


default search action
ISPEC 2006: Hangzhou, China
- Kefei Chen, Robert H. Deng, Xuejia Lai, Jianying Zhou:

Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings. Lecture Notes in Computer Science 3903, Springer 2006, ISBN 3-540-33052-6
Cryptoanalysis
- Yoo-Jin Baek, Mi-Jung Noh:

DPA-Resistant Finite Field Multipliers and Secure AES Design. 1-12 - Min Feng, Bin B. Zhu, Cunlai Zhao, Shipeng Li:

Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication. 13-24 - Baocang Wang, Yupu Hu

:
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. 25-32 - Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim:

Further Security Analysis of XTR. 33-44
Network Security I
- Hao Luo, Binxing Fang, Xiao-chun Yun:

A Counting-Based Method for Massive Spam Mail Classification. 45-56 - Ping Wang, Binxing Fang, Xiao-chun Yun:

Model and Estimation of Worm Propagation Under Network Partition. 57-66 - Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi:

Tackling Worm Detection Speed and False Alarm in Virus Throttling. 67-77
Network Security II
- Feng Xie, Shuo Bai:

Using Data Field to Analyze Network Intrusions. 78-89 - Ji Wu, Chaoqun Ye, Shiyao Jin:

Adversarial Organization Modeling for Network Attack/Defense. 90-99 - Zhifei Tao, Hai Jin, Zongfen Han, En Cheng:

A Novel Dynamic Immunization Strategy for Computer Network Epidemics. 100-111 - Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu:

Preventing Web-Spoofing with Automatic Detecting Security Indicator. 112-122
Security Protocol
- Xiehua Li, ShuTang Yang, Jianhua Li, HongWen Zhu:

Security Protocol Analysis with Improved Authentication Tests. 123-133 - Xiao Li, Mingxing He:

A Protocol of Member-Join in a Secret Sharing Scheme. 134-141 - Huafei Zhu, Feng Bao, Tieyan Li, Ying Qiu:

More on Shared-Scalar-Product Protocols. 142-152
Communication Security
- Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee:

Efficient Public Key Broadcast Encryption Using Identifier of Receivers. 153-164 - Ling Dong, Kefei Chen:

A Practical Clumped-Tree Multicast Encryption Scheme. 165-176 - Jinye Peng, GuangQiang He, Jin Xiong, Guihua Zeng:

Trojan Horse Attack Strategy on Quantum Private Communication. 177-186
Signature and Key Agreement
- Mark Manulis

, Ahmad-Reza Sadeghi, Jörg Schwenk:
Linkable Democratic Group Signatures. 187-201 - Zhaohui Cheng, Liqun Chen

, Richard Comley, Qiang Tang:
Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. 202-213 - Xinyi Huang, Willy Susilo

, Yi Mu, Futai Zhang:
Short (Identity-Based) Strong Designated Verifier Signature Schemes. 214-225 - Yuan Zhou, Zhenfu Cao

, Zhenchuan Chai:
Identity Based Key Insulated Signature. 226-234
Application I
- Hyung Chan Kim, Wook Shin, Rudrapatna S. Ramakrishna, Kouichi Sakurai:

Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. 235-247 - Youngtae Yun, Sangseo Park, Yosik Kim, Jaecheol Ryou

:
A Design and Implementation of Profile Based Web Application Securing Proxy. 248-259 - Muhammad Khurram Khan

, Jiashu Zhang:
An Efficient and Practical Fingerprint-Based Remote User Authentication Scheme with Smart Cards. 260-268
Application II
- Gu Su Kim, Young Ik Eom:

Domain-Based Mobile Agent Fault-Tolerance Scheme for Home Network Environments. 269-277 - Yahui Lu, Li Zhang, Yinbo Liu, Jiaguang Sun:

Using pi-Calculus to Formalize Domain Administration of RBAC. 278-289 - Fangyong Hou, Hongjun He, Zhiying Wang, Kui Dai:

An Efficient Way to Build Secure Disk. 290-301 - Hongxia Jin, Jeffery Lotspiech:

Practical Forensic Analysis in Advanced Access Content System. 302-313
Cryptographic Techniques
- Tianjie Cao, Xianping Mao, Dongdai Lin:

Security Analysis of a Server-Aided RSA Key Generation Protocol. 314-320 - Zhonghua Jiang, Dongdai Lin, Lin Xu, Lei Lin:

Integrating Grid with Cryptographic Computing. 321-331 - Lan Zhou, Willy Susilo

, Yi Mu:
Three-Round Secret Handshakes Based on ElGamal and DSA. 332-342
System Security
- Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun:

Securing C Programs by Dynamic Type Checking. 343-354 - Fenlin Liu, Bin Lu, Xiangyang Luo:

A Chaos-Based Robust Software Watermarking. 355-366 - Qianhong Wu, Yi Mu, Willy Susilo

, Fangguo Zhang
:
Privately Retrieve Data from Large Databases. 367-378 - Seok Lee, Tai-Myung Chung, Myeonggil Choi:

An Empirical Study of Quality and Cost Based Security Engineering. 379-389

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














