ISPEC C

35 papers

YearTitle / Authors
2009A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length.
Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
2009A Framework for Authenticated Key Exchange in the Standard Model.
Shuhua Wu, Yuefei Zhu
2009A Hybrid E-Voting Scheme.
Kun Peng
2009A Novel Adaptive Watermarking Scheme Based on Human Visual System and Particle Swarm Optimization.
Shaomin Zhu, Jianming Liu
2009Achieving Better Privacy Protection in Wireless Sensor Networks Using Trusted Computing.
Yanjiang Yang, Robert H. Deng, Jianying Zhou, Ying Qiu
2009An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems.
Ruishan Zhang, Xinyuan Wang, Xiaohui Yang, Ryan Farley, Xuxian Jiang
2009An Extended Authentication and Key Agreement Protocol of UMTS.
Farshid Farhat, Somayeh Salimi, Ahmad Salahi
2009Analysing Protocol Implementations.
Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister, Arne-Kristian Groven
2009Certificateless Hybrid Signcryption.
Fagen Li, Masaaki Shirase, Tsuyoshi Takagi
2009Defending against the Pirate Evolution Attack.
Hongxia Jin, Jeffrey B. Lotspiech
2009Efficient Concurrent npoly(logn)-Simulatable Argument of Knowledge.
Guifang Huang, Dongdai Lin, Yanshuo Zhang
2009Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes.
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker
2009Ensuring Dual Security Modes in RFID-Enabled Supply Chain Systems.
Shaoying Cai, Tieyan Li, Yingjiu Li, Robert H. Deng
2009Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL.
Hongbo Yu, Xiaoyun Wang
2009Hash-Based Key Management Schemes for MPEG4-FGS.
Mohamed Karroumi, Ayoub Massoudi
2009Implementing IDS Management on Lock-Keeper.
Feng Cheng, Sebastian Roschke, Christoph Meinel
2009Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings
Feng Bao, Hui Li, Guilin Wang
2009Measuring Anonymity.
Xiaojuan Cai, Yonggen Gu
2009Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2.
Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher.
Ewan Fleischmann, Michael Gorski, Stefan Lucks
2009New Constructions for Reusable, Non-erasure and Universally Composable Commitments.
Huafei Zhu
2009On Non-representable Secret Sharing Matroids.
Qi Cheng, Yong Yin, Kun Xiao, Ching-Fang Hsu
2009On the Correctness of an Approach against Side-Channel Attacks.
Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
2009On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings.
Jianhong Zhang
2009Preimage Attack on Hash Function RIPEMD.
Gaoli Wang, Shaohui Wang
2009RSA-Based Certificateless Public Key Encryption.
Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou
2009Ranking Attack Graphs with Graph Neural Networks.
Liang Lu, Reihaneh Safavi-Naini, Markus Hagenbuchner, Willy Susilo, Jeffrey Horton, Sweah Liang Yong, Ah Chung Tsoi
2009Reconstructing a Packed DLL Binary for Static Analysis.
Xianggen Wang, Dengguo Feng, Purui Su
2009Secret Handshake: Strong Anonymity Definition and Construction.
Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
2009Security Specification for Conversion Technologies of Heterogeneous DRM Systems.
Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim, Dongho Won
2009Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard.
Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su
2009Static Analysis of a Class of Memory Leaks in TrustedBSD MAC Framework.
Xinsong Wu, Zhouyi Zhou, Yeping He, Hongliang Liang
2009Strongly Unforgeable ID-Based Signatures without Random Oracles.
Chifumi Sato, Takeshi Okamoto, Eiji Okamoto
2009Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing.
Hans Löhr, Ahmad-Reza Sadeghi, Claire Vishik, Marcel Winandy
2009Twister- A Framework for Secure and Fast Hash Functions.
Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks