1 | -- | 2 | Bart Preneel, Jongsung Kim, Damien Sauveron. Advanced theory and practice for cryptography and future security |
3 | -- | 11 | Hyoung Joong Kim, Soomin Lim, Jongsub Moon, Boram Kim, Eui S. Jung. A photographic forensic case study: Myths, principles and techniques |
12 | -- | 18 | Leyou Zhang, Yupu Hu, Qing Wu. Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups |
19 | -- | 25 | Jianjie Zhao, Dawu Gu, Yali Li, Wei Cheng. On weaknesses of the HDCP authentication and key exchange protocol and its repair |
26 | -- | 34 | Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong. Differential fault analysis on block cipher SEED |
35 | -- | 44 | Chun-Ta Li, Cheng-Chi Lee. A novel user authentication and privacy preserving scheme with smart cards for wireless communications |
45 | -- | 57 | Jangseong Kim, Kwangjo Kim, Jong Hyuk Park, Taeshik Shon. A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment |
58 | -- | 68 | Inyong Lee, Soonki Jeong, Sangsoo Yeo, Jongsub Moon. A novel method for SQL injection attack detection based on removing SQL query attribute values |
69 | -- | 79 | JingZheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving performance of network covert timing channel through Huffman coding |
80 | -- | 86 | Lansheng Han, Cai Fu, Deqing Zou, Changhoon Lee, Wenjing Jia. Task-based behavior detection of illegal codes |
87 | -- | 96 | Xiaopu Ma, Ruixuan Li, Zhengding Lu, Wei Wang. Mining constraints in role-based access control |
97 | -- | 101 | Zhiwei Wang. A new construction of the server-aided verification signature scheme |
102 | -- | 112 | Nianhua Yang, Huiqun Yu, Zhilin Qian, Hua Sun. Modeling and quantitatively predicting software security based on stochastic Petri nets |
113 | -- | 122 | Chanil Park, Junbeom Hur, Seongoun Hwang, Hyunsoo Yoon. Authenticated public key broadcast encryption scheme secure against insiders' attack |
123 | -- | 133 | Ding Lin, Guan Jie. Related key chosen IV attacks on Decim v2 and Decim-128 |
134 | -- | 141 | Jong Sik Moon, Im-Yeong Lee. Authentication protocol using an identifier in an ad hoc network environment |
142 | -- | 150 | Shaojing Fu, Chao Li, Longjiang Qu, Deshuai Dong. On the number of rotation symmetric functions over GF(p) |
151 | -- | 160 | Sungsu Lim, Byeongyeong Yoo, Jungheum Park, KeunDuck Byun, Sangjin Lee. A research on the investigation method of digital forensics for a VMware Workstation's virtual machine |
161 | -- | 169 | R. Padmavathy, Chakravarthy Bhagvati. Discrete logarithm problem using index calculus method |
170 | -- | 187 | Jong-Hyouk Lee, Jiefeng (Terence) Chen, Thierry Ernst. Securing mobile network prefix provisioning for NEMO based vehicular networks |
188 | -- | 197 | Dan Feng, Junjian Chen, Jingning Liu, Zhikun Wang. BLESS: Object level encryption security for object-based storage system |
198 | -- | 213 | Fei Wang 0007, Hailong Wang, Xiaofeng Wang, Jinshu Su. A new multistage approach to detect subtle DDoS attacks |
214 | -- | 222 | Hyeran Mun, Kyusuk Han, Yang-Sun Lee, Chan Yeob Yeun, Hyo Hyun Choi. Enhanced secure anonymous authentication scheme for roaming service in global mobility networks |
223 | -- | 240 | Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee, Sangjin Lee. On-the-spot digital investigation by means of LDFS: Live Data Forensic System |
241 | -- | 255 | Peidong Zhu, Huayang Cao, Laurence Laurence Yang, Kan Chen. AS Alliance based security enhancement for inter-domain routing protocol |
256 | -- | 267 | Ihor Vasyltsov, Gökay Saldamli. Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography |