default search action
ISPEC 2006: Hangzhou, China
- Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou:
Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings. Lecture Notes in Computer Science 3903, Springer 2006, ISBN 3-540-33052-6
Cryptoanalysis
- Yoo-Jin Baek, Mi-Jung Noh:
DPA-Resistant Finite Field Multipliers and Secure AES Design. 1-12 - Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li:
Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. 13-24 - Baocang Wang, Yupu Hu:
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. 25-32 - Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim:
Further Security Analysis of XTR. 33-44
Network Security I
- Hao Luo, Binxing Fang, Xiao-chun Yun:
A Counting-Based Method for Massive Spam Mail Classification. 45-56 - Ping Wang, Binxing Fang, Xiao-chun Yun:
Model and Estimation of Worm Propagation Under Network Partition. 57-66 - Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi:
Tackling Worm Detection Speed and False Alarm in Virus Throttling. 67-77
Network Security II
- Feng Xie, Shuo Bai:
Using Data Field to Analyze Network Intrusions. 78-89 - Ji Wu, Chaoqun Ye, Shiyao Jin:
Adversarial Organization Modeling for Network Attack/Defense. 90-99 - Zhifei Tao, Hai Jin, Zongfen Han, En Cheng:
A Novel Dynamic Immunization Strategy for Computer Network Epidemics. 100-111 - Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu:
Preventing Web-Spoofing with Automatic Detecting Security Indicator. 112-122
Security Protocol
- Xiehua Li, ShuTang Yang, Jian-Hua Li, HongWen Zhu:
Security Protocol Analysis with Improved Authentication Tests. 123-133 - Xiao Li, Mingxing He:
A Protocol of Member-Join in a Secret Sharing Scheme. 134-141 - Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu:
More on Shared-Scalar-Product Protocols. 142-152
Communication Security
- Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee:
Efficient Public Key Broadcast Encryption Using Identifier of Receivers. 153-164 - Ling Dong, Kefei Chen:
A Practical Clumped-Tree Multicast Encryption Scheme. 165-176 - Jinye Peng, GuangQiang He, Jin Xiong, Guihua Zeng:
Trojan Horse Attack Strategy on Quantum Private Communication. 177-186
Signature and Key Agreement
- Mark Manulis, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. 187-201 - Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang:
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. 202-213 - Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang:
Short (Identity-Based) Strong Designated Verifier Signature Schemes. 214-225 - Yuan Zhou, Zhenfu Cao, Zhenchuan Chai:
Identity Based Key Insulated Signature. 226-234
Application I
- Hyung Chan Kim, Wook Shin, Rudrapatna S. Ramakrishna, Kouichi Sakurai:
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. 235-247 - Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou:
A Design and Implementation of Profile Based Web Application Securing Proxy. 248-259 - Muhammad Khurram Khan, Jiashu Zhang:
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. 260-268
Application II
- Gu Su Kim, Young Ik Eom:
Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. 269-277 - Yahui Lu, Li Zhang, Yinbo Liu, Jiaguang Sun:
Using pi-Calculus to Formalize Domain Administration of RBAC. 278-289 - Fangyong Hou, Hongjun He, Zhiying Wang, Kui Dai:
An Efficient Way to Build Secure Disk. 290-301 - Hongxia Jin, Jeffery Lotspiech:
Practical Forensic Analysis in Advanced Access Content System. 302-313
Cryptographic Techniques
- Tianjie Cao, Xianping Mao, Dongdai Lin:
Security Analysis of a Server-Aided RSA Key Generation Protocol. 314-320 - Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin:
Integrating Grid with Cryptographic Computing. 321-331 - Lan Zhou, Willy Susilo, Yi Mu:
Three-Round Secret Handshakes Based on ElGamal and DSA. 332-342
System Security
- Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun:
Securing C Programs by Dynamic Type Checking. 343-354 - Fenlin Liu, Bin Lu, Xiangyang Luo:
A Chaos-Based Robust Software Watermarking. 355-366 - Qianhong Wu, Yi Mu, Willy Susilo, Fangguo Zhang:
Privately Retrieve Data from Large Databases. 367-378 - Seok Lee, Tai-Myung Chung, Myeonggil Choi:
An Empirical Study of Quality and Cost Based Security Engineering. 379-389
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.