


default search action
SSR 2015: Tokyo, Japan
- Liqun Chen, Shin'ichiro Matsuo:

Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Lecture Notes in Computer Science 9497, Springer 2015, ISBN 978-3-319-27151-4
Bitcoin and Payment
- Patrick McCorry, Siamak Fayyaz Shahandashti

, Dylan Clarke, Feng Hao
:
Authenticated Key Exchange over Bitcoin. 3-20 - Maryam Mehrnezhad

, Feng Hao
, Siamak Fayyaz Shahandashti
:
Tap-Tap and Pay (TTP): Preventing the Mafia Attack in NFC Payment. 21-39
Protocol and API
- Jung Yeon Hwang, Seung-Hyun Kim, Daeseon Choi, Seung-Hun Jin, Boyeon Song:

Robust Authenticated Key Exchange Using Passwords and Identity-Based Signatures. 43-69 - Karl Christoph Ruland

, Jochen Sassmannshausen:
Non-repudiation Services for the MMS Protocol of IEC 61850. 70-85 - Antonio González-Burgueño, Sonia Santiago

, Santiago Escobar
, Catherine Meadows, José Meseguer:
Analysis of the PKCS#11 API Using the Maude-NPA Tool. 86-106
Analysis on Cryptographic Algorithm
- Daniel J. Bernstein, Tung Chou

, Chitchanok Chuengsatiansup, Andreas Hülsing
, Eran Lambooij, Tanja Lange, Ruben Niederhagen, Christine van Vredendaal:
How to Manipulate Curve Standards: A White Paper for the Black Hat http: //bada55.cr.yp.to. 109-139 - Zhenfeng Zhang, Kang Yang, Jiang Zhang

, Cheng Chen:
Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks. 140-153 - Gautham Sekar:

Side Channel Cryptanalysis of Streebog. 154-162
Privacy
- Mohammed Shafiul Alam Khan, Chris J. Mitchell

:
Improving Air Interface User Privacy in Mobile Telephony. 165-184 - Mwawi Nyirenda Kayuni, Mohammed Shafiul Alam Khan, Wanpeng Li

, Chris J. Mitchell
, Po-Wah Yau:
Generating Unlinkable IPv6 Addresses. 185-199
Trust and Formal Analysis
- Masatoshi Hokino, Yuri Fujiki, Sakura Onda, Takeaki Kaneko, Natsuhiko Sakimura, Hiroyuki Sato:

A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks. 203-217 - Kristof Teichel, Dieter Sibold, Stefan Milius:

First Results of a Formal Analysis of the Network Time Security Specification. 218-245 - Joshua D. Guttman

, Moses D. Liskov, John D. Ramsdell, Paul D. Rowe:
Formal Support for Standardizing Protocols with State. 246-265

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







last updated on 2026-04-30 00:09 CEST by the 







