ACNS B

33 papers

YearTitle / Authors
2010A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.
Xuhua Ding
2010A Message Recognition Protocol Based on Standard Assumptions.
Atefeh Mashatan, Serge Vaudenay
2010A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm.
Hassan Jameel Asghar, Josef Pieprzyk, Huaxiong Wang
2010Adaptive Chosen-Message Side-Channel Attacks.
Nicolas Veyrat-Charvillon, François-Xavier Standaert
2010Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Mark Manulis, Bertram Poettering, Gene Tsudik
2010Applied Cryptography and Network Security, 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings
Jianying Zhou, Moti Yung
2010Batch Groth-Sahai.
Olivier Blazy, Georg Fuchsbauer, Malika Izabachène, Amandine Jambert, Hervé Sibert, Damien Vergnaud
2010COP: A Step toward Children Online Privacy.
Wei Xu, Sencun Zhu, Heng Xu
2010Deniable Internet Key Exchange.
Andrew Chi-Chih Yao, Yunlei Zhao
2010Efficient Implementation of the Orlandi Protocol.
Thomas P. Jakobsen, Marc X. Makkes, Janus Dam Nielsen
2010Efficient and Secure Evaluation of Multivariate Polynomials and Applications.
Matthew K. Franklin, Payman Mohassel
2010Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs.
Markus Rückert, Michael Schneider, Dominique Schröder
2010High Performance GHASH Function for Long Messages.
Nicolas Méloni, Christophe Nègre, M. Anwar Hasan
2010How to Construct Interval Encryption from Binary Tree Encryption.
Huang Lin, Zhenfu Cao, Xiaohui Liang, Muxin Zhou, Haojin Zhu, Dongsheng Xing
2010Impossible Differential Cryptanalysis on Feistel Ciphers with
Yuechuan Wei, Ping Li, Bing Sun, Chao Li
2010Improving the Round Complexity of Traitor Tracing Schemes.
Aggelos Kiayias, Serdar Pehlivanoglu
2010Multi-trail Statistical Saturation Attacks.
Baudoin Collard, François-Xavier Standaert
2010Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G
Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang
2010Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead.
Rosario Gennaro, Hugo Krawczyk, Tal Rabin
2010On RFID Privacy with Mutual Authentication and Tag Corruption.
Frederik Armknecht, Ahmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann
2010On the Broadcast and Validity-Checking Security of pkcs#1 v1.5 Encryption.
Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud
2010Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters.
Julien Bringer, Hervé Chabanne, Thomas Icart
2010Principles on the Security of AES against First and Second-Order Differential Power Analysis.
Jiqiang Lu, Jing Pan, Jerry den Hartog
2010Privacy-Preserving Group Discovery with Linear Complexity.
Mark Manulis, Benny Pinkas, Bertram Poettering
2010Redactable Signatures for Tree-Structured Data: Definitions and Constructions.
Christina Brzuska, Heike Busch, Özgür Dagdelen, Marc Fischlin, Martin Franz, Stefan Katzenbeisser, Mark Manulis, Cristina Onete, Andreas Peter, Bertram Poettering, Dominique Schröder
2010Regulatory Compliant Oblivious RAM.
Bogdan Carbunar, Radu Sion
2010Revisiting Unpredictability-Based RFID Privacy Models.
Junzuo Lai, Robert H. Deng, Yingjiu Li
2010Secure Multiplicative Masking of Power Functions.
Laurie Genelle, Emmanuel Prouff, Michaël Quisquater
2010Secure Sketch for Multiple Secrets.
Chengfang Fang, Qiming Li, Ee-Chien Chang
2010Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions.
Xavier Boyen, Brent Waters
2010Social Network-Based Botnet Command-and-Control: Emerging Threats and Countermeasures.
Erhan J. Kartaltepe, Jose Andre Morales, Shouhuai Xu, Ravi S. Sandhu
2010Trapdoor Sanitizable Signatures Made Easy.
Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee
2010Two New Efficient PIR-Writing Protocols.
Helger Lipmaa, Bingsheng Zhang