default search action
ISPEC 2007: Hong Kong, China
- Ed Dawson, Duncan S. Wong:
Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings. Lecture Notes in Computer Science 4464, Springer 2007, ISBN 978-3-540-72159-8
Invited Talks
- William J. Caelli:
Application Security - Myth Or Reality? 1-10 - Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). 11-19
Cryptanalysis
- Jorge Nakahara Jr.:
A Linear Analysis of Blowfish and Khufu. 20-32 - Gaoli Wang:
Related-Key Rectangle Attack on 43-Round SHACAL-2. 33-42 - Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou:
On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. 43-50
Signatures
- Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka:
A Sanitizable Signature Scheme with Aggregation. 51-64 - Jianhong Zhang, Jian Mao:
A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. 65-78 - Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Certificate Based (Linkable) Ring Signature. 79-92 - Saeran Kwon, Sang-Ho Lee:
An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme. 93-104 - Zuhua Shao:
On the Sequentiality of Three Optimal Structured Multisignature Schemes. 105-115
Network Security and Security Management
- Di Ma:
Secure Feedback Service in Wireless Sensor Networks. 116-128 - Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang:
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. 129-144 - Peter C. S. Kwan, Glenn Durfee:
Practical Uses of Virtual Machines for Protection of Sensitive User Data. 145-161 - Jung-Hwa Chae, Nematollaah Shiri:
Formalization of RBAC Policy with Object Class Hierarchy. 162-176
Privacy and Applications
- Yanjiang Yang, Robert H. Deng, Feng Bao:
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. 177-192 - Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Two-Party Privacy-Preserving Agglomerative Document Clustering. 193-208 - Kun Peng, Ed Dawson:
Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. 209-224
Cryptographic Algorithms and Implementations
- Yoo-Jin Baek, Ihor V. Vasyltsov:
How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. 225-237 - Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim:
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. 238-253 - Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. 254-268 - Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar:
Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. 269-283
Authentication and Key Management
- Robert H. Deng, Yanjiang Yang:
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. 284-300 - Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li:
Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. 301-313 - Jiyong Jang, Taekyoung Kwon, JooSeok Song:
A Time-Based Key Management Protocol for Wireless Sensor Networks. 314-328
Cryptosystems
- Shengli Liu, Kefei Chen, Weidong Qiu:
Identity-Based Threshold Decryption Revisited. 329-343 - Miyuki Uno, Mikio Kano:
Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. 344-359
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.