ICICS C

33 papers

YearTitle / Authors
2010A New Method for Formalizing Optimistic Fair Exchange Protocols.
Ming Chen, Kaigui Wu, Jie Xu, Pan He
2010A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms.
Kurt Dietrich, Johannes Winter
2010A Trust-Based IDS for the AODV Protocol.
Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent
2010A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks.
Jaydip Sen
2010A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia, Wei-Chang Yeh
2010An Agent-Mediated Fair Exchange Protocol.
Gerard Draper-Gil, Jianying Zhou, Josep-Lluís Ferrer-Gomila
2010Anonymity and Verifiability in Voting: Understanding (Un)Linkability.
Lucie Langer, Hugo Jonker, Wolter Pieters
2010Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis.
Kai Chen, Yifeng Lian, Yingjun Zhang
2010CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization.
Flavio Lombardi, Roberto Di Pietro
2010Ciphertext Policy Attribute-Based Proxy Re-encryption.
Song Luo, Jian-bin Hu, Zhong Chen
2010Compromise-Resilient Anti-jamming for Wireless Sensor Networks.
Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao
2010Consecutive S-box Lookups: A Timing Attack on SNOW 3G.
Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio
2010Cryptographic Hash Functions: Theory and Practice.
Bart Preneel
2010Efficient Authentication for Mobile and Pervasive Computing.
Basel Alomair, Radha Poovendran
2010Experimental Threat Model Reuse with Misuse Case Diagrams.
Jostein Jensen, Inger Anne Tøndel, Per Håkon Meland
2010Federated Secret Handshakes with Support for Revocation.
Alessandro Sorniotti, Refik Molva
2010Fine-Grained Disclosure of Access Policies.
Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio
2010Horizontal Correlation Analysis on Exponentiation.
Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil
2010Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks.
Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo
2010IDS Alert Visualization and Monitoring through Heuristic Host Selection.
Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani
2010Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.
Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto
2010Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings
Miguel Soriano, Sihan Qing, Javier López
2010Manger's Attack Revisited.
Falko Strenzke
2010On Practical Second-Order Power Analysis Attacks for Block Ciphers.
Renato Menicocci, Andrea Simonetti, Giuseppe Scotti, Alessandro Trifiletti
2010Proving Coercion-Resistance of Scantegrity II.
Ralf Küsters, Tomasz Truderung, Andreas Vogt
2010Return-Oriented Rootkit without Returns (on the x86).
Ping Chen, Xiao Xing, Bing Mao, Li Xie
2010Rewriting of SPARQL/Update Queries for Securing Data Access.
Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci
2010SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms.
Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez
2010Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol.
Talal Alharbi, Abdullah Mohammed Almuhaideb, Phu Dung Le
2010Security Enhancement and Modular Treatment towards Authenticated Key Exchange.
Jiaxin Pan, Libin Wang, Changshe Ma
2010Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts.
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer
2010Time Warp: How Time Affects Privacy in LBSs.
Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti
2010Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme.
Mehrdad Nojoumian, Douglas R. Stinson