A Group Key Agreement Scheme Revisited (English)
- New search for: Cao, Zhengjun
- New search for: Liu, Lihua
- New search for: Cao, Zhengjun
- New search for: Liu, Lihua
-
ISBN:
- Conference paper / Electronic Resource
-
Title:A Group Key Agreement Scheme Revisited
-
Contributors:Cao, Zhengjun ( author ) / Liu, Lihua ( author )
-
Published in:
-
Publisher:
- New search for: IEEE
-
Publication date:2008-09-01
-
Size:193389 byte
-
ISBN:
-
DOI:
-
Type of media:Conference paper
-
Type of material:Electronic Resource
-
Language:English
-
Source:
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
A Formal Comparison of the Bell & LaPadula and RBAC ModelsHabib, Lionel / Jaume, Mathieu / Morisset, Charles et al. | 2008
- 9
-
Threshold Proxy Signature Scheme with Strong Real-Time EfficiencyWang, Xiaoming / Chen, Huoyan et al. | 2008
- 15
-
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card PaymentXiao, Hannan / Christianson, Bruce / Zhang, Ying et al. | 2008
- 21
-
Comparison and Evaluation of Identity Management in Three Architectures for Virtual OrganizationsHaidar, Ali N. / Abdallah, Ali E. et al. | 2008
- 27
-
Speaker Identification by Multi-Frame Generative ModelsImpedovo, Donato / Refice, Mario et al. | 2008
- 33
-
Integrating Delegation with the Formal Core RBAC ModelAbdallah, Ali E. / Takabi, Hassan et al. | 2008
- 37
-
Security Analysis of Temporal-RBAC Using Timed AutomataMondal, Samrat / Sural, Shamik et al. | 2008
- 43
-
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor NetworkLim, Shu Yun / Lim, Meng-Hui / Lee, Sang Gon / Lee, Hoon Jae et al. | 2008
- 50
-
PHAL-256 – Parameterized Hash AlgorithmRodwald, P. / Stoklosa, J. et al. | 2008
- 56
-
Steganography in TextilesShirali-Shahreza, Sajad / Shirali-Shahreza, Mohammad et al. | 2008
- 62
-
Persian/Arabic Unicode Text SteganographyShirali-Shahreza, Mohammad / Shirali-Shahreza, Sajad et al. | 2008
- 67
-
Efficient Hierarchical Group-Oriented Key Establishment and DecryptionEskeland, Sigurd / Oleshchuk, Vladimir et al. | 2008
- 73
-
Forward-Secure Proxy Signature Scheme for Multiple Proxy Signers Using Bellare-Miner Scheme with Proxy RevocationSunitha, N.R. / Amberker, B.B. et al. | 2008
- 79
-
Data Hiding in Non-Expansion Visual Cryptography Based on Edge Enhancement MultitoningLuo, Hao / Yu, Faxin / Pan, Jeng-Shyang et al. | 2008
- 83
-
Skin Segmentation Using Color Distance Map and Water-Flow PropertyAbdullah-Al-Wadud, M. / Chae, Oksam et al. | 2008
- 89
-
An Implementation Infrastructure for Server-Passive Timed-Release CryptographyChalkias, Konstantinos / Baldimtsi, Foteini / Hristu-Varsakelis, Dimitrios / Stephanides, George et al. | 2008
- 95
-
A Group Key Agreement Scheme RevisitedCao, Zhengjun / Liu, Lihua et al. | 2008
- 99
-
Secure E-Passport Protocol Using Elliptic Curve Diffie-Hellman Key Agreement ProtocolAbid, Mohamed / Afifi, Hossam et al. | 2008
- 103
-
A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of SpeechKhan, Liaqat Ali / Baig, Muhammad Shamim et al. | 2008
- 108
-
Dynamic Substitution ModelEl-Fotouh, Mohamed Abo / Diepold, Klaus et al. | 2008
- 115
-
Data Fusion Assurance for the Kalman Filter in Uncertain NetworksZhu, Bonnie / Sastry, Shankar et al. | 2008
- 120
-
A Time and Storage Efficient Solution to Remote File Integrity CheckAV, Sarad / K, Sankar / M, Vipin et al. | 2008
- 126
-
A New Narrow Block Mode of Operations for Disk EncryptionEl-Fotouh, Mohamed Abo / Diepold, Klaus et al. | 2008
- 132
-
Provenance Tracking with Bit VectorsGadang, Siddharta S. / Panda, Brajendra / Hoag, Joseph E. et al. | 2008
- 141
-
Impact of Cheating and Non-Cooperation on the Stability and the Performances of Application-Level Multicast SessionsAlkubeily, Mothanna / Bettahar, Hatem / Bouabdallah, Abdelmadjid et al. | 2008
- 147
-
ACML: Capability Based Attack Modeling LanguagePandey, Navneet Kumar / Gupta, S.K. / Leekha, Shaveta / Zhou, Jingmin et al. | 2008
- 155
-
Realistic Threats to Self-Enforcing PrivacyBella, Giampaolo / Librizzi, Francesco / Riccobene, Salvatore et al. | 2008
- 161
-
Operator-Centric and Adaptive Intrusion DetectionLarson, Ulf E. / Lindskog, Stefan / Nilsson, Dennis K. / Jonsson, Erland et al. | 2008
- 167
