ISPEC C

30 papers

YearTitle / Authors
20081-out-of-.
Raylin Tso, Takeshi Okamoto, Eiji Okamoto
2008A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval
2008A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection.
Jihwan Lim, Heekuck Oh, Sangjin Kim
2008A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme.
Jong Hwan Park, Dong Hoon Lee
2008An Efficient Countermeasure against Side Channel Attacks for Pairing Computation.
Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
2008An On-Line Secure E-Passport Protocol.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang
2008Analysis of Zipper as a Hash Function.
Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu
2008Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers.
Patrick P. Tsang, Sean W. Smith
2008Computational Soundness of Non-Malleable Commitments.
David Galindo, Flavio D. Garcia, Peter van Rossum
2008Distributed Private Matching and Set Operations.
Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
2008Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic.
Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi
2008Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings
Liqun Chen, Yi Mu, Willy Susilo
2008Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains.
Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu
2008On the Importance of the Key Separation Principle for Different Modes of Operation.
Danilo Gligoroski, Suzana Andova, Svein J. Knapskog
2008PROBE: A Process Behavior-Based Host Intrusion Prevention System.
Minjin Kwon, Kyoochang Jeong, Heejo Lee
2008Privacy of Recent RFID Authentication Protocols.
Khaled Ouafi, Raphael C.-W. Phan
2008Private Query on Encrypted Data in Multi-user Settings.
Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang
2008RSA Moduli with a Predetermined Portion: Techniques and Applications.
Marc Joye
2008Rational Secret Sharing with Repeated Games.
Shaik Maleka, Amjed Shareef, C. Pandu Rangan
2008Secure Computation of the Vector Dominance Problem.
Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk
2008Secure Cryptographic Precomputation with Insecure Memory.
Patrick P. Tsang, Sean W. Smith
2008Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
2008Securing Peer-to-Peer Distributions for Mobile Devices.
André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan
2008Square Attack on Reduced-Round Zodiac Cipher.
Wen Ji, Lei Hu
2008Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software.
Andrew Brown, Mark Ryan
2008Towards Tamper Resistant Code Encryption: Practice and Experience.
Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere
2008Towards the World-Wide Quantum Network.
Quoc-Cuong Le, Patrick Bellot, Akim Demaille
2008Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks.
Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim
2008Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs.
Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma
2008Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol.
Anongporn Salaiwarakul, Mark Dermot Ryan