


default search action
ISPEC 2011: Guangzhou, China
- Feng Bao, Jian Weng:

Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings. Lecture Notes in Computer Science 6672, Springer 2011, ISBN 978-3-642-21030-3
Public Key Encryption
- Huafei Zhu:

Public-Key Encryptions Tolerating Adaptive and Composable Adversaries. 1-13 - Yamin Liu, Bao Li, Xianhui Lu, Xiaoying Jia:

Encryption Simulatability Reconsidered. 14-23 - Junzuo Lai, Robert H. Deng

, Yingjiu Li:
Fully Secure Cipertext-Policy Hiding CP-ABE. 24-39 - Yu Chen, Liqun Chen

, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. 40-54 - Song Luo, Yu Chen, Jian-bin Hu, Zhong Chen:

New Fully Secure Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. 55-70
Cloud Security
- Imad M. Abbadi:

Toward Trustworthy Clouds' Internet Scale Critical Infrastructure. 71-82 - Fangming Zhao, Takashi Nishide, Kouichi Sakurai:

Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. 83-97 - Jun-e Liu, Zhiguo Wan, Ming Gu:

Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing. 98-107
Security Applications
- Saeed Sedghi, Pieter H. Hartel

, Willem Jonker, Svetla Nikova:
Privacy Enhanced Access Control by Means of Policy Blinding. 108-122 - Yikai Wang, Yi Mu, Minjie Zhang

:
Policy-Based Authentication for Mobile Agents. 123-137 - Xuhua Zhou, Xuhua Ding

, Kefei Chen:
Lightweight Delegated Subset Test with Privacy Protection. 138-151
Post-quantum Cryptography and Side-Channel Attack
- Michael Rose, Thomas Plantard

, Willy Susilo
:
Improving BDD Cryptosystems in General Lattices. 152-167 - Weiwei Cao, Lei Hu, Jintai Ding

, Zhijun Yin:
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme. 168-180 - Guangdong Yang, Shaohua Tang, Li Yang:

A Novel Group Signature Scheme Based on MPKC. 181-195 - Jiye Liu, Yongbin Zhou, Yang Han, Jiantang Li, Shuguo Yang, Dengguo Feng:

How to Characterize Side-Channel Leakages More Accurately? 196-207
Block Ciphers and MACs
- Jorge Nakahara Jr.:

New Impossible Differential and Known-Key Distinguishers for the 3D Cipher. 208-221 - Yongzhuang Wei, Jiqiang Lu, Yupu Hu:

Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. 222-232 - Bo Liang, Wenling Wu, Liting Zhang:

BCBC: A More Efficient MAC Algorithm. 233-246 - Bozhong Liu, Zheng Gong, Weidong Qiu, Dong Zheng:

On the Security of 4-Bit Involutive S-Boxes for Lightweight Designs. 247-256
Signature, Secrete Sharing and Traitor Tracing
- Qiong Huang, Duncan S. Wong:

Short Convertible Undeniable Signature in the Standard Model. 257-272 - Mahabir Prasad Jhanwar

:
A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme. 273-287 - Chunli Lv, Xiaoqi Jia, Jingqiang Lin, Jiwu Jing, Lijun Tian:

An Efficient Group-Based Secret Sharing Scheme. 288-301 - Xingwen Zhao, Fangguo Zhang

:
Traitor Tracing against Public Collaboration. 302-316
System Security and Network Security
- Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:

Policy-Centric Protection of OS Kernel from Vulnerable Loadable Kernel Modules. 317-332 - Tristan Allard, Benjamin Nguyen, Philippe Pucheral:

Sanitizing Microdata without Leak: Combining Preventive and Curative Actions. 333-342 - Jonghoon Kwon

, Jehyun Lee, Heejo Lee:
Hidden Bot Detection by Tracing Non-human Generated Traffic at the Zombie Host. 343-361 - Quan Pham, Jason Reid, Ed Dawson

:
A Model for Constraint and Delegation Management. 362-371
Security Protocols
- Huafei Zhu:

Non-black-Box Computation of Linear Regression Protocols with Malicious Adversaries. 372-385 - An Wang, Zheng Li, Xianwen Yang, Yanyan Yu:

A New Security Proof of Practical Cryptographic Devices Based on Hardware, Software and Protocols. 386-400 - Ning Ding, Dawu Gu:

A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware. 401-416 - Jiaxin Pan

, Libin Wang, Changshe Ma:
Analysis and Improvement of an Authenticated Key Exchange Protocol. 417-431 - Lijun Zhang, Kunpeng Wang, Hong Wang, Dingfeng Ye:

Another Elliptic Curve Model for Faster Pairing Computation. 432-446

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














