ISC C

37 papers

YearTitle / Authors
2014"To Share or not to Share" in Client-Side Encrypted Clouds.
Duane C. Wilson, Giuseppe Ateniese
2014(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160.
Gaoli Wang, Yanzhao Shen
2014A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices.
Javier González, Michael Hölzl, Peter Riedl, Philippe Bonnet, René Mayrhofer
2014ARBRA: Anonymous Reputation-Based Revocation with Efficient Authentication.
Li Xi, Jianxiong Shao, Kang Yang, Dengguo Feng
2014Adding Controllable Linkability to Pairing-Based Group Signatures for Free.
Daniel Slamanig, Raphael Spreitzer, Thomas Unterluggauer
2014An Evaluation of Single Character Frequency-Based Exclusive Signature Matching in Distinct IDS Environments.
Weizhi Meng, Wenjuan Li, Lam-for Kwok
2014Analyzing Android Browser Apps for file: // Vulnerabilities.
Daoyuan Wu, Rocky K. C. Chang
2014Attribute-Based Signatures for Circuits from Multilinear Maps.
Fei Tang, Hongda Li, Bei Liang
2014CodeXt: Automatic Extraction of Obfuscated Attack Code from Memory Dump.
Ryan Farley, Xinyuan Wang
2014Comprehensive Behavior Profiling for Proactive Android Malware Detection.
Britton Wolfe, Karim O. Elish, Danfeng (Daphne) Yao
2014Defining Injection Attacks.
Donald Ray, Jay Ligatti
2014Efficient Attack Forest Construction for Automotive On-board Networks.
Martin Salfer, Hendrik Schweppe, Claudia Eckert
2014Efficient Secure and Verifiable Outsourcing of Matrix Multiplications.
Yihua Zhang, Marina Blanton
2014Exploiting the Floating-Point Computing Power of GPUs for RSA.
Fangyu Zheng, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao
2014Expressive and Secure Searchable Encryption in the Public Key Setting.
Zhiquan Lv, Cheng Hong, Min Zhang, Dengguo Feng
2014Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups.
Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay
2014Graded Encryption, or How to Play "Who Wants To Be A Millionaire?" Distributively.
Aggelos Kiayias, Murat Osmanoglu, Qiang Tang
2014Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations.
Toomas Krips, Jan Willemson
2014Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings
Sherman S. M. Chow, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu
2014Investigating the Hooking Behavior: A Page-Level Memory Monitoring Method for Live Forensics.
Yingxin Cheng, Xiao Fu, Bin Luo, Rui Yang, Hao Ruan
2014Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols.
Sven Laur, Bingsheng Zhang
2014MobiHydra: Pragmatic and Multi-level Plausibly Deniable Encryption Storage for Mobile Devices.
Xingjie Yu, Bo Chen, Zhan Wang, Bing Chang, Wen Tao Zhu, Jiwu Jing
2014Obfuscation-Based Non-Black-Box Extraction and Constant-Round Zero-Knowledge Arguments of Knowledge.
Ning Ding
2014On Formally Bounding Information Leakage by Statistical Estimation.
Michele Boreale, Michela Paolini
2014PAEQ: Parallelizable Permutation-Based Authenticated Encryption.
Alex Biryukov, Dmitry Khovratovich
2014Reducing User Tracking through Automatic Web Site State Isolations.
Martin Stopczynski, Michael Zugelder
2014Related-Key Security for Hybrid Encryption.
Xianhui Lu, Bao Li, Dingding Jia
2014Revised Algorithms for Computing Algebraic Immunity against Algebraic and Fast Algebraic Attacks.
Lin Jiao, Bin Zhang, Mingsheng Wang
2014SIACHEN: A Fine-Grained Policy Language for the Mitigation of Cross-Site Scripting Attacks.
Ashar Javed, Jens Riemer, Jörg Schwenk
2014Security Issues in OAuth 2.0 SSO Implementations.
Wanpeng Li, Chris J. Mitchell
2014Soundsquatting: Uncovering the Use of Homophones in Domain Squatting.
Nick Nikiforakis, Marco Balduzzi, Lieven Desmet, Frank Piessens, Wouter Joosen
2014Structure Based Data De-Anonymization of Social Networks and Mobility Traces.
Shouling Ji, Weiqing Li, Mudhakar Srivatsa, Jing (Selena) He, Raheem A. Beyah
2014SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection.
Sebastian Biedermann, Jakub Szefer
2014Using Machine Language Model for Mimimorphic Malware Detection.
Pinghai Yuan, Qingkai Zeng, Yao Liu
2014Winnowing Double Structure for Wildcard Query in Payload Attribution.
Yichen Wei, Fei Xu, Xiaojun Chen, Yiguo Pu, Jinqiao Shi, Sihan Qing
2014eavesROP: Listening for ROP Payloads in Data Streams.
Christopher Jämthagen, Linus Karlsson, Paul Stankovski, Martin Hell
2014transAD: An Anomaly Detection Network Intrusion Sensor for the Web.
Sharath Hiremagalore, Daniel Barbará, Dan Fleck, Walter Powell, Angelos Stavrou