


default search action
12. ISC 2009: Pisa, Italy
- Pierangela Samarati, Moti Yung, Fabio Martinelli, Claudio A. Ardagna:

Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings. Lecture Notes in Computer Science 5735, Springer 2009, ISBN 978-3-642-04473-1
Analysis Techniques
- Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza

, Bart Preneel
:
A New Approach to chi2 Cryptanalysis of Block Ciphers. 1-16 - Joppe W. Bos, Onur Özen, Jean-Pierre Hubaux:

Analysis and Optimization of Cryptographically Generated Addresses. 17-32 - Jens Bender, Marc Fischlin, Dennis Kügler:

Security Analysis of the PACE Key-Agreement Protocol. 33-48 - Amitabh Saxena, Brecht Wyseur, Bart Preneel

:
Towards Security Notions for White-Box Cryptography. 49-58 - Bogdan Groza

, Marius Minea
:
A Calculus to Detect Guessing Attacks. 59-67
Hash Functions
- Mario Lamberger, Florian Mendel

:
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. 68-78 - Yu Sasaki:

Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. 79-94 - Florian Mendel

, Martin Schläffer:
On Free-Start Collisions and Collisions for TIB3. 95-106
Database Security and Biometrics
- Suvasini Panigrahi, Shamik Sural

:
Detection of Database Intrusion Using a Two-Stage Fuzzy System. 107-120 - Joachim Biskup, Lena Wiese

:
Combining Consistency and Confidentiality Requirements in First-Order Databases. 121-134 - Jutta Hämmerle-Uhl, Elias Pschernig, Andreas Uhl:

Cancelable Iris Biometrics Using Block Re-mapping and Image Warping. 135-142 - Kaushik Roy, Prabir Bhattacharya:

Iris Recognition in Nonideal Situations. 143-150
Algebraic Attacks and Proxy Re-Encryption
- Jian Weng

, Yanjiang Yang, Qiang Tang, Robert H. Deng
, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. 151-166 - Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater:

Practical Algebraic Attacks on the Hitag2 Stream Cipher. 167-176 - Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li:

A New Construction of Boolean Functions with Maximum Algebraic Immunity. 177-185
Distributed System Security
- Angelos Stavrou

, Ricardo A. Barrato, Angelos D. Keromytis, Jason Nieh:
A2M: Access-Assured Mobile Desktop Computing. 186-201 - Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda:

Automated Spyware Collection and Analysis. 202-217 - Sebastian Roschke, Feng Cheng, Robert Schuppenies, Christoph Meinel:

Towards Unifying Vulnerability Information for Attack Graph Construction. 218-233 - Hongxia Jin, Serdar Pehlivanoglu:

Traitor Tracing without A Priori Bound on the Coalition Size. 234-241 - Boris Rozenberg, Ehud Gudes, Yuval Elovici:

SISR - A New Model for Epidemic Spreading of Electronic Threats. 242-249
Identity Management and Authentication
- Gildas Avoine, Aslan Tchamkerten:

An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. 250-261 - Keith B. Frikken, Marina Blanton

, Mikhail J. Atallah:
Robust Authentication Using Physically Unclonable Functions. 262-277 - Sebastian Gajek, Jörg Schwenk, Michael Steiner, Chen Xuan:

Risks of the CardSpace Protocol. 278-293
Applied Cryptography
- Sébastien Canard, Cécile Delerablée, Aline Gouget, Emeline Hufschmitt, Fabien Laguillaumie, Hervé Sibert, Jacques Traoré, Damien Vergnaud

:
Fair E-Cash: Be Compact, Spend Faster. 294-309 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:

On the Security of Identity Based Ring Signcryption Schemes. 310-325 - Ryo Nojima, Jin Tamura, Youki Kadobayashi, Hiroaki Kikuchi:

A Storage Efficient Redactable Signature in the Standard Model. 326-337 - Peng Yang, Rui Zhang, Kanta Matsuura

, Hideki Imai:
Generic Construction of Stateful Identity Based Encryption. 338-346
Access Control
- Jin Li, Kui Ren

, Bo Zhu, Zhiguo Wan:
Privacy-Aware Attribute-Based Encryption with User Accountability. 347-362 - Yu-Yuan Chen, Ruby B. Lee:

Hardware-Assisted Application-Level Access Control. 363-378 - Manachai Toahchoodee, Xing Xie, Indrakshi Ray:

Towards Trustworthy Delegation in Role-Based Access Control Model. 379-394 - Jianfeng Lu, Ruixuan Li, Vijay Varadharajan

, Zhengding Lu, Xiaopu Ma:
Secure Interoperation in Multidomain Environments Employing UCON Policies. 395-402 - Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, Xiaopu Ma:

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. 403-410
MAC and Nonces
- Erik Zenner:

Nonce Generators and the Nonce Reset Problem. 411-426 - Juan A. Garay, Vladimir Kolesnikov, Rae McLellan:

MAC Precomputation with Applications to Secure Memory. 427-442 - Kan Yasuda:

HMAC without the "Second" Key. 443-458
P2P and Web Services
- Alex Sherman, Angelos Stavrou

, Jason Nieh, Angelos D. Keromytis, Clifford Stein:
Adding Trust to P2P Distribution of Paid Content. 459-474 - Mirco Marchetti

, Michele Messori, Michele Colajanni
:
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale. 475-490 - Matthew Burnside, Angelos D. Keromytis:

F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services. 491-506

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














