


default search action
4. ISC 2001: Malaga, Spain
- George I. Davida, Yair Frankel:

Information Security, 4th International Conference, ISC 2001, Malaga, Spain, October 1-3, 2001, Proceedings. Lecture Notes in Computer Science 2200, Springer 2001, ISBN 3-540-42662-0
Key Distribution
- Carlo Blundo, Paolo D'Arco, Vanesa Daza, Carles Padró:

Bounds and Constructions for Unconditionally Secure Distributed Key Distribution Schemes for General Access Structures. 1-17 - Valeri Korjik, Guillermo Morales-Luna, Vladimir B. Balakirsky:

Privacy Amplification Theorem for Noisy Main Channel. 18-26
Protocols
- Giovanni Di Crescenzo, Olga Kornievskaia:

Efficient Kerberized Multicast in a Practical Distributed Setting. 27-45 - Sigrid Gürgens, Javier López:

Suitability of a Classical Analysis Method for E-commerce Protocols. 46-62
Enhancing Technologies
- Carlo Blundo, Paolo D'Arco, Alfredo De Santis

, Clemente Galdi:
Hyppocrates. 63-80 - Fumitaka Hoshino

, Masayuki Abe, Tetsutaro Kobayashi:
Lenient/Strict Batch Verification in Several Groups. 81-94
Privacy
- Dmitri Asonov, Markus Schaal, Johann Christoph Freytag:

Absolute Privacy in Voting. 95-109 - Tsan-sheng Hsu, Churn-Jung Liau

, Da-Wei Wang:
A Logical Model for Privacy Protection. 110-124
Software Protection
- Enriquillo Valdez, Moti Yung:

DISSECT: DIStribution for SECurity Tool. 125-143 - Stanley Chow, Yuan Xiang Gu, Harold Johnson, Vladimir A. Zakharov:

An Approach to the Obfuscation of Control-Flow of Sequential Computer Programs. 144-155
Message Hiding I
- Mark Chapman, George I. Davida, Marc Rennhard:

A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. 156-165 - David Sánchez, Agustín Orfila, Julio César Hernández Castro, José María Sierra:

Robust New Method in Frequency Domain Watermarking. 166-182
PKI Issues and Protocols
- Diana Berbecaru, Antonio Lioy, Marius Marian

:
On the Complexity of Public-Key Certificate Validation. 183-203 - Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila

:
Liability of Certification Authorities: A Juridical Point of View. 204-219
Hardware Implementations
- Pawel Chodowiec, Kris Gaj, Peter Bellows, Brian Schott:

Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. 220-234 - Kazumaro Aoki, Fumitaka Hoshino

, Tetsutaro Kobayashi, Hiroaki Oguro:
Elliptic Curve Arithmetic Using SIMD. 235-247 - Kostas Marinis, Nikos K. Moshopoulos, Fotis Karoubalis, Kiamal Z. Pekmestzi:

On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. 248-265 - Sheng-Bo Xu, Lejla Batina:

Efficient Implementation of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator. 266-279
Cryptanalysis and Prevention
- Rainer Steinwandt, Willi Geiselmann, Thomas Beth:

A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. 280-293 - Routo Terada, Paulo G. Pinheiro:

Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds. 294-309 - Ismael Jiménez Calvo, Germán Sáez:

Approximate Power Roots in Zm. 310-323 - Bodo Möller:

Securing Elliptic Curve Point Multiplication against Side-Channel Attacks. 324-334
Implementations
- Sofia K. Tzelepi, George Pangalos:

A Flexible Role-Based Access Control Model for Multimedia Medical Image Database Systems. 335-346 - Elisa Bertino, Barbara Carminati, Elena Ferrari:

A Secure Publishing Service for Digital Libraries of XML Documents. 347-362
Non-repudiation Techniques
- Olivier Markowitch, Steve Kremer:

An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. 363-378 - Aris Anagnostopoulos

, Michael T. Goodrich, Roberto Tamassia:
Persistent Authenticated Dictionaries and Their Applications. 379-393
Contracts and Auctions
- Josep Lluís Ferrer-Gomila

, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
Efficient Optimistic N-Party Contract Signing Protocol. 394-407 - Koji Chida, Kunio Kobayashi, Hikaru Morita:

Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison. 408-419
Message Hiding II
- Francesc Sebé, Josep Domingo-Ferrer:

Oblivious Image Watermarking Robust against Scaling and Geometric Distortions. 420-432 - Christian Damsgaard Jensen:

Fingerprinting Text in Logical Markup Languages. 433-445
Payments
- Antonio Ruiz-Martínez

, Gregorio Martínez Pérez, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta:
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery. 446-461 - Ik Rae Jeong, Dong Hoon Lee, Jong In Lim:

Efficient Transferable Cash with Group Signatures. 462-474
Network and OS Security
- Liqun Chen

, Wenbo Mao:
An Auditable Metering Scheme for Web Advertisement Applications. 475-485 - Jaime Delgado

, Isabel Gallego, Xavier Perramon
:
Broker-Based Secure Negotiation of Intellectual Property Rights. 486-496
Network and OS Security
- Jae Seung Lee, Sang-Choon Kim:

Design of the Decision Support System for Network Security Management to Secure Enterprise Network. 497-511 - Jia Wang, Insup Lee:

Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. 512-535 - Kenji Masui, Masahiko Tomoishi, Naoki Yonezaki:

Design of UNIX System for the Prevention of Damage Propagation by Intrusion and Its Implementation Based on 4.4BSD. 536-553

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














