


default search action
International Journal of Information Security, Volume 5
Volume 5, Number 1, January 2006
- Stefanos Gritzalis
:
Public Key Infrastructure: Research and Applications. 1-2 - Gabriel Vanrenen, Sean W. Smith, John Marchesini:
Distributing security-mediated PKI. 3-17 - Antonio Lioy
, Marius Marian
, Natalia Moltchanova, Massimiliano Pala:
PKI past, present and future. 18-29 - Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt:
Key substitution attacks revisited: Taking into account malicious signers. 30-36 - Jianying Zhou, Feng Bao, Robert H. Deng
:
Minimizing TTP's involvement in signature validation. 37-47 - Ninghui Li, John C. Mitchell:
Understanding SPKI/SDSI using first-order logic. 48-64
Volume 5, Number 2, April 2006
- Jianying Zhou, Javier López
:
Preface. 65-66 - Adam L. Young:
Cryptoviral extortion using Microsoft's Crypto API. 67-76 - Stelios Sidiroglou, Angelos D. Keromytis:
Execution transactions for defending against software failures: use and evaluation. 77-91 - Deholo Nali, Carlisle M. Adams, Ali Miri:
Hierarchical time-based information release. 92-104 - Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy:
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design. 105-114 - Gary S.-W. Yeo, Raphael Chung-Wei Phan
:
On the security of the WinRAR encryption feature. 115-123
Volume 5, Number 3, July 2006
- Alain J. Mayer, Avishai Wool
, Elisha Ziskind:
Offline firewall analysis. 125-144 - Vino Fernando Crescini, Yan Zhang:
PolicyUpdater: a system for dynamic access control. 145-165 - Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu:
Improving cache attacks by considering cipher structure. 166-176 - Katsuyuki Okeya, Tsuyoshi Takagi:
Security analysis of CRT-based cryptosystems. 177-185 - Paul C. van Oorschot
, Jean-Marc Robert, Miguel Vargas Martin:
A monitoring system for detecting repeated packets with applications to computer worms. 186-199
Volume 5, Number 4, October 2006
- Felix Brandt:
How to obtain full privacy in auctions. 201-216 - Sattam S. Al-Riyami, John Malone-Lee, Nigel P. Smart:
Escrow-free encryption supporting cryptographic workflow. 217-229 - Jintai Ding, Dieter Schmidt, Zhijun Yin:
Cryptanalysis of the new TTS scheme in CHES 2004. 231-240 - Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa:
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. 241-255 - Paolo Giorgini
, Fabio Massacci
, John Mylopoulos, Nicola Zannone
:
Requirements engineering for trust management: model, methodology, and reasoning. 257-274

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.