default search action
CISC 2005: Beijing, China
- Dengguo Feng, Dongdai Lin, Moti Yung:
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings. Lecture Notes in Computer Science 3822, Springer 2005, ISBN 3-540-30855-5
Invited Talks
- Serge Vaudenay:
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography. 1-9 - Giovanni Di Crescenzo:
You Can Prove So Many Things in Zero-Knowledge. 10-27
Identity Based Cryptography
- Rui Zhang, Hideki Imai:
Improvements on Security Proofs of Some Identity Based Encryption Schemes. 28-41 - Chunxiang Gu, Yuefei Zhu:
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . 42-52 - Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong:
ID-Based Signature Scheme Without Trusted PKG. 53-62
Security Modelling
- Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:
Specifying Authentication Using Signal Events in CSP. 63-74 - Xiaolan Joy Zhang, Brian King:
Modeling RFID Security. 75-90
Systems Security
- Roman Schlegel, Serge Vaudenay:
Enforcing Email Addresses Privacy Using Tokens. 91-100 - Yongdong Wu:
Efficient Authentication of Electronic Document Workflow. 101-112
Signature Schemes
- Raylin Tso, Takeshi Okamoto, Eiji Okamoto:
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms. 113-127 - Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang:
Efficient Group Signatures from Bilinear Pairing. 128-139 - Zuhua Shao:
Enhanced Aggregate Signatures from Pairings. 140-149 - Yuan Zhou, Zhenfu Cao, Zhenchuan Chai:
Constructing Secure Proxy Cryptosystem. 150-161
Symmetric Key Mechanisms
- Guang Gong, Kishan Chand Gupta, Martin Hell, Yassir Nawaz:
Towards a General RC4-Like Keystream Generator. 162-174 - Peng Wang, Dengguo Feng, Wenling Wu:
HCTR: A Variable-Input-Length Enciphering Mode. 175-188 - Jihong Teng, Shiqu Li, Xiaoying Huang:
The kth-Order Quasi-Generalized Bent Functions over Ring Zp. 189-201 - Shimin Wei, Guolong Chen, Guozhen Xiao:
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. 202-209
Zero-Knowledge and Secure Computations
- Hongda Li, Bao Li:
An Unbounded Simulation-Sound Non-interactive Zero-Knowledge Proof System for NP. 210-220 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
An Improved Secure Two-Party Computation Protocol. 221-232
Threshold Cryptography
- Tianjie Cao, Dongdai Lin:
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. 233-241 - Fagen Li, Juntao Gao, Yupu Hu:
ID-Based Threshold Unsigncryption Scheme from Pairings. 242-253
Intrusion Detection Systems
- Gil-Jong Mun, Yongmin Kim, DongKook Kim, BongNam Noh:
Improvement of Detection Ability According to Optimum Selection of Measures Based on Statistical Approach. 254-264 - Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon:
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. 265-278 - Jong Sou Park, Khaja Mohammad Shazzad, Dong Seong Kim:
Toward Modeling Lightweight Intrusion Detection System Through Correlation-Based Hybrid Feature Selection. 279-289
Protocol Cryptanalysis
- Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu:
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. 290-301 - Fei Gao, Su-Juan Qin, Qiao-Yan Wen, Fu-Chen Zhu:
An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption. 302-312
ECC Algorithms
- Cheol-Min Park, Myung-Hwan Kim, Moti Yung:
A Remark on Implementing the Weil Pairing. 313-323 - Pradeep Kumar Mishra:
Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. 324-335
Applications
- Jong-Hyuk Roh, Kyoon-Ha Lee:
Key Management for Secure Overlay Multicast. 336-345 - Duhyun Bae, Jiho Kim, Sehyun Park, Ohyoung Song:
Design and Implementation of IEEE 802.11i Architecture for Next Generation WLAN. 346-357 - Yongwha Chung, Daesung Moon, Sungju Lee, Seunghwan Jung, Taehae Kim, Dosung Ahn:
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault. 358-369
Secret Sharing
- Zhanfei Zhou:
Classification of Universally Ideal Homomorphic Secret Sharing Schemes and Ideal Black-Box Secret Sharing Schemes. 370-383 - Wenping Ma, Fu Tai Zhang:
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. 384-394
Denial of Service Attacks
- Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura:
Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation. 395-406 - Hyun-Sun Kang, Chang-Seop Park:
MIPv6 Binding Update Protocol Secure Against Both Redirect and DoS Attacks. 407-418
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.