ISC C

34 papers

YearTitle / Authors
2003A Fast Signature Scheme Based on New On-line Computation.
Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto
2003A Logic Model for Temporal Authorization Delegation with Negation.
Chun Ruan, Vijay Varadharajan, Yan Zhang
2003A Note on Weak Keys of PES, IDEA, and Some Extended Variants.
Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
2003Analysis of the Insecurity of ECMQV with Partially Known Nonces.
Peter James Leadbitter, Nigel P. Smart
2003Cryptanalysis of an Algebraic Privacy Homomorphism.
David A. Wagner
2003Cryptographically Generated Addresses (CGA).
Tuomas Aura
2003Designated Verification of Non-invertible Watermark.
HyeJoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim
2003Distributed RSA Signature Schemes for General Access Structures.
Javier Herranz, Carles Padró, Germán Sáez
2003Divisible Voting Scheme.
Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
2003Easy Verifiable Primitives and Practical Public Key Cryptosystems.
David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
2003Enabling Shared Audit Data.
Adrian Baldwin, Simon Shiu
2003Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes.
Yvo Desmedt, Kaoru Kurosawa, Tri Van Le
2003Foundations of Differential Cryptanalysis in Abelian Groups.
Tomasz Tyksinski
2003Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES.
Akashi Satoh, Sumio Morioka
2003Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings
Colin Boyd, Wenbo Mao
2003Intrinsic Limitations of Digital Signatures and How to Cope with Them.
Ueli M. Maurer
2003On the Security of Fair Non-repudiation Protocols.
Sigrid Gürgens, Carsten Rudolph, Holger Vogt
2003Proactive Software Tampering Detection.
Hongxia Jin, Jeffery Lotspiech
2003Reactively Secure Signature Schemes.
Michael Backes, Birgit Pfitzmann, Michael Waidner
2003Revisiting Software Protection.
Paul C. van Oorschot
2003Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits.
Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee
2003Security Analysis of a Password Authenticated Key Exchange Protocol.
Feng Bao
2003Short c-Secure Fingerprinting Codes.
Tri Van Le, Mike Burmester, Jiangyi Hu
2003Single Sign-On Using Trusted Platforms.
Andreas Pashalidis, Chris J. Mitchell
2003Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto
2003The Design and Implementation of Protocol-Based Hidden Key Recovery.
Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle
2003The Role of Arbiters in Asymmetric Authentication Schemes.
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
2003Towards a Business Process-Driven Framework for Security Engineering with the UML.
José Luis Vivas, José A. Montenegro, Javier López
2003Trust and Authorization in Pervasive B2E Scenarios.
Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta
2003Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
2003Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation.
Jianying Zhou, Feng Bao, Robert H. Deng
2003Validating and Securing Spontaneous Associations between Wireless Devices.
Tim Kindberg, Kan Zhang
2003Zero-Distortion Authentication Watermarking.
Yongdong Wu
2003Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
Toru Akishita, Tsuyoshi Takagi