Information Security

Intrusion Detection and Tamper Resistance.- Real-Time Intruder Tracing through Self-Replication.- On the Difficulty of Protecting Private Keys in Software.- Intrusion Detection with Support Vector Machines and Generative Models.- Cryptographic Algorithm and Attack Implementation.- Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI.- Fast Software Implementations of SC2000.- Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512.- Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.- Access Control and Trust Management (I).- Role-Based Access Control for E-commerce Sea-of-Data Applications.- An Access Control Model for Tree Data Structures.- A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.- Authentication and Privacy.- Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.- Quantifying Privacy Leakage through Answering Database Queries.- A New Offiine Privacy Protecting E-cash System with Revokable Anonymity.- E-commerce Protocols (I).- Receipt-Free Sealed-Bid Auction.- Exclusion-Freeness in Multi-party Exchange Protocols.- A Realistic Protocol for Multi-party Certified Electronic Mail.- Signature Schemes.- A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification.- Comments to the UNCITRAL Model Law on Electronic Signatures.- An Anonymous Loan System Based on Group Signature Scheme.- Traceability Schemes for Signed Documents*.- Cryptography (I).- Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications.- Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m).- Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF(2m).- Access Control and Trust Management (II).- Conditional Cryptographic Delegation for P2P Data Sharing.- Certification of Public Keys within an Identity Based System.- A New Public Key Cryptosystem for Constrained Hardware.- Key Management.- A Distributed and Computationally Secure Key Distribution Scheme*.- On Optimal Hash Tree Traversal for Interval Time-Stamping.- An Efficient Dynamic and Distributed Cryptographic Accumulator*.- Security Analysis.- A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.- Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.- Automated Analysis of Some Security Mechanisms of SCEP*.- An Attack on a Protocol for Certified Delivery.- E-commerce Protocols (II).- Oblivious Counter and Majority Protocol.- Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.- Fingerprinting Concatenated Codes with Efficient Identification.- Cryptography (II).- A Provably Secure Additive and Multiplicative Privacy Homomorphism*.- Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.

[1]  Jacques Traoré,et al.  Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems , 1999, ACISP.

[2]  William E. Winkler,et al.  The State of Record Linkage and Current Research Problems , 1999 .

[3]  David Naccache,et al.  On blind signatures and perfect crimes , 1992, Comput. Secur..

[4]  Dan Gusfield,et al.  A Graph Theoretic Approach to Statistical Data Security , 1988, SIAM J. Comput..

[5]  Dawn Xiaodong Song,et al.  Practical forward secure group signature schemes , 2001, CCS '01.

[6]  Yi-Ting Chiang,et al.  How Much Privacy? - A System to Safe Guard Personal Privacy while Releasing Databases , 2002, Rough Sets and Current Trends in Computing.

[7]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[8]  L. Cox Suppression Methodology and Statistical Disclosure Control , 1980 .

[9]  Thomas G. Dietterich What is machine learning? , 2020, Archives of Disease in Childhood.

[10]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[11]  Ming-Yang Kao,et al.  Security problems for statistical databases with general cell suppressions , 1997, Proceedings. Ninth International Conference on Scientific and Statistical Database Management (Cat. No.97TB100150).

[12]  Gultekin Özsoyoglu,et al.  Auditing and Inference Control in Statistical Databases , 1982, IEEE Transactions on Software Engineering.

[13]  Latanya Sweeney,et al.  Guaranteeing anonymity when sharing medical data, the Datafly System , 1997, AMIA.

[14]  P. Jones Making Decisions , 1971, Nature.

[15]  Tsan-sheng Hsu,et al.  A Logical Model for Privacy Protection , 2001, ISC.

[16]  Pierangela Samarati,et al.  Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..

[17]  Janusz Zalewski,et al.  Rough sets: Theoretical aspects of reasoning about data , 1996 .