


default search action
7. ISC 2004: Palo Alto, CA, USA
- Kan Zhang, Yuliang Zheng:

Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3225, Springer 2004, ISBN 3-540-23208-7
Key Management
- Taekyoung Kwon:

Practical Authenticated Key Agreement Using Passwords. 1-12 - Muxiang Zhang:

Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. 13-24 - Pan Wang, Peng Ning, Douglas S. Reeves:

Storage-Efficient Stateless Group Key Revocation. 25-38
Digital Signatures
- Michael Backes, Birgit Pfitzmann, Michael Waidner

:
Low-Level Ideal Signatures and General Integrity Idealization. 39-51 - Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater:

Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. 52-60 - Michael Backes, Dennis Hofheinz:

How to Break and Repair a Universally Composable Signature Functionality. 61-72
New Algorithms
- Craig Gentry, Zulfikar Ramzan:

RSA Accumulator Based Broadcast Encryption. 73-86 - Xiaofeng Chen, Fangguo Zhang

, Kwangjo Kim:
Chameleon Hashing Without Key Exposure. 87-98 - Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu:

Radix-r Non-Adjacent Form. 99-110
Cryptanalysis
- Raphael Chung-Wei Phan, Helena Handschuh:

On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. 111-122 - Guilin Wang, Robert H. Deng

, Dong Jin Kwak, Sang-Jae Moon:
Security Analysis of Two Signcryption Schemes. 123-133 - Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato:

On The Security of Key Derivation Functions. 134-145
Intrusion Detection
- Alex Hai Wang, Peng Liu, Lunquan Li:

Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. 146-157 - Michael Meier

:
A Model for the Semantics of Attack Signatures in Misuse Detection Systems. 158-169 - Zouheir Trabelsi, Hamza Rahmani:

Detection of Sniffers in an Ethernet Network. 170-182 - Mark Foster, Joseph N. Wilson, Shigang Chen:

Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. 183-194 - Elisa Bertino, Teodoro Leggieri, Evimaria Terzi:

Securing DBMS: Characterizing and Detecting Query Floods. 195-206
Access Control
- Elisa Bertino, Elena Ferrari, Giovanni Mella:

An XML-Based Approach to Document Flow Verification. 207-218 - Dimitar P. Guelev, Mark Ryan

, Pierre-Yves Schobbens
:
Model-Checking Access Control Policies. 219-230 - Ajay Chander, Drew Dean, John C. Mitchell:

A Distributed High Assurance Reference Monitor. 231-244 - Deholo Nali, Carlisle M. Adams, Ali Miri:

Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. 245-256
Human Authentication
- Richard Bergmair, Stefan Katzenbeisser:

Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). 257-267 - Monica Chew, J. D. Tygar:

Image Recognition CAPTCHAs. 268-279
Certificate Management
- Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon:

A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. 280-291 - Qinglin Jiang, Douglas S. Reeves, Peng Ning:

Certificate Recommendations to Improve the Robustness of Web of Trust. 292-303
Mobile and Ad Hoc Security
- Ke Xu, Stephen R. Tate:

Universally Composable Secure Mobile Agent Computation. 304-317 - Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen:

Re-thinking Security in IP Based Micro-Mobility. 318-329 - Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang:

Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. 330-341
Web Security
- HongQian Karen Lu, Asad M. Ali:

Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. 342-353 - Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:

Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! 354-366 - Toru Nakanishi, Mitsuaki Shiota, Yuji Sugiyama:

An Efficient Online Electronic Cash with Unlinkable Exact Payments. 367-378
Digital Rights Management
- Heejae Park, Jong Kim:

Modifiable Digital Content Protection in P2P. 379-390 - William Ku, Chi-Hung Chi:

Survey on the Technological Aspects of Digital Rights Management. 391-403 - Ginger Myles, Christian S. Collberg:

Detecting Software Theft via Whole Program Path Birthmarks. 404-415
Software Security
- Thitima Srivatanakul, John A. Clark, Fiona Polack:

Effective Security Requirements Analysis: HAZOP and Use Cases. 416-427 - Kelly Heffner, Christian S. Collberg:

The Obfuscation Executive. 428-440

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














