Sciweavers

ACISP
2006
Springer
14 years 4 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
ACISP
2006
Springer
14 years 4 months ago
Towards an Invisible Honeypot Monitoring System
Anh-Quynh Nguyen, Yoshiyasu Takefuji
ACISP
2006
Springer
14 years 4 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt
ACISP
2006
Springer
14 years 4 months ago
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys
Abstract. A security proof in the Bellare
Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria
ACISP
2006
Springer
14 years 4 months ago
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption
In this paper, we propose an efficient multi-receiver identity based signcryption scheme which only needs one pairing computation to signcrypt a message for n receivers and can pro...
Shanshan Duan, Zhenfu Cao
ACISP
2006
Springer
14 years 6 months ago
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant
Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie...
ACISP
2006
Springer
14 years 6 months ago
Distinguishing Attack on SOBER-128 with Linear Masking
Abstract. We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2−8.8 for the non-linear filter. The atta...
Joo Yeon Cho, Josef Pieprzyk
ACISP
2006
Springer
14 years 6 months ago
Cache Based Power Analysis Attacks on AES
Jacques J. A. Fournier, Michael Tunstall
ACISP
2006
Springer
14 years 6 months ago
Towards Provable Security for Ubiquitous Applications
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...
Mike Burmester, Tri Van Le, Breno de Medeiros