ISC C

26 papers

YearTitle / Authors
2011A Formal Approach to Distance-Bounding RFID Protocols.
Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete
2011A Privacy-Preserving Join on Outsourced Database.
Sha Ma, Bo Yang, Kangshun Li, Feng Xia
2011APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks.
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer
2011Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption.
Keita Emura, Atsuko Miyaji, Kazumasa Omote
2011An Efficient Construction of Time-Selective Convertible Undeniable Signatures.
Qiong Huang, Duncan S. Wong, Willy Susilo, Bo Yang
2011Assessing Location Privacy in Mobile Communication Networks.
Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, Dirk von Suchodoletz
2011Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders.
Aggelos Kiayias, Serdar Pehlivanoglu
2011Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes.
Ge Zhang, Simone Fischer-Hübner
2011Detection and Analysis of Cryptographic Data Inside Software.
Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu
2011Efficient Fail-Stop Signatures from the Factoring Assumption.
Atefeh Mashatan, Khaled Ouafi
2011Hello rootKitty: A Lightweight Invariance-Enforcing Framework.
Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen
2011How Much Is Enough? Choosing ε for Differential Privacy.
Jaewoo Lee, Chris Clifton
2011How to Find Short RC4 Colliding Key Pairs.
Jiageng Chen, Atsuko Miyaji
2011Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings
Xuejia Lai, Jianying Zhou, Hui Li
2011MASHA - Low Cost Authentication with a New Stream Cipher.
Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima
2011Multi-stage Binary Code Obfuscation Using Improved Virtual Machine.
Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang
2011Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Yuan Zhou, Haifeng Qian, Xiangxue Li
2011On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints.
Joachim Biskup, Marcel Preuß, Lena Wiese
2011Opacity Analysis in Trust Management Systems.
Moritz Y. Becker, Masoud Koleini
2011RatBot: Anti-enumeration Peer-to-Peer Botnets.
Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz
2011Replacement Attacks on Behavior Based Software Birthmark.
Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie
2011Round-Efficient Oblivious Database Manipulation.
Sven Laur, Jan Willemson, Bingsheng Zhang
2011Security Analysis of an RSA Key Generation Algorithm with a Large Private Key.
Fanyu Kong, Jia Yu, Lei Wu
2011SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms.
Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos
2011The n-Diffie-Hellman Problem and Its Applications.
Liqun Chen, Yu Chen
2011Toward Pairing-Free Certificateless Authenticated Key Exchanges.
Hu Xiong, Qianhong Wu, Zhong Chen