


default search action
ISPEC 2010: Seoul, Korea
- Jin Kwak, Robert H. Deng, Yoojae Won, Guilin Wang:

Information Security, Practice and Experience, 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings. Lecture Notes in Computer Science 6047, Springer 2010, ISBN 978-3-642-12826-4
Cryptanalysis
- Jiazhe Chen, Keting Jia:

Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512. 1-18 - Yanjun Li

, Wenling Wu, Lei Zhang:
Integral Attacks on Reduced-Round ARIA Block Cipher. 19-29 - Jiageng Chen

, Atsuko Miyaji
:
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. 30-44 - Shekh Faisal Abdul-Latip, Mohammad Reza Reyhanitabar, Willy Susilo

, Jennifer Seberry:
On the Security of NOEKEON against Side Channel Cube Attacks. 45-55
Algorithms and Implementations (I)
- Aivo Jürgenson, Jan Willemson:

On Fast and Approximate Attack Tree Computations. 56-66 - Katsuyuki Okeya, Hidehiro Katou, Yasuyuki Nogami:

Width-3 Joint Sparse Form. 67-84 - Lei Xu

, Dongdai Lin:
Accelerating Inverse of GF(2n) with Precomputation. 85-95
Algorithms and Implementations (II)
- Zhen Wang, Xiaozhe Wang, Shuqin Fan:

Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis. 96-109 - Masaya Yasuda:

The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups. 110-122 - Lin Xu, Dongdai Lin, Xin Li:

A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables. 123-137
Network Security
- Thomas Richard McEvoy

, Stephen D. Wolthusen:
Host-Based Security Sensor Integrity in Multiprocessing Environments. 138-152 - Xiaoqi Jia, Xi Xiong, Jiwu Jing, Peng Liu:

Using Purpose Capturing Signatures to Defeat Computer Virus Mutating. 153-171 - Zongbin Liu, Jiwu Jing, Peng Liu:

Rate-Based Watermark Traceback: A New Approach. 172-186 - Farshid Farhat, Mohammad Reza Pakravan, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Locally Multipath Adaptive Routing Protocol Resilient to Selfishness and Wormholes. 187-200
Access Control
- Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng:

Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk. 201-216 - Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim

:
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . 217-228
Identity Management
- Inkyung Jeun, Dongho Won:

A Trustworthy ID Management Mechanism in Open Market. 229-240 - Byoung-Jin Han, Donghwi Shin, Hyoung-Jin Lim, Inkyung Jeun, Hyun-Chul Jung:

BioID: Biometric-Based Identity Management. 241-250
Trust Management
- Bin Wu

, Dengguo Feng, Meijiao Duan:
Privacy Preserving of Trust Management Credentials Based on Trusted Computing. 251-263 - Daren Zha, Jiwu Jing, Le Kang:

Mitigating the Malicious Trust Expansion in Social Network Service. 264-275
Public Key Cryptography
- Jacob C. N. Schuldt, Kanta Matsuura

:
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification. 276-293 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:

Certificateless KEM and Hybrid Signcryption Schemes Revisited. 294-307 - Yazhe Zhang, Kunpeng Wang, Bao Li:

A Deniable Group Key Establishment Protocol in the Standard Model. 308-323 - Hui Li, Chuankun Wu, Lingbo Wei:

Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. 324-340
Security Applications
- Chiew Kang Leng

, Josef Pieprzyk
:
Binary Image Steganographic Techniques Classification Based on Multi-class Steganalysis. 341-358 - Harikrishna Narasimhan, Venkatanathan Varadarajan, C. Pandu Rangan:

Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. 359-376 - Youngsook Lee, Hyungkyu Yang, Dongho Won:

Attacking and Improving on Lee and Chiu's Authentication Scheme Using Smart Cards. 377-385 - Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim

:
Protection Profile for Secure E-Voting Systems. 386-397

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














