


default search action
6. ISC 2003: Bristol, UK
- Colin Boyd, Wenbo Mao:

Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings. Lecture Notes in Computer Science 2851, Springer 2003, ISBN 3-540-20176-9
Invited Talk
- Paul C. van Oorschot

:
Revisiting Software Protection. 1-13
Network Security
- Adrian Baldwin, Simon Shiu:

Enabling Shared Audit Data. 14-28 - Tuomas Aura:

Cryptographically Generated Addresses (CGA). 29-43 - Tim Kindberg, Kan Zhang:

Validating and Securing Spontaneous Associations between Wireless Devices. 44-53 - Andreas Pashalidis, Chris J. Mitchell

:
Single Sign-On Using Trusted Platforms. 54-68
Public-Key Algorithms
- David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar

:
Easy Verifiable Primitives and Practical Public Key Cryptosystems. 69-83 - Michael Backes, Birgit Pfitzmann, Michael Waidner

:
Reactively Secure Signature Schemes. 84-95 - Jianying Zhou, Feng Bao, Robert H. Deng

:
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. 96-110 - Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto:

A Fast Signature Scheme Based on New On-line Computation. 111-121
Cryptographic Protocols
- Javier Herranz, Carles Padró, Germán Sáez:

Distributed RSA Signature Schemes for General Access Structures. 122-136 - Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata

:
Divisible Voting Scheme. 137-150 - Anderson C. A. Nascimento

, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. 151-164 - Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle:

The Design and Implementation of Protocol-Based Hidden Key Recovery. 165-179
Invited Talk
- Ueli M. Maurer:

Intrinsic Limitations of Digital Signatures and How to Cope with Them. 180-192
Protocol Attacks
- Sigrid Gürgens, Carsten Rudolph

, Holger Vogt:
On the Security of Fair Non-repudiation Protocols. 193-207 - Feng Bao:

Security Analysis of a Password Authenticated Key Exchange Protocol. 208-217
Attacks on Public Key Algorithms
- Toru Akishita, Tsuyoshi Takagi:

Zero-Value Point Attacks on Elliptic Curve Cryptosystem. 218-233 - David A. Wagner:

Cryptanalysis of an Algebraic Privacy Homomorphism. 234-239 - Peter James Leadbitter, Nigel P. Smart:

Analysis of the Insecurity of ECMQV with Partially Known Nonces. 240-251
Block Ciphers
- Akashi Satoh, Sumio Morioka

:
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. 252-266 - Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:

A Note on Weak Keys of PES, IDEA, and Some Extended Variants. 267-279 - Tomasz Tyksinski:

Foundations of Differential Cryptanalysis in Abelian Groups. 280-294
Authorization
- Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta:

Trust and Authorization in Pervasive B2E Scenarios. 295-309 - Chun Ruan, Vijay Varadharajan, Yan Zhang:

A Logic Model for Temporal Authorization Delegation with Negation. 310-324
Watermarking
- Yongdong Wu:

Zero-Distortion Authentication Watermarking. 325-337 - Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim:

Designated Verification of Non-invertible Watermark. 338-351
Software Security
- Hongxia Jin, Jeffery Lotspiech:

Proactive Software Tampering Detection. 352-365 - Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee:

Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. 366-380 - José Luis Vivas, José A. Montenegro, Javier López:

Towards a Business Process-Driven Framework for Security Engineering with the UML. 381-395
Codes and Related Issues
- Yvo Desmedt, Kaoru Kurosawa, Tri Van Le:

Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. 396-407 - Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:

Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. 408-421 - Tri Van Le, Mike Burmester, Jiangyi Hu:

Short c-Secure Fingerprinting Codes. 422-427 - Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:

The Role of Arbiters in Asymmetric Authentication Schemes. 428-441

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














