ACNS B

31 papers

YearTitle / Authors
2008A Practical and Efficient Tree-List Structure for Public-Key Certificate Validation.
Tong-Lee Lim, Anantharaman Lakshminarayanan, Vira Saksen
2008A Very Compact "Perfectly Masked" S-Box for AES.
David Canright, Lejla Batina
2008An Authentication Scheme Based on the Twisted Conjugacy Problem.
Vladimir Shpilrain, Alexander Ushakov
2008Analysis of EAP-GPSK Authentication Protocol.
John C. Mitchell, Arnab Roy, Paul D. Rowe, Andre Scedrov
2008Anonymity in Transferable E-cash.
Sébastien Canard, Aline Gouget
2008Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings
Steven M. Bellovin, Rosario Gennaro, Angelos D. Keromytis, Moti Yung
2008Attacking Reduced Round SHA-256.
Somitra Kumar Sanadhya, Palash Sarkar
2008Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures.
Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta
2008Dakota- Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography.
Ivan Damgård, Lars R. Knudsen, Søren S. Thomsen
2008Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns.
Ramnath Prasad, Nitesh Saxena
2008Generic Constructions of Stateful Public Key Encryption and Their Applications.
Joonsang Baek, Jianying Zhou, Feng Bao
2008Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Jin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong
2008Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?.
Yevgeniy Dodis, Prashant Puniya
2008Improved Conditional E-Payments.
Marina Blanton
2008Multi-factor Authenticated Key Exchange.
David Pointcheval, Sébastien Zimmer
2008New Differential-Algebraic Attacks and Reparametrization of Rainbow.
Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng
2008On the Effectiveness of Internal Patching Against File-Sharing Worms.
Liang Xie, Hui Song, Sencun Zhu
2008On the Security of the CCM Encryption Mode and of a Slight Variant.
Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer
2008PPAA: Peer-to-Peer Anonymous Authentication.
Patrick P. Tsang, Sean W. Smith
2008PUF-HB: A Tamper-Resilient HB Based Authentication Protocol.
Ghaith Hammouri, Berk Sunar
2008Peeking Through the Cloud: DNS-Based Estimation and Its Applications.
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos
2008Pushback for Overlay Networks: Protecting Against Malicious Insiders.
Angelos Stavrou, Michael E. Locasto, Angelos D. Keromytis
2008Repelling Detour Attack Against Onions with Re-encryption.
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks
2008Replay Attack in a Fair Exchange Protocol.
Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep-Lluís Ferrer-Gomila, Llorenç Huguet i Rotger
2008Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance.
Nikita Borisov, Soumyadeb Mitra
2008Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks.
Frank Stajano, Daniel Cvrcek, Matt Lewis
2008The Security of EPC Gen2 Compliant RFID Protocols.
Mike Burmester, Breno de Medeiros
2008Traceable Privacy of Recent Provably-Secure RFID Protocols.
Khaled Ouafi, Raphael C.-W. Phan
2008Traceable and Retrievable Identity-Based Encryption.
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang
2008TrapdoorSanitizable Signatures and Their Application to Content Protection.
Sébastien Canard, Fabien Laguillaumie, Michel Milhau
2008wNAF*, an Efficient Left-to-Right Signed Digit Recoding Algorithm.
Brian King