Multi-domain Direct Anonymous Attestation Scheme from Pairings (English)
- New search for: Yang, L.
- New search for: Ma, J.
- New search for: Wang, W.
- New search for: Cao, C.
- New search for: Yang, L.
- New search for: Ma, J.
- New search for: Wang, W.
- New search for: Cao, C.
- New search for: Au, Man Ho
- New search for: Carminati, Barbara
- New search for: Kuo, C.-C Jay
In:
Network and system security: 8th international conference, NSS 2014, Xi' an, China, October 15-17, 2014, proceedings /
8792
;
566-574
;
2014
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Multi-domain Direct Anonymous Attestation Scheme from Pairings
-
Contributors:Yang, L. ( author ) / Ma, J. ( author ) / Wang, W. ( author ) / Cao, C. ( author ) / Au, Man Ho / Carminati, Barbara / Kuo, C.-C Jay
-
Conference:International conference; 8th, Network and system security: 8th international conference, NSS 2014, Xi' an, China, October 15-17, 2014, proceedings / ; 2014 ; Xi'an, China
-
Published in:Network and system security: 8th international conference, NSS 2014, Xi' an, China, October 15-17, 2014, proceedings / , 8792 ; 566-574LECTURE NOTES IN COMPUTER SCIENCE , 8792 ; 566-574
-
Publisher:
- New search for: Springer
-
Place of publication:Cham
-
Publication date:2014-01-01
-
Size:9 pages
-
Remarks:Includes bibliographical references and index. Also issued online.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
An Approach for the Automated Analysis of Network Access Controls in Cloud Computing InfrastructuresProbst, T. / Alata, E. / Kaaniche, M. / Nicomette, V. et al. | 2014
- 15
-
Adopting Provenance-Based Access Control in OpenStack Cloud IaaSNguyen, D. / Park, J. / Sandhu, R. et al. | 2014
- 28
-
Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud StorageYu, Y. / Mu, Y. / Ni, J. / Deng, J. / Huang, K. et al. | 2014
- 41
-
A Formal Model for Isolation Management in Cloud Infrastructure-as-a-ServiceBijon, K.Z. / Krishnan, R. / Sandhu, R. et al. | 2014
- 54
-
Extending OpenStack Access Control with Domain TrustTang, B. / Sandhu, R. et al. | 2014
- 70
-
Hierarchical Solution for Access Control and Authentication in Software Defined NetworksShuangyu, H. / Jianwei, L. / Jian, M. / Jie, C. et al. | 2014
- 82
-
A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud ComputingChen, Z. / Li, S. / Guo, Y. / Wang, Y. / Chu, Y. et al. | 2014
- 96
-
psOBJ: Defending against Traffic Analysis with pseudo-ObjectsTang, Y. / Lin, P. / Luo, Z. et al. | 2014
- 110
-
Universally Composable Secure TNC Protocol Based on IF-T Binding to TLSZhao, S. / Zhang, Q. / Qin, Y. / Feng, D. et al. | 2014
- 124
-
Revisiting Node Injection of P2P BotnetYan, J. / Ying, L. / Yang, Y. / Su, P. / Li, Q. / Kong, H. / Feng, D. et al. | 2014
- 138
-
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic ClassificationWu, D. / Chen, X. / Chen, C. / Zhang, J. / Xiang, Y. / Zhou, W. et al. | 2014
- 152
-
Exploiting the Hard-Wired Vulnerabilities of Newcast via Connectivity-Splitting AttackMuszynski, J. / Varrette, S. / Laredo, J.L.J. / Bouvry, P. et al. | 2014
- 166
-
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration TechniqueHao, Y. / Bai, D. / Li, L. et al. | 2014
- 184
-
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlockChen, J. / Futa, Y. / Miyaji, A. / Su, C. et al. | 2014
- 198
-
Cryptanalysis on the Authenticated Cipher SablierFeng, X. / Zhang, F. et al. | 2014
- 209
-
A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation TechniqueLi, Y. / Voos, H. / Rosich, A. / Darouach, M. et al. | 2014
- 223
-
Security Analysis and Improvement of Femtocell Access ControlChen, C.-M. / Wu, T.-Y. / Tso, R. / Wu, M.-E. et al. | 2014
