ISPEC C

29 papers

YearTitle / Authors
2010A Deniable Group Key Establishment Protocol in the Standard Model.
Yazhe Zhang, Kunpeng Wang, Bao Li
2010A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.
Jiageng Chen, Atsuko Miyaji
2010A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables.
Lin Xu, Dongdai Lin, Xin Li
2010A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), .
Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim
2010A Trustworthy ID Management Mechanism in Open Market.
InKyung Jeun, Dongho Won
2010Accelerating Inverse of
Lei Xu, Dongdai Lin
2010An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification.
Jacob C. N. Schuldt, Kanta Matsuura
2010Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards.
Youngsook Lee, Hyungkyu Yang, Dongho Won
2010Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis.
Chiew Kang Leng, Josef Pieprzyk
2010BioID: Biometric-Based Identity Management.
Byoung-Jin Han, Donghwi Shin, Hyoung-Jin Lim, InKyung Jeun, Hyun-Chul Jung
2010Certificateless KEM and Hybrid Signcryption Schemes Revisited.
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2010Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis.
Zhen Wang, Xiaozhe Wang, Shuqin Fan
2010Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles.
Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan
2010Host-Based Security Sensor Integrity in Multiprocessing Environments.
Thomas Richard McEvoy, Stephen D. Wolthusen
2010Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512.
Jiazhe Chen, Keting Jia
2010Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings
Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang
2010Integral Attacks on Reduced-Round ARIA Block Cipher.
Yanjun Li, Wenling Wu, Lei Zhang
2010Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes.
Farshid Farhat, Mohammad Reza Pakravan, Mahmoud Salmasizadeh, Mohammad Reza Aref
2010Mitigating the Malicious Trust Expansion in Social Network Service.
Daren Zha, Jiwu Jing, Le Kang
2010On Fast and Approximate Attack Tree Computations.
Aivo Jürgenson, Jan Willemson
2010On the Security of NOEKEON against Side Channel Cube Attacks.
Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo, Jennifer Seberry
2010Privacy Preserving of Trust Management Credentials Based on Trusted Computing.
Bin Wu, Dengguo Feng, Meijiao Duan
2010Protection Profile for Secure E-Voting Systems.
Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim
2010Rate-Based Watermark Traceback: A New Approach.
Zongbin Liu, Jiwu Jing, Peng Liu
2010Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk.
Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng
2010The Elliptic Curve Discrete Logarithm Problems over the
Masaya Yasuda
2010Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting.
Hui Li, Chuankun Wu, Lingbo Wei
2010Using Purpose Capturing Signatures to Defeat Computer Virus Mutating.
Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu
2010Width-3 Joint Sparse Form.
Katsuyuki Okeya, Hidehiro Katou, Yasuyuki Nogami