CANS B

29 papers

YearTitle / Authors
2018Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers
Srdjan Capkun, Sherman S. M. Chow
2017(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation.
Angela Jäschke, Frederik Armknecht
2017A New Approach to Deanonymization of Unreachable Bitcoin Nodes.
Indra Deep Mastan, Souradyuti Paul
2017A New Direction for Research on Data Origin Authentication in Group Communication.
Robert Annessi, Tanja Zseby, Joachim Fabini
2017A New Secure Matrix Multiplication from Ring-LWE.
Lihua Wang, Yoshinori Aono, Le Trieu Phong
2017A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems.
Mohammad Hossein Chinaei, Diethelm Ostry, Vijay Sivaraman
2017A Paged Domain Name System for Query Privacy.
Daniele Enrico Asoni, Samuel Hitz, Adrian Perrig
2017A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Tomer Ashur, Jeroen Delvaux, Sanghan Lee, Pieter Maene, Eduard Marin, Svetla Nikova, Oscar Reparaz, Vladimir Rozic, Dave Singelée, Bohan Yang, Bart Preneel
2017A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model.
S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan
2017An Efficient Attribute-Based Authenticated Key Exchange Protocol.
Suvradip Chakraborty, Y. Sreenivasa Rao, Chandrasekaran Pandu Rangan
2017Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin.
Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang
2017Forward-Security Under Continual Leakage.
Mihir Bellare, Adam O'Neill, Igors Stepanovs
2017Modelling Traffic Analysis in Home Automation Systems.
Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge
2017Multi-client Predicate-Only Encryption for Conjunctive Equality Tests.
Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker
2017Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps.
Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu
2017On the Security of Frequency-Hiding Order-Preserving Encryption.
Matteo Maffei, Manuel Reinert, Dominique Schröder
2017Out of the Dark: UI Redressing and Trustworthy Events.
Marcus Niemietz, Jörg Schwenk
2017Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN.
Daniele Antonioli, Sandra Deepthy Siby, Nils Ole Tippenhauer
2017Privacy-Preserving Whole-Genome Variant Queries.
Daniel Demmler, Kay Hamacher, Thomas Schneider, Sebastian Stammler
2017Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough?
Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa
2017Secure Code Updates for Smart Embedded Devices Based on PUFs.
Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, Xiaobo Chu, Dengguo Feng
2017Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure.
Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui
2017Subset Predicate Encryption and Its Applications.
Jonathan Katz, Matteo Maffei, Giulio Malavolta, Dominique Schröder
2017Tightly-Secure PAK(E).
José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Sala, Marjan Skrobot
2017Towards Attribute-Based Credentials in the Cloud.
Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks
2017Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure.
Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias
2017Two Cents for Strong Anonymity: The Anonymous Post-office Protocol.
Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz
2017Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures.
Xavier Bultel, Pascal Lafourcade
2017VisAuth: Authentication over a Visual Channel Using an Embedded Image.
Jack Sturgess, Ivan Martinovic