ISC C

30 papers

YearTitle / Authors
2015Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings
Yvo Desmedt
20134GMOP: Mopping Malware Initiated SMS Traffic in Mobile Networks.
Marián Kühnel, Ulrike Meyer
2013A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites.
Ping Chen, Nick Nikiforakis, Christophe Huygens, Lieven Desmet
2013A Secure and Efficient Method for Scalar Multiplication on Supersingular Elliptic Curves over Binary Fields.
Matheus F. de Oliveira, Marco Aurélio Amaral Henriques
2013Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan, Jianying Zhou
2013An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles.
Naoto Yanai, Masahiro Mambo, Eiji Okamoto
2013Cars, Condoms, and Facebook.
Vaibhav Garg, L. Jean Camp
2013CrowdFlow: Efficient Information Flow Security.
Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz
2013Design and Analysis of a Sophisticated Malware Attack Against Smart Grid.
Byungho Min, Vijay Varadharajan
2013DroidTest: Testing Android Applications for Leakage of Private Information.
Sarker T. Ahmed Rumee, Donggang Liu
2013Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption.
Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai
2013Encrypted Secret Sharing and Analysis by Plaintext Randomization.
Stephen R. Tate, Roopa Vishwanathan, Scott Weeks
2013Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited.
Lin Jiao, Bin Zhang, Mingsheng Wang
2013Factoring a Multiprime Modulus
Routo Terada, Reynaldo Cáceres Villena
2013Faster 128-EEA3 and 128-EIA3 Software.
Roberto Avanzi, Billy Bob Brumley
2013Fine-Grained Access Control for HTML5-Based Mobile Applications in Android.
Xing Jin, Lusha Wang, Tongbo Luo, Wenliang Du
2013Human Assisted Randomness Generation Using Video Games.
Mohsen Alimomeni, Reihaneh Safavi-Naini
2013Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA.
Dongxia Bai, Hongbo Yu
2013Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection.
Irfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev
2013Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks.
Steffen Wagner, Christoph Krauß, Claudia Eckert
2013Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases.
Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores
2013Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs.
Cristina Alcaraz, Estefanía Etchevés Miciolino, Stephen D. Wolthusen
2013Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards.
Ding Wang, Ping Wang
2013On the Viability of CAPTCHAs for use in Telephony Systems: A Usability Field Study.
Niharika Sachdeva, Nitesh Saxena, Ponnurangam Kumaraguru
2013Practical and Provably Secure Distance-Bounding.
Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay
2013Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length.
Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro
2013Round-Efficient Private Stable Matching from Additive Homomorphic Encryption.
Tadanori Teruya, Jun Sakuma
2013Security Ranking Among Assumptions Within the
Antoine Joux, Antoine Rojat
2013Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou
2013The Security Defect of a Multi-pixel Encoding Method.
Teng Guo, Feng Liu, Chuan Kun Wu, YoungChang Hou, YaWei Ren, Wen Wang