ISC C

34 papers

YearTitle / Authors
2008A Demonstrative Ad Hoc Attestation System.
Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi
2008A Five-Round Algebraic Property of the Advanced Encryption Standard.
Jianyong Huang, Jennifer Seberry, Willy Susilo
2008A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka
2008A Novel Audio Steganalysis Based on High-Order Statistics of a Distortion Measure with Hausdorff Distance.
Yali Liu, Ken Chiang, Cherita L. Corbett, Rennie Archibald, Biswanath Mukherjee, Dipak Ghosal
2008Algebraic Attack on HFE Revisited.
Jintai Ding, Dieter Schmidt, Fabian Werner
2008An Efficient PIR Construction Using Trusted Hardware.
Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao
2008An RSA-Based (t, n) Threshold Proxy Signature Scheme without Any Trusted Combiner.
Pei-Yih Ting, Xiao-Wei Huang
2008Antisocial Networks: Turning a Social Network into a Botnet.
Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos
2008Athos: Efficient Authentication of Outsourced File Systems.
Michael T. Goodrich, Charalampos Papamanthou, Roberto Tamassia, Nikos Triandopoulos
2008Behavior-Based Network Access Control: A Proof-of-Concept.
Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis
2008BotTracer: Execution-Based Bot-Like Malware Detection.
Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang
2008Can "Something You Know" Be Saved?.
Baris Coskun, Cormac Herley
2008Certificate-Based Signature Schemes without Pairings or Random Oracles.
Joseph K. Liu, Joonsang Baek, Willy Susilo, Jianying Zhou
2008Collisions for RC4-Hash.
Sebastiaan Indesteege, Bart Preneel
2008Comparative Evaluation of Rank Correlation Based DPA on an AES Prototype Chip.
Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust
2008Compromising Anonymity Using Packet Spinning.
Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos
2008Cryptanalysis of Rabbit.
Yi Lu, Huaxiong Wang, San Ling
2008Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family.
Somitra Kumar Sanadhya, Palash Sarkar
2008Distinguishing between FE and DDoS Using Randomness Check.
Hyundo Park, Peng Li, Debin Gao, Heejo Lee, Robert H. Deng
2008HAPADEP: Human-Assisted Pure Audio Device Pairing.
Claudio Soriente, Gene Tsudik, Ersin Uzun
2008Improved Impossible Differential Attacks on Large-Block Rijndael.
Lei Zhang, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom
2008Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings
Tzong-Chen Wu, Chin-Laung Lei, Vincent Rijmen, Der-Tsai Lee
2008New Applications of Differential Bounds of the SDS Structure.
Jiali Choy, Khoongming Khoo
2008New Communication-Efficient Oblivious Transfer Protocols Based on Pairings.
Helger Lipmaa
2008One-Time Password Access to Any Server without Changing the Server.
Dinei A. F. Florêncio, Cormac Herley
2008Path-Based Access Control for Enterprise Networks.
Matthew Burnside, Angelos D. Keromytis
2008Property-Based Attestation without a Trusted Third Party.
Liqun Chen, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi
2008Property-Based TPM Virtualization.
Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy
2008Proxy Re-signatures in the Standard Model.
Sherman S. M. Chow, Raphael C.-W. Phan
2008Revisiting Wiener's Attack - New Weak Keys in RSA.
Subhamoy Maitra, Santanu Sarkar
2008Strong Accumulators from Collision-Resistant Hashing.
Philippe Camacho, Alejandro Hevia, Marcos A. Kiwi, Roberto Opazo
2008The Reduced Address Space (RAS) for Application Memory Authentication.
David Champagne, Reouven Elbaz, Ruby B. Lee
2008Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets.
Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang
2008Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication.
Shay Gueron, Michael E. Kounavis