default search action
7. ISC 2004: Palo Alto, CA, USA
- Kan Zhang, Yuliang Zheng:
Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings. Lecture Notes in Computer Science 3225, Springer 2004, ISBN 3-540-23208-7
Key Management
- Taekyoung Kwon:
Practical Authenticated Key Agreement Using Passwords. 1-12 - Muxiang Zhang:
Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks. 13-24 - Pan Wang, Peng Ning, Douglas S. Reeves:
Storage-Efficient Stateless Group Key Revocation. 25-38
Digital Signatures
- Michael Backes, Birgit Pfitzmann, Michael Waidner:
Low-Level Ideal Signatures and General Integrity Idealization. 39-51 - Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater:
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. 52-60 - Michael Backes, Dennis Hofheinz:
How to Break and Repair a Universally Composable Signature Functionality. 61-72
New Algorithms
- Craig Gentry, Zulfikar Ramzan:
RSA Accumulator Based Broadcast Encryption. 73-86 - Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim:
Chameleon Hashing Without Key Exposure. 87-98 - Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu:
Radix-r Non-Adjacent Form. 99-110
Cryptanalysis
- Raphael Chung-Wei Phan, Helena Handschuh:
On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor. 111-122 - Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon:
Security Analysis of Two Signcryption Schemes. 123-133 - Carlisle M. Adams, Guenther Kramer, Serge Mister, Robert J. Zuccherato:
On The Security of Key Derivation Functions. 134-145
Intrusion Detection
- Alex Hai Wang, Peng Liu, Lunquan Li:
Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. 146-157 - Michael Meier:
A Model for the Semantics of Attack Signatures in Misuse Detection Systems. 158-169 - Zouheir Trabelsi, Hamza Rahmani:
Detection of Sniffers in an Ethernet Network. 170-182 - Mark Foster, Joseph N. Wilson, Shigang Chen:
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks. 183-194 - Elisa Bertino, Teodoro Leggieri, Evimaria Terzi:
Securing DBMS: Characterizing and Detecting Query Floods. 195-206
Access Control
- Elisa Bertino, Elena Ferrari, Giovanni Mella:
An XML-Based Approach to Document Flow Verification. 207-218 - Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobbens:
Model-Checking Access Control Policies. 219-230 - Ajay Chander, Drew Dean, John C. Mitchell:
A Distributed High Assurance Reference Monitor. 231-244 - Deholo Nali, Carlisle M. Adams, Ali Miri:
Using Mediated Identity-Based Cryptography to Support Role-Based Access Control. 245-256
Human Authentication
- Richard Bergmair, Stefan Katzenbeisser:
Towards Human Interactive Proofs in the Text-Domain (Using the Problem of Sense-Ambiguity for Security). 257-267 - Monica Chew, J. D. Tygar:
Image Recognition CAPTCHAs. 268-279
Certificate Management
- Zhengyi Le, Yi Ouyang, James Ford, Fillia Makedon:
A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model. 280-291 - Qinglin Jiang, Douglas S. Reeves, Peng Ning:
Certificate Recommendations to Improve the Robustness of Web of Trust. 292-303
Mobile and Ad Hoc Security
- Ke Xu, Stephen R. Tate:
Universally Composable Secure Mobile Agent Computation. 304-317 - Jukka Ylitalo, Jan Melén, Pekka Nikander, Vesa Torvinen:
Re-thinking Security in IP Based Micro-Mobility. 318-329 - Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang:
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. 330-341
Web Security
- HongQian Karen Lu, Asad M. Ali:
Prevent Online Identity Theft - Using Network Smart Cards for Secure Online Transactions. 342-353 - Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Provable Unlinkability Against Traffic Analysis Already After O(log(n)) Steps! 354-366 - Toru Nakanishi, Mitsuaki Shiota, Yuji Sugiyama:
An Efficient Online Electronic Cash with Unlinkable Exact Payments. 367-378
Digital Rights Management
- Heejae Park, Jong Kim:
Modifiable Digital Content Protection in P2P. 379-390 - William Ku, Chi-Hung Chi:
Survey on the Technological Aspects of Digital Rights Management. 391-403 - Ginger Myles, Christian S. Collberg:
Detecting Software Theft via Whole Program Path Birthmarks. 404-415
Software Security
- Thitima Srivatanakul, John A. Clark, Fiona Polack:
Effective Security Requirements Analysis: HAZOP and Use Cases. 416-427 - Kelly Heffner, Christian S. Collberg:
The Obfuscation Executive. 428-440
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.