default search action
5. IWSEC 2010: Kobe, Japan
- Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki:
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings. Lecture Notes in Computer Science 6434, Springer 2010, ISBN 978-3-642-16824-6
Invited Talks
- Jaideep Vaidya:
Automating Security Configuration and Administration: An Access Control Perspective. 1-9 - Rainer Böhme:
Security Metrics and Security Investment Models. 10-24
Encryption
- Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta:
Publishing Upper Half of RSA Decryption Exponent. 25-39 - Yamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang:
PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples. 40-54 - Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta:
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model. 55-69 - Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama:
An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme. 70-83
Data and Web Security
- Marek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska:
Practical Universal Random Sampling. 84-100 - Lena Wiese:
Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints. 101-116 - Minoru Kuribayashi:
Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel. 117-132 - Fumiko Satoh, Naohiko Uramoto:
Validating Security Policy Conformance with WS-Security Requirements. 133-148
Protocols
- Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption. 149-163 - Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama:
Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage. 164-180 - Keita Emura, Goichiro Hanaoka, Yusuke Sakai:
Group Signature Implies PKE with Non-interactive Opening and Threshold PKE. 181-198
Network Security
- Tomonori Izumida, Kokichi Futatsugi, Akira Mori:
A Generic Binary Analysis Method for Malware. 199-216 - Carlos Miguel Tavares Calafate, Javier Campos, Marga Nácher, Pietro Manzoni, Juan-Carlos Cano:
A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs. 217-231 - Mansoor Alicherry, Angelos D. Keromytis:
Securing MANET Multicast Using DIPLOMA. 232-250
Block Cipher
- Kimmo Halunen, Juha Röning:
Preimage Attacks against Variants of Very Smooth Hash. 251-266 - Jun Yajima, Takeshi Shimoyama:
Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification. 267-284 - Thanh-Ha Le, Maël Berthier:
Mutual Information Analysis under the View of Higher-Order Statistics. 285-300 - Yu Sasaki:
Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter. 301-315
Implementation and Real Life Security
- Benjamin Justus, Daniel Loebenberger:
Differential Addition in Generalized Edwards Coordinates. 316-325 - Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi:
Efficient Implementation of Pairing on BREW Mobile Phones. 326-336 - Lasse Harjumaa, Ilkka Tervonen:
Introducing Mitigation Use Cases to Enhance the Scope of Test Cases. 337-353 - Margus Niitsoo:
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees. 354-370
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.