ISC C

37 papers

YearTitle / Authors
2004A Distributed High Assurance Reference Monitor.
Ajay Chander, Drew Dean, John C. Mitchell
2004A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model.
Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon
2004A Model for the Semantics of Attack Signatures in Misuse Detection Systems.
Michael Meier
2004An Efficient Online Electronic Cash with Unlinkable Exact Payments.
Toru Nakanishi, Mitsuaki Shiota, Yuji Sugiyama
2004An XML-Based Approach to Document Flow Verification.
Elisa Bertino, Elena Ferrari, Giovanni Mella
2004Certificate Recommendations to Improve the Robustness of Web of Trust.
Qinglin Jiang, Douglas S. Reeves, Peng Ning
2004Chameleon Hashing Without Key Exposure.
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
2004Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA.
Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
2004Detecting Software Theft via Whole Program Path Birthmarks.
Ginger Myles, Christian S. Collberg
2004Detection of Sniffers in an Ethernet Network.
Zouheir Trabelsi, Hamza Rahmani
2004Effective Security Requirements Analysis: HAZOP and Use Cases.
Thitima Srivatanakul, John A. Clark, Fiona Polack
2004Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery.
Alex Hai Wang, Peng Liu, Lunquan Li
2004Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks.
Muxiang Zhang
2004How to Break and Repair a Universally Composable Signature Functionality.
Michael Backes, Dennis Hofheinz
2004Image Recognition CAPTCHAs.
Monica Chew, J. D. Tygar
2004Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings
Kan Zhang, Yuliang Zheng
2004Low-Level Ideal Signatures and General Integrity Idealization.
Michael Backes, Birgit Pfitzmann, Michael Waidner
2004Model-Checking Access Control Policies.
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobbens
2004Modifiable Digital Content Protection in P2P.
Heejae Park, Jong Kim
2004On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor.
Raphael Chung-Wei Phan, Helena Handschuh
2004On The Security of Key Derivation Functions.
Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato
2004Practical Authenticated Key Agreement Using Passwords.
Taekyoung Kwon
2004Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions.
HongQian Karen Lu, Asad M. Ali
2004Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps!
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
2004RSA Accumulator Based Broadcast Encryption.
Craig Gentry, Zulfikar Ramzan
2004Radix-r Non-Adjacent Form.
Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu
2004Re-thinking Security in IP Based Micro-Mobility.
Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen
2004Securing DBMS: Characterizing and Detecting Query Floods.
Elisa Bertino, Teodoro Leggieri, Evimaria Terzi
2004Security Analysis of Two Signcryption Schemes.
Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon
2004Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.
Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang
2004Storage-Efficient Stateless Group Key Revocation.
Pan Wang, Peng Ning, Douglas S. Reeves
2004Survey on the Technological Aspects of Digital Rights Management.
William Ku, Chi-Hung Chi
2004The Obfuscation Executive.
Kelly Heffner, Christian S. Collberg
2004Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security).
Richard Bergmair, Stefan Katzenbeisser
2004Universally Composable Secure Mobile Agent Computation.
Ke Xu, Stephen R. Tate
2004Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks.
Mark Foster, Joseph N. Wilson, Shigang Chen
2004Using Mediated Identity-Based Cryptography to Support Role-Based Access Control.
Deholo Nali, Carlisle M. Adams, Ali Miri