default search action
WISA 2010: Jeju Island, Korea
- Yongwha Chung, Moti Yung:
Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6513, Springer 2011, ISBN 978-3-642-17954-9
Cryptosystem
- Sumit Kumar Pandey, Rana Barua:
Construction of Identity Based Signcryption Schemes. 1-14 - Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama:
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage. 15-30 - Wenpan Jing, Haixia Xu, Bao Li:
A New Efficient Construction for Non-Malleable Zero-Knowledge Sets. 31-43 - Takashi Nishide, Kouichi Sakurai:
Distributed Paillier Cryptosystem without Trusted Dealer. 44-60
Implementation
- Colin D. Walter:
Fast Scalar Multiplication for ECC over GF(p) Using Division Chains. 61-75 - Boufeldja Allailou, Abdelaziz Marjane, Abdellah Mokrane:
Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs. 76-91 - Erich Wenger, Martin Feldhofer, Norbert Felber:
Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices. 92-106 - Takehiko Amaki, Masanori Hashimoto, Yukio Mitsuyama, Takao Onoye:
A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling. 107-121
Mobile Security/Secure Coding
- Jean-Marie Kabasele-Tenday:
Using Special Use Cases for Security in the Software Development Life Cycle. 122-134 - Atsuko Miyaji, Kazumasa Omote:
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks. 135-149 - Jae-hoon Jang, Don-Gu Yeo, Dong-hee Lee, Heung-Youl Youm:
An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6. 150-159 - Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Hidden Credential Retrieval without Random Oracles. 160-174
Attack
- M. Abdelaziz Elaabid, Olivier Meynard, Sylvain Guilley, Jean-Luc Danger:
Combined Side-Channel Attacks. 175-190 - Hongying Liu, Guoyu Qian, Satoshi Goto, Yukiyasu Tsunoo:
Correlation Power Analysis Based on Switching Glitch Model. 191-205 - Nico Döttling, Dejan E. Lazich, Jörn Müller-Quade, Antonio Sobreira de Almeida:
Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity. 206-220 - Kehua Bao, Zhenfeng Zhang:
Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks. 221-233 - Bozhan Su, Wenling Wu, Lei Zhang, Yanjun Li:
Full-Round Differential Attack on TWIS Block Cipher. 234-242 - Jean-François Gallais, Ilya Kizhvatov, Michael Tunstall:
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations. 243-257 - Daisuke Nakatsu, Yang Li, Kazuo Sakiyama, Kazuo Ohta:
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis. 258-272
Biometrics
- Hansung Lee, Yunsu Chung, Jeongnyeo Kim, Daihee Park:
Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram. 273-280 - Changlong Jin, Shengzhe Li, Hakil Kim, Eunsoo Park:
Fingerprint Liveness Detection Based on Multiple Image Quality Features. 281-291 - Thi Hai Binh Nguyen, Van Huan Nguyen, Hakil Kim:
Robust Feature Extraction for Facial Image Quality Assessment. 292-306
Secure Protocol
- Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother. 307-321 - Kazuki Yoneyama:
Cross-Realm Password-Based Server Aided Key Exchange. 322-336 - Rafael Dowsley, Jeroen van de Graaf, Davidson Marques, Anderson C. A. Nascimento:
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product. 337-350
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.