ISC C

27 papers

YearTitle / Authors
2016A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing.
Guanhua Yan, Yunus Kucuk, Max Slocum, David C. Last
2016AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash.
Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng
2016Analyzing Randomized Response Mechanisms Under Differential Privacy.
Atsushi Waseda, Ryo Nojima
2016Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols.
Franziskus Kiefer, Mark Manulis
2016Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2.
Lucjan Hanzlik, Miroslaw Kutylowski
2016Control Flow Integrity Enforcement with Dynamic Code Optimization.
Yan Lin, Xiaoxiao Tang, Debin Gao, Jianming Fu
2016Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication.
Jun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng, Zhangjie Huang
2016Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.
Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng
2016Cyber Security Risk Assessment of a DDoS Attack.
Gaute Wangen, Andrii Shalaginov, Christoffer Hallstensen
2016Damaging, Simplifying, and Salvaging p-OMD.
Tomer Ashur, Bart Mennink
2016Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security.
Junichi Tomida, Masayuki Abe, Tatsuaki Okamoto
2016Enhanced Correlation Power Analysis by Biasing Power Traces.
Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai, Na Pang
2016Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method.
Dongpeng Xu, Jiang Ming, Dinghao Wu
2016Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle Model.
Masayuki Fukumitsu, Shingo Hasegawa
2016Improved Linear Cryptanalysis of Round-Reduced ARIA.
Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef
2016Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings
Matt Bishop, Anderson C. A. Nascimento
2016Leveraging Internet Services to Evade Censorship.
Apostolis Zarras
2016MQSAS - A Multivariate Sequential Aggregate Signature Scheme.
Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt
2016Models and Algorithms for Graph Watermarking.
David Eppstein, Michael T. Goodrich, Jenny Lam, Nil Mamano, Michael Mitzenmacher, Manuel R. Torres
2016Moving Target Defense Against Network Reconnaissance with Software Defined Networking.
Li Wang, Dinghao Wu
2016Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits.
Atsushi Takayasu, Noboru Kunihiro
2016Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems.
Steffen Wagner, Claudia Eckert
2016SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing.
George D. Webster, Zachary D. Hanif, Andre L. P. Ludwig, Tamas K. Lengyel, Apostolis Zarras, Claudia Eckert
2016Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128.
Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
2016Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control.
Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan
2016Universally Composable Two-Server PAKE.
Franziskus Kiefer, Mark Manulis
2016Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools.
Samiran Bag, Kouichi Sakurai