SECRYPT C

71 papers

YearTitle / Authors
2010"My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones.
Tim Dörflinger, Anna Voth, Juliane Krämer, Ronald Fromm
2010A C++ Class for Analysing Vector Boolean Functions from a Cryptographic Perspective.
José Antonio Álvarez-Cubero, Pedro J. Zufiria
2010A New Chaos-based Watermarking Algorithm.
Christophe Guyeux, Jacques M. Bahi
2010A Novel Intrusion Detection System for MANETs.
Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis
2010Access Control Models for Business Processes.
Vahid R. Karimi, Donald D. Cowan
2010Adaptive and Composable Non-interactive String-commitment Protocols.
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai
2010An Effective Clustering Approach to Web Query Log Anonymization.
Amin Milani Fard, Ke Wang
2010An Encryption Scheme for a Secure Policy Updating.
Luan Ibraimi, Muhammad Asim, Milan Petkovic
2010An ICT Security Management Framework.
Aristeidis Chatzipoulidis, Ioannis Mavridis
2010An Identity based Ring Signcryption Scheme with Public Verifiability.
S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan
2010Analysis of SNOW 3G⊕ Resynchronization Mechanism.
Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang
2010Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous Networks.
Giovanni Cabiddu, Emanuele Cesena, Davide Vernizzi
2010Anonymous Social Stamps - Authenticating Anonymous Statements to Friends with Privacy.
Sandeep S. Kumar
2010Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access.
María Isabel González Vasco, Somayeh Heidarvand, Jorge L. Villar
2010Anonymous but Authorized Transactions Supporting Selective Traceability.
Daniel Slamanig, Stefan Rass
2010Attacks on Web Services and Mitigation Schemes.
Vipul Patel, Radhesh Mohandas, Alwyn R. Pais
2010Auditing the Defense Against Cross Site Scripting in Web Applications.
Lwin Khin Shar, Hee Beng Kuan Tan
2010Automated Threat Identification for UML.
George Yee, Xingli Xie, Shikharesh Majumdar
2010BMQE System - A MQ Equations System based on Ergodic Matrix.
Xiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Miltos Petridis, Yongzhe Zhao
2010Chaotic Quantum Cryptography - The Ultimate for Network Security.
Stamatios V. Kartalopoulos
2010Confidentiality and Integrity for SUM Aggregation in Sensor Networks.
Keith B. Frikken, Yihua Zhang
2010Conjugation as Public Key Agreement Protocol in Mobile Cryptography.
Vittorio Ottaviani, Alberto Zanoni, Massimo Regoli
2010Don't Follow Me - Spam Detection in Twitter.
Alex Hai Wang
2010Efficient Algorithmic Safety Analysis of HRU Security Models.
Anja Fischer, Winfried E. Kühnhauser
2010Efficient Asymmetric IPSec for Secure iSCSI.
Murthy S. Andukuri, C. Edward Chow
2010EnCoRe: Towards a Holistic Approach to Privacy.
Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson
2010Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures.
Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu
2010Extended Visual Cryptography Scheme for Color Images with no Pixel Expansion.
Xiaoyu Wu, Duncan S. Wong, Qing Li
2010Forcing Out a Confession - Threshold Discernible Ring Signatures.
Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan
2010Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2.
Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica
2010From Nature to Methods and Back to Nature.
Petar M. Djuric
2010Graphical Authentication based on user Behaviour.
Ahmed Al-Khazzar, Nick Savage
2010HTEE: An HMAC based Tamper Evident Encryption.
Bradley Baker, C. Edward Chow
2010HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index.
Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik
2010Handling IDS' Reliability in Alert Correlation - A Bayesian Network-based Model for Handling IDS's Reliability and Controlling Prediction/False Alarm Rate Tradeoffs.
Karim Tabia, Philippe Leray
2010Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs.
Elisa Mannes, Eduardo da Silva, Michele Nogueira Lima, Aldri Luiz dos Santos
2010Improving N-Gram Linguistic Steganography based on Templates.
Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Álvarez
2010Infinite Alphabet Passwords - A Unified Model for a Class of Authentication Systems.
Marcia Gibson, Marc Conrad, Carsten Maple
2010Information Security: The SCAN - Secure Processor with Crypto-Biometrics Capabilities.
Nikolaos G. Bourbakis
2010Management of Security Policies in Virtual Organisations.
Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson
2010Nanonetworks - A New Frontier in Communications.
Ian F. Akyildiz
2010New Pseudo Near Collision Attack on Tiger.
Dibyendu Mallik, Debdeep Mukhopadhyay
2010On a Construction of Stream-cipher-based Hash Functions.
Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka
2010On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols.
David M. Williams, Helen Treharne, Anthony T. S. Ho
2010Piecewise Classification of Attack Patterns for Efficient Network Intrusion Detection.
Abdelhalim Zaidi, Nazim Agoulmine, Tayeb Kenaza
2010Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals.
Oliver Gmelch, Günther Pernul
2010Privacy Protection for user Authentication.
Jan Hajny, Tomas Pelka, Vaclav Zeman
2010Providing Confidentiality in Content-based Publish/subscribe Systems.
Mihaela Ion, Giovanni Russello, Bruno Crispo
2010Proxiable Designated Verifier Signature.
Mebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama
2010QoS and Security in Energy-harvesting Wireless Sensor Networks.
Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante
2010Realizing Secure Multiparty Computation on Incomplete Networks.
Shailesh Vaya
2010Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach.
Mahjoub Langar, Mohamed Mejri, Kamel Adi
2010Risk based Access Control with Uncertain and Time-dependent Sensitivity.
John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget
2010SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
Sokratis K. Katsikas, Pierangela Samarati
2010Safe RPC - Auditing Mixnets Safely using Randomized Partial Checking.
Stefan Popoveniuc, Eugen Leontie
2010Secure Bridging in Large Scale Deployment of Ethernet.
Khan Ferdous Wahid, Javier Rubio-Loyola
2010Security Models for Heterogeneous Networking.
Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, Raphael Chung-Wei Phan
2010Security in Future Mobile Sensor Networks - Issues and Challenges.
Eliana Stavrou, Andreas Pitsillides, George C. Hadjichristofi, Christoforos N. Hadjicostis
2010Server-assisted Long-term Secure 3-party Key Establishment.
Kashi Neupane, Rainer Steinwandt
2010Short ECC - A Lightweight Security Approach for Wireless Sensor Networks.
Anna Sojka, Krzysztof Piotrowski, Peter Langendörfer
2010Side-channel Attack on the HumanAuth CAPTCHA.
Carlos Javier Hernández-Castro, Arturo Ribagorda, Yago Sáez
2010Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey.
Dipankar Dasgupta, Sudip Saha, Aregahegn Negatu
2010The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies.
Jonny Milliken, Alan Marshall
2010Throttling DDoS Attacks using Discrete Logarithm Problem.
Avinash Darapureddi, Radhesh Mohandas, Alwyn Roshan Pais
2010Towards Data Protection Compliance.
Nicola Zannone, Milan Petkovic, Sandro Etalle
2010Towards Risk based Prevention of Grooming Attacks.
Dimitrios Michalopoulos, Ioannis Mavridis
2010Trust Degree based Access Control for Social Networks.
Bo Lang
2010Ultra High Speed SHA-256 Hashing Cryptographic Module for IPSec Hardware/Software Codesign.
Harris E. Michail, George Athanasiou, Angeliki Kritikakou, Costas E. Goutis, Andreas Gregoriades, Vicky G. Papadopoulou
2010Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries.
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai
2010Vulnerability of a Non-membership Proof Scheme.
Kun Peng, Feng Bao
2010What can RFID do for Vanets? - A Cryptographic Point of View.
Jorge Munilla, Andrés Ortiz, Alberto Peinado