- 233
-
Identity Based Threshold Ring Signature from LatticesWei, B. / Du, Y. / Zhang, H. / Zhang, F. / Tian, H. / Gao, C. et al. | 2014
- 246
-
Identity-Based Transitive SigncryptionHou, S. / Huang, X. / Xu, L. et al. | 2014
- 260
-
GO-ABE: Group-Oriented Attribute-Based EncryptionLi, M. / Huang, X. / Liu, J.K. / Xu, L. et al. | 2014
- 271
-
Jhanwar-Barua's Identity-Based Encryption RevisitedElashry, I. / Mu, Y. / Susilo, W. et al. | 2014
- 285
-
Lightweight Universally Composable Adaptive Oblivious TransferGuleria, V. / Dutta, R. et al. | 2014
- 299
-
Certificate-Based Conditional Proxy Re-EncryptionLi, J. / Zhao, X. / Zhang, Y. et al. | 2014
- 311
-
A Secure Obfuscator for Encrypted Blind Signature FunctionalityFeng, X. / Yuan, Z. et al. | 2014
- 323
-
Attribute-Based Signing Right DelegationLiu, W. / Mu, Y. / Yang, G. et al. | 2014
- 335
-
Countering Ballot Stuffing and Incorporating Eligibility Verifiability in HeliosSrinivasan, S. / Culnane, C. / Heather, J. / Schneider, S. / Xia, Z. et al. | 2014
- 349
-
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS ApplicationsLi, Y. / Zhang, Y. / Li, J. / Gu, D. et al. | 2014
- 363
-
Formal Verification of Finite State Transactional Security PolicyRajamanickam, N. / Nadarajan, R. / Elci, A. et al. | 2014
- 377
-
Fingerprint Indexing Based on Combination of Novel Minutiae Triplet FeaturesZhou, W. / Hu, J. / Wang, S. / Petersen, I. / Bennamoun, M. et al. | 2014
- 389
-
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolGunasinghe, H. / Bertino, E. et al. | 2014
- 409
-
A Dynamic Matching Secret Handshake Scheme without Random OraclesWen, Y. / Gong, Z. et al. | 2014
- 421
-
Formal Analysis of DAA-Related APIs in TPM 2.0Xi, L. / Feng, D. et al. | 2014
- 435
-
eCK Secure Single Round ID-Based Authenticated Key Exchange Protocols with Master Perfect Forward SecrecyPandit, T. / Barua, R. / Tripathy, S. et al. | 2014
- 448
-
Efficient Sub-/Inter-Group Key Distribution for ad hoc NetworksQin, B. / Wang, L. / Wang, Y. / Wu, Q. / Shi, W. / Liang, B. et al. | 2014
- 462
-
A Novel Hybrid Key Revocation Scheme for Wireless Sensor NetworksGe, M. / Choo, K.-K.R. et al. | 2014
- 476
-
Rational Secure Two-party Computation in Social CloudWang, Y. / Liu, Z. / Li, T. / Xu, Q. et al. | 2014
- 484
-
How to Evaluate Trust Using MMTToumi, K. / Mallouli, W. / de Oca, E.M. / Andres, C. / Cavalli, A. et al. | 2014
- 493
-
A Proposed Approach to Compound File Fragment IdentificationNguyen, K. / Tran, D. / Ma, W. / Sharma, D. et al. | 2014
- 501
-
Geo-Social-RBAC: A Location-Based Socially Aware Access Control FrameworkBaracaldo, N. / Palanisamy, B. / Joshi, J. et al. | 2014
- 510
-
A New Approach to Executable File Fragment Detection in Network ForensicsNguyen, K. / Tran, D. / Ma, W. / Sharma, D. et al. | 2014
- 518
-
Tighter Security Bound of MIBS Block Cipher against Differential AttackMa, X. / Hu, L. / Sun, S. / Qiao, K. / Shan, J. et al. | 2014
- 526
-
A New Multivariate Based Threshold Ring Signature SchemeZhang, J. / Zhao, Y. et al. | 2014
- 534
-
Capturing Android Malware Behaviour Using System Flow GraphAndriatsimandefitra, R. / Tong, V.V.T. et al. | 2014
- 542
-
Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LDXie, M. / Hu, J. / Yu, X. / Chang, E. et al. | 2014
- 550
-
A New Public Key Encryption with Equality TestHuang, K. / Tso, R. / Chen, Y.-C. / Li, W. / Sun, H.-M. et al. | 2014
- 558
-
A Probabilistic Algebraic Attack on the Grain Family of Stream CiphersDatta, P. / Roy, D. / Mukhopadhyay, S. et al. | 2014
- 566
-
Multi-domain Direct Anonymous Attestation Scheme from PairingsYang, L. / Ma, J. / Wang, W. / Cao, C. et al. | 2014