ISC C

39 papers

YearTitle / Authors
2009A
Angelos Stavrou, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh
2009A Calculus to Detect Guessing Attacks.
Bogdan Groza, Marius Minea
2009A New Approach to
Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel
2009A New Construction of Boolean Functions with Maximum Algebraic Immunity.
Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li
2009A Storage Efficient Redactable Signature in the Standard Model.
Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi
2009Adding Trust to P2P Distribution of Paid Content.
Alex Sherman, Angelos Stavrou, Jason Nieh, Angelos D. Keromytis, Clifford Stein
2009An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement.
Gildas Avoine, Aslan Tchamkerten
2009Analysis and Optimization of Cryptographically Generated Addresses.
Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux
2009Automated Spyware Collection and Analysis.
Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda
2009Cancelable Iris Biometrics Using Block Re-mapping and Image Warping.
Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl
2009Combining Consistency and Confidentiality Requirements in First-Order Databases.
Joachim Biskup, Lena Wiese
2009Detection of Database Intrusion Using a Two-Stage Fuzzy System.
Suvasini Panigrahi, Shamik Sural
2009Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao
2009F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services.
Matthew Burnside, Angelos D. Keromytis
2009Fair E-Cash: Be Compact, Spend Faster.
Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud
2009Generic Construction of Stateful Identity Based Encryption.
Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai
2009HMAC without the "Second" Key.
Kan Yasuda
2009Hardware-Assisted Application-Level Access Control.
Yu-Yuan Chen, Ruby B. Lee
2009Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings
Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio A. Ardagna
2009Iris Recognition in Nonideal Situations.
Kaushik Roy, Prabir Bhattacharya
2009MAC Precomputation with Applications to Secure Memory.
Juan A. Garay, Vladimir Kolesnikov, Rae McLellan
2009Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL.
Yu Sasaki
2009Nonce Generators and the Nonce Reset Problem.
Erik Zenner
2009On Free-Start Collisions and Collisions for TIB3.
Florian Mendel, Martin Schläffer
2009On the Security of Identity Based Ring Signcryption Schemes.
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan
2009Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale.
Mirco Marchetti, Michele Messori, Michele Colajanni
2009Practical Algebraic Attacks on the Hitag2 Stream Cipher.
Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater
2009Privacy-Aware Attribute-Based Encryption with User Accountability.
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan
2009Risks of the CardSpace Protocol.
Sebastian Gajek, Jörg Schwenk, Michael Steiner, Chen Xuan
2009Robust Authentication Using Physically Unclonable Functions.
Keith B. Frikken, Marina Blanton, Mikhail J. Atallah
2009SISR - A New Model for Epidemic Spreading of Electronic Threats.
Boris Rozenberg, Ehud Gudes, Yuval Elovici
2009Secure Interoperation in Multidomain Environments Employing UCON Policies.
Jianfeng Lu, Ruixuan Li, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma
2009Security Analysis of the PACE Key-Agreement Protocol.
Jens Bender, Marc Fischlin, Dennis Kügler
2009Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, Xiaopu Ma
2009Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n.
Mario Lamberger, Florian Mendel
2009Towards Security Notions for White-Box Cryptography.
Amitabh Saxena, Brecht Wyseur, Bart Preneel
2009Towards Trustworthy Delegation in Role-Based Access Control Model.
Manachai Toahchoodee, Xing Xie, Indrakshi Ray
2009Towards Unifying Vulnerability Information for Attack Graph Construction.
Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel
2009Traitor Tracing without A Priori Bound on the Coalition Size.
Hongxia Jin, Serdar Pehlivanoglu