ACNS B

32 papers

YearTitle / Authors
2011A Specification Based Intrusion Detection Framework for Mobile Phones.
Ashwin Chaugule, Zhi Xu, Sencun Zhu
2011Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto
2011Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings
Javier López, Gene Tsudik
2011Cache Timing Analysis of RC4.
Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux
2011Cold Boot Key Recovery by Solving Polynomial Systems with Noise.
Martin R. Albrecht, Carlos Cid
2011Composable Security Analysis of OS Services.
Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema
2011Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
Alex Biryukov, Ilya Kizhvatov, Bin Zhang
2011Double-Trapdoor Anonymous Tags for Traceable Signatures.
Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo
2011Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting.
Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura
2011Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security.
Werner Schindler, Kouichi Itoh
2011Fighting Pirates 2.0.
Paolo D'Arco, Angel L. Pérez del Pozo
2011Fully Non-interactive Onion Routing with Forward-Secrecy.
Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi
2011Generic Fully Simulatable Adaptive Oblivious Transfer.
Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong
2011Hierarchical Identity-Based Chameleon Hash and Its Applications.
Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao
2011Inferring Protocol State Machine from Network Traces: A Probabilistic Approach.
Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo
2011LBlock: A Lightweight Block Cipher.
Wenling Wu, Lei Zhang
2011Linear Analysis of Reduced-Round CubeHash.
Tomer Ashur, Orr Dunkelman
2011Misuse Detection in Consent-Based Networks.
Mansoor Alicherry, Angelos D. Keromytis
2011Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks.
Jacob C. N. Schuldt, Goichiro Hanaoka
2011On Hiding a Plaintext Length by Preencryption.
Cihangir Tezcan, Serge Vaudenay
2011On the Indifferentiability of Fugue and Luffa.
Rishiraj Bhattacharyya, Avradip Mandal
2011Practical Attacks on the Maelstrom-0 Compression Function.
Stefan Kölbl, Florian Mendel
2011Private Discovery of Common Social Contacts.
Emiliano De Cristofaro, Mark Manulis, Bertram Poettering
2011Public-Key Encryption with Delegated Search.
Luan Ibraimi, Svetla Nikova, Pieter H. Hartel, Willem Jonker
2011Quantitatively Analyzing Stealthy Communication Channels.
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
2011Relaxed Security Notions for Signatures of Knowledge.
Marc Fischlin, Cristina Onete
2011Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency.
Henrich Christopher Pöhls, Kai Samelin, Joachim Posegga
2011Secure Authenticated Comparisons.
Keith B. Frikken, Hao Yuan, Mikhail J. Atallah
2011Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications.
Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung
2011Security Notions for Broadcast Encryption.
Duong Hieu Phan, David Pointcheval, Mario Strefler
2011Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.
Ashish Choudhury, Kaoru Kurosawa, Arpita Patra
2011Towards User-Friendly Credential Transfer on Open Credential Platforms.
Kari Kostiainen, N. Asokan, Alexandra Afanasyeva