default search action
5. ISC 2002: Sao Paulo, Brazil
- Agnes Hui Chan, Virgil D. Gligor:
Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings. Lecture Notes in Computer Science 2433, Springer 2002, ISBN 3-540-44270-7
Intrusion Detection and Tamper Resistance
- Heejin Jang, Sangwook Kim:
Real-Time Intruder Tracing through Self-Replication. 1-16 - Taekyoung Kwon:
On the Difficulty of Protecting Private Keys in Software. 17-31 - John S. Baras, Maben Rabi:
Intrusion Detection with Support Vector Machines and Generative Models. 32-47
Cryptographic Algorithm and Attack Implementation
- Akashi Satoh, Sumio Morioka:
Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI. 48-62 - Helger Lipmaa:
Fast Software Implementations of SC2000. 63-74 - Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott:
Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. 75-89 - Kahil Jallad, Jonathan Katz, Bruce Schneier:
Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG. 90-101
Access Control and Trust Management (I)
- Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno:
An Access Control Model for Tree Data Structures. 117-135 - Ed Dawson, Javier López, José A. Montenegro, Eiji Okamoto:
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. 136-149
Authentication and Privacy
- Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye:
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. 150-161 - Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen:
Quantifying Privacy Leakage through Answering Database Queries. 162-176 - Weidong Qiu, Kefei Chen, Dawu Gu:
A New Offline Privacy Protecting E-cash System with Revokable Anonymity. 177-190
E-commerce Protocols (I)
- Masayuki Abe, Koutarou Suzuki:
Receipt-Free Sealed-Bid Auction. 191-199 - Nicolás González-Deleito, Olivier Markowitch:
Exclusion-Freeness in Multi-party Exchange Protocols. 200-209 - Josep Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger:
A Realistic Protocol for Multi-party Certified Electronic Mail. 210-219
Signature Schemes
- Shunsuke Araki:
A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification. 220-228 - Apollònia Martínez Nadal, Josep Lluís Ferrer-Gomila:
Comments to the UNCITRAL Model Law on Electronic Signatures. 229-243 - Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai:
An Anonymous Loan System Based on Group Signature Scheme. 244-256 - Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Traceability Schemes for Signed Documents. 257-271
Cryptography (I)
- Emmanuel Bresson, Jacques Stern:
Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications. 272-288 - Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo:
Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). 289-299 - Soonhak Kwon, Heuisu Ryu:
Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2m). 300-308
Access Control and Trust Management (II)
- Yuji Watanabe, Masayuki Numao:
Conditional Cryptographic Delegation for P2P Data Sharing. 309-321 - Liqun Chen, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart:
Certification of Public Keys within an Identity Based System. 322-333 - Jiande Zheng:
A New Public Key Cryptosystem for Constrained Hardware. 334-341
Key Management
- Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez:
A Distributed and Computationally Secure Key Distribution Scheme. 342-356 - Helger Lipmaa:
On Optimal Hash Tree Traversal for Interval Time-Stamping. 357-371 - Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic:
An Efficient Dynamic and Distributed Cryptographic Accumulator. 372-388
Security Analysis
- Katsuyuki Okeya, Kouichi Sakurai:
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. 389-401 - Bodo Möller:
Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks. 402-413 - Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli:
Automated Analysis of Some Security Mechanisms of SCEP. 414-427 - José R. M. Monteiro, Ricardo Dahab:
An Attack on a Protocol for Certified Delivery. 428-436
E-commerce Protocols (II)
- Hiroaki Kikuchi:
Oblivious Counter and Majority Protocol. 437-445 - Wai Han Soo, Azman Samsudin, Alwyn Goh:
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. 446-458 - Marcel Fernandez, Miguel Soriano:
Fingerprinting Concatenated Codes with Efficient Identification. 459-470
Cryptography (II)
- Josep Domingo-Ferrer:
A Provably Secure Additive and Multiplicative Privacy Homomorphism. 471-483 - Yasuyuki Sakai, Kouichi Sakurai:
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. 484-500
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.