Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. (English) Zbl 1136.68006

Lecture Notes in Computer Science 4176. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). xiv, 548 p. (2006).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1087.68008).
Indexed articles:
Danezis, George, Breaking four mix-related schemes based on universal re-encryption, 46-59 [Zbl 1156.94344]
Atzori, Maurizio, Weak \(k\)-anonymity: A low-distortion model for protecting privacy, 60-71 [Zbl 1156.94330]
Esponda, Fernando; Ackley, Elena S.; Helman, Paul; Jia, Haixia; Forrest, Stephanie, Protecting data privacy through hard-to-reverse negative databases, 72-84 [Zbl 1138.68407]
Lu, Jiqiang; Kim, Jongsung; Keller, Nathan; Dunkelman, Orr, Related-key rectangle attack on 42-round SHACAL-2, 85-100 [Zbl 1156.94367]
Mendel, Florian; Pramstaller, Norbert; Rechberger, Christian; Rijmen, Vincent, On the collision resistance of RIPEMD-160, 101-116 [Zbl 1156.94368]
Herranz, Javier; Laguillaumie, Fabien, Blind ring signatures secure under the chosen-target-CDH assumption, 117-130 [Zbl 1156.94413]
Tonien, Dongvu; Susilo, Willy; Safavi-Naini, Reihaneh, Multi-party concurrent signatures, 131-145 [Zbl 1156.94423]
Komano, Yuichi; Ohta, Kazuo; Shimbo, Atsushi; Kawamura, Shinichi, Formal security model of multisignatures, 146-160 [Zbl 1156.94416]
Hu, Yuh-Hua; Chou, Chun-Yen; Wang, Lih-Chung; Lai, Feipei, Cryptanalysis of variants of UOV, 161-170 [Zbl 1156.94415]
De Cannière, Christophe, Trivium: A stream cipher construction inspired by block cipher design principles, 171-186 [Zbl 1156.94345]
Shaked, Yaniv; Wool, Avishai, Cryptanalysis of the bluetooth \(E_{0}\) cipher using OBDD’s, 187-202 [Zbl 1156.94376]
Jochemsz, Ellen; de Weger, Benne, A partial key exposure attack on RSA using a 2-dimensional lattice, 203-216 [Zbl 1156.94355]
Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy, On the integration of public key data encryption and public key encryption with keyword search, 217-232 [Zbl 1156.94331]
Bagga, Walid; Molva, Refik, Collusion-free policy-based encryption, 233-245 [Zbl 1156.94333]
Berta, István Zsolt, Using multiple smart cards for signing messages at malicious terminals, 246-256 [Zbl 1156.68374]
Huber, Ulrich; Sadeghi, Ahmad-Reza, A generic transformation from symmetric to asymmetric broadcast encryption, 270-285 [Zbl 1156.94352]
Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki, An authentication and key exchange protocol for secure credential services, 443-458 [Zbl 1156.94421]
Desmedt, Yvo; Pieprzyk, Josef; Steinfeld, Ron; Wang, Huaxiong, A non-malleable group key exchange protocol robust against active insiders, 459-475 [Zbl 1156.94410]
Jonker, H. L.; de Vink, E. P., Formalising receipt-freeness, 476-488 [Zbl 1156.94356]
Assora, Mohammed; Shirvani, Ayoub, Enhancing the security and efficiency of 3-D secure, 489-501 [Zbl 1156.94407]
von Oheimb, David; Cuellar, Jorge, Designing and verifying core protocols for location privacy, 502-516 [Zbl 1156.94406]


68-06 Proceedings, conferences, collections, etc. pertaining to computer science
68P25 Data encryption (aspects in computer science)
00B25 Proceedings of conferences of miscellaneous specific interest


Zbl 1087.68008
Full Text: DOI