ISPEC 2008:
Sydney,
Australia
Liqun Chen, Yi Mu, Willy Susilo (Eds.):
Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings.
Lecture Notes in Computer Science 4991 Springer 2008, ISBN 978-3-540-79103-4 BibTeX
- Anongporn Salaiwarakul, Mark Dermot Ryan:
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol.
1-13
Electronic Edition (link) BibTeX
- Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
An On-Line Secure E-Passport Protocol.
14-28
Electronic Edition (link) BibTeX
- Frederik Armknecht, Alberto N. Escalante, Hans Löhr, Mark Manulis, Ahmad-Reza Sadeghi:
Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly.
29-44
Electronic Edition (link) BibTeX
- Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
1-out-of-.
45-55
Electronic Edition (link) BibTeX
- Qiang Tang, Julien Bringer, Hervé Chabanne, David Pointcheval:
A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes.
56-70
Electronic Edition (link) BibTeX
- Feng Bao, Robert H. Deng, Xuhua Ding, Yanjiang Yang:
Private Query on Encrypted Data in Multi-user Settings.
71-85
Electronic Edition (link) BibTeX
- Jan Cappaert, Bart Preneel, Bertrand Anckaert, Matias Madou, Koen De Bosschere:
Towards Tamper Resistant Code Encryption: Practice and Experience.
86-100
Electronic Edition (link) BibTeX
- Jong Hwan Park, Dong Hoon Lee:
A New Public Key Broadcast Encryption Using Boneh-Boyen-Goh's HIBE Scheme.
101-115
Electronic Edition (link) BibTeX
- Marc Joye:
RSA Moduli with a Predetermined Portion: Techniques and Applications.
116-130
Electronic Edition (link) BibTeX
- Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma:
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs.
131-145
Electronic Edition (link) BibTeX
- Patrick P. Tsang, Sean W. Smith:
Secure Cryptographic Precomputation with Insecure Memory.
146-160
Electronic Edition (link) BibTeX
- André Osterhues, Ahmad-Reza Sadeghi, Marko Wolf, Christian Stüble, N. Asokan:
Securing Peer-to-Peer Distributions for Mobile Devices.
161-175
Electronic Edition (link) BibTeX
- Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim:
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks.
176-187
Electronic Edition (link) BibTeX
- Patrick P. Tsang, Sean W. Smith:
Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers.
188-202
Electronic Edition (link) BibTeX
- Minjin Kwon, Kyoochang Jeong, Heejo Lee:
PROBE: A Process Behavior-Based Host Intrusion Prevention System.
203-217
Electronic Edition (link) BibTeX
- Quoc-Cuong Le, Patrick Bellot, Akim Demaille:
Towards the World-Wide Quantum Network.
218-232
Electronic Edition (link) BibTeX
- Andrew Brown, Mark Ryan:
Synthesising Monitors from High-Level Policies for the Safe Execution of Untrusted Software.
233-247
Electronic Edition (link) BibTeX
- Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu:
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains.
248-262
Electronic Edition (link) BibTeX
- Khaled Ouafi, Raphael C.-W. Phan:
Privacy of Recent RFID Authentication Protocols.
263-277
Electronic Edition (link) BibTeX
- Jihwan Lim, Heekuck Oh, Sangjin Kim:
A New Hash-Based RFID Mutual Authentication Protocol Providing Enhanced User Privacy Protection.
278-289
Electronic Edition (link) BibTeX
- Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation.
290-303
Electronic Edition (link) BibTeX
- Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic.
304-318
Electronic Edition (link) BibTeX
- Jin Yuan, Qingsong Ye, Huaxiong Wang, Josef Pieprzyk:
Secure Computation of the Vector Dominance Problem.
319-333
Electronic Edition (link) BibTeX
- Shaik Maleka, Amjed Shareef, C. Pandu Rangan:
Rational Secret Sharing with Repeated Games.
334-346
Electronic Edition (link) BibTeX
- Qingsong Ye, Huaxiong Wang, Josef Pieprzyk:
Distributed Private Matching and Set Operations.
347-360
Electronic Edition (link) BibTeX
- David Galindo, Flavio D. Garcia, Peter van Rossum:
Computational Soundness of Non-Malleable Commitments.
361-376
Electronic Edition (link) BibTeX
- Wen Ji, Lei Hu:
Square Attack on Reduced-Round Zodiac Cipher.
377-391
Electronic Edition (link) BibTeX
- Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu:
Analysis of Zipper as a Hash Function.
392-403
Electronic Edition (link) BibTeX
- Danilo Gligoroski, Suzana Andova, Svein J. Knapskog:
On the Importance of the Key Separation Principle for Different Modes of Operation.
404-418
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:26:13 2009
by Michael Ley (ley@uni-trier.de)