ACNS B

34 papers

YearTitle / Authors
2012A General Construction for 1-Round δ-RMT and (0, δ)-SMT.
Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang
2012A New Framework for Privacy of RFID Path Authentication.
Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao
2012A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring.
Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin
2012A Prefiltering Approach to Regular Expression Matching for Network Security Systems.
Tingwen Liu, Yong Sun, Alex X. Liu, Li Guo, Binxing Fang
2012ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches.
Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, Evangelos P. Markatos
2012Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings
Feng Bao, Pierangela Samarati, Jianying Zhou
2012Authenticated Encryption: How Reordering Can Impact Performance.
Basel Alomair
2012Breaking an Animated CAPTCHA Scheme.
Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
2012Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung
2012Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys.
Yuki Asano, Shingo Yanagihara, Tetsu Iwata
2012Detecting Social Spam Campaigns on Twitter.
Zi Chu, Indra Widjaja, Haining Wang
2012Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions.
Yu Sasaki, Lei Wang
2012Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers.
Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu
2012GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol.
Panagiotis Rizomiliotis, Stefanos Gritzalis
2012Identity-Based Extractable Hash Proofs and Their Applications.
Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao
2012Inner-Product Lossy Trapdoor Functions and Applications.
Xiang Xie, Rui Xue, Rui Zhang
2012Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud.
Boyang Wang, Baochun Li, Hui Li
2012Length-Doubling Ciphers and Tweakable Ciphers.
Haibin Zhang
2012Linear Fault Analysis of Block Ciphers.
Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li
2012On Structural Signatures for Tree Data Structures.
Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer
2012On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification.
Afonso Arriaga, Manuel Barbosa, Pooya Farshim
2012PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance.
Gilles Piret, Thomas Roche, Claude Carlet
2012Private Computation of Spatial and Temporal Power Consumption with Smart Meters.
Zekeriya Erkin, Gene Tsudik
2012RIKE: Using Revocable Identities to Support Key Escrow in PKIs.
Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao
2012SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Sherman S. M. Chow, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu
2012Secure Accumulators from Euclidean Rings without Trusted Setup.
Helger Lipmaa
2012Security Analysis of a Multi-factor Authenticated Key Exchange Protocol.
Feng Hao, Dylan Clarke
2012Security Enhancements by OR-Proof in Identity-Based Identification.
Atsushi Fujioka, Taiichi Saito, Keita Xagawa
2012The Shy Mayor: Private Badges in GeoSocial Networks.
Bogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan
2012Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations.
Minh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang
2012TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks.
Tilo Müller, Benjamin Taubmann, Felix C. Freiling
2012Wide Collisions in Practice.
Xin Ye, Thomas Eisenbarth
2012Zero-Value Point Attacks on Kummer-Based Cryptosystem.
Fangguo Zhang, Qiping Lin, Shengli Liu
2012iHTTP: Efficient Authentication of Non-confidential HTTP Traffic.
Jason Gionta, Peng Ning, Xiaolan Zhang