ISC C

38 papers

YearTitle / Authors
2005"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience.
Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou, Moti Yung
2005A Cryptographic Solution for General Access Control.
Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu
2005A Dynamic Mechanism for Recovering from Buffer Overflow Attacks.
Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis
2005A Formal Definition for Trust in Distributed Systems.
Daoxi Xiu, Zhaoyu Liu
2005A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design.
Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
2005A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption.
Kun Peng, Colin Boyd, Ed Dawson
2005A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm.
Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
2005A Practical Voting Scheme with Receipts.
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski
2005A Privacy Preserving Rental System.
Yanjiang Yang, Beng Chin Ooi
2005An Oblivious Transfer Protocol with Log-Squared Communication.
Helger Lipmaa
2005Analysis and Improvement of a Signcryption Scheme with Key Privacy.
Guomin Yang, Duncan S. Wong, Xiaotie Deng
2005Building a Cryptovirus Using Microsoft's Cryptographic API.
Adam L. Young
2005Certificateless Public Key Encryption Without Pairing.
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo
2005Chaum's Designated Confirmer Signature Revisited.
Jean Monnerat, Serge Vaudenay
2005Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.
Chi-Ming Hu, Wen-Guey Tzeng
2005Constant Round Dynamic Group Key Agreement.
Ratna Dutta, Rana Barua
2005Device-Enabled Authorization in the Grey-System.
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar
2005Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models.
German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn
2005Efficient and Proactive Threshold Signcryption.
Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu
2005Electronic Voting: Starting Over?
Yvo Desmedt, Kaoru Kurosawa
2005Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
Chris J. Mitchell
2005Evaluating Access Control Policies Through Model Checking.
Nan Zhang, Mark Ryan, Dimitar P. Guelev
2005Hardware Architecture and Cost Estimates for Breaking SHA-1.
Akashi Satoh
2005Hybrid Signcryption Schemes with Outsider Security.
Alexander W. Dent
2005ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms.
Hyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku
2005IPSec Support in NAT-PT Scenario for IPv6 Transition.
Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim
2005Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings
Jianying Zhou, Javier López, Robert H. Deng, Feng Bao
2005Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting.
Xiaolan Joy Zhang, Brian King
2005New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation.
Zhenghong Wang, Ruby B. Lee
2005On the Notion of Statistical Security in Simulatability Definitions.
Dennis Hofheinz, Dominique Unruh
2005On the Security of Tweakable Modes of Operation: TBC and TAE.
Peng Wang, Dengguo Feng, Wenling Wu
2005On the Security of the WinRAR Encryption Method.
Gary S.-W. Yeo, Raphael Chung-Wei Phan
2005SVision: A Network Host-Centered Anomaly Visualization Technique.
Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani
2005Time-Based Release of Confidential Information in Hierarchical Settings.
Deholo Nali, Carlisle M. Adams, Ali Miri
2005Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System.
Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee
2005Towards Better Software Tamper Resistance.
Hongxia Jin, Ginger Myles, Jeffery Lotspiech
2005Tracing-by-Linking Group Signatures.
Victor K. Wei
2005Universally Composable Time-Stamping Schemes with Audit.
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson