Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015
    URL: https://doi.org/10.1007/978-3-319-27152-1
    DBLP: db/conf/secsr/ssr2015.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 13  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Mwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li, Chris J. Mitchell, Po-Wah Yau.
    Generating Unlinkable IPv6 Addresses.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Analysis of the PKCS#11 API Using the Maude-NPA Tool.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Mohammed Shafiul Alam Khan, Chris J. Mitchell.
    Improving Air Interface User Privacy in Mobile Telephony.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Jung Yeon Hwang, Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Boyeon Song.
    Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Christoph Ruland, Jochen Sassmannshausen.
    Non-repudiation Services for the MMS Protocol of IEC 61850.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Daniel J. Bernstein, Tung Chou, Chitchanok Chuengsatiansup, Andreas Hülsing, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal.
    How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Joshua D. Guttman, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe.
    Formal Support for Standardizing Protocols with State.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Zhenfeng Zhang, Kang Yang, Jiang Zhang, Cheng Chen.
    Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Patrick McCorry, Siamak F. Shahandashti, Dylan Clarke, Feng Hao.
    Authenticated Key Exchange over Bitcoin.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Kristof Teichel, Dieter Sibold, Stefan Milius.
    First Results of a Formal Analysis of the Network Time Security Specification.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Show item 1 to 10 of 13  

    Your query returned 13 matches in the database.