


default search action
9th ISPEC 2013: Lanzhou, China
- Robert H. Deng, Tao Feng:

Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings. Lecture Notes in Computer Science 7863, Springer 2013, ISBN 978-3-642-38032-7
Network Security
- Yuxin Meng

, Lam-for Kwok
:
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection. 1-15 - Stefan Kraxberger, Ronald Toegl, Martin Pirker

, Elisa Pintado Guijarro, Guillermo Garcia Millan:
Trusted Identity Management for Overlay Networks. 16-30 - Mixia Liu, Tao Feng, Paul Smith

, David Hutchison:
Situational Awareness for Improving Network Resilience Management. 31-43 - Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang:

Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. 44-59
Identity-Based Cryptography
- Hao Xiong, Tsz Hon Yuen

, Cong Zhang, Yi Jun He, Siu-Ming Yiu:
Attribute Specified Identity-Based Encryption. 60-74 - Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:

Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. 75-90 - Kefeng Wang, Yi Mu, Willy Susilo

:
Identity-Based Multisignature with Message Recovery. 91-104 - Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:

Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme. 105-116
Cryptographic Primitives
- Junzuo Lai, Xuhua Ding

, Yongdong Wu:
Accountable Trapdoor Sanitizable Signatures. 117-131 - Kaitai Liang

, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. 132-146 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:

About Hash into Montgomery Form Elliptic Curves. 147-159 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:

Joint Triple-Base Number System for Multi-Scalar Multiplication. 160-173
Security Protocols
- Divyan Munirathnam Konidala, Robert H. Deng

, Yingjiu Li, Hoong Chuin Lau
, Stephen E. Fienberg:
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. 174-188 - Nan Li

, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Secure RFID Ownership Transfer Protocols. 189-203 - Guomin Yang

, Yi Mu, Willy Susilo
, Duncan S. Wong:
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. 204-217 - Lucjan Hanzlik, Lukasz Krzywiecki

, Miroslaw Kutylowski:
Simplified PACE|AA Protocol. 218-232
System Security
- Xiaofan Liu, Natasha Alechina, Brian Logan:

Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control. 233-247 - Shichao Jin, Okhee Kim, Tieming Chen

:
Efficient Attack Detection Based on a Compressed Model. 248-262 - Jungin Kang, Sangwook Lee, Heejo Lee:

A Digital Forensic Framework for Automated User Activity Reconstruction. 263-277 - Jairo Serrano, Eduardo César

, Elisa Heymann
, Barton P. Miller:
Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware. 278-294
Software Security DRM
- Yingjun Zhang, Kai Chen, Yifeng Lian:

VulLocator: Automatically Locating Vulnerable Code in Binary Programs. 295-308 - Vivek Balachandran, Sabu Emmanuel:

Software Protection with Obfuscation and Encryption. 309-320 - Dheerendra Mishra

, Sourav Mukhopadhyay:
Secure Content Delivery in DRM System with Consumer Privacy. 321-335
Cryptanalysis and Side Channel Attacks
- Hui Zhao, Yongbin Zhou, François-Xavier Standaert

, Hailong Zhang:
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. 336-352 - Peng Wang

, Wenling Wu, Liting Zhang:
Cryptanalysis of the OKH Authenticated Encryption Scheme. 353-360 - Mohammad Ali Orumiehchiha, Josef Pieprzyk

, Elham Shakour, Ron Steinfeld:
Security Evaluation of Rakaposhi Stream Cipher. 361-371 - Ling Song, Lei Hu:

Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher. 372-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.




Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID















