SECRYPT C

73 papers

YearTitle / Authors
2006A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL.
Gregory V. Bard
2006A DoS Attack Against the Integrity-Less ESP (IPSEC).
Ventzislav Nikov
2006A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra.
Seyed Hamed Hassani, Mohammad Reza Aref
2006A Service Discovery Threat Model for Ad Hoc Networks.
Adrian Leung, Chris J. Mitchell
2006Access Control and Joint Management for Collaborative Peer Groups.
Wenhua Qi
2006Achieving Unconditional Security in Existing Networks Using Quantum Cryptography.
Stefan Rass, Mohamed Ali Sfaxi, Solange Ghernaouti-Helie
2006Action-Triggered Public-Key System for GSM Using RSA with Phone-Dependent Encryption.
Rehab K. El Nemr, Imane Aly Saroit Ismail, S. H. Ahmed
2006Advances in Speech and Audio Coding and its Applications for Mobile Multimedia.
Anisse Taleb
2006An Algorithm for Authentication of Digital Images.
Dumitru Dan Burdescu, Liana Stanescu
2006An Extended Role-Based Access Control for Web Services.
Yi-qun Zhu, Jianhua Li, Quan-hai Zhang
2006An Infinite Phase-Size BMAP/M/1 Queue and its Application to Secure Group Communication.
Hiroshi Toyoizumi
2006Chosen-IV Statistical Attacks on eStream Ciphers.
Markku-Juhani Olavi Saarinen
2006Collaboration Security for Modern Information Systems.
Richard Whittaker, Gonzalo Argote-Garcia, Peter J. Clarke, Raimund K. Ege
2006Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments on the Internet.
Antonio Ruiz-Martínez, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte
2006Comparative Study between Bayesian Network and Possibilistic Network in Intrusion Detection.
Najla Arfaoui, Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed
2006Defining Viewpoints for Security Architectural Patterns.
David Garcia Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
2006Design and Implementation of a Practical Secure Distributed Healthcare Application.
Zaobin Gan, Vijay Varadharajan
2006Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques.
Luis Zarza, Josep Pegueroles, Miguel Soriano, Rafael Martínez
2006Digital Contract Signature Scheme Based on Multiple Cryptosystem.
Wang Lianhai, Manu Malek
2006Digital Object Rights Management - Interoperable Client-side DRM Middleware.
Carlos Serrão, Miguel Sales Dias, Jaime Delgado
2006Digital Pseudonym Identity for E-Commerce.
Rafael Martínez-Peláez, Francisco Rico-Novella, Luis A. Zarza-López
2006E-Business Strategy - Charting a Way through Uncertain Waters of Electronic Commerce.
David A. Marca
2006Efficient All-or-Nothing Encryption Using CTR Mode.
Robert P. McEvoy, Colin C. Murphy
2006Evaluation of the Intrusion Detection Capabilities and Performance of a Security Operation Center.
Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, François Spies
2006Extending XML Signature and Applying it to Web Page Signing.
Takahito Tsukuba, Kenichiro Noguchi
2006Finite Field Multiplication in Lagrange Representation Using Fast Fourrier Transform.
Christophe Nègre
2006Flexible License Transfer System Using Mobile Terminal.
Masaki Inamura, Toshiaki Tanaka, Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura
2006Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka
2006IT Security Forensics: Promises and Shortcomings.
Manu Malek
2006Improving Software Security Through an Integrated Approach.
Zaobin Gan, Dengwei Wei, Vijay Varadharajan
2006Inter-Node Relationship Labeling: A Fine-Grained XML Access Control Implementation Using Generic Security Labels.
Zheng Zhang, Walid Rjaibi
2006Internet Routing Security: An Approach to Detect and to React to Incorrect Advertisements.
Ines Feki, Xiaoli Zheng, Mohammed Achemlal, Ahmed Serhrouchni
2006Intrusion Detection for Web Applications (Short Version).
Nathalie Dagorn
2006JASTEG2000 - Steganography for JPEG2000 Coded Images.
Domenico Introna, Francescomaria Marino
2006Layered Architecture for Secure E-Commerce Applications.
Amir Herzberg, Igal Yoffe
2006Least Privilege in Separation Kernels.
Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen
2006Model-Based Security Engineering.
Jan Jürjens
2006Modelling E-Business Security Using Business Processes.
