


default search action
8. ISC 2005: Singapore
- Jianying Zhou, Javier López, Robert H. Deng, Feng Bao:

Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings. Lecture Notes in Computer Science 3650, Springer 2005, ISBN 3-540-29001-X
Network Security I
- Stelios Sidiroglou, Giannis Giovanidis, Angelos D. Keromytis:

A Dynamic Mechanism for Recovering from Buffer Overflow Attacks. 1-15 - Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani:

SVision: A Network Host-Centered Anomaly Visualization Technique. 16-28
Trust & Privacy
- Deholo Nali, Carlisle M. Adams, Ali Miri:

Time-Based Release of Confidential Information in Hierarchical Settings. 29-43 - Elisavet Konstantinou, Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou

, Moti Yung:
"Trust Engineering: " From Requirements to System Design and Maintenance - A Working National Lottery System Experience. 44-58 - Yanjiang Yang, Beng Chin Ooi:

A Privacy Preserving Rental System. 59-73
Key Management & Protocols
- Ratna Dutta, Rana Barua:

Constant Round Dynamic Group Key Agreement. 74-88 - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:

A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. 89-103 - Hyung-Mok Lee, Kyung Ju Ha, Kyo-Min Ku:

ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms. 104-117 - Dennis Hofheinz, Dominique Unruh:

On the Notion of Statistical Security in Simulatability Definitions. 118-133
Public Key Encryption & Signature
- Joonsang Baek

, Reihaneh Safavi-Naini, Willy Susilo
:
Certificateless Public Key Encryption Without Pairing. 134-148 - Victor K. Wei:

Tracing-by-Linking Group Signatures. 149-163 - Jean Monnerat, Serge Vaudenay:

Chaum's Designated Confirmer Signature Revisited. 164-178
Network Security II
- Stephen T. Chou, Angelos Stavrou

, John Ioannidis, Angelos D. Keromytis:
gore: Routing-Assisted Defense Against DDoS Attacks. 179-193 - Souhwan Jung, Jaeduck Choi, Younghan Kim, Sungi Kim:

IPSec Support in NAT-PT Scenario for IPv6 Transition. 194-202
Signcryption
- Alexander W. Dent:

Hybrid Signcryption Schemes with Outsider Security. 203-217 - Guomin Yang

, Duncan S. Wong, Xiaotie Deng:
Analysis and Improvement of a Signcryption Scheme with Key Privacy. 218-232 - Changshe Ma, Kefei Chen, Dong Zheng, Shengli Liu:

Efficient and Proactive Threshold Signcryption. 233-243
Crypto Algorithm & Analysis
- Chris J. Mitchell

:
Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? 244-258 - Akashi Satoh:

Hardware Architecture and Cost Estimates for Breaking SHA-1. 259-273 - Peng Wang

, Dengguo Feng, Wenling Wu:
On the Security of Tweakable Modes of Operation: TBC and TAE. 274-287 - Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim:

A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. 288-299
Cryptography
- Chi-Ming Hu, Wen-Guey Tzeng:

Compatible Ideal Contrast Visual Cryptography Schemes with Reversing. 300-313 - Helger Lipmaa:

An Oblivious Transfer Protocol with Log-Squared Communication. 314-328
Applications
- Yvo Desmedt, Kaoru Kurosawa:

Electronic Voting: Starting Over? 329-343 - Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee:

Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. 344-358 - Ahto Buldas, Peeter Laud, Märt Saarepera, Jan Willemson:

Universally Composable Time-Stamping Schemes with Audit. 359-373 - Kun Peng, Colin Boyd, Ed Dawson:

A Multiplicative Homomorphic Sealed-Bid Auction Based on Goldwasser-Micali Encryption. 374-388
Software Security
- Adam L. Young:

Building a Cryptovirus Using Microsoft's Cryptographic API. 389-401 - Gary S.-W. Yeo, Raphael Chung-Wei Phan:

On the Security of the WinRAR Encryption Method. 402-416 - Hongxia Jin, Ginger Myles, Jeffery Lotspiech:

Towards Better Software Tamper Resistance. 417-430
Authorization & Access Control
- Lujo Bauer

, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar:
Device-Enabled Authorization in the Grey-System. 431-445 - Nan Zhang, Mark Ryan

, Dimitar P. Guelev:
Evaluating Access Control Policies Through Model Checking. 446-460 - Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu

:
A Cryptographic Solution for General Access Control. 461-473
Student Papers
- Xiaolan Joy Zhang, Brian King:

Integrity Improvements to an RFID Privacy Protection Protocol for Anti-counterfeiting. 474-481 - Daoxi Xiu, Zhaoyu Liu:

A Formal Definition for Trust in Distributed Systems. 482-489 - Marek Klonowski, Miroslaw Kutylowski, Anna Lauks

, Filip Zagórski
:
A Practical Voting Scheme with Receipts. 490-497 - Zhenghong Wang, Ruby B. Lee:

New Constructive Approach to Covert Channel Modeling and Channel Capacity Estimation. 498-505 - German Florez-Larrahondo, Susan M. Bridges, Rayford B. Vaughn:

Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models. 506-514

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














