Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
A Grid Certificate Authority for Community and Ad-Hoc Grids
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 5 - Volume 06
Information security education in the UK: a proposed course in secure e-commerce systems
Proceedings of the 1st annual conference on Information security curriculum development
Power-smart system-on-chip architecture for embedded cryptosystems
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Computational concepts in IT: a new approach to IT mathematics
Proceedings of the 6th conference on Information technology education
Towards a software architecture for DRM
Proceedings of the 5th ACM workshop on Digital rights management
A proposed curriculum of cryptography courses
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Database security curriculum in InfoSec program
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Teaching cryptography in an applied computing program
Journal of Computing Sciences in Colleges
Trust and tamper-proof software delivery
Proceedings of the 2006 international workshop on Software engineering for secure systems
Integrity regions: authentication through presence in wireless networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Security issues in privacy and key management protocols of IEEE 802.16
Proceedings of the 44th annual Southeast regional conference
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Computer Standards & Interfaces
Journal of VLSI Signal Processing Systems
Towards security and QoS optimization in real-time embedded systems
ACM SIGBED Review - Special issue: The work-in-progress (WIP) session of the RTSS 2005
Cryptographically sound implementations for typed information-flow security
Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Fast S-box security mechanism research based on the polymorphic cipher
Information Sciences: an International Journal
IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
Computer Communications
Electronic Notes in Theoretical Computer Science (ENTCS)
Key management and secure software updates in wireless process control environments
WiSec '08 Proceedings of the first ACM conference on Wireless network security
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
A New Formal Proof Model for RFID Location Privacy
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Using Theorem Proving to Verify Expectation and Variance for Discrete Random Variables
Journal of Automated Reasoning
Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
ISICA '08 Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence
Random Visitor: Defense against Identity Attacks in P2P Networks
IEICE - Transactions on Information and Systems
Graduate follow up as a vehicle for CSIT curriculum assessment and improvement
Proceedings of the 14th Western Canadian Conference on Computing Education
A new public-key encryption scheme
Journal of Computer Science and Technology
Reducing the Complexity in the Distributed Computation of Private RSA Keys
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
SAGE: a strong privacy-preserving scheme against global eavesdropping for ehealth systems
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Formal Analysis of the Estonian Mobile-ID Protocol
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks
IEEE Transactions on Wireless Communications
Identity-based threshold decryption revisited
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
A direct anonymous attestation scheme for embedded devices
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
A framework for proving the security of data transmission protocols in sensor network
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Random visitor: a defense against identity attacks in P2P overlay networks
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Design of secure watermarking scheme for watermarking protocol
PCM'07 Proceedings of the multimedia 8th Pacific Rim conference on Advances in multimedia information processing
Token-based authenticated key establishment protocols for three-party communication
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Secret signatures: how to achieve business privacy efficiently?
WISA'07 Proceedings of the 8th international conference on Information security applications
Security analysis of the authentication modules of Chinese WLAN standard and its implementation plan
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Online/offline signature schemes for devices with limited computing capabilities
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Verification of expectation properties for discrete random variables in HOL
TPHOLs'07 Proceedings of the 20th international conference on Theorem proving in higher order logics
Secure wireless communication platform for EV-to-Grid research
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Hierarchies of keys in secure multicast communications
Journal of Computer Security
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Introducing perfect forward secrecy for AN.ON
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
An identity-based authentication protocol for clustered ZigBee network
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Deniable internet key exchange
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Hardware framework for the rabbit stream cipher
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
International Journal of Mobile Communications
An ID-based digital watermarking protocol for copyright protection
Computers and Electrical Engineering
A non-committing encryption scheme based on quadratic residue
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Provable security of on-demand distance vector routing in wireless ad hoc networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
An ID-based watermarking scheme for java programs
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Single sign-on and key establishment for ubiquitous smart environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part IV
RSA extended modulus attacks and their solutions in a kind of fair exchange protocols
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Gateway-oriented password-authenticated key exchange protocol in the standard model
Journal of Systems and Software
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
On the security of the authentication module of chinese WLAN standard implementation plan
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
A new dynamic ID-Based remote user authentication scheme with forward secrecy
APWeb'12 Proceedings of the 14th international conference on Web Technologies and Applications
Algebraic Framework for the Specification and Analysis of Cryptographic-Key Distribution
Fundamenta Informaticae
Non-delegatable strong designated verifier signature on elliptic curves
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
A password authentication scheme against smart card security breach
ICICA'12 Proceedings of the Third international conference on Information Computing and Applications
ID based signcryption scheme in standard model
ProvSec'12 Proceedings of the 6th international conference on Provable Security
V2GPriv: vehicle-to-grid privacy in the smart grid
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Journal of Medical Systems
Public key infrastructure for UAE: a case study
Proceedings of the 6th International Conference on Security of Information and Networks
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
Future Generation Computer Systems
Hi-index | 0.00 |
Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It explains why "textbook crypto" isonly good in an ideal world where data are random and bad guys behave nicely.It reveals the general unfitness of "textbook crypto" for the real world by demonstratingnumerous attacks on such schemes, protocols and systems under variousreal-world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography.