8. ISC 2005:
Singapore
Jianying Zhou, Javier Lopez, Robert H. Deng, Feng Bao (Eds.):
Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings.
Lecture Notes in Computer Science 3650 Springer 2005, ISBN 3-540-29001-X
Network Security I
Trust & Privacy
Key Management & Protocols
Public Key Encryption & Signature
Network Security II
Signcryption
Crypto Algorithm & Analysis
Cryptography
- Chi-Ming Hu, Wen-Guey Tzeng:
Compatible Ideal Contrast Visual Cryptography Schemes with Reversing.
300-313
- Helger Lipmaa:
An Oblivious Transfer Protocol with Log-Squared Communication.
314-328
Applications
Software Security
Authorization & Access Control
- Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, Peter Rutenbar:
Device-Enabled Authorization in the Grey-System.
431-445
- Nan Zhang, Mark Ryan, Dimitar P. Guelev:
Evaluating Access Control Policies Through Model Checking.
446-460
- Yibing Kong, Jennifer Seberry, Janusz R. Getta, Ping Yu:
A Cryptographic Solution for General Access Control.
461-473
Student Papers
Copyright © Fri Mar 12 17:17:31 2010
by Michael Ley (ley@uni-trier.de)