ISPEC 2009:
Xi'an,
China
Feng Bao, Hui Li, Guilin Wang (Eds.):
Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings.
Lecture Notes in Computer Science 5451 Springer 2009, ISBN 978-3-642-00842-9 BibTeX
Public Key Encryption
- Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes.
1-12
Electronic Edition (link) BibTeX
- Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi:
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length.
13-23
Electronic Edition (link) BibTeX
- Junzuo Lai, Robert H. Deng, Shengli Liu, Weidong Kou:
RSA-Based Certificateless Public Key Encryption.
24-34
Electronic Edition (link) BibTeX
Digital Signatures
System Security
Applied Cryptography
Multimedia Security and DRM
Security Protocols
Key Exchange and Management
Hash Functions and MACs
Cryptanalysis
- Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher.
298-309
Electronic Edition (link) BibTeX
- Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Memoryless Related-Key Boomerang Attack on 39-Round SHACAL-2.
310-323
Electronic Edition (link) BibTeX
- Wentao Zhang, Wenling Wu, Dengguo Feng, Bozhan Su:
Some New Observations on the SMS4 Block Cipher in the Chinese WAPI Standard.
324-335
Electronic Edition (link) BibTeX
- Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang:
On the Correctness of an Approach against Side-Channel Attacks.
336-344
Electronic Edition (link) BibTeX
Network Security
Security Applications
Copyright © Sat May 16 23:26:13 2009
by Michael Ley (ley@uni-trier.de)