SECRYPT C

83 papers

YearTitle / Authors
2008A 640 Mbit/S 32-Bit Pipelined Implementation of the AES Algorithm.
Guido Marco Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni
2008A Fair e-Tendering Protocol.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang
2008A Fast Encryption Scheme for Networks Applications.
Mohamed Abo El-Fotouh, Klaus Diepold
2008A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers.
Guanhan Chew, Khoongming Khoo
2008A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets.
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca
2008A Multiple Birthday Attack on NTRU.
Raphael Overbeck
2008A New Probabilistic Rekeying Method for Secure Dynamic Groups.
Shankar Joshi, Alwyn R. Pais
2008A Note on Biometrics-based Authentication with Portable Device.
Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano, Kensuke Baba, Hiroto Yasuura
2008A Polynomial based Hashing Algorithm.
V. Kumar Murty, Nikolajs Volkovs
2008A Review of Trust Management, Security and Privacy Policy Languages.
Juri Luca De Coi, Daniel Olmedilla
2008A Short Note on Secret Sharing using Elliptic Curves.
Volker Müller
2008Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge.
Salem Benferhat, Karima Sedki
2008An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks.
Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro
2008An Efficient Multiplication Algorithm using Binomial Residue Representation.
Yin Li, Christophe Nègre
2008An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP Slices.
Muhammed Nauman Qureshi, Muhammad Nadeem Sial, Nassar Ikram
2008An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity.
Satyajit Grover, Divya Naidu Kolar Sunder, Samuel O. Moffatt, Michael E. Kounavis
2008An Improvement of Strong Proxy Signature and Its Applications.
Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou
2008An e-Voting Protocol based on Pairing Blind Signatures.
Lourdes López-García, Francisco Rodríguez-Henríquez, Miguel Ángel León-Chávez
2008Anonymous Message Authentication - Universally Composable Definition and Construction.
Kazuki Yoneyama
2008Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation.
Kazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe
2008Applying SRP on SIP Authentication.
Celalettin Kilinc, Ali Gökhan Yavuz
2008Autonomic Trust Management for a Pervasive System.
Zheng Yan
2008CSteg: Talking in C Code - Steganography of C Source Code in Text.
Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho
2008Cryptographic Algorithms - Successes, Failures and Challenges.
Bart Preneel
2008Cryptonet: Secure E-Mail System.
Sead Muftic, Gernot Schmoelzer
2008Detection of Illicit Traffic using Neural Networks.
Paulo Salvador, António Nogueira, Ulisses França, Rui Valadas
2008Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics.
Christian Damsgaard Jensen, Thomas Rune Korsgaard
2008Efficient IBE-PKE Proxy Re-Encryption.
Takeo Mizuno, Hiroshi Doi
2008Efficient Localization Schemes in Sensor Networks with Malicious Nodes.
Kaiqi Xiong, David J. Thuente
2008Enhanced Secure Interface for a Portable e-Voting Terminal.
André Zúquete
2008Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems.
Kikelomo Maria Apampa, Tian Zhang, Gary B. Wills, David Argles
2008Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy.
Hanane Houmani, Mohamed Mejri
2008Experimental Research and Capability Valuation on Security of SOA-SCA based SDO.
Peng Xu, Zhiyi Fang, Hang Su, Chuyi Wei
2008FPGA-Targeted Hardware Implementations of K2.
Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai
2008Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities.
Ioanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke
2008Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers.
B. B. Amberker, N. R. Sunitha
2008Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions.
Z. Cliffe Schreuders, Christian Payne
2008Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography.
Malte Diehl
2008Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon.
Ammar Boulaiche, Kamel Adi
2008Identity-based Signcryption without Random Oracles.
Shivaramakrishnan Narayan, Parampalli Udaya, Peter Hyun-Jeen Lee
2008Improved Fuzzy Vault Scheme for Fingerprint Verification.
Cengiz Örencik, Thomas Brochmann Pedersen, Erkay Savas, Mehmet Keskinöz
2008Improving Reliability in Commercial IP Networks.
Yaakov Kogan
2008Interactivity for Reactive Access Control.
Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia
2008Intrusion Detection and Prevention System using Secure Mobile Agents.
Muhammad Awais Shibli, Sead Muftic
2008Kerberos Implementation in Manets.
