Papers from the 5th Information Security Practice and Experience Conference (ISPEC’09), held in Xi’an, China, 13–15 April 2009
- Achieving high security and efficiency in RFID-tagged supply chains
- Designing attacks on SIP call set-up
- Defending against the pirate evolution attack
- Strongly unforgeable ID-based signatures without random oracles
- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
- Some results on cryptanalysis of SMS4 block cipher
- TWISTERπ – a framework for secure and fast hash functions
No comments:
Post a Comment