default search action
3. IWSEC 2008: Kagawa, Japan
- Kanta Matsuura, Eiichiro Fujisaki:
Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings. Lecture Notes in Computer Science 5312, Springer 2008, ISBN 978-3-540-89597-8
Cryptography
- Maciej Grzeskowiak:
On Generating Elements of Orders Dividing p2k±pk+1. 1-19 - Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe:
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. 20-33 - Naoki Ogura, Shigenori Uchiyama:
Remarks on the Attack of Fouque et al. against the lIC Scheme. 34-48
Signature and Signcryption
- Fuchun Guo, Yi Mu, Zhide Chen:
Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles. 49-63 - Chik How Tan:
Signcryption Scheme in Multi-user Setting without Random Oracles. 64-82 - Takuya Yoshida, Koji Okada:
Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices. 83-99
Software Security
- Matthias Jacob, Mariusz H. Jakubowski, Prasad Naldurg, Chit Wei Saw, Ramarathnam Venkatesan:
The Superdiversifier: Peephole Individualization for Software Protection. 100-120 - Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han:
Detecting Java Theft Based on Static API Trace Birthmark. 121-135 - Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis:
Online Network Forensics for Automatic Repair Validation. 136-151 - Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo:
Return Value Predictability Profiles for Self-healing. 152-166
Privacy Protection and Contents Protection
- Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen:
Involuntary Information Leakage in Social Network Services. 167-183 - Koji Chida, Katsumi Takahashi:
Privacy Preserving Computations without Public Key Cryptographic Operation. 184-200 - Cyril Bazin, Jean-Marie Le Bars, Jacques Madelaine:
A Novel Framework for Watermarking: The Data-Abstracted Approach. 201-217
Invited Talk
- Alfred Menezes:
The Elliptic Curve Discrete Logarithm Problem: State of the Art. 218
Authentication and Access Control
- Julien Bringer, Hervé Chabanne, David Pointcheval, Sébastien Zimmer:
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication. 219-230 - Anongporn Salaiwarakul, Mark Ryan:
Analysis of a Biometric Authentication Protocol for Signature Creation Application. 231-245 - Dong Chan An, So Mi Park, Seog Park:
Efficient Secure Labeling Method under Dynamic XML Data Streams. 246-260
Implementation
- Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda:
Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems. 261-278 - Matthew Cary, Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan:
The Long-Short-Key Primitive and Its Applications to Key Security. 279-297
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.