default search action
1. IWSEC 2006: Kyoto, Japan
- Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura:
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings. Lecture Notes in Computer Science 4266, Springer 2006, ISBN 3-540-47699-7
Signatures (1)
- Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
ID-Based Ring Signature Scheme Secure in the Standard Model. 1-16 - Toru Nakanishi, Nobuo Funabiki:
A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability. 17-32 - Flavio D. Garcia, Peter van Rossum:
Sound Computational Interpretation of Symbolic Hashes in the Standard Model. 33-47
Security Evaluation
- Reijo Savola:
A Requirement Centric Framework for Information Security Evaluation. 48-59 - Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa:
A Model-Based Method for Security Configuration Verification. 60-75 - Young Chul Kwon, Sang Won Lee, Songchun Moon:
Personal Computer Privacy: Analysis for Korean PC Users. 76-87
Signatures (2)
- Seung Geol Choi, Kunsoo Park, Moti Yung:
Short Traceable Signatures Based on Bilinear Pairings. 88-103 - Joseph K. Liu, Willy Susilo, Duncan S. Wong:
Ring Signature with Designated Linkability. 104-119 - Qianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang:
Ad Hoc Group Signatures. 120-135 - Christophe Tartary, Huaxiong Wang:
Rateless Codes for the Multicast Stream Authentication Problem. 136-151
Authentication
- Jaap-Henk Hoepman, Engelbert Hubbers, Bart Jacobs, Martijn Oostdijk, Ronny Wichers Schreur:
Crossing Borders: Security and Privacy Issues of the European e-Passport. 152-167 - Hai Jin, Zhensong Liao, Deqing Zou, Weizhong Qiang:
A New Approach to Hide Policy for Automated Trust Negotiation. 168-178 - Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu:
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing. 179-195 - James Kempf, Jonathan Wood, Zulfikar Ramzan, Craig Gentry:
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures. 196-211
Security for Multimedia
- Junji Onishi, Tsukasa Ono:
A Study of Detection Method of Printed Image Alteration Using Digital Watermark. 212-226 - In Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee:
Real-Time Watermark Embedding for High Resolution Video Watermarking. 227-238 - Michael Tunstall, Constantinos Markantonakis, Keith Mayes:
Inhibiting Card Sharing Attacks. 239-251
Network Security
- Yi Shi, Xinyu Yang, Huijun Zhu:
A Flooding-Based DoS/DDoS Detecting Algorithm Based on Traffic Measurement and Prediction. 252-267 - Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim:
Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. 268-277 - Sang-Kyun Noh, DongKook Kim, Yongmin Kim, Bong-Nam Noh:
Modeling of Network Intrusions Based on the Multiple Transition Probability. 278-291
Encryption and Key Exchange
- Chik How Tan:
Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. 292-307 - Satoshi Hada, Kouichi Sakurai:
Ciphertext-Auditable Public Key Encryption. 308-321 - Jeong Ok Kwon, Ik Rae Jeong, Dong Hoon Lee:
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model. 322-336
Cryptanalysis and Implementation
- Sourav Mukhopadhyay, Palash Sarkar:
On the Effectiveness of TMTO and Exhaustive Search Attacks. 337-352 - Mooseop Kim, Jaecheol Ryou, YongJe Choi, Sungik Jun:
Low Power AES Hardware Architecture for Radio Frequency Identification. 353-363 - Sang-Hyun Park, Hoon Choi, Sang-Han Lee, Taejoo Chang:
The High-Speed Packet Cipher System Suitable for Small Sized Data. 364-377
Access Control
- Anna V. Álvarez, Karen A. García, Raúl Monroy, Luis A. Trejo, Jesús Vázquez:
A Tool for Managing Security Policies in Organisations. 378-388 - Yi-Ming Chen, Yung-Wei Kao:
Information Flow Query and Verification for Security Policy of Security-Enhanced Linux. 389-404 - Stephen Dranger, Robert H. Sloan, Jon A. Solworth:
The Complexity of Discretionary Access Control. 405-420 - Zouheir Trabelsi, Hesham El-Sayed, Lilia Frikha, Tamer Rabie:
Traceroute Based IP Channel for Sending Hidden Short Messages. 421-436
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.