ISC C

37 papers

YearTitle / Authors
2011Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers
Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic
2010A Short Signature Scheme from the RSA Family.
Ping Yu, Rui Xue
2010An Analysis of DepenDNS.
Nadhem J. AlFardan, Kenneth G. Paterson
2010An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications.
Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos
2010Artificial Malware Immunization Based on Dynamically Assigned Sense of Self.
Xinyuan Wang, Xuxian Jiang
2010CRePE: Context-Related Policy Enforcement for Android.
Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo
2010Crimeware Swindling without Virtual Machines.
Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis
2010Cryptanalysis of the Convex Hull Click Human Identification Protocol.
Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang
2010Deciding Recognizability under Dolev-Yao Intruder Model.
Zhiwei Li, Weichao Wang
2010Double Spending Protection for E-Cash Based on Risk Management.
Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré
2010Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups.
Jonathan T. Trostle, Andy Parrish
2010Efficient Message Space Extension for Automorphic Signatures.
Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo
2010Efficient Multiplicative Homomorphic E-Voting.
Kun Peng, Feng Bao
2010Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation.
Arne Tauber, Thomas Rössler
2010Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets.
Georg Neugebauer, Ulrike Meyer, Susanne Wetzel
2010Implicit Authentication through Learning User Behavior.
Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow
2010Improved Collision Attacks on the Reduced-Round Grøstl Hash Function.
Kota Ideguchi, Elmar Tischhauser, Bart Preneel
2010Improved Distinguishing Attack on Rabbit.
Yi Lu, Yvo Desmedt
2010Indifferentiable Security Reconsidered: Role of Scheduling.
Kazuki Yoneyama
2010Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks.
Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu
2010Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices.
Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter
2010Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation.
Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie
2010On Privacy Leakage through Silence Suppression.
Ye Zhu
2010On Side-Channel Resistant Block Cipher Usage.
Jorge Guajardo, Bart Mennink
2010One-Time Trapdoor One-Way Functions.
Julien Cathalo, Christophe Petit
2010Privacy-Preserving ECC-Based Grouping Proofs for RFID.
Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede
2010Privilege Escalation Attacks on Android.
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy
2010Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento
2010Revisiting the Security of the Alred Design.
Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho
2010Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents.
Özgür Dagdelen, Marc Fischlin
2010Security Implications of Crosstalk in Switching CMOS Gates.
Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes
2010Security Reductions of the Second Round SHA-3 Candidates.
Elena Andreeva, Bart Mennink, Bart Preneel
2010Selective Regular Expression Matching.
Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani
2010Summary-Invisible Networking: Techniques and Defenses.
Lei Wei, Michael K. Reiter, Ketan Mayer-Patel
2010Traceability of Executable Codes Using Neural Networks.
Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. S. Machado, Charles B. Prado, Luiz F. R. C. Carmo
2010Video Streaming Forensic - Content Identification with Traffic Snooping.
Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee
2010Walk the Walk: Attacking Gait Biometrics by Imitation.
Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski