


default search action
5. ISC 2002: Sao Paulo, Brazil
- Agnes Hui Chan, Virgil D. Gligor:

Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings. Lecture Notes in Computer Science 2433, Springer 2002, ISBN 3-540-44270-7
Intrusion Detection and Tamper Resistance
- Heejin Jang, Sangwook Kim:

Real-Time Intruder Tracing through Self-Replication. 1-16 - Taekyoung Kwon:

On the Difficulty of Protecting Private Keys in Software. 17-31 - John S. Baras, Maben Rabi:

Intrusion Detection with Support Vector Machines and Generative Models. 32-47
Cryptographic Algorithm and Attack Implementation
- Akashi Satoh, Sumio Morioka:

Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI. 48-62 - Helger Lipmaa:

Fast Software Implementations of SC2000. 63-74 - Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen

, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott:
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. 75-89 - Kahil Jallad, Jonathan Katz, Bruce Schneier:

Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. 90-101
Access Control and Trust Management (I)
- Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon

, Emmanuel Bruno:
An Access Control Model for Tree Data Structures. 117-135 - Ed Dawson, Javier López, José A. Montenegro, Eiji Okamoto:

A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. 136-149
Authentication and Privacy
- Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye:

Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. 150-161 - Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen:

Quantifying Privacy Leakage through Answering Database Queries. 162-176 - Weidong Qiu, Kefei Chen, Dawu Gu:

A New Offline Privacy Protecting E-cash System with Revokable Anonymity. 177-190
E-commerce Protocols (I)
- Masayuki Abe, Koutarou Suzuki:

Receipt-Free Sealed-Bid Auction. 191-199 - Nicolás González-Deleito, Olivier Markowitch:

Exclusion-Freeness in Multi-party Exchange Protocols. 200-209 - Josep Lluís Ferrer-Gomila

, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
A Realistic Protocol for Multi-party Certified Electronic Mail. 210-219
Signature Schemes
- Shunsuke Araki:

A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification. 220-228 - Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila

:
Comments to the UNCITRAL Model Law on Electronic Signatures. 229-243 - Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai:

An Anonymous Loan System Based on Group Signature Scheme. 244-256 - Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai:

Traceability Schemes for Signed Documents. 257-271
Cryptography (I)
- Emmanuel Bresson, Jacques Stern:

Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. 272-288 - Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo:

Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). 289-299 - Soonhak Kwon, Heuisu Ryu:

Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2m). 300-308
Access Control and Trust Management (II)
- Yuji Watanabe, Masayuki Numao:

Conditional Cryptographic Delegation for P2P Data Sharing. 309-321 - Liqun Chen

, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart:
Certification of Public Keys within an Identity Based System. 322-333 - Jiande Zheng:

A New Public Key Cryptosystem for Constrained Hardware. 334-341
Key Management
- Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez:

A Distributed and Computationally Secure Key Distribution Scheme. 342-356 - Helger Lipmaa:

On Optimal Hash Tree Traversal for Interval Time-Stamping. 357-371 - Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic:

An Efficient Dynamic and Distributed Cryptographic Accumulator. 372-388
Security Analysis
- Katsuyuki Okeya, Kouichi Sakurai:

A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. 389-401 - Bodo Möller:

Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. 402-413 - Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli:

Automated Analysis of Some Security Mechanisms of SCEP. 414-427 - José R. M. Monteiro, Ricardo Dahab:

An Attack on a Protocol for Certified Delivery. 428-436
E-commerce Protocols (II)
- Hiroaki Kikuchi:

Oblivious Counter and Majority Protocol. 437-445 - Wai Han Soo, Azman Samsudin, Alwyn Goh:

Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. 446-458 - Marcel Fernandez, Miguel Soriano:

Fingerprinting Concatenated Codes with Efficient Identification. 459-470
Cryptography (II)
- Josep Domingo-Ferrer:

A Provably Secure Additive and Multiplicative Privacy Homomorphism. 471-483 - Yasuyuki Sakai, Kouichi Sakurai:

Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. 484-500

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














