SECRYPT C

62 papers

YearTitle / Authors
2009A Chaos based Encryption Method using Dynamical Systems with Strange Attractors.
S. Arash Sheikholeslam
2009A New Analysis of RC4 - A Data Mining Approach (J48).
Mohsen Hajsalehi Sichani, Ali Movaghar
2009A New Image Encryption Algorithm using Cellular Automata.
Mayank Varshney, Dipanwita Roy Chowdhury
2009A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions.
Shiwei Chen, Chenhui Jin
2009A Security Design Pattern Taxonomy based on Attack Patterns - Findings of a Systematic Literature Review.
Andreas Wiesauer, Johannes Sametinger
2009A Traffic Coherence Analysis Model for DDoS Attack Detection.
Hamza Rahmani, Nabil Sahli, Farouk Kamoun
2009Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks.
A. M. Hamad, Walid I. Khedr
2009Adaptive Antennas in Wireless Communication Networks.
Blagovest Shishkov
2009Adding Expert Knowledge to TAN-based Intrusion Detection Systems.
Salem Benferhat, Abdelhamid Boudjelida, Habiba Drias
2009An Alternative Approach for Formula Modelling in Security Metrics.
Rodrigo Sanches Miani, Felipe Marques Pires, Leonardo de Souza Mendes
2009An Anomaly-based Web Application Firewall.
Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez
2009An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk Assessment.
Anton Romanov, Eiji Okamoto
2009An Efficient Group Key Agreement Protocol for Heterogeneous Environment.
Mounita Saha, Dipanwita Roy Chowdhury
2009An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin
2009Assessment of Mobile Security Platforms.
Germán Retamosa, Jorge E. López de Vergara
2009Attack Graph Generation with Infused Fuzzy Clustering.
Sudip Misra, Mohammad S. Obaidat, Atig Bagchi, Ravindara Bhatt, Soumalya Ghosh
2009Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks.
Young-Jun Heo, Jintae Oh, Jongsoo Jang
2009Certified Pseudonyms Colligated with Master Secret Key.
Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang
2009Cloud Computing - Fundamental Architecture & Future Applications.
Frank Leymann
2009Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative Analysis.
Friedrich Köster, Michael Klaas, Hanh Quyen Nguyen, Walter Brenner, Markus Brändle, Sebastian Obermeier
2009Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs.
Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos
2009Efficient Traitor Tracing for Content Protection.
Hongxia Jin
2009Evaluation of Quality and Security of a VoIP Network based on Asterisk and OpenVPN.
Dherik Barison, Rodrigo Sanches Miani, Leonardo de Souza Mendes
2009Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network.
Peng Yang, Yuanchen Ma, Satoshi Yoshizawa
2009Finger Vein Verification Technology for Mobile Apparatus.
Hideo Sato
2009Free Security Suite 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration.
Javier Corral-García, Carlos-Jorge del Arco González, José Luis González Sánchez, José Luis Redondo García
2009ISEE: An Information Security Engineering Environment.
Jingde Cheng, Yuichi Goto, Daisuke Horie
2009Identifying Security Elements for Cooperative Information Systems.
Nathalie Dagorn
2009Implementing True Random Number Generators in FPGAs by Chip Filling.
Octavian Cret, Radu Tudoran, Alin Suciu, Tamas Györfi
2009Information-theoretically Secure Strong Verifiable Secret Sharing.
Changlu Lin, Lein Harn, Dingfeng Ye
2009Interactive Secret Share Management.
Constantin Catalin Dragan
2009Iterated Transformations and Quantitative Metrics for Software Protection.
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan
2009Managing Security of Grid Architecture with a Grid Security Operation Center.
Julien Bourgeois, Syed Raheel Hassan
2009Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network.
Jaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim
2009Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared Values.
Tord Ingolf Reistad
2009Network Stack Optimization for Improved IPsec Performance on Linux.
Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos
2009Nmix: An Ideal Candidate for Key Mixing.
Jaydeb Bhaumik, Dipanwita Roy Chowdhury
2009On the Need to Divide the Signature Creation Environment.
Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda
2009On the Security of Adding Confirmers into Designated Confirmer Signatures.
Wataru Senga, Hiroshi Doi
2009On the Security of Two Ring Signcryption Schemes.
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2009One-touch Financial Transaction Authentication.
Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar
2009Phishpin: An Integrated, Identity-based Anti-phishing Approach.
Hicham Tout
2009Practical Traceable Anonymous Identification.
Daniel Slamanig, Peter Schartner, Christian Stingl
2009Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes.
Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani
2009Protecting Information Privacy in the Electronic Society.
Pierangela Samarati
2009Quantum Secure Direct Communication using Entanglement and Super Dense Coding.
Ola M. Hegazy, Ayman M. Bahaa Eldin, Yasser H. Dakroury
2009RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey.
Michael Hutter
2009Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management.
Renan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini
2009Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions.
Guanhan Chew, Aileen Zhang, Khoongming Khoo
2009SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
Eduardo Fernández-Medina, Manu Malek, Javier Hernando
2009Safe Reverse Auctions Protocol - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks.
Leonardo Ribeiro, Guerra Ruy
2009Security Patterns, Towards a Further Level.
Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano
2009Service and Timeframe Dependent Unlinkable One-time Pseudonyms.
Kristof Verslype, Bart De Decker
2009Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks.
Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica
2009The Chameleon Cipher-192 (CC-192) - A Polymorphic Cipher.
Magdy Saeb
2009The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime.
Nicolas T. Courtois
2009Throttling DDoS Attacks.
Saraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash Darapureddi, Radhesh Mohandas, Alwyn R. Pais
2009Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative Analysis.
Hanh Quyen Nguyen, Friedrich Köster, Michael Klaas, Walter Brenner, Sebastian Obermeier, Markus Brändle
2009Universal Authentication Framework - Requirements and Phase Design.
Jan Hajny, Tomas Pelka, Petra Lambertova
2009Visual Programming Language for Security Requirements in Business Processes as Model-driven Software Development.
Mirad Zadic, Andrea Nowak
2009Web 2.0: A Buzzword, a Serious Development, just Fun, or What?
Gottfried Vossen
2009e-Business Design - A Shift to Adaptability.
David A. Marca