


default search action
10. ISC 2007: Valparaíso, Chile
- Juan A. Garay, Arjen K. Lenstra, Masahiro Mambo, René Peralta

:
Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings. Lecture Notes in Computer Science 4779, Springer 2007, ISBN 978-3-540-75495-4
Intrusion Detection
- Thomas Raffetseder, Christopher Krügel, Engin Kirda:

Detecting System Emulators. 1-18 - Iosif-Viorel Onut, Ali A. Ghorbani:

Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. 19-36 - Pradeep Kannadiga, Mohammad Zulkernine, Anwar Haque

:
E-NIPS: An Event-Based Network Intrusion Prediction System. 37-52
Digital Rights Management
- Ahmad-Reza Sadeghi, Marko Wolf

, Christian Stüble, N. Asokan, Jan-Erik Ekberg:
Enabling Fairer Digital Rights Management with Trusted Computing. 53-70 - Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan

:
Traitor Tracing with Optimal Transmission Rate. 71-88
Symmetric-Key Cryptography
- Debra L. Cook, Moti Yung, Angelos D. Keromytis:

The Security of Elastic Block Ciphers Against Key-Recovery Attacks. 89-103 - Jorge Nakahara Jr., Ivan Carlos Pavão:

Impossible-Differential Attacks on Large-Block Rijndael. 104-117 - Akashi Satoh, Takeshi Sugawara, Takafumi Aoki:

High-Speed Pipelined Hardware Architecture for Galois Counter Mode. 118-129
Cryptographic Protocols and Schemes
- Mehmet S. Kiraz

, Berry Schoenmakers, José Villegas:
Efficient Committed Oblivious Transfer of Bit Strings. 130-144 - Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao

:
An Efficient Certified Email Protocol. 145-157 - Alexander W. Dent, Qiang Tang:

Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability. 158-174 - Fabien Laguillaumie, Damien Vergnaud:

On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. 175-188
Identify-Based Cryptography
- Cheng-Kang Chu, Wen-Guey Tzeng:

Identity-Based Proxy Re-encryption Without Random Oracles. 189-202 - Sherman S. M. Chow

, Kim-Kwang Raymond Choo:
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. 203-220
Cryptanalysis
- Yao-Dong Zhao, Wen-Feng Qi:

Small Private-Exponent Attack on RSA with Primes Sharing Bits. 221-229 - Joo Yeon Cho, Josef Pieprzyk

:
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. 230-248 - Gautham Sekar, Souradyuti Paul, Bart Preneel:

New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. 249-262
Network Security
- Daniel Boteanu, José M. Fernandez, John McHugh, John Mullins:

Queue Management as a DoS Counter-Measure? 263-280
Software Obfuscation
- Nikolay Kuzurin, Alexander V. Shokurov, Nikolay P. Varnovsky, Vladimir A. Zakharov:

On the Concept of Software Obfuscation in Computer Security. 281-298 - Stephen Drape, Clark D. Thomborson, Anirban Majumdar:

Specifying Imperative Data Obfuscations. 299-314
Public-Key Cryptosystems
- Sherman S. M. Chow

:
Token-Controlled Public Key Encryption in the Standard Model. 315-332 - Guilhem Castagnos, Damien Vergnaud:

Trapdoor Permutation Polynomials of Z/ n Z and Public Key Cryptosystems. 333-350 - Yvo Desmedt, Kaoru Kurosawa:

A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. 351-361 - Guilhem Castagnos, Benoît Chevallier-Mames:

Towards a DL-Based Additively Homomorphic Encryption Scheme. 362-375
Elliptic Curves and Applications
- Billy Bob Brumley

, Kaisa Nyberg:
Differential Properties of Elliptic Curves and Blind Signatures. 376-389 - Pradeep Kumar Mishra, Vassil S. Dimitrov:

Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation. 390-406
Database Security and Privacy
- Joachim Biskup, Jan-Hendrik Lochner:

Enforcing Confidentiality in Relational Databases by Reducing Inference Control to Access Control. 407-422 - George Danezis, Claudia Díaz, Sebastian Faust, Emilia Käsper, Carmela Troncoso, Bart Preneel:

Efficient Negative Databases from Cryptographic Hash Functions. 423-436

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














