CANS B

57 papers

YearTitle / Authors
2016A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption.
Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh
2016A Privacy-Preserving Model for Biometric Fusion.
Christina-Angeliki Toli, Abdelrahaman Aly, Bart Preneel
2016AAL and Static Conflict Detection in Policy.
Jean-Claude Royer, Anderson Santana de Oliveira
2016An Automatic Cryptanalysis of Transposition Ciphers Using Compression.
Noor R. Al-Kazaz, Sean A. Irvine, William John Teahan
2016An Efficient Approach to Detect TorrentLocker Ransomware in Computer Systems.
Faustin Mbol, Jean-Marc Robert, Alireza Sadighian
2016An Efficient Construction of Non-Interactive Secure Multiparty Computation.
Satoshi Obana, Maki Yoshida
2016An Efficient Entity Authentication Protocol with Enhanced Security and Privacy Properties.
Aysajan Abidin, Enrique Argones-Rúa, Bart Preneel
2016An Efficient Lattice-Based Multisignature Scheme with Applications to Bitcoins.
Rachid El Bansarkhani, Jan Sturm
2016An Efficient Somewhat Homomorphic Encryption Scheme Based on Factorization.
Gérald Gavin
2016An MPC-Based Privacy-Preserving Protocol for a Local Electricity Trading Market.
Aysajan Abidin, Abdelrahaman Aly, Sara Cleemput, Mustafa A. Mustafa
2016Attackers in Wireless Sensor Networks Will Be Neither Random Nor Jumping - Secrecy Amplification Case.
Radim Ostádal, Petr Svenda, Vashek Matyás
2016Breaking PPTP VPNs via RADIUS Encryption.
Matthias Horst, Martin Grothe, Tibor Jager, Jörg Schwenk
2016Compact Representation for Division Property.
Yosuke Todo, Masakatu Morii
2016Component-Oriented Access Control for Deployment of Application Services in Containerized Environments.
Kirill Belyaev, Indrakshi Ray
2016Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings
Sara Foresti, Giuseppe Persiano
2016DNSSEC Misconfigurations in Popular Domains.
Tianxiang Dai, Haya Schulmann, Michael Waidner
2016Denying Your Whereabouts: A Secure and Deniable Scheme for Location-Based Services.
Tassos Dimitriou, Naser Al-Ibrahim
2016Detecting Malware Through Anti-analysis Signals - A Preliminary Study.
Joash W. J. Tan, Roland H. C. Yap
2016Distance Bounding Based on PUF.
Mathilde Igier, Serge Vaudenay
2016Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis.
Merrielle Spain, Mayank Varia
2016Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations.
Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta
2016Efficient Verifiable Computation of XOR for Biometric Authentication.
Aysajan Abidin, Abdelrahaman Aly, Enrique Argones-Rúa, Aikaterini Mitrokotsa
2016Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards.
Takaaki Mizuki
2016Efficient, XOR-Based, Ideal (t, n)- threshold Schemes.
Liqun Chen, Thalia M. Laing, Keith M. Martin
2016Evaluation on Malware Classification by Session Sequence of Common Protocols.
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura, Takeshi Yagi, Mitsuaki Akiyama
2016FHE Over the Integers and Modular Arithmetic Circuits.
Eunkyung Kim, Mehdi Tibouchi
2016Generic Access Control System for Ad Hoc MCC and Fog Computing.
Bilel Zaghdoudi, Hella Kaffel-Ben Ayed, Wafa Harizi
2016Group Signature with Deniability: How to Disavow a Signature.
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
2016Hybrid WBC: Secure and Efficient White-Box Encryption Schemes.
Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg
2016Implementation State of HSTS and HPKP in Both Browsers and Servers.
Sergio de los Santos, Carmen Torrano, Yaiza Rubio, Felix Brezo
2016Implementation of Verified Set Operation Protocols Based on Bilinear Accumulators.
Luca Ferretti, Michele Colajanni, Mirco Marchetti
2016Improved Attacks on Extended Generalized Feistel Networks.
Valérie Nachef, Nicolas Marrière, Emmanuel Volte
2016Improving the Sphinx Mix Network.
Filipe Beato, Kimmo Halunen, Bart Mennink
2016Integral Privacy.
Vicenç Torra, Guillermo Navarro-Arribas
2016Internet Censorship in Italy: A First Look at 3G/4G Networks.
Giuseppe Aceto, Antonio Montieri, Antonio Pescapè
2016LEAP: A Next-Generation Client VPN and Encrypted Email Provider.
Elijah Sparrow, Harry Halpin, Kali Kaneko, Ruben Pollan
2016Language-Based Hypervisors.
Enrico Budianto, Richard Chow, Jonathan Ding, Michael McCool
2016Linear Regression Attack with F-test: A New SCARE Technique for Secret Block Ciphers.
Si Gao, Hua Chen, Wenling Wu, Limin Fan, Jingyi Feng, Xiangliang Ma
2016Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments.
Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, Mayank Varia
2016Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation.
Bo-Yuan Peng, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, Bo-Yin Yang
2016NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM.
Brian Koziel, Amir Jalali, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani
2016On the Power of Public-key Function-Private Functional Encryption.
Vincenzo Iovino, Qiang Tang, Karol Zebrowski
2016Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto
2016Range Query Integrity in Cloud Data Streams with Efficient Insertion.
Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera
2016Sandwich Construction for Keyed Sponges: Independence Between Capacity and Online Queries.
Yusuke Naito
2016SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
Hanyu Quan, Boyang Wang, Iraklis Leontiadis, Ming Li, Yuqing Zhang
2016Secure Error-Tolerant Graph Matching Protocols.
Kalikinkar Mandal, Basel Alomair, Radha Poovendran
2016Security of Online AE Schemes in RUP Setting.
Jian Zhang, Wen-Ling Wu
2016Server-Aided Revocable Identity-Based Encryption from Lattices.
Khoa Nguyen, Huaxiong Wang, Juanyang Zhang
2016Sharing Is Caring, or Callous?
Yu Pu, Jens Grossklags
2016Side-Channel Attacks on Threshold Implementations Using a Glitch Algebra.
Serge Vaudenay
2016Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing.
David Derler, Stephan Krenn, Daniel Slamanig
2016Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography.
Patrick Longa, Michael Naehrig
2016User Authentication from Mouse Movement Data Using SVM Classifier.
Bashira Akter Anima, Mahmood Jasim, Khandaker Abir Rahman, Adam Rulapaugh, Mohammed Hasanuzzaman
2016Verifiable Message-Locked Encryption.
Sébastien Canard, Fabien Laguillaumie, Marie Paindavoine
2016Vulnerability Analysis Using Google and Shodan.
Kai Simon
2016When Constant-Time Source Yields Variable-Time Binary: Exploiting Curve25519-donna Built with MSVC 2015.
Thierry Kaufmann, Hervé Pelletier, Serge Vaudenay, Karine Villegas