AsiaCCS A

42 papers

YearTitle / Authors
2008A block cipher based pseudo random number generator secure against side-channel key recovery.
Christophe Petit, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung
2008A general model of probabilistic packet marking for IP traceback.
Liming Lu, Mun Choon Chan, Ee-Chien Chang
2008A practical mimicry attack against powerful system-call monitors.
Chetan Parampalli, R. Sekar, Rob Johnson
2008A short anonymously revocable group signature scheme from decision linear assumption.
Toru Nakanishi, Nobuo Funabiki
2008A strict evaluation method on the number of conditions for the SHA-1 collision search.
Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
2008An integrated framework for security protocol analysis.
Marcin Olszewski, Lukasz Cyra
2008An overview of side channel analysis attacks.
Thanh-Ha Le, Cécile Canovas, Jessy Clédière
2008Avoiding timing channels in fixed-priority schedulers.
Marcus Völp, Claude-Joachim Hamann, Hermann Härtig
2008CMV: automatic verification of complete mediation for java virtual machines.
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle Zhou, Hilary Branske
2008Certificateless signcryption.
Manuel Barbosa, Pooya Farshim
2008Computationally sound mechanized proofs for basic and public-key Kerberos.
Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
2008Confronting a mobile adversary in unattended sensor networks.
Gene Tsudik
2008Controlled privacy preserving keyword search.
Stephen S. Yau, Yin Yin
2008Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06.
Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee
2008Detecting VoIP based DoS attacks at the public safety answering point.
Christoph Fuchs, Nils Aschenbruck, Felix Leder, Peter Martini
2008Efficient designated confirmer signature from bilinear pairings.
Fangguo Zhang, Xiaofeng Chen, Baodian Wei
2008Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao
2008Exploiting social networks for threshold signing: attack-resilience vs. availability.
Shouhuai Xu, Xiaohu Li, T. Paul Parker
2008HMAC is a randomness extractor and applications to TLS.
Pierre-Alain Fouque, David Pointcheval, Sébastien Zimmer
2008Mechanisms for usage control.
Alexander Pretschner, Manuel Hilty, David A. Basin, Christian Schaefer, Thomas Walter
2008Mutual authentication in RFID: security and privacy.
Radu-Ioan Paise, Serge Vaudenay
2008Non-interactive conference key distribution and its applications.
Reihaneh Safavi-Naini, Shaoquan Jiang
2008On spatio-temporal constraints and inheritance in role-based access control.
Liang Chen, Jason Crampton
2008On the protocol composition logic PCL.
Cas Cremers
2008Online subscriptions with anonymous access.
Marina Blanton
2008Practical forward secure sequential aggregate signatures.
Di Ma
2008Principled reasoning and practical applications of alert fusion in intrusion detection systems.
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
2008Private combinatorial group testing.
Mikhail J. Atallah, Keith B. Frikken, Marina Blanton, YounSun Cho
2008Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008
Masayuki Abe, Virgil D. Gligor
2008Prototyping security test objects for use with advanced biometric authentication systems.
Tsutomu Matsumoto
2008Provably secure browser-based user-aware mutual authentication over TLS.
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk
2008Robust, anonymous RFID authentication with constant key-lookup.
Mike Burmester, Breno de Medeiros, Rossana Motta
2008SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe
2008SNAPP: stateless network-authenticated path pinning.
Bryan Parno, Adrian Perrig, Dave G. Andersen
2008Secure neighbor discovery in wireless networks: formal investigation of possibility.
Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux
2008Secure slices of insecure programs.
Salvador Cavadini
2008Securing group key exchange against strong corruptions.
Emmanuel Bresson, Mark Manulis
2008Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard.
Alfred Menezes, Berkant Ustaoglu
2008Stateful identity-based encryption scheme: faster encryption and decryption.
Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata
2008Towards an efficient and language-agnostic compliance checker for trust negotiation systems.
Adam J. Lee, Marianne Winslett
2008Usage control platformization via trustworthy SELinux.
Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang
2008Verified implementations of the information card federated identity-management protocol.
Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy