default search action
9th ISPEC 2013: Lanzhou, China
- Robert H. Deng, Tao Feng:
Information Security Practice and Experience - 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings. Lecture Notes in Computer Science 7863, Springer 2013, ISBN 978-3-642-38032-7
Network Security
- Yuxin Meng, Lam-for Kwok:
Enhancing False Alarm Reduction Using Pool-Based Active Learning in Network Intrusion Detection. 1-15 - Stefan Kraxberger, Ronald Toegl, Martin Pirker, Elisa Pintado Guijarro, Guillermo Garcia Millan:
Trusted Identity Management for Overlay Networks. 16-30 - Mixia Liu, Tao Feng, Paul Smith, David Hutchison:
Situational Awareness for Improving Network Resilience Management. 31-43 - Yuling Liu, Dengguo Feng, Yifeng Lian, Kai Chen, Yingjun Zhang:
Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model. 44-59
Identity-Based Cryptography
- Hao Xiong, Tsz Hon Yuen, Cong Zhang, Yi Jun He, Siu-Ming Yiu:
Attribute Specified Identity-Based Encryption. 60-74 - Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. 75-90 - Kefeng Wang, Yi Mu, Willy Susilo:
Identity-Based Multisignature with Message Recovery. 91-104 - Dingding Jia, Bao Li, Yamin Liu, Qixiang Mei:
Improving the Message-Ciphertext Rate of Lewko's Fully Secure IBE Scheme. 105-116
Cryptographic Primitives
- Junzuo Lai, Xuhua Ding, Yongdong Wu:
Accountable Trapdoor Sanitizable Signatures. 117-131 - Kaitai Liang, Qiong Huang, Roman Schlegel, Duncan S. Wong, Chunming Tang:
A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release. 132-146 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
About Hash into Montgomery Form Elliptic Curves. 147-159 - Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Joint Triple-Base Number System for Multi-Scalar Multiplication. 160-173
Security Protocols
- Divyan Munirathnam Konidala, Robert H. Deng, Yingjiu Li, Hoong Chuin Lau, Stephen E. Fienberg:
Anonymous Authentication of Visitors for Mobile Crowd Sensing at Amusement Parks. 174-188 - Nan Li, Yi Mu, Willy Susilo, Vijay Varadharajan:
Secure RFID Ownership Transfer Protocols. 189-203 - Guomin Yang, Yi Mu, Willy Susilo, Duncan S. Wong:
Leakage Resilient Authenticated Key Exchange Secure in the Auxiliary Input Model. 204-217 - Lucjan Hanzlik, Lukasz Krzywiecki, Miroslaw Kutylowski:
Simplified PACE|AA Protocol. 218-232
System Security
- Xiaofan Liu, Natasha Alechina, Brian Logan:
Expressing User Access Authorization Exceptions in Conventional Role-Based Access Control. 233-247 - Shichao Jin, Okhee Kim, Tieming Chen:
Efficient Attack Detection Based on a Compressed Model. 248-262 - Jungin Kang, Sangwook Lee, Heejo Lee:
A Digital Forensic Framework for Automated User Activity Reconstruction. 263-277 - Jairo Serrano, Eduardo César, Elisa Heymann, Barton P. Miller:
Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware. 278-294
Software Security DRM
- Yingjun Zhang, Kai Chen, Yifeng Lian:
VulLocator: Automatically Locating Vulnerable Code in Binary Programs. 295-308 - Vivek Balachandran, Sabu Emmanuel:
Software Protection with Obfuscation and Encryption. 309-320 - Dheerendra Mishra, Sourav Mukhopadhyay:
Secure Content Delivery in DRM System with Consumer Privacy. 321-335
Cryptanalysis and Side Channel Attacks
- Hui Zhao, Yongbin Zhou, François-Xavier Standaert, Hailong Zhang:
Systematic Construction and Comprehensive Evaluation of Kolmogorov-Smirnov Test Based Side-Channel Distinguishers. 336-352 - Peng Wang, Wenling Wu, Liting Zhang:
Cryptanalysis of the OKH Authenticated Encryption Scheme. 353-360 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld:
Security Evaluation of Rakaposhi Stream Cipher. 361-371 - Ling Song, Lei Hu:
Improved Algebraic and Differential Fault Attacks on the KATAN Block Cipher. 372-386
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.