default search action
WISA 2011: Jeju Island, Korea
- Souhwan Jung, Moti Yung:
Information Security Applications - 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers. Lecture Notes in Computer Science 7115, Springer 2012, ISBN 978-3-642-27889-1 - Gautham Sekar, Bart Preneel:
Practical Attacks on a Cryptosystem Proposed in Patent WO/2009/066313. 1-12 - Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto:
Generalized Security Analysis of the Random Key Bits Leakage Attack. 13-27 - Yanjun Li, Wenling Wu, Lei Zhang:
Improved Integral Attacks on Reduced-Round CLEFIA Block Cipher. 28-39 - Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama:
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward. 40-54 - Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-Key Distinguisher on Round-Reduced 3D Block Cipher. 55-69 - Woomyo Lee, Jae Woo Seo, Pil Joong Lee:
Identity-Based Signcryption from Identity-Based Cryptography. 70-83 - Dae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, Sung Je Hong:
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts. 84-97 - Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda:
Solving a DLP with Auxiliary Input with the ρ-Algorithm. 98-108 - Yanbin Pan, Yingpu Deng:
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems. 109-120 - Tatsuyuki Matsushita, Shinji Yamanaka, Fangming Zhao:
A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage. 121-135 - Boojoong Kang, Hye Seon Kim, Ji Su Yang, Eul Gyu Im:
Rule Indexing for Efficient Intrusion Detection Systems. 136-141 - Chung-Hyo Kim, Moon-Seok Choi, Seongho Ju, Yong-Hun Lim, Jong-mock Baek:
Security Data Extraction from IEC 61850 ACSI Models for Network and System Management. 142-150 - Insung Hong, Jinsung Byun, Sehyun Park:
Lightweight Middleware-Based ZigBee Security in Building Energy Management System. 151-156 - Yingjun Zhang, Yang Zhang, Kai Chen:
A Map-Layer-Based Access Control Model. 157-170 - Go Ohtake, Kazuto Ogawa:
Application Authentication for Hybrid Services of Broadcasting and Communications Networks. 171-186 - Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura:
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols. 187-202 - Kwantae Cho, Dong Hoon Lee:
Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks. 203-218 - Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon:
Mutual Private Set Intersection with Linear Complexity. 219-231 - Chung Il Sun, Tae Ho Cho:
Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs. 232-241 - Jarno Salonen:
Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation. 242-255 - Islam Hegazy, Reihaneh Safavi-Naini, Carey Williamson:
Exploiting Routing Tree Construction in CTP. 256-270
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.