|
|
Current Topics in Information Security (HS 2007): Papers
- Operational Semantics of Security Protocols
Cas Cremers and Sjouke Mauw
In Scenarios: models, transformations and tools, international workshop, Dagstuhl castle, Germany, september 7-12, 2003, revised selected papers LNCS, Vol. 3466, Springer, 2005 [pdf]
- Distance-Bounding Protocols [responsible: Patrick Schaller]
Stefan Brands and David Chaum
In Advances in Cryptology - EUROCRYPT '93, LNCS 763, Springer, 1993 [link]
- Enforceable Security Policies
Fred Schneider
ACM Transactions on Information and System Security, Vol. 3, No. 1, Feb 2000 [pdf]
- Model checking SPKI/SDSI
Somesh Jha and Thomas Reps
Journal of Computer Security, vol.12, no. 3-4, pp. 317-353, 2004 [pdf]
- Remote Timing Attacks are Practical
David Brumley and Dan Boneh
In proceedings of the 12th Usenix Security Symposium, 2003 [link]
- Hot or Not: Revealing Hidden Services by their Clock Skew
Steven J. Murdoch
In Proceedings of the ACM CCS Conference 2006. [pdf]
- Cat and Mouse: Content Delivery Tradeoffs in Web Access
Balachander Krishnamurthy and Craig Wills
In Proceedings of WWW 2006. [pdf]
- Fast and Automated Generation of Attack Signatures: A Basis for Building SelfProtecting Servers
Zhenkai Liang and R. Sekar
In Proceedings of the ACM CCS Conference 2005. [pdf]
- Practical Private Computation of Vector Addition-Based Functions or: Can Privacy be for Free?
John Canny and Yitao Duan
Technical Report No. UCB/EECS-2006-12, University of California at Berkeley [pdf]
- How to 0wn the Internet in Your Spare Time
Stuart Staniford, Vern Paxsony, and Nicholas Weaver
In Proceedings of the 11th USENIX Security Symposium 2002 [pdf]
- Vigilante: End-to-End Containment of Internet Worms
Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, and Paul Barham
In Proceedings of the 20th ACM symposium on Operating Systems Principles 2005 [pdf]
Cryptography: Hash Functions [Dominik Raub]
- Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
Antoine Joux
In CRYPTO 2004, LNCS, Vol. 3152, pp. 306-316, Springer Verlag, 2004. [pdf]
- Second Preimages on n-Bit Hash Functions for Much Less than 2^n Work
John Kelsey and Bruce Schneier
In EUROCRYPT 2005, LNCS, Vol. 3494, pp. 474-490, Springer Verlag, 2005. [pdf]
- Herding Hash Functions and the Nostradamus Attack
John Kelsey and Tadayoshi Kohno
In EUROCRYPT 2006, LNCS, Vol. 4004, pp. 183-200, Springer Verlag, 2006. [pdf]
Cryptography: Human-Centric Protocols [Dominik Raub]
- Visual cryptography
Moni Naor and Adi Shamir
In EUROCRYPT 1994, LNCS, Vol. 950, pp. 1-12, Springer Verlag, 1995. [ps]
- Polling With Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
Tal Moran and Moni Naor
In EUROCRYPT 2006, LNCS, Vol. 4004, pp. 88-108, Springer Verlag, 2006. [pdf]
- Secure multiparty computations without computers
Valtteri Niemi and Ari Renvall
In Theoretical Computer Science, Vol. 191, pp. 173-183, Elsevier, 1998. [ps.gz]
- Diffie Helman Key Distribution Extended to Group Communication [PDF]
Michael Steiner, Gene Tsudik and Michael Waidner
In Proceedings of the ACM Conference on Computer and Communications Security, 1996.
- Key Agreement in Peer-to-Peer Wireless Networks [PDF]
Mario Cagalj, Srdjan Capkun, Jean Pierre Hubaux
In Proceedings of the IEEE (Special Issue on Cryptography and Security), 2006.
- The TESLA Broadcast Authentication Protocol [PDF]
Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Song
In Cryptobytes, Volume 5, No. 2, pp. 2--13, 2002.
- Crowds: Anonymity for Web Transactions [PDF]
Michael K. Reiter
In ACM Transactions on Information and System Security, 1997.
- The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks [PDF]
Wenyuan Xu, Wade Trappe, Yanyong Zhang, Timothy Wood
In Proceedings of MobiHoc, 2005.
- Cryptographic Processors-a survey [PDF]
Ross Anderson and Markus Kuhn
R. Anderson, M. Bond, J. Clulow and S. Skorobogatov
In Proceedings of the IEEE,, Vol. 94, No. 2. (2006), pp. 357-369, 2006.
Wichtiger Hinweis:
Diese Website wird in älteren Versionen von Netscape ohne
graphische Elemente dargestellt. Die Funktionalität der
Website ist aber trotzdem gewährleistet. Wenn Sie diese
Website regelmässig benutzen, empfehlen wir Ihnen, auf
Ihrem Computer einen aktuellen Browser zu installieren. Weitere
Informationen finden Sie auf
folgender
Seite.
Important Note:
The content in this site is accessible to any browser or
Internet device, however, some graphics will display correctly
only in the newer versions of Netscape. To get the most out of
our site we suggest you upgrade to a newer browser.
More
information