-
A Queuing Theory Based Model for Studying Intrusion Evolution and Elimination in Computer NetworksKammas, Pantelis / Komninos, Thodoros / Stamatiou, Yannis C. et al. | 2008
- 172
-
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection SystemsSnasel, Vaclav / Platos, Jan / Kromer, Pavel / Abraham, Ajith et al. | 2008
- 180
-
Ensemble of One-Class Classifiers for Network Intrusion Detection SystemZainal, Anazida / Maarof, Mohd Aizaini / Shamsuddin, Siti Mariyam / Abraham, Ajith et al. | 2008
- 186
-
Web Application Attack Prevention for Tiered Internet ServicesNanda, Susanta / Lam, Lap-Chung / Chiueh, Tzi-Cker et al. | 2008
- 192
-
LoSS Detection Approach Based on ESOSS and ASOSS ModelsRohani, Mohd Fo'ad / Maarof, Mohd Aizaini / Selamat, Ali / Kettani, Houssain et al. | 2008
- 198
-
COTraSE: Connection Oriented Traceback in Switched EthernetAndreou, Marios S. / Moorsel, Aad van et al. | 2008
- 205
-
Improving the Efficiency of Misuse Detection by Means of the q-gram DistancePetrovic, Slobodan / Bakke, Sverre et al. | 2008
- 209
-
An Efficient Approach to Minimum-Cost Network Hardening Using Attack GraphsChen, Feng / Wang, Lingyu / Su, Jinshu et al. | 2008
- 215
-
Developing a Security Typed Java ServletHassan, Doaa / Kassas, Sherif El- / Ziedan, Ibrahim et al. | 2008
- 221
-
Designing a DRM SystemFrattolillo, Franco / Landolfi, Federica et al. | 2008
- 227
-
Challenges for Security Typed Web Scripting Languages DesignHassan, Doaa / Kassas, Sherif El- / Ziedan, Ibrahim et al. | 2008
- 231
-
Systematic Website Verification for Privacy ProtectionJeoung, Ji-Hee / Shin, Eun-Ji / Hong, Seng-Phil / Kim, Sung-Hoon / Kim, In-Ho / Lee, Min-Woo et al. | 2008
- 237
-
Abusing SIP AuthenticationAbdelnur, Humberto / Avanesov, Tigran / Rusinowitch, Michael / State, Radu et al. | 2008
- 243
-
A Friend Mechanism for Mobile Ad Hoc NetworksRazak, Shukor Abd / Samian, Normalia / Maarof, Mohd Aizaini et al. | 2008
- 249
-
A Composite Network Security AssessmentKondakci, Suleyman et al. | 2008
- 255
-
Managing Reputation over MANETsBella, G. / Costantino, G. / Riccobene, S. et al. | 2008
- 261
-
Network Level Privacy for Wireless Sensor NetworksShaikh, Riaz Ahmed / Jameel, Hassan / d'Auriol, Brian J. / Lee, Sungyoung / Song, Young-Jae / Lee, Heejo et al. | 2008
- 267
-
A Device Management Framework for Secure Ubiquitous Service DeliveryLeung, Adrian / Mitchell, Chris J. et al. | 2008
- 275
-
Automatic Verification of Simulatability in Security ProtocolsAraragi, Tadashi / Pereira, Olivier et al. | 2008
- 281
-
A New Secure Binding Management Protocol for Mobile IPv6 NetworksElshakankiry, Osama / Carpenter, Andy / Zhang, Ning et al. | 2008
- 287
-
Geolocation-Based Trust for Vanet's PrivacySerna, Jetzabel / Luna, Jesus / Medina, Manel et al. | 2008
- 291
-
An Automated Validation Method for Security Policies: The Firewall CaseAbassi, Ryma / Fatmi, Sihem Guemara El et al. | 2008
- 295
-
Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car EnvironmentHoppe, Tobias / Kiltz, Stefan / Dittmann, Jana et al. | 2008
- 299
-
Semantics-Driven Introspection in a Virtual EnvironmentTamberi, Francesco / Maggiari, Dario / Sgandurra, Daniele / Baiardi, Fabrizio et al. | 2008
- 305
-
Information Assurance in Critical Infrastructures via Wireless Sensor NetworksAlbano, Michele / Chessa, Stefano / Pietro, Roberto Di et al. | 2008
- 311
-
A Model for the Study of Privacy Issues in Secure Shell ConnectionsDusi, Maurizio / Gringoli, Francesco / Salgarelli, Luca et al. | 2008
- 318
-
IRC Traffic Analysis for Botnet DetectionMazzariello, Claudio et al. | 2008
- 327
-
Key Distribution Using Dual Quantum ChannelsJin, Di / Verma, Pramode / Kartalopoulos, Stamatios et al. | 2008
- 333
-
Quantum Key Distribution Based on Multi-qubit Hadamard MatricesHuang, Dazu / Chen, Zhigang et al. | 2008
- 338
-
Chaotic Quantum CryptographyKartalopoulos, Stamatios V. et al. | 2008
- 343
-
Author index| 2008
- 346
-
Roster Page| 2008
- C1
-
Cover Art| 2008
- i
-
Title Page i| 2008
- iii
-
Title Page iii| 2008
- iv
-
Copyright Page| 2008
- ix
-
Message from General Chair(s)| 2008
- v
-
Table of Contents| 2008
- xi
-
Committee Lists| 2008
- xiii
-
Plenary Abstracts| 2008