


default search action
14. ISC 2011: Xi'an, China
- Xuejia Lai, Jianying Zhou, Hui Li:

Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings. Lecture Notes in Computer Science 7001, Springer 2011, ISBN 978-3-642-24860-3
Attacks
- Zhi Xin, Huiyu Chen, Xinche Wang, Peng Liu, Sencun Zhu, Bing Mao, Li Xie:

Replacement Attacks on Behavior Based Software Birthmark. 1-16 - Aggelos Kiayias, Serdar Pehlivanoglu:

Attacking Traitor Tracing Schemes Using History Recording and Abrupt Decoders. 17-31 - Jiageng Chen

, Atsuko Miyaji
:
How to Find Short RC4 Colliding Key Pairs. 32-46
Protocols
- Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete:

A Formal Approach to Distance-Bounding RFID Protocols. 47-62 - Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap

, Yuto Nakano, Kazuhide Fukushima
:
MASHA - Low Cost Authentication with a New Stream Cipher. 63-78 - Hu Xiong, Qianhong Wu, Zhong Chen:

Toward Pairing-Free Certificateless Authenticated Key Exchanges. 79-94
Public-Key Cryptosystems
- Fanyu Kong, Jia Yu, Lei Wu:

Security Analysis of an RSA Key Generation Algorithm with a Large Private Key. 95-101 - Keita Emura

, Atsuko Miyaji
, Kazumasa Omote:
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption. 102-118 - Liqun Chen

, Yu Chen:
The n-Diffie-Hellman Problem and Its Applications. 119-134
Network Security
- Guanhua Yan, Songqing Chen, Stephan J. Eidenbenz

:
RatBot: Anti-enumeration Peer-to-Peer Botnets. 135-151 - Ge Zhang, Simone Fischer-Hübner:

Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes. 152-167
Software Security
- Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang:

Multi-stage Binary Code Obfuscation Using Improved Virtual Machine. 168-181 - Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu:

Detection and Analysis of Cryptographic Data Inside Software. 182-196
System Security
- Georgios Kontaxis, Michalis Polychronakis, Evangelos P. Markatos:

SudoWeb: Minimizing Information Disclosure to Third Parties in Single Sign-on Platforms. 197-212 - Francesco Gadaleta, Nick Nikiforakis, Yves Younan, Wouter Joosen:

Hello rootKitty: A Lightweight Invariance-Enforcing Framework. 213-228 - Moritz Y. Becker, Masoud Koleini:

Opacity Analysis in Trust Management Systems. 229-245
Database Security
- Joachim Biskup, Marcel Preuß, Lena Wiese

:
On the Inference-Proofness of Database Fragmentation Satisfying Confidentiality Constraints. 246-261 - Sven Laur, Jan Willemson, Bingsheng Zhang:

Round-Efficient Oblivious Database Manipulation. 262-277 - Sha Ma, Bo Yang, Kangshun Li, Feng Xia:

A Privacy-Preserving Join on Outsourced Database. 278-292
Privacy
- Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer

:
APPA: Aggregate Privacy-Preserving Authentication in Vehicular Ad Hoc Networks. 293-308 - Klaus Rechert, Konrad Meier, Benjamin Greschbach, Dennis Wehrle, Dirk von Suchodoletz

:
Assessing Location Privacy in Mobile Communication Networks. 309-324 - Jaewoo Lee, Chris Clifton:

How Much Is Enough? Choosing ε for Differential Privacy. 325-340
Digital Signatures
- Yuan Zhou, Haifeng Qian, Xiangxue Li:

Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security. 341-354 - Qiong Huang, Duncan S. Wong, Willy Susilo

, Bo Yang:
An Efficient Construction of Time-Selective Convertible Undeniable Signatures. 355-371 - Atefeh Mashatan

, Khaled Ouafi:
Efficient Fail-Stop Signatures from the Factoring Assumption. 372-385

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














