3. ASIACCS 2008:
Tokyo,
Japan
Masayuki Abe, Virgil D. Gligor (Eds.):
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008.
ACM 2008, ISBN 978-1-59593-979-1
Invited talk
- Gene Tsudik:
Confronting a mobile adversary in unattended sensor networks.
1
- Tsutomu Matsumoto:
Prototyping security test objects for use with advanced biometric authentication systems.
2
Hash and MAC
Side channel attacks
Block cipher
Formal verification
Secure implementation
Network security (I)
Network security (II)
- Bryan Parno, Adrian Perrig, Dave Andersen:
SNAPP: stateless network-authenticated path pinning.
168-178
- Liming Lu, Mun Choon Chan, Ee-Chien Chang:
A general model of probabilistic packet marking for IP traceback.
179-188
- Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux:
Secure neighbor discovery in wireless networks: formal investigation of possibility.
189-200
- Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe:
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks.
201-204
Access control
Key exchange
RFID security
Protocols
Digital signatures (I)
Digital signatures (II)
- Di Ma:
Practical forward secure sequential aggregate signatures.
341-352
- Stuart Haber, Yasuo Hatano, Yoshinori Honda, William G. Horne, Kunihiko Miyazaki, Tomas Sander, Satoru Tezoku, Danfeng Yao:
Efficient signature schemes supporting redaction, pseudonymization, and data deidentification.
353-362
- Fangguo Zhang, Xiaofeng Chen, Baodian Wei:
Efficient designated confirmer signature from bilinear pairings.
363-368
- Manuel Barbosa, Pooya Farshim:
Certificateless signcryption.
369-372
Identity based encryption
Copyright © Sun Mar 14 22:57:22 2010
by Michael Ley (ley@uni-trier.de)