CANS B

26 papers

YearTitle / Authors
2014A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System.
Matthias Wachs, Martin Schanzenbach, Christian Grothoff
2014A Storage-Efficient and Robust Private Information Retrieval Scheme Allowing Few Servers.
Daniel Augot, Françoise Levy-dit-Vehel, Abdullatif Shikfa
2014Attribute-Based Signatures with User-Controlled Linkability.
Ali El Kaafarani, Liqun Chen, Essam Ghadafi, James H. Davenport
2014Bootstrappable Identity-Based Fully Homomorphic Encryption.
Michael Clear, Ciaran McGoldrick
2014Breaking and Fixing Cryptophia's Short Combiner.
Bart Mennink, Bart Preneel
2014Converting PKI-Based Authenticated Key Exchange to Identity-Based.
Koutarou Suzuki, Kazuki Yoneyama
2014Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings
Dimitris Gritzalis, Aggelos Kiayias, Ioannis G. Askoxylakis
2014Decentralized Distributed Data Usage Control.
Florian Kelbert, Alexander Pretschner
2014Direct Anonymous Attestations with Dependent Basename Opening.
Nicolas Desmoulins, Roch Lescuyer, Olivier Sanders, Jacques Traoré
2014Efficient Signatures with Tight Real World Security in the Random-Oracle Model.
Christoph Bader
2014FFT Key Recovery for Integral Attack.
Yosuke Todo, Kazumaro Aoki
2014Message Extension Attack against Authenticated Encryptions: Application to PANDA.
Yu Sasaki, Lei Wang
2014Mining API Calls and Permissions for Android Malware Detection.
Akanksha Sharma, Subrat Kumar Dash
2014More Sparse Families of Pairing-Friendly Elliptic Curves.
Georgios Fotiadis, Elisavet Konstantinou
2014Negotiating DNSSEC Algorithms over Legacy Proxies.
Amir Herzberg, Haya Schulmann
2014New Second Preimage Attack Variants against the MD-Structure.
Tuomas Kortelainen, Juha Kortelainen
2014On the Lossiness of 2 k -th Power and the Instantiability of Rabin-OAEP.
Haiyang Xue, Bao Li, Xianhui Lu, Kunpeng Wang, Yamin Liu
2014Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation.
Felix Günther, Mark Manulis, Andreas Peter
2014Private and Dynamic Time-Series Data Aggregation with Trust Relaxation.
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva
2014Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-honest Sender.
Florian Böhl, Simon Greiner, Patrik Scheidecker
2014Proxy Re-encryption with Unforgeable Re-encryption Keys.
Hui Guo, Zhenfeng Zhang, Jiang Zhang
2014Security of a Privacy-Preserving Biometric Authentication Protocol Revisited.
Aysajan Abidin, Kanta Matsuura, Aikaterini Mitrokotsa
2014Short Comparable Encryption.
Jun Furukawa
2014Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players.
Sourya Joyee De, Sushmita Ruj, Asim K. Pal
2014Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards.
Antonio de la Piedra, Jaap-Henk Hoepman, Pim Vullers
2014Universally Composable Oblivious Transfer Based on a Variant of LPN.
Bernardo David, Rafael Dowsley, Anderson C. A. Nascimento