health Care Application.
Chun Ruan, Vijay Varadharajan
2003An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
Sangwon Lee, Yongdae Kim, Kwangjo Kim, Daehyun Ryu
2003An IP Traceback Scheme Integrating DPM and PPM.
Fan Min, Jun-Yan Zhang, Guo-wie Yang
2003Anonymity-Enhanced Pseudonym System.
Yuko Tamura, Atsuko Miyaji
2003Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings
Jianying Zhou, Moti Yung, Yongfei Han
2003Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Johann Großschädl, Guy-Armand Kamendje
2003Common Vulnerability Markup Language.
Haitao Tian, Liusheng Huang, Zhi Zhou, Hui Zhang
2003Differential Fault Analysis on A.E.S.
Pierre Dusart, Gilles Letourneux, Olivier Vivolo
2003Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.
Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park
2003Efficient Distributed Signcryption Scheme as Group Signcryption.
Dong Jin Kwak, Sang-Jae Moon
2003Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services.
Zhi Guo, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun
2003Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model.
Sandeepan Chowdhury, Subhamoy Maitra
2003Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary.
Gene Itkis, Peng Xie
2003Improved Algebraic Traitor Tracing Scheme.
Chunyan Bai, Gui Liang Feng
2003Improved Scalable Hash Chain Traversal.
Sung-Ryul Kim
2003Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient.
Gang Yao, Kui Ren, Feng Bao, Robert H. Deng, Dengguo Feng
2003Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems.
Ching Lin, Vijay Varadharajan
2003Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
Ventzislav Nikov, Svetla Nikova, Bart Preneel
2003On the Security of Two Threshold Signature Schemes with Traceable Signers.
Guilin Wang, Xiaoxi Han, Bo Zhu
2003Optimized Chi
Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji
2003PLI: A New Framework to Protect Digital Content for P2P Networks.
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
2003Proxy and Threshold One-Time Signatures.
Mohamed Al-Ibrahim, Anton Cerný
2003Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.
Rui Zhang, Hideki Imai
2003Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.
Luciano Rila, Chris J. Mitchell
2003Side-Channel Attack on Substitution Blocks.
Roman Novak
2003Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.
Yasuyuki Sakai, Kouichi Sakurai
2003Trust on Web Browser: Attack vs. Defense.
Tieyan Li, Yongdong Wu
2003Using Feedback to Improve Masquerade Detection.
Kwong H. Yung
2003Using OCSP to Secure Certificate-Using Transactions in M-commerce.
Jose L. Muñoz, Jordi Forné, Oscar Esparza, Miguel Soriano