ISPEC C

27 papers

YearTitle / Authors
2007A Linear Analysis of Blowfish and Khufu.
Jorge Nakahara Jr.
2007A Novel Verifiably Encrypted Signature Scheme Without Random Oracle.
Jianhong Zhang, Jian Mao
2007A Sanitizable Signature Scheme with Aggregation.
Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
2007A Time-Based Key Management Protocol for Wireless Sensor Networks.
Jiyong Jang, Taekyoung Kwon, JooSeok Song
2007Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems.
Robert H. Deng, Yanjiang Yang
2007An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols.
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang
2007An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme.
Saeran Kwon, Sang-Ho Lee
2007Application Security - Myth Or Reality?
William J. Caelli
2007Certificate Based (Linkable) Ring Signature.
Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
2007Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction.
Kun Peng, Ed Dawson
2007Formalization of RBAC Policy with Object Class Hierarchy.
Jung-Hwa Chae, Nematollaah Shiri
2007How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method.
Yoo-Jin Baek, Ihor V. Vasyltsov
2007Identity-Based Threshold Decryption Revisited.
Shengli Liu, Kefei Chen, Weidong Qiu
2007Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings
Ed Dawson, Duncan S. Wong
2007On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis.
Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou
2007On the Sequentiality of Three Optimal Structured Multisignature Schemes.
Zuhua Shao
2007Practical Uses of Virtual Machines for Protection of Sensitive User Data.
Peter C. S. Kwan, Glenn Durfee
2007Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers.
Yanjiang Yang, Robert H. Deng, Feng Bao
2007Related-Key Rectangle Attack on 43-Round SHACAL-2.
Gaoli Wang
2007Scalable Group Key Management Protocol Based on Key Material Transmitting Tree.
Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li
2007Secure Feedback Service in Wireless Sensor Networks.
Di Ma
2007Secure Signed Radix-
Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim
2007Some Efficient Algorithms for the Final Exponentiation of
Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2007Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper).
Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu
2007Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems.
Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar
2007Two-Party Privacy-Preserving Agglomerative Document Clustering.
Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai
2007Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images.
Miyuki Uno, Mikio Kano