ISC C

29 papers

YearTitle / Authors
2007A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring.
Yvo Desmedt, Kaoru Kurosawa
2007An Efficient Certified Email Protocol.
Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao
2007Detecting System Emulators.
Thomas Raffetseder, Christopher Krügel, Engin Kirda
2007Differential Properties of Elliptic Curves and Blind Signatures.
Billy Bob Brumley, Kaisa Nyberg
2007E-NIPS: An Event-Based Network Intrusion Prediction System.
Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque
2007Efficient Committed Oblivious Transfer of Bit Strings.
Mehmet S. Kiraz, Berry Schoenmakers, José Villegas
2007Efficient Negative Databases from Cryptographic Hash Functions.
George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel
2007Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation.
Pradeep Kumar Mishra, Vassil S. Dimitrov
2007Enabling Fairer Digital Rights Management with Trusted Computing.
Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan, Jan-Erik Ekberg
2007Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control.
Joachim Biskup, Jan-Hendrik Lochner
2007Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems.
Iosif-Viorel Onut, Ali A. Ghorbani
2007High-Speed Pipelined Hardware Architecture for Galois Counter Mode.
Akashi Satoh, Takeshi Sugawara, Takafumi Aoki
2007Identity-Based Proxy Re-encryption Without Random Oracles.
Cheng-Kang Chu, Wen-Guey Tzeng
2007Impossible-Differential Attacks on Large-Block Rijndael.
Jorge Nakahara Jr., Ivan Carlos Pavão
2007Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings
Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta
2007Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.
Joo Yeon Cho, Josef Pieprzyk
2007New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py.
Gautham Sekar, Souradyuti Paul, Bart Preneel
2007On the Concept of Software Obfuscation in Computer Security.
Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov
2007On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures.
Fabien Laguillaumie, Damien Vergnaud
2007Queue Management as a DoS Counter-Measure?
Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins
2007Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability.
Alexander W. Dent, Qiang Tang
2007Small Private-Exponent Attack on RSA with Primes Sharing Bits.
Yao-Dong Zhao, Wen-Feng Qi
2007Specifying Imperative Data Obfuscations.
Stephen Drape, Clark D. Thomborson, Anirban Majumdar
2007Strongly-Secure Identity-Based Key Agreement and Anonymous Extension.
Sherman S. M. Chow, Kim-Kwang Raymond Choo
2007The Security of Elastic Block Ciphers Against Key-Recovery Attacks.
Debra L. Cook, Moti Yung, Angelos D. Keromytis
2007Token-Controlled Public Key Encryption in the Standard Model.
Sherman S. M. Chow
2007Towards a DL-Based Additively Homomorphic Encryption Scheme.
Guilhem Castagnos, Benoît Chevallier-Mames
2007Traitor Tracing with Optimal Transmission Rate.
Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
2007Trapdoor Permutation Polynomials of Z/
Guilhem Castagnos, Damien Vergnaud