Atta-ur-Rahman, Mureed Hussain, Kahina Kabri, Dominique Seret
2008Key Distribution based on Quantum Fourier Transform.
Marius Nagy, Selim G. Akl, Sean Kershaw
2008Key Management of Quantum Generated Keys in IPsec.
Andreas Neppach, Christian Pfaffel-Janser, Ilse Wimberger, Thomas Lorünser, Michael Meyenburg, Alexander Szekely, Johannes Wolkerstorfer
2008Low Area Scalable Montgomery Inversion Over GF(2m).
Mohamed N. Hassan, Mohammed Benaissa
2008Metrics Application in Metropolitan Broadband Access Network Security Analysis.
Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr.
2008Multi-Collisions Attack in Ring Hash Structure.
Nasour Bagheri, Babak Sadeghiyan, Majid Naderi
2008Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks.
Omer Zekvan Yilmaz, Albert Levi, Erkay Savas
2008New Schemes for Anomaly Score Aggregation and Thresholding.
Salem Benferhat, Karim Tabia
2008New Techniques to Enhance the Capabilities of the Socks Network Security Protocol.
Mukund Sundararajan, Mohammad S. Obaidat
2008Next Generation CDMA Technologies for Futuristic Wireless Communications.
Hsiao-Hwa Chen
2008Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold.
Tarik Guelzim, Mohammad S. Obaidat
2008Novel and Anomalous Behavior Detection using Bayesian Network Classifiers.
Salem Benferhat, Karim Tabia
2008On the (In)Security of Two Buyer-Seller Watermarking Protocols.
Geong Sen Poh, Keith M. Martin
2008Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3.
Kwang Ho Kim, Christophe Nègre
2008Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas.
Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini
2008Price to Provide RFID Security and Privacy?.
Tim Good, Mohammed Benaissa
2008Proper Key Generation for the IzoSign Algorithm.
Loránd Szöllösi, Gábor Fehér, Tamás Marosits
2008Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets.
Eduardo da Silva, Aldri Luiz dos Santos, Luiz Carlos Pessoa Albini, Michele Nogueira Lima
2008REBEL - Reconfigurable Block Encryption Logic.
Mahadevan Gomathisankaran, Ka-Ming Keung, Akhilesh Tyagi
2008Reputation Management in Grid-based Virtual Organisations.
Álvaro Enrique Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi
2008Rethinking Digital Signatures.
Ueli M. Maurer
2008SAKE - Secure Authenticated Key Establishment in Sensor Networks.
Muhammad Yasir, Mureed Hussain, Kahina Kabri, Dominique Seret
2008SCFS: Towards Design and Implementation of a Secure Distributed Filesystem.
Juan Vera del Campo, Juan Hernández-Serrano, Josep Pegueroles
2008SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
Eduardo Fernández-Medina, Manu Malek, Javier Hernando
2008Sec-SNMP: Policy-based Security Management for Sensor Networks.
Qinghua Wang, Tingting Zhang
2008Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption.
Peter Hyun-Jeen Lee, Shivaramakrishnan Narayan, Parampalli Udaya
2008Securing the Email Services - New System for Secure Managing the Organization's Mail Service.
Raúl Herbosa, Gabriel Díaz, Manuel Castro
2008Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using OWL and SWRL.
Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra
2008Security Requirements in Software Product Lines.
Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
2008Security and Authentication for Networked Storage.
V. Kumar Murty, Guangwu Xu
2008Selecting Trustworthy Content using Tags.
Daniele Quercia, Licia Capra, Valentina Zanardi
2008The Importance of Metrology in Wireless Communication Systems - From AM/FM to SDR Systems.
Nuno Borges Carvalho
2008The Substitution Cipher Chaining Mode.
Mohamed Abo El-Fotouh, Klaus Diepold
2008Towards Language-Independent Approach for Security Concerns Weaving.
Azzam Mourad, Dima Alhadidi, Mourad Debbabi
2008Traitor Tracing for Anonymous Attack in Content Protection.
Hongxia Jin
2008Trust Model for High Quality Recommendation.
Gabriele Lenzini, Nabil Sahli, Henk Eertink
2008Watermarking, Steganography and Content Forensics.
Ingemar J. Cox
2008Yet Another Secure Distance-Bounding Protocol.
Ventzislav Nikov, Marc Vauclair
2008e-Business Innovation - Surviving the Coming Decades.
David A. Marca