ISPEC C

33 papers

YearTitle / Authors
2011A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware.
Ning Ding, Dawu Gu
2011A Model for Constraint and Delegation Management.
Quan Pham, Jason Reid, Ed Dawson
2011A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols.
An Wang, Zheng Li, Xianwen Yang, Yanyan Yu
2011A Novel Group Signature Scheme Based on MPKC.
Guangdong Yang, Shaohua Tang, Li Yang
2011A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme.
Mahabir Prasad Jhanwar
2011An Efficient Group-Based Secret Sharing Scheme.
Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian
2011Analysis and Improvement of an Authenticated Key Exchange Protocol.
Jiaxin Pan, Libin Wang, Changshe Ma
2011Another Elliptic Curve Model for Faster Pairing Computation.
Lijun Zhang, Kunpeng Wang, Hong Wang, Dingfeng Ye
2011BCBC: A More Efficient MAC Algorithm.
Bo Liang, Wenling Wu, Liting Zhang
2011Encryption Simulatability Reconsidered.
Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia
2011Fully Secure Cipertext-Policy Hiding CP-ABE.
Junzuo Lai, Robert H. Deng, Yingjiu Li
2011Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes.
Yu Chen, Liqun Chen, Zhong Chen
2011Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host.
Jonghoon Kwon, Jehyun Lee, Heejo Lee
2011Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing.
Jun-e Liu, Zhiguo Wan, Ming Gu
2011How to Characterize Side-Channel Leakages More Accurately?
Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng
2011Improving BDD Cryptosystems in General Lattices.
Michael Rose, Thomas Plantard, Willy Susilo
2011Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings
Feng Bao, Jian Weng
2011Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme.
Weiwei Cao, Lei Hu, Jintai Ding, Zhijun Yin
2011Lightweight Delegated Subset Test with Privacy Protection.
Xuhua Zhou, Xuhua Ding, Kefei Chen
2011Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits.
Yongzhuang Wei, Jiqiang Lu, Yupu Hu
2011New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen
2011New Impossible Differential and Known-Key Distinguishers for the 3D Cipher.
Jorge Nakahara Jr.
2011Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries.
Huafei Zhu
2011On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs.
Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng
2011Policy-Based Authentication for Mobile Agents.
Yikai Wang, Yi Mu, Minjie Zhang
2011Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules.
Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu
2011Privacy Enhanced Access Control by Means of Policy Blinding.
Saeed Sedghi, Pieter H. Hartel, Willem Jonker, Svetla Nikova
2011Public-Key Encryptions Tolerating Adaptive and Composable Adversaries.
Huafei Zhu
2011Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems.
Fangming Zhao, Takashi Nishide, Kouichi Sakurai
2011Sanitizing Microdata without Leak: Combining Preventive and Curative Actions.
Tristan Allard, Benjamin Nguyen, Philippe Pucheral
2011Short Convertible Undeniable Signature in the Standard Model.
Qiong Huang, Duncan S. Wong
2011Toward Trustworthy Clouds' Internet Scale Critical Infrastructure.
Imad M. Abbadi
2011Traitor Tracing against Public Collaboration.
Xingwen Zhao, Fangguo Zhang