


default search action
WISA 2009: Busan, Korea
- Heung Youl Youm, Moti Yung:

Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5932, Springer 2009, ISBN 978-3-642-10837-2
Multimedia Security
- Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo:

Protecting IPTV Service Network against Malicious Rendezvous Point. 1-9 - KyoungHee Ko, Hwankuk Kim

, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, Hyun-Cheol Jeong:
Design and Implementation of SIP-aware Security Management System. 10-19
Device Security
- Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
Application Management Framework in User Centric Smart Card Ownership Model. 20-35 - Gildas Avoine, Cédric Lauradoux, Tania Martin:

When Compromised Readers Meet RFID. 36-50
HW Implementation Security
- Marcel Medwed, Jörn-Marc Schmidt:

Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? 51-65 - Takeshi Sugawara

, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki
, Takafumi Aoki, Hideaki Sone, Akashi Satoh:
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. 66-78 - Timo Kasper, David F. Oswald

, Christof Paar:
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. 79-93
Applied Cryptography
- Pairat Thorncharoensri

, Willy Susilo
, Yi Mu:
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. 94-108 - Shaojing Fu, Longjiang Qu, Chao Li:

Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity. 109-117 - Kun Peng, Feng Bao:

Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. 118-132 - Fangguo Zhang

, Xingwen Zhao, Xiaofeng Chen:
ID-Based Adaptive Oblivious Transfer. 133-147
Side Channel Attacks
- Neil Hanley, Michael Tunstall

, William P. Marnane
:
Unknown Plaintext Template Attacks. 148-162 - Thomas Plos, Michael Hutter, Martin Feldhofer:

On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices. 163-177 - Jing Pan, J. I. den Hartog, Jiqiang Lu:

You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation. 178-192 - Amir Moradi

, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh:
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. 193-205
Cryptograptanalysis
- Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel

:
Finding Collisions for a 45-Step Simplified HAS-V. 206-225 - Kahraman D. Akdemir, Ghaith Hammouri, Berk Sunar:

Non-linear Error Detection for Finite State Machines. 226-238 - Jia Xie, Weiwei Cao, TianZe Wang:

Quadratic Equations from a Kind of S-boxes. 239-253 - Weiwei Cao, Lei Hu:

Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure. 254-267
Anonymity/Authentication/Access Control
- Rasheed Hussain, Sangjin Kim, Heekuck Oh:

Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. 268-280 - Keita Emura

, Atsuko Miyaji
, Kazumasa Omote:
A Selectable k-Times Relaxed Anonymous Authentication Scheme. 281-295 - Heike Busch, Stefan Katzenbeisser, Paul Baecher:

PUF-Based Authentication Protocols - Revisited. 296-308 - Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel

, Willem Jonker:
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. 309-323
Network Security
- Mark Manulis

:
Securing Remote Access Inside Wireless Mesh Networks. 324-338 - Dae Hyun Yum, Sun Young Kim, Ho-Kun Moon, Mi-Yeon Kim, Jae-Hoon Roh, Pil Joong Lee:

Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. 339-353 - Mijoo Kim, Miyeon Yoon, Hyun Cheol Jeong, Heung Youl Youm:

USN Middleware Security Model. 354-365 - Chae Hoon Lim:

Practical Broadcast Authentication Using Short-Lived Signatures in WSNs. 366-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














