3. ASIACCS 2008:
Tokyo,
Japan
Masayuki Abe, Virgil D. Gligor (Eds.):
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008.
ACM 2008, ISBN 978-1-59593-979-1 BibTeX
Invited talk
Hash and MAC
Side channel attacks
Block cipher
Formal verification
Secure implementation
Network security (I)
Network security (II)
- Bryan Parno, Adrian Perrig, Dave Andersen:
SNAPP: stateless network-authenticated path pinning.
168-178
Electronic Edition (ACM DL) BibTeX
- Liming Lu, Mun Choon Chan, Ee-Chien Chang:
A general model of probabilistic packet marking for IP traceback.
179-188
Electronic Edition (ACM DL) BibTeX
- Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux:
Secure neighbor discovery in wireless networks: formal investigation of possibility.
189-200
Electronic Edition (ACM DL) BibTeX
- Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
201-204
Electronic Edition (ACM DL) BibTeX
Access control
Key exchange
RFID security
Protocols
Digital signatures (I)
Digital signatures (II)
- Di Ma:
Practical forward secure sequential aggregate signatures.
341-352
Electronic Edition (ACM DL) BibTeX
- Stuart Haber, Yasuo Hatano, Yoshinori Honda, William Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao:
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
353-362
Electronic Edition (ACM DL) BibTeX
- Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Efficient designated confirmer signature from bilinear pairings.
363-368
Electronic Edition (ACM DL) BibTeX
- Manuel Barbosa, Pooya Farshim:
Certificateless signcryption.
369-372
Electronic Edition (ACM DL) BibTeX
Identity based encryption
Copyright © Sat May 16 23:00:55 2009
by Michael Ley (ley@uni-trier.de)