


default search action
ISPEC 2008: Sydney, Australia
- Liqun Chen, Yi Mu, Willy Susilo

:
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings. Lecture Notes in Computer Science 4991, Springer 2008, ISBN 978-3-540-79103-4 - Anongporn Salaiwarakul, Mark Dermot Ryan

:
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. 1-13 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk

, Huaxiong Wang:
An On-Line Secure E-Passport Protocol. 14-28 - Frederik Armknecht

, Alberto N. Escalante, Hans Löhr, Mark Manulis
, Ahmad-Reza Sadeghi:
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly. 29-44 - Raylin Tso

, Takeshi Okamoto, Eiji Okamoto:
1-out-of-. 45-55 - Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval

:
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. 56-70 - Feng Bao, Robert H. Deng

, Xuhua Ding
, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings. 71-85 - Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere:

Towards Tamper Resistant Code Encryption: Practice and Experience. 86-100 - Jong Hwan Park, Dong Hoon Lee:

A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme. 101-115 - Marc Joye:

RSA Moduli with a Predetermined Portion: Techniques and Applications. 116-130 - Jin Hong

, Kyung Chul Jeong
, Eun Young Kwon, In-Sok Lee, Daegun Ma:
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. 131-145 - Patrick P. Tsang, Sean W. Smith:

Secure Cryptographic Precomputation with Insecure Memory. 146-160 - André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf

, Christian Stüble, N. Asokan
:
Securing Peer-to-Peer Distributions for Mobile Devices. 161-175 - Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim:

Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. 176-187 - Patrick P. Tsang, Sean W. Smith:

Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers. 188-202 - Minjin Kwon, Kyoochang Jeong, Heejo Lee:

PROBE: A Process Behavior-Based Host Intrusion Prevention System. 203-217 - Quoc-Cuong Le, Patrick Bellot, Akim Demaille:

Towards the World-Wide Quantum Network. 218-232 - Andrew Brown, Mark Ryan

:
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software. 233-247 - Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu:

Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. 248-262 - Khaled Ouafi, Raphael C.-W. Phan

:
Privacy of Recent RFID Authentication Protocols. 263-277 - Jihwan Lim, Heekuck Oh, Sangjin Kim:

A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection. 278-289 - Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:

An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. 290-303 - Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:

Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. 304-318 - Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk

:
Secure Computation of the Vector Dominance Problem. 319-333 - Shaik Maleka, Amjed Shareef, C. Pandu Rangan:

Rational Secret Sharing with Repeated Games. 334-346 - Qingsong Ye, Huaxiong Wang, Josef Pieprzyk

:
Distributed Private Matching and Set Operations. 347-360 - David Galindo

, Flavio D. Garcia, Peter van Rossum:
Computational Soundness of Non-Malleable Commitments. 361-376 - Wen Ji, Lei Hu:

Square Attack on Reduced-Round Zodiac Cipher. 377-391 - Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu:

Analysis of Zipper as a Hash Function. 392-403 - Danilo Gligoroski, Suzana Andova, Svein J. Knapskog:

On the Importance of the Key Separation Principle for Different Modes of Operation. 404-418

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