Sharon Nachtigal, Chris J. Mitchell
2006More Robust Private Information.
Chun-Hua Chen, Gwoboa Horng
2006Multimedia Representation in MPEG Standards: Achievements and Challenges.
Fernando Pereira
2006Network Security Evaluation Based on Simulation of Malfactor's Behavior.
Igor V. Kotenko, Mikhail Stepashkin
2006On Use of Identity-Based Encryption for Secure Emailing.
Christian Veigner, Chunming Rong
2006On the Design of a Low-Rate DoS Attack Against Iterative Servers.
Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro
2006On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation Data.
Kun Huang, Dafang Zhang
2006Parallel Multiplication in F2n Using Condensed Matrix Representation.
Christophe Nègre
2006Person Verification by Fusion of Prosodic, Voice Spectral and Facial Parameters.
Javier Hernando, Mireia Farrús, Pascual Ejarque, Ainara Garde, Jordi Luque
2006Private Bidding for Mobile Agents.
Bartek Gedrojc, Kathy Cartrysse, Jan C. A. van der Lubbe
2006Project Management for E-Business Initiatives . Project Framework, Proven Practices, Coordinated Work, Focused Sub-Teams.
David A. Marca
2006Proposals for Iterated Hash Functions.
Lars R. Knudsen, Søren S. Thomsen
2006Protecting Adaptive Multimedia Delivery and Adaptation Using Proxy Based Approach.
Ahmed Réda Kaced, Jean-Claude Moissinac
2006Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack.
Chuan-Wen Loe, Khoongming Khoo
2006Protocol Independent Lightweight Secure Communication.
M. Amaç Güvensan, Ali Gökhan Yavuz
2006Quantitative Analysis and Enforcement of the Principle of Least Privilege in Role-Based.
Chunren Lai, Chang N. Zhang
2006Redefining the Market Place: Only the Numbers are Different?
Thomas Greene
2006SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
Manu Malek, Eduardo Fernández-Medina, Javier Hernando
2006Secure Access Modules for Identity Protection over the EAP-TLS - Smartcard Benefits for User Anonymity in Wireless Infrastructures.
Pascal Urien, Mohamad Badra
2006Secure Information Systems Development - Based on a Security Requirements Engineering Process.
Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
2006Secure Online English Auctions.
Jarrod Trevathan, Wayne Read
2006Securing Web Services Using Identity-Based Encryption (IBE).
Kari Anne Haaland, Chunming Rong
2006Security Considerations in Current VoIP Protocols.
Steffen Fries
2006Security Enhancement for a Low Computation Cost User Authentication Scheme.
Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
2006Security Risk Analysis in Web Services Systems.
Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini
2006Smooth Blocks-Based Blind Watermarking Algorithm in Compressed DCT Domain.
Chun Qi, Haitao Zhou, Bin Long
2006Spoofed ARP Packets Detection in Switched LAN Networks.
Zouheir Trabelsi, Khaled Shuaib
2006The "SECUREPHONE" - A Mobile Phone with Biometric Authentication and e-Signature Support for Dealing Secure Transactions on the Fly.
R. Ricci, Gérard Chollet, M. V. Crispino, Sabah Jassim, Jacques C. Koreman, Andrew C. Morris, M. Olivar-Dimas, Sonia Garcia-Salicetti, Pedro Soria-Rodriguez
2006Traitor Tracing for Subscription-Based Systems.
Hongxia Jin, Jeffrey B. Lotspiech, Mario Blaum
2006Trust Management without Reputation in P2P Games.
Adam Wierzbicki
2006Undesirable and Fraudulent Behaviour in Online Auctions.
Jarrod Trevathan, Wayne Read
2006Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction Correlation and Detection.
Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani
2006Using Microsoft Office Infopath to Generate XACML Policies.
Manuel Sánchez, Gabriel López, Antonio Fernandez Gómez-Skarmeta, Óscar Cánovas Reverte
2006Using OMA DRM 2.0 Protected Content - Ogg Vorbis Protected Audio under Symbian OS.
Francisco Pimenta, Carlos Serrão
2006Wireless Communications, a new Emphasis for Effective Use of the Radio Spectrum.
Les Barclay
2006Workload Hidden Markov Model for Anomaly Detection.
Juan Manuel García, Tomás Navarrete, Carlos Orozco