


Остановите войну!
for scientists:


default search action
6. ISC 2003: Bristol, UK
- Colin Boyd, Wenbo Mao:
Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings. Lecture Notes in Computer Science 2851, Springer 2003, ISBN 3-540-20176-9
Invited Talk
- Paul C. van Oorschot
:
Revisiting Software Protection. 1-13
Network Security
- Adrian Baldwin, Simon Shiu:
Enabling Shared Audit Data. 14-28 - Tuomas Aura:
Cryptographically Generated Addresses (CGA). 29-43 - Tim Kindberg, Kan Zhang:
Validating and Securing Spontaneous Associations between Wireless Devices. 44-53 - Andreas Pashalidis, Chris J. Mitchell
:
Single Sign-On Using Trusted Platforms. 54-68
Public-Key Algorithms
- David Galindo, Sebastià Martín Molleví, Paz Morillo, Jorge Luis Villar
:
Easy Verifiable Primitives and Practical Public Key Cryptosystems. 69-83 - Michael Backes, Birgit Pfitzmann, Michael Waidner:
Reactively Secure Signature Schemes. 84-95 - Jianying Zhou, Feng Bao, Robert H. Deng
:
Validating Digital Signatures without TTP's Time-Stamping and Certificate Revocation. 96-110 - Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto:
A Fast Signature Scheme Based on New On-line Computation. 111-121
Cryptographic Protocols
- Javier Herranz, Carles Padró, Germán Sáez:
Distributed RSA Signature Schemes for General Access Structures. 122-136 - Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata
:
Divisible Voting Scheme. 137-150 - Anderson C. A. Nascimento
, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. 151-164 - Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle:
The Design and Implementation of Protocol-Based Hidden Key Recovery. 165-179
Invited Talk
- Ueli M. Maurer:
Intrinsic Limitations of Digital Signatures and How to Cope with Them. 180-192
Protocol Attacks
- Sigrid Gürgens, Carsten Rudolph
, Holger Vogt:
On the Security of Fair Non-repudiation Protocols. 193-207 - Feng Bao:
Security Analysis of a Password Authenticated Key Exchange Protocol. 208-217
Attacks on Public Key Algorithms
- Toru Akishita, Tsuyoshi Takagi:
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. 218-233 - David A. Wagner:
Cryptanalysis of an Algebraic Privacy Homomorphism. 234-239 - Peter James Leadbitter, Nigel P. Smart:
Analysis of the Insecurity of ECMQV with Partially Known Nonces. 240-251
Block Ciphers
- Akashi Satoh, Sumio Morioka
:
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. 252-266 - Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
A Note on Weak Keys of PES, IDEA, and Some Extended Variants. 267-279 - Tomasz Tyksinski:
Foundations of Differential Cryptanalysis in Abelian Groups. 280-294
Authorization
- Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta:
Trust and Authorization in Pervasive B2E Scenarios. 295-309 - Chun Ruan, Vijay Varadharajan, Yan Zhang:
A Logic Model for Temporal Authorization Delegation with Negation. 310-324
Watermarking
- Yongdong Wu:
Zero-Distortion Authentication Watermarking. 325-337 - Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim:
Designated Verification of Non-invertible Watermark. 338-351
Software Security
- Hongxia Jin, Jeffery Lotspiech:
Proactive Software Tampering Detection. 352-365 - Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee:
Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. 366-380 - José Luis Vivas, José A. Montenegro, Javier López:
Towards a Business Process-Driven Framework for Security Engineering with the UML. 381-395
Codes and Related Issues
- Yvo Desmedt, Kaoru Kurosawa, Tri Van Le:
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. 396-407 - Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. 408-421 - Tri Van Le, Mike Burmester, Jiangyi Hu:
Short c-Secure Fingerprinting Codes. 422-427 - Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
The Role of Arbiters in Asymmetric Authentication Schemes. 428-441

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.