![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
6. IWSEC 2011: Tokyo, Japan
- Tetsu Iwata, Masakatsu Nishigaki:
Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings. Lecture Notes in Computer Science 7038, Springer 2011, ISBN 978-3-642-25140-5
Software Protection and Reliability
- Minoru Kuribayashi
:
A New Soft Decision Tracing Algorithm for Binary Fingerprinting Codes. 1-15 - Georgios Portokalidis, Angelos D. Keromytis:
REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points. 16-32
Cryptographic Protocol
- Atsushi Fujioka:
Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique. 33-50 - Takuho Mitsunaga
, Yoshifumi Manabe, Tatsuaki Okamoto:
A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits. 51-64
Pairing and Identity-Based Signature
- Naoki Ogura, Naoki Kanayama, Shigenori Uchiyama, Eiji Okamoto:
Cryptographic Pairings Based on Elliptic Nets. 65-78 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity-Based Deterministic Signature Scheme without Forking-Lemma. 79-95
Malware Detection
- Jonas Pfoh, Christian A. Schneider, Claudia Eckert:
Nitro: Hardware-Based System Call Tracing for Virtual Machines. 96-112 - Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis:
Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking. 113-128 - Maryam Shojaei, Naser Movahhedinia, Behrouz Tork Ladani
:
An Entropy Based Approach for DDoS Attack Detection in IEEE 802.16 Based Networks. 129-143
Mathematical and Symmetric Cryptography
- Koji Nuida
, Takuro Abe, Shizuo Kaji
, Toshiaki Maeno, Yasuhide Numata:
A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators. 144-160 - Goutam Paul, Subhamoy Maitra, Shashwat Raizada:
A Theoretical Analysis of the Structure of HC-128. 161-177 - Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, Kazuo Ohta:
Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity. 178-192
Public Key Encryption
- Yusuke Sakai, Keita Emura
, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote:
Towards Restricting Plaintext Space in Public Key Encryption. 193-209 - Ryotaro Hayashi, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada:
Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption. 210-229
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.