13. ACISP 2008:
Wollongong,
Australia
Yi Mu, Willy Susilo, Jennifer Seberry (Eds.):
Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings.
Lecture Notes in Computer Science 5107 Springer 2008, ISBN 978-3-540-69971-2 BibTeX
- Xavier Boyen:
New Paradigms for Password Security.
1-5
Electronic Edition (link) BibTeX
- Sebastian Gajek, Mark Manulis, Jörg Schwenk:
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy.
6-20
Electronic Edition (link) BibTeX
- Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa:
Secure Biometric Authentication with Improved Accuracy.
21-36
Electronic Edition (link) BibTeX
- Jiayuan Sui, Douglas R. Stinson:
A Critical Analysis and Improvement of AACS Drive-Host Authentication.
37-52
Electronic Edition (link) BibTeX
- Alfred Menezes, Berkant Ustaoglu:
Comparing the Pre- and Post-specified Peer Models for Key Agreement.
53-68
Electronic Edition (link) BibTeX
- Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson:
Efficient One-Round Key Exchange in the Standard Model.
69-83
Electronic Edition (link) BibTeX
- Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo:
On the Improvement of the BDF Attack on LSBS-RSA.
84-97
Electronic Edition (link) BibTeX
- Takato Hirano, Koichiro Wada, Keisuke Tanaka:
Public-Key Cryptosystems with Primitive Power Roots of Unity.
98-112
Electronic Edition (link) BibTeX
- Isamu Teranishi, Wakaha Ogata:
Relationship between Two Approaches for Defining the Standard Model PA-ness.
113-127
Electronic Edition (link) BibTeX
- Jacek Cichon, Marek Klonowski, Miroslaw Kutylowski:
Distributed Verification of Mixing - Local Forking Proofs Model.
128-140
Electronic Edition (link) BibTeX
- Huafei Zhu:
Fully-Simulatable Oblivious Set Transfer.
141-154
Electronic Edition (link) BibTeX
- Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang:
Efficient Disjointness Tests for Private Datasets.
155-169
Electronic Edition (link) BibTeX
- Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan:
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
170-186
Electronic Edition (link) BibTeX
- Debra L. Cook, Moti Yung, Angelos D. Keromytis:
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers.
187-202
Electronic Edition (link) BibTeX
- Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg:
Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
203-215
Electronic Edition (link) BibTeX
- Lei Zhang, Wentao Zhang, Wenling Wu:
Cryptanalysis of Reduced-Round SMS4 Block Cipher.
216-229
Electronic Edition (link) BibTeX
- Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Unprovable Security of 2-Key XCBC.
230-238
Electronic Edition (link) BibTeX
- Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin:
Looking Back at a New Hash Function.
239-253
Electronic Edition (link) BibTeX
- Somitra Kumar Sanadhya, Palash Sarkar:
Non-linear Reduced Round Attacks against SHA-2 Hash Family.
254-266
Electronic Edition (link) BibTeX
- Florian Mendel, Martin Schläffer:
Collisions for Round-Reduced LAKE.
267-281
Electronic Edition (link) BibTeX
- Yu Sasaki, Kazumaro Aoki:
Preimage Attacks on Step-Reduced MD5.
282-296
Electronic Edition (link) BibTeX
- Risto Hakala, Kaisa Nyberg:
Linear Distinguishing Attack on Shannon.
297-305
Electronic Edition (link) BibTeX
- Subhamoy Maitra, Goutam Paul:
Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck.
306-320
Electronic Edition (link) BibTeX
- Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong:
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128.
321-335
Electronic Edition (link) BibTeX
- V. Sai Sathyanarayan, Pankaj Kohli, Bezawada Bruhadeshwar:
Signature Generation and Detection of Malware Families.
336-349
Electronic Edition (link) BibTeX
- Sunghyun Kim, Heejo Lee:
Reducing Payload Scans for Attack Signature Matching Using Rule Classification.
350-360
Electronic Edition (link) BibTeX
- Yan Wen, Jinjing Zhao, Huaimin Wang, Jiannong Cao:
Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor.
361-375
Electronic Edition (link) BibTeX
- Pankaj Kohli, Bezawada Bruhadeshwar:
FormatShield: A Binary Rewriting Defense against Format String Attacks.
376-390
Electronic Edition (link) BibTeX
- Min Li, Hua Wang, Ashley W. Plank, Jianming Yong:
Advanced Permission-Role Relationship in Role-Based Access Control.
391-403
Electronic Edition (link) BibTeX
- B. John Oommen, Ebaa Fayyoumi:
Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based Information in Secure Statistical Databases.
404-418
Electronic Edition (link) BibTeX
- Silvana Medos, Serdar Boztas:
Montgomery Residue Representation Fault-Tolerant Computation in GF(2k).
419-432
Electronic Edition (link) BibTeX
- Christophe Doche, Laurent Habsieger:
A Tree-Based Approach for Computing Double-Base Chains.
433-446
Electronic Edition (link) BibTeX
- Reza Rezaeian Farashahi:
Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves.
447-462
Electronic Edition (link) BibTeX
- Christophe Nègre, Thomas Plantard:
Efficient Modular Arithmetic in Adapted Modular Number System Using Lagrange Representation.
463-477
Electronic Edition (link) BibTeX
Copyright © Sat May 16 22:55:48 2009
by Michael Ley (ley@uni-trier.de)