


default search action
3rd AsiaCCS 2008: Tokyo, Japan
- Masayuki Abe, Virgil D. Gligor: 
 Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008. ACM 2008, ISBN 978-1-59593-979-1
Invited talk
- Gene Tsudik: 
 Confronting a mobile adversary in unattended sensor networks. 1
- Tsutomu Matsumoto: 
 Prototyping security test objects for use with advanced biometric authentication systems. 2
Hash and MAC
- Jun Yajima  , Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro , Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro , Kazuo Ohta: , Kazuo Ohta:
 A strict evaluation method on the number of conditions for the SHA-1 collision search. 10-20
- Pierre-Alain Fouque  , David Pointcheval , David Pointcheval , Sébastien Zimmer: , Sébastien Zimmer:
 HMAC is a randomness extractor and applications to TLS. 21-32
Side channel attacks
- Thanh-Ha Le, Cécile Canovas  , Jessy Clédière , Jessy Clédière : :
 An overview of side channel analysis attacks. 33-43
- Marcus Völp  , Claude-Joachim Hamann, Hermann Härtig: , Claude-Joachim Hamann, Hermann Härtig:
 Avoiding timing channels in fixed-priority schedulers. 44-55
Block cipher
- Christophe Petit  , François-Xavier Standaert , François-Xavier Standaert , Olivier Pereira, Tal Malkin, Moti Yung: , Olivier Pereira, Tal Malkin, Moti Yung:
 A block cipher based pseudo random number generator secure against side-channel key recovery. 56-65
Formal verification
- Cas Cremers: 
 On the protocol composition logic PCL. 66-76
- Marcin Olszewski, Lukasz Cyra: 
 An integrated framework for security protocol analysis. 77-86
- Bruno Blanchet, Aaron D. Jaggard  , Andre Scedrov , Andre Scedrov , Joe-Kai Tsay: , Joe-Kai Tsay:
 Computationally sound mechanized proofs for basic and public-key Kerberos. 87-99
- A. Prasad Sistla, V. N. Venkatakrishnan, Michelle Zhou, Hilary Branske: 
 CMV: automatic verification of complete mediation for java virtual machines. 100-111
Secure implementation
- Salvador Cavadini: 
 Secure slices of insecure programs. 112-122
- Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon, Nikhil Swamy: 
 Verified implementations of the information card federated identity-management protocol. 123-135
Network security (I)
- Guofei Gu, Alvaro A. Cárdenas  , Wenke Lee: , Wenke Lee:
 Principled reasoning and practical applications of alert fusion in intrusion detection systems. 136-147
- Christoph Fuchs, Nils Aschenbruck, Felix Leder, Peter Martini: 
 Detecting VoIP based DoS attacks at the public safety answering point. 148-155
- Chetan Parampalli, R. Sekar, Rob Johnson: 
 A practical mimicry attack against powerful system-call monitors. 156-167
Network security (II)
- Bryan Parno, Adrian Perrig, Dave G. Andersen: 
 SNAPP: stateless network-authenticated path pinning. 168-178
- Liming Lu  , Mun Choon Chan, Ee-Chien Chang , Mun Choon Chan, Ee-Chien Chang : :
 A general model of probabilistic packet marking for IP traceback. 179-188
- Marcin Poturalski, Panos Papadimitratos  , Jean-Pierre Hubaux: , Jean-Pierre Hubaux:
 Secure neighbor discovery in wireless networks: formal investigation of possibility. 189-200
- Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe: 
 SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks. 201-204
Access control
- Liang Chen, Jason Crampton: 
 On spatio-temporal constraints and inheritance in role-based access control. 205-216
- Marina Blanton  : :
 Online subscriptions with anonymous access. 217-227
- Adam J. Lee  , Marianne Winslett: , Marianne Winslett:
 Towards an efficient and language-agnostic compliance checker for trust negotiation systems. 228-239
- Alexander Pretschner, Manuel Hilty, David A. Basin, Christian Schaefer, Thomas Walter: 
 Mechanisms for usage control. 240-244
- Masoom Alam, Jean-Pierre Seifert, Qi Li, Xinwen Zhang: 
 Usage control platformization via trustworthy SELinux. 245-248
Key exchange
- Emmanuel Bresson, Mark Manulis  : :
 Securing group key exchange against strong corruptions. 249-260
- Alfred Menezes, Berkant Ustaoglu  : :
 Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. 261-270
- Reihaneh Safavi-Naini, Shaoquan Jiang: 
 Non-interactive conference key distribution and its applications. 271-282
RFID security
- Mike Burmester, Breno de Medeiros, Rossana Motta: 
 Robust, anonymous RFID authentication with constant key-lookup. 283-291
- Radu-Ioan Paise, Serge Vaudenay: 
 Mutual authentication in RFID: security and privacy. 292-299
Protocols
- Sebastian Gajek, Mark Manulis  , Ahmad-Reza Sadeghi, Jörg Schwenk: , Ahmad-Reza Sadeghi, Jörg Schwenk:
 Provably secure browser-based user-aware mutual authentication over TLS. 300-311
- Mikhail J. Atallah, Keith B. Frikken, Marina Blanton  , YounSun Cho: , YounSun Cho:
 Private combinatorial group testing. 312-320
- Stephen S. Yau, Yin Yin: 
 Controlled privacy preserving keyword search. 321-324
Digital signatures (I)
- Shouhuai Xu, Xiaohu Li  , T. Paul Parker: , T. Paul Parker:
 Exploiting social networks for threshold signing: attack-resilience vs. availability. 325-336
- Toru Nakanishi, Nobuo Funabiki: 
 A short anonymously revocable group signature scheme from decision linear assumption. 337-340
Digital signatures (II)
- Di Ma  : :
 Practical forward secure sequential aggregate signatures. 341-352
- Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao  : :
 Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. 353-362
- Fangguo Zhang  , Xiaofeng Chen, Baodian Wei: , Xiaofeng Chen, Baodian Wei:
 Efficient designated confirmer signature from bilinear pairings. 363-368
- Manuel Barbosa  , Pooya Farshim: , Pooya Farshim:
 Certificateless signcryption. 369-372
Identity based encryption
- Jong Hwan Park, Ki Tak Kim, Dong Hoon Lee: 
 Cryptanalysis and improvement of a multi-receiver identity-based key encapsulation at INDOCRYPT 06. 373-380
- Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata  : :
 Stateful identity-based encryption scheme: faster encryption and decryption. 381-388

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














