default search action
WISA 2009: Busan, Korea
- Heung Youl Youm, Moti Yung:
Information Security Applications, 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5932, Springer 2009, ISBN 978-3-642-10837-2
Multimedia Security
- Hyeokchan Kwon, Yong-Hyuk Moon, Jaehoon Nah, Dongil Seo:
Protecting IPTV Service Network against Malicious Rendezvous Point. 1-9 - KyoungHee Ko, Hwankuk Kim, JeongWook Kim, Chang-Yong Lee, Soo-Gil Cha, Hyun-Cheol Jeong:
Design and Implementation of SIP-aware Security Management System. 10-19
Device Security
- Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Application Management Framework in User Centric Smart Card Ownership Model. 20-35 - Gildas Avoine, Cédric Lauradoux, Tania Martin:
When Compromised Readers Meet RFID. 36-50
HW Implementation Security
- Marcel Medwed, Jörn-Marc Schmidt:
Coding Schemes for Arithmetic and Logic Operations - How Robust Are They? 51-65 - Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Akashi Satoh:
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. 66-78 - Timo Kasper, David F. Oswald, Christof Paar:
EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment. 79-93
Applied Cryptography
- Pairat Thorncharoensri, Willy Susilo, Yi Mu:
Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles. 94-108 - Shaojing Fu, Longjiang Qu, Chao Li:
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity. 109-117 - Kun Peng, Feng Bao:
Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and ZK Privacy. 118-132 - Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen:
ID-Based Adaptive Oblivious Transfer. 133-147
Side Channel Attacks
- Neil Hanley, Michael Tunstall, William P. Marnane:
Unknown Plaintext Template Attacks. 148-162 - Thomas Plos, Michael Hutter, Martin Feldhofer:
On Comparing Side-Channel Preprocessing Techniques for Attacking RFID Devices. 163-177 - Jing Pan, J. I. den Hartog, Jiqiang Lu:
You Cannot Hide behind the Mask: Power Analysis on a Provably Secure S-Box Implementation. 178-192 - Amir Moradi, Nima Mousavi, Christof Paar, Mahmoud Salmasizadeh:
A Comparative Study of Mutual Information Analysis under a Gaussian Assumption. 193-205
Cryptograptanalysis
- Nicky Mouha, Christophe De Cannière, Sebastiaan Indesteege, Bart Preneel:
Finding Collisions for a 45-Step Simplified HAS-V. 206-225 - Kahraman D. Akdemir, Ghaith Hammouri, Berk Sunar:
Non-linear Error Detection for Finite State Machines. 226-238 - Jia Xie, Weiwei Cao, TianZe Wang:
Quadratic Equations from a Kind of S-boxes. 239-253 - Weiwei Cao, Lei Hu:
Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure. 254-267
Anonymity/Authentication/Access Control
- Rasheed Hussain, Sangjin Kim, Heekuck Oh:
Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in VANET. 268-280 - Keita Emura, Atsuko Miyaji, Kazumasa Omote:
A Selectable k-Times Relaxed Anonymous Authentication Scheme. 281-295 - Heike Busch, Stefan Katzenbeisser, Paul Baecher:
PUF-Based Authentication Protocols - Revisited. 296-308 - Luan Ibraimi, Milan Petkovic, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. 309-323
Network Security
- Mark Manulis:
Securing Remote Access Inside Wireless Mesh Networks. 324-338 - Dae Hyun Yum, Sun Young Kim, Ho-Kun Moon, Mi-Yeon Kim, Jae-Hoon Roh, Pil Joong Lee:
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. 339-353 - Mijoo Kim, Miyeon Yoon, Hyun Cheol Jeong, Heung Youl Youm:
USN Middleware Security Model. 354-365 - Chae Hoon Lim:
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs. 366-383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.