


default search action
ISPEC 2007: Hong Kong, China
- Ed Dawson, Duncan S. Wong:

Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings. Lecture Notes in Computer Science 4464, Springer 2007, ISBN 978-3-540-72159-8
Invited Talks
- William J. Caelli:

Application Security - Myth Or Reality? 1-10 - Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu:

Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). 11-19
Cryptanalysis
- Jorge Nakahara Jr.:

A Linear Analysis of Blowfish and Khufu. 20-32 - Gaoli Wang:

Related-Key Rectangle Attack on 43-Round SHACAL-2. 33-42 - Zhenglin Liu, Xu Guo, Yi-Cheng Chen, Yu Han, Xuecheng Zou:

On the Ability of AES S-Boxes to Secure Against Correlation Power Analysis. 43-50
Signatures
- Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka:

A Sanitizable Signature Scheme with Aggregation. 51-64 - Jianhong Zhang, Jian Mao:

A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. 65-78 - Man Ho Au, Joseph K. Liu, Willy Susilo

, Tsz Hon Yuen:
Certificate Based (Linkable) Ring Signature. 79-92 - Saeran Kwon, Sang-Ho Lee:

An Efficient ID-Based Verifiably Encrypted Signature Scheme Based on Hess's Scheme. 93-104 - Zuhua Shao:

On the Sequentiality of Three Optimal Structured Multisignature Schemes. 105-115
Network Security and Security Management
- Di Ma

:
Secure Feedback Service in Wireless Sensor Networks. 116-128 - Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyong Tang:

An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols. 129-144 - Peter C. S. Kwan, Glenn Durfee:

Practical Uses of Virtual Machines for Protection of Sensitive User Data. 145-161 - Jung-Hwa Chae, Nematollaah Shiri:

Formalization of RBAC Policy with Object Class Hierarchy. 162-176
Privacy and Applications
- Yanjiang Yang, Robert H. Deng

, Feng Bao:
Privacy-Preserving Credentials Upon Trusted Computing Augmented Servers. 177-192 - Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:

Two-Party Privacy-Preserving Agglomerative Document Clustering. 193-208 - Kun Peng, Ed Dawson:

Efficient Bid Validity Check in ElGamal-Based Sealed-Bid E-Auction. 209-224
Cryptographic Algorithms and Implementations
- Yoo-Jin Baek, Ihor V. Vasyltsov:

How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. 225-237 - Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim:

Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. 238-253 - Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:

Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. 254-268 - Pradeep Kumar Mishra, Pinakpani Pal, Palash Sarkar:

Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Cryptosystems. 269-283
Authentication and Key Management
- Robert H. Deng

, Yanjiang Yang:
Achieving End-to-End Authentication in Intermediary-Enabled Multimedia Delivery Systems. 284-300 - Minghui Zheng, Guohua Cui, Muxiang Yang, Jun Li:

Scalable Group Key Management Protocol Based on Key Material Transmitting Tree. 301-313 - Jiyong Jang, Taekyoung Kwon, JooSeok Song:

A Time-Based Key Management Protocol for Wireless Sensor Networks. 314-328
Cryptosystems
- Shengli Liu, Kefei Chen, Weidong Qiu:

Identity-Based Threshold Decryption Revisited. 329-343 - Miyuki Uno, Mikio Kano:

Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. 344-359

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














