


default search action
CISC 2005: Beijing, China
- Dengguo Feng, Dongdai Lin, Moti Yung:

Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings. Lecture Notes in Computer Science 3822, Springer 2005, ISBN 3-540-30855-5
Invited Talks
- Serge Vaudenay:

On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. 1-9 - Giovanni Di Crescenzo:

You Can Prove So Many Things in Zero-Knowledge. 10-27
Identity Based Cryptography
- Rui Zhang, Hideki Imai:

Improvements on Security Proofs of Some Identity Based Encryption Schemes. 28-41 - Chunxiang Gu, Yuefei Zhu:

An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . 42-52 - Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong:

ID-Based Signature Scheme Without Trusted PKG. 53-62
Security Modelling
- Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:

Specifying Authentication Using Signal Events in CSP. 63-74 - Xiaolan Joy Zhang, Brian King:

Modeling RFID Security. 75-90
Systems Security
- Roman Schlegel, Serge Vaudenay:

Enforcing Email Addresses Privacy Using Tokens. 91-100 - Yongdong Wu:

Efficient Authentication of Electronic Document Workflow. 101-112
Signature Schemes
- Raylin Tso, Takeshi Okamoto, Eiji Okamoto:

Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. 113-127 - Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang:

Efficient Group Signatures from Bilinear Pairing. 128-139 - Zuhua Shao:

Enhanced Aggregate Signatures from Pairings. 140-149 - Yuan Zhou, Zhenfu Cao

, Zhenchuan Chai:
Constructing Secure Proxy Cryptosystem. 150-161
Symmetric Key Mechanisms
- Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz:

Towards a General RC4-Like Keystream Generator. 162-174 - Peng Wang

, Dengguo Feng, Wenling Wu:
HCTR: A Variable-Input-Length Enciphering Mode. 175-188 - Jihong Teng, Shiqu Li, Xiaoying Huang:

The kth-Order Quasi-Generalized Bent Functions over Ring Zp. 189-201 - Shimin Wei, Guolong Chen, Guozhen Xiao:

A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. 202-209
Zero-Knowledge and Secure Computations
- Hongda Li, Bao Li:

An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. 210-220 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:

An Improved Secure Two-Party Computation Protocol. 221-232
Threshold Cryptography
- Tianjie Cao, Dongdai Lin:

Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. 233-241 - Fagen Li, Juntao Gao, Yupu Hu:

ID-Based Threshold Unsigncryption Scheme from Pairings. 242-253
Intrusion Detection Systems
- Gil-Jong Mun, Yongmin Kim, DongKook Kim, BongNam Noh:

Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. 254-264 - Chang-Joo Moon, Woojin Paik, Young-Gab Kim

, JuHum Kwon:
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. 265-278 - Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim

:
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. 279-289
Protocol Cryptanalysis
- Sherman S. M. Chow

, Zhengjun Cao, Joseph K. Liu:
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. 290-301 - Fei Gao, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu:

An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. 302-312
ECC Algorithms
- Cheol-Min Park, Myung-Hwan Kim, Moti Yung:

A Remark on Implementing the Weil Pairing. 313-323 - Pradeep Kumar Mishra:

Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. 324-335
Applications
- Jong-Hyuk Roh, Kyoon-Ha Lee:

Key Management for Secure Overlay Multicast. 336-345 - Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song:

Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. 346-357 - Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn:

Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. 358-369
Secret Sharing
- Zhanfei Zhou:

Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. 370-383 - Wenping Ma, Fu Tai Zhang:

New Methods to Construct Cheating Immune Multisecret Sharing Scheme. 384-394
Denial of Service Attacks
- Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura

:
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. 395-406 - Hyun-Sun Kang, Chang-Seop Park:

MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. 407-418

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














