ICICS C

29 papers

YearTitle / Authors
2008A Bootstrap Attack on Digital Watermarks in the Frequency Domain.
Sam Behseta, Charles Lam, Robert L. Webb
2008A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail.
Lijun Liao, Jörg Schwenk
2008Access with Fast Batch Verifiable Anonymous Credentials.
Ke Zeng
2008Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0..
Nicolas T. Courtois, Blandine Debraize
2008Analysis of Two Attacks on Reduced-Round Versions of the SMS4.
Deniz Toz, Orr Dunkelman
2008Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack.
Jiali Choy, Khoongming Khoo, Chuan-Wen Loe
2008Attestation: Evidence and Trust.
George Coker, Joshua D. Guttman, Peter A. Loscocco, Justin Sheehy, Brian T. Sniffen
2008Automated Device Pairing for Asymmetric Pairing Scenarios.
Nitesh Saxena, Md. Borhan Uddin
2008Beyond User-to-User Access Control for Online Social Networks.
Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn
2008BinHunt: Automatically Finding Semantic Differences in Binary Programs.
Debin Gao, Michael K. Reiter, Dawn Xiaodong Song
2008Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval.
Mohamed Layouni, Maki Yoshida, Shingo Okamura
2008Embedding Renewable Cryptographic Keys into Continuous Noisy Data.
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis
2008Enhancing Java ME Security Support with Resource Usage Monitoring.
Alessandro Castrucci, Fabio Martinelli, Paolo Mori, Francesco Roperti
2008Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes.
Rabia Sirhindi, Saeed Murtaza, Mehreen Afzal
2008Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings
Liqun Chen, Mark Dermot Ryan, Guilin Wang
2008Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box.
Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki
2008Method for Detecting Vulnerability to Doubling Attacks.
Chong Hee Kim, Jean-Jacques Quisquater
2008Pseudo-randomness Inside Web Browsers.
Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan
2008Publicly Verifiable Remote Data Integrity.
Ke Zeng
2008Quantifying Timing Leaks and Cost Optimisation.
Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky
2008Reusability of Functionality-Based Application Confinement Policy Abstractions.
Z. Cliffe Schreuders, Christian Payne
2008Revocation Schemes for Delegation Licences.
Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula
2008Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements.
Praveen Gauravaram, Katsuyuki Okeya
2008Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study.
Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohamed Mejri
2008Threat Modelling in User Performed Authentication.
Xun Dong, John A. Clark, Jeremy L. Jacob
2008Towards Role Based Trust Management without Distributed Searching of Credentials.
Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi
2008Towards an Information Theoretic Analysis of Searchable Encryption.
Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker
2008Unclonable Lightweight Authentication Scheme.
Ghaith Hammouri, Erdinç Öztürk, Berk Birand, Berk Sunar
2008Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data.
Henrich Christopher Pöhls