ISC C

25 papers

YearTitle / Authors
2012100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks.
Samiran Bag, Aritra Dhar, Pinaki Sarkar
2012A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching.
Ciprian-Petrisor Pungila, Viorel Negru
2012A Quantitative Approach for Inexact Enforcement of Security Policies.
Peter Drábik, Fabio Martinelli, Charles Morisset
2012Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited.
Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser
2012An Empirical Study of Dangerous Behaviors in Firefox Extensions.
Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng
2012Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems.
Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari
2012Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems.
Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang
2012Differential Attacks on Reduced RIPEMD-160.
Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer
2012Domain-Specific Pseudonymous Signatures for the German Identity Card.
Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler
2012Dynamic Anomaly Detection for More Trustworthy Outsourced Computation.
Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser
2012Efficient Two-Move Blind Signatures in the Common Reference String Model.
Essam Ghadafi, Nigel P. Smart
2012GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library.
Johannes Gilger, Johannes Barnickel, Ulrike Meyer
2012Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings
Dieter Gollmann, Felix C. Freiling
2012Intended Actions: Risk Is Conflicting Incentives.
Lisa Rajbhandari, Einar Snekkenes
2012Learning Fine-Grained Structured Input for Memory Corruption Detection.
Lei Zhao, Debin Gao, Lina Wang
2012Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road?
Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot
2012OSDM: An Organizational Supervised Delegation Model for RBAC.
Nezar Nassr, Nidal Aboudagga, Eric Steegmans
2012On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.
Noboru Kunihiro
2012On the Self-similarity Nature of the Revocation Data.
Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Oscar Esparza, Juanjo Alins
2012Privacy-Preserving Speaker Authentication.
Manas A. Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso
2012Revisiting Difficulty Notions for Client Puzzles and DoS Resilience.
Bogdan Groza, Bogdan Warinschi
2012Secure Hierarchical Identity-Based Identification without Random Oracles.
Atsushi Fujioka, Taiichi Saito, Keita Xagawa
2012Selective Document Retrieval from Encrypted Database.
Christoph Bösch, Qiang Tang, Pieter H. Hartel, Willem Jonker
2012Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms.
Falko Strenzke
2012Strong Authentication with Mobile Phone.
Sanna Suoranta, André Andrade, Tuomas Aura