Intrusion Detection and Tamper Resistance.- Real-Time Intruder Tracing through Self-Replication.- On the Difficulty of Protecting Private Keys in Software.- Intrusion Detection with Support Vector Machines and Generative Models.- Cryptographic Algorithm and Attack Implementation.- Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI.- Fast Software Implementations of SC2000.- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512.- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.- Access Control and Trust Management (I).- Role-Based Access Control for E-commerce Sea-of-Data Applications.- An Access Control Model for Tree Data Structures.- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.- Authentication and Privacy.- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.- Quantifying Privacy Leakage through Answering Database Queries.- A New Offiine Privacy Protecting E-cash System with Revokable Anonymity.- E-commerce Protocols (I).- Receipt-Free Sealed-Bid Auction.- Exclusion-Freeness in Multi-party Exchange Protocols.- A Realistic Protocol for Multi-party Certified Electronic Mail.- Signature Schemes.- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification.- Comments to the UNCITRAL Model Law on Electronic Signatures.- An Anonymous Loan System Based on Group Signature Scheme.- Traceability Schemes for Signed Documents*.- Cryptography (I).- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications.- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m).- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m).- Access Control and Trust Management (II).- Conditional Cryptographic Delegation for P2P Data Sharing.- Certification of Public Keys within an Identity Based System.- A New Public Key Cryptosystem for Constrained Hardware.- Key Management.- A Distributed and Computationally Secure Key Distribution Scheme*.- On Optimal Hash Tree Traversal for Interval Time-Stamping.- An Efficient Dynamic and Distributed Cryptographic Accumulator*.- Security Analysis.- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.- Automated Analysis of Some Security Mechanisms of SCEP*.- An Attack on a Protocol for Certified Delivery.- E-commerce Protocols (II).- Oblivious Counter and Majority Protocol.- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.- Fingerprinting Concatenated Codes with Efficient Identification.- Cryptography (II).- A Provably Secure Additive and Multiplicative Privacy Homomorphism*.- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
[1]
Jacques Traoré,et al.
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems
,
1999,
ACISP.
[2]
William E. Winkler,et al.
The State of Record Linkage and Current Research Problems
,
1999
.
[3]
David Naccache,et al.
On blind signatures and perfect crimes
,
1992,
Comput. Secur..
[4]
Dan Gusfield,et al.
A Graph Theoretic Approach to Statistical Data Security
,
1988,
SIAM J. Comput..
[5]
Dawn Xiaodong Song,et al.
Practical forward secure group signature schemes
,
2001,
CCS '01.
[6]
Yi-Ting Chiang,et al.
How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases
,
2002,
Rough Sets and Current Trends in Computing.
[7]
Pierangela Samarati,et al.
Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression
,
1998
.
[8]
L. Cox.
Suppression Methodology and Statistical Disclosure Control
,
1980
.
[9]
Thomas G. Dietterich.
What is machine learning?
,
2020,
Archives of Disease in Childhood.
[10]
Dorothy E. Denning,et al.
Cryptography and Data Security
,
1982
.
[11]
Ming-Yang Kao,et al.
Security problems for statistical databases with general cell suppressions
,
1997,
Proceedings. Ninth International Conference on Scientific and Statistical Database Management (Cat. No.97TB100150).
[12]
Gultekin Özsoyoglu,et al.
Auditing and Inference Control in Statistical Databases
,
1982,
IEEE Transactions on Software Engineering.
[13]
Latanya Sweeney,et al.
Guaranteeing anonymity when sharing medical data, the Datafly System
,
1997,
AMIA.
[14]
P. Jones.
Making Decisions
,
1971,
Nature.
[15]
Tsan-sheng Hsu,et al.
A Logical Model for Privacy Protection
,
2001,
ISC.
[16]
Pierangela Samarati,et al.
Protecting Respondents' Identities in Microdata Release
,
2001,
IEEE Trans. Knowl. Data Eng..
[17]
Janusz Zalewski,et al.
Rough sets: Theoretical aspects of reasoning about data
,
1996
.