CANS B

19 papers

YearTitle / Authors
2015A Formal Environment for MANET Organization and Security.
Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi
2015A Security Framework for Internet of Things.
Imane Bouij-Pasquier, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort
2015An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks.
Maroua Gharam, Meriem Salhi, Noureddine Boudriga
2015Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme.
Helger Lipmaa, Kateryna Pavlyk
2015Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals.
S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena
2015Bandwidth-Optimized Secure Two-Party Computation of Minima.
Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle
2015Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings
Michael K. Reiter, David Naccache
2015On the Weaknesses of PBKDF2.
Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò
2015Outsourcing Secure Two-Party Computation as a Black Box.
Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler
2015PUDA - Privacy and Unforgeability for Data Aggregation.
Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2015Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation.
Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada
2015Privacy-Aware Authentication in the Internet of Things.
Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer
2015Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution.
Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue
2015SEPM: Efficient Partial Keyword Search on Encrypted Data.
Yutaka Kawai, Takato Hirano, Yoshihiro Koseki, Tatsuji Munaka
2015Secure Set-Based Policy Checking and Its Application to Password Registration.
Changyu Dong, Franziskus Kiefer
2015Security of Linear Secret-Sharing Schemes Against Mass Surveillance.
Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci
2015Verifiable Random Functions from (Leveled) Multilinear Maps.
Bei Liang, Hongda Li, Jinyong Chang
2015What Users Should Know About Full Disk Encryption Based on LUKS.
Simone Bossi, Andrea Visconti
2015iDeFEND: Intrusion Detection Framework for Encrypted Network Data.
Fatih Kiliç, Claudia Eckert