SECRYPT C

67 papers

YearTitle / Authors
2007A 3g IMS-based Testbed for Secure Real-Time Audio Sessions.
Paolo Cennamo, Antonio Fresa, Anton Luca Robustelli, Francesco Toro, Maurizio Longo, Fabio Postiglione
2007A Closer Look at Broadcast Encryption and Traitor Tracing for Content Protection.
Hongxia Jin
2007A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware.
Kazumasa Omote, Takeshi Shimoyama, Satoru Torii
2007A High-Level Aspect-Oriented based Language for Software Security Hardening.
Azzam Mourad, Marc-André Laverdière, Mourad Debbabi
2007A More Efficient Convertible Nominative Signature.
Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong
2007A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps.
Shivaramakrishnan Narayan, Parampalli Udaya
2007A Query Unit for The IPSec Databases.
Alberto Ferrante, Sathish Chandra, Vincenzo Piuri
2007A Secure Jailing System for Confining Untrusted Applications.
Guido van 't Noordende, Ádám Balogh, Rutger F. H. Hofman, Frances M. T. Brazier, Andrew S. Tanenbaum
2007Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs.
Amitabh Saxena
2007An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted Computing.
Adrian Leung, Geong Sen Poh
2007An Effective and Secure Watermarking Protocol for Digital Rights Protection over the Second-Hand Market.
Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy
2007An Efficient Intrusion Detection System for Networks with Centralized Routing.
Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro
2007An Improved Model for Secure Cryptographic Integrity Verification of Local Code.
Christian Payne
2007Anonymous Prepaid Content Viewing System with Mobile Terminal.
Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura, Masaki Inamura, Toshiaki Tanaka
2007Clock Control Sequence Reconstruction in the Generalized Shrinking Generator.
Slobodan Petrovic
2007Combined Data Mining Approach for Intrusion Detection.
Urko Zurutuza, Roberto Uribeetxeberria, Ekain Azketa, G. Gil, Jesus Lizarraga, Miguel Fernández
2007Cross-Layer Resource Allocation in Satellite Networks.
Franco Davoli
2007Detecting Anomalous Traffic using Statistical Processing and Self-Organizing Maps.
Paola Baldassarri, Anna Montesanto, Paolo Puliti
2007Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises.
Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
2007Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies.
Annett Laube, Laurent Gomez
2007Efficient Large-Scale Distributed Key Generation against Burst Interruption.
Jheng-Ru Ou, Shi-Chun Tsai, Wen-Guey Tzeng
2007Extensible Access Control Model for XML Document Collections.
Goran Sladic, Branko Milosavljevic, Zora Konjovic
2007Formal Analysis Methods of Network Security Design.
Mariusz Stawowski
2007Future and Challenges of the Security of e-Systems and Computer Networks.
Mohammad S. Obaidat
2007Identity Based Public Key Exchange (IDPKE) for Wireless Ad Hoc Networks.
Clare McGrath, Ghazanfar Ali Safdar, Máire McLoone
2007Implementation and Analysis of a Handwritten Signature Verification Technique.
Alan McCabe, Jarrod Trevathan
2007Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy.
Masaki Inamura, Toshiaki Tanaka
2007Improving Security in Chaotic Spread Spectrum Communication Systems with a Novel 'Bit Power Parameter Spectrum' Measure.
Branislav Jovic, Charles P. Unsworth
2007Independent Voter Verifiability for Remote Electronic Voting.
Jordi Puiggali, Victor Morales-Rocha
2007Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project.
Günther Pernul
2007Integrated Right Management for Home Content - A SIM based Right Management Solution for Home Networks.
György Kálmán, Josef Noll
2007Investigation of Cooperative Defense against DDoS.
Igor V. Kotenko, Alexander Ulanov
2007K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai
2007MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents.
Rafael Páez, Joan Tomàs, Jordi Forné, Miguel Soriano
2007Mobile Agent Security with Efficient Oblivious Transfer.
Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji
2007Mobile Secret Key Distribution with Network Coding.
Paulo F. Oliveira, Rui A. Costa, João Barros
2007Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security.
M. Razvi Doomun, K. M. Sunjiv Soyjaudah
2007On the Effect of Score Equalization in SVM Multimodal Biometric Systems.
Pascual Ejarque, Javier Hernando
2007On the Improvement of Remote Authentication Scheme with Smart Cards.
Lih-Yang Wang, Chao-Chih Chen
2007On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols.
Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hristu-Varsakelis, George Stephanides
2007Practical Secure Biometrics using Set Intersection as a Similarity Measure.
Daniel Socek, Dubravko Culibrk, Vladimir Bozovic
2007Practical Verification of Untrusted Terminals using Remote Attestation.
Simone Lupetti, Gianluca Dini
2007Practical and Universal Interpretation Functions for Secrecy.
Hanane Houmani, Mohamed Mejri
2007Pragmatic Computing.
Kecheng Liu
2007Privacy Preserving k-Means Clustering in Multi-Party Environment.
Saeed Samet, Ali Miri, Luis Orozco-Barbosa
2007Private Computing with Beehive Organized Agents.
Bartek Gedrojc, Jan C. A. van der Lubbe, Martin van Hensbergen
2007Recent Trends in the Design of Video Signal Processing IPS and Multimedia SoCs.
Santanu Dutta
2007Reliable Process for Security Policy Deployment.
Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain
2007Remote Algorithmic Complexity Attacks against Randomized Hash Tables.
Noa Bar-Yosef, Avishai Wool
2007Role and Task Based Authorization Management for Process-View.
Mei-Yu Wu, Duen-Ren Liu
2007SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
Javier Hernando, Eduardo Fernández-Medina, Manu Malek
2007SOA Wisdom.
Tony C. Shan
2007Secure Computation of Common Data among Malicious Partners.
Sebastian Obermeier, Stefan Böttcher
2007Secure License Management - Management of Digital Object Licenses in a DRM Environment.
Carlos Serrão, Miguel Sales Dias, Jaime Delgado
2007Secure Service Publishing with Untrusted Registries - Securing Service Discovery.
Slim Trabelsi, Yves Roudier
2007Securing Healthgrid Environments.
Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos, Christos K. Georgiadis
2007Securing OpenSSL against Micro-Architectural Attacks.
Marc Joye, Michael Tunstall
2007Subquadratic Binary Field Multiplier in Double Polynomial System.
Pascal Giorgi, Christophe Nègre, Thomas Plantard
2007The Polynomial Multicomposition Problem in (Z/nZ).
Neculai Daniel Stoleru, Victor Valeriu Patriciu
2007Towards User Authentication Flexibility.
Laurent Gomez, Ivonne Thomas
2007Towards a Multi-model Views Security Framework.
Lei Xia, Hao Huang, Shuying Yu
2007Using Steganography to Improve Hash Functions' Collision Resistance.
Emmanouel Kellinis, Konstantinos Papapanagiotou
2007Utility Computing: Reality and Beyond.
Ivan Ivanov
2007Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking.
Adnan Abdul-Aziz Gutub, Lahouari Ghouti, Alaaeldin A. Amin, Talal M. Alkharobi, Mohammad K. Ibrahim
2007Utilizing Social Networking Platforms to Support Public Key Infrastructures.
Volker Gruhn, Malte Hülder, Vincent Wolff-Marting
2007Wise Guard - MAC Address Spoofing Detection System for Wireless LANs.
Kai Tao, Jing Li, Srinivas Sampalli
2007e-Business Security Design using Process Security Requirements Septet.
Sharon Nachtigal