SECRYPT C

68 papers

YearTitle / Authors
2011A Forward Private Protocol based on PRNG and LPN for Low-cost RFID .
Xiaolin Cao, Máire O'Neill
2011A Four-concern-oriented Secure IS Development Approach.
Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Pierre Konopacki, Régine Laleau, Jérémy Milhau, Richard St-Denis
2011A Framework for Security and Workload Gradual Adaptation.
Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante
2011A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel.
Yanling Chen, A. J. Han Vinck
2011A Logical View of Nonmonotonicity in Access Control.
Ali Noorollahi Ravari, Mehran S. Fallah
2011A Method for Flexible Reduction over Binary Fields using a Field Multiplier.
Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan, S. K. Nandy
2011A New Steganographic Scheme based on First Order Reed Muller Codes - A New Steganographic Scheme.
Houda Jouhari, El Mamoun Souidi
2011A New Tree-structure-specified Multisignature Scheme for a Document Circulation System.
Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka
2011A Public Randomness Service.
Michael J. Fischer, Michaela Iorga, René Peralta
2011A Security Metrics Framework for the Cloud.
Jesus Luna Garcia, Hamza Ghani, Daniel Germanus, Neeraj Suri
2011A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks.
Jing Xu, Wen Tao Zhu, Dengguo Feng
2011A Smart-gentry based Software System for Secret Program Execution.
Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith
2011A Snort-based Mobile Agent for a Distributed Intrusion Detection System.
Imen Brahmi, Sadok Ben Yahia, Pascal Poncelet
2011A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs.
Xin Xie, Fenlin Liu, Bin Lu, Tao Zhao, Hanning Li
2011A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture.
Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu
2011Analysis of Botnets through Life-cycle.
Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro
2011Anomaly-based Spam Filtering.
Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz, Pablo García Bringas
2011Apollon: Towards a Semantically Extensible Policy Framework.
Julian Schütte
2011Artificial Immunity-based Correlation System.
Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda
2011Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis.
Maria-Camilla Fiazza, Michele Peroli, Luca Viganò
2011Biometrics Privacy - Technologies and Applications.
Vincenzo Piuri, Fabio Scotti
2011Black-box Collision Attacks on the Compression Function of the GOST Hash Function.
Nicolas T. Courtois, Theodosis Mourouzis
2011Botnet Detection based on DNS Records and Active Probing.
Iria Prieto, Eduardo Magaña, Daniel Morató, Mikel Izal
2011Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl.
Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer
2011Byzantine Decisions for Inferring Trust in Sensor Networks.
Björn Stelte
2011CCA Secure Certificateless Encryption Schemes based on RSA.
S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan
2011Chaotic Iterations for Steganography - Stego-security and Chaos-security.
Nicolas Friot, Christophe Guyeux, Jacques M. Bahi
2011Collective Classification for Unknown Malware Detection.
Igor Santos, Carlos Laorden, Pablo García Bringas
2011Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids.
Mohammad Reza Sohizadeh Abyaneh
2011Data and Access Management using Access Tokens for Delegating Authority to Persons and Software.
Hidehito Gomi
2011Differential Fault Analysis of Hummingbird.
Yaser Esmaeili Salehani, Amr M. Youssef
2011Distributed Threshold Cryptography Certification with No Trusted Dealer.
Apostolos P. Fournaris
2011Driver Authentication using Brain Waves While Route Tracing as a Mental Task.
Isao Nakanishi, Sadanao Baba, Masahiro Inoue
2011E-Commerce and Fair Exchange - The Problem of Item Validation.
Fabio Piva, Ricardo Dahab
2011Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB.
Chunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu
2011Face Biometrics without Intrusion in Airport.
Enrique Cabello
2011Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher.
Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta
2011Higher Layer Authentication for Broadcast in Controller Area Networks.
Bogdan Groza, Pal-Stefan Murvay
2011How to Transmit Messages via WSN in a Hostile Environment.
Marek Klonowski, Michal Koza, Miroslaw Kutylowski
2011IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS.
Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis
2011Information-leakage in Hybrid Randomized Protocols.
Stefan Rass, Peter Schartner
2011Internationally Standardized Efficient Cryptographic Hash Function.
Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen
2011No Security by Obscurity - Why Two Factor Authentication Should Be based on an Open Design.
Jinying Yu, Philipp Brune
2011OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes.
Angel Jesus Varela-Vaca, Rafael M. Gasca, Sergio Pozo
2011On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting.
Marina Blanton, Mehrdad Aliasgari
2011On the Privacy Threats of Electronic Poll Books.
Stefan Popoveniuc, John Kelsey, Eugen Leontie
2011On the Security of Location Determination and Verification Methods for Wireless Networks.
Günther Lackner
2011On the Strength of Egglue and Other Logic CAPTCHAs.
Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro
2011Paradigms of Distributed Software Systems - Services, Processes, and Self-organization.
Winfried Lamersdorf
2011Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing.
Wassim Itani, Ayman I. Kayssi, Ali Chehab
2011Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use.
Jan Hajny, Lukas Malina, Vaclav Zeman
2011Privacy-enhancing Cryptography-based Materials.
Almudena Alcaide, Esther Palomar, Israel Barroso-Perez, Ali E. Abdallah
2011Privacy-preserving Smart Metering without a Trusted-third-party.
Tobias Jeske
2011Private Searching for Sensitive File Signatures.
John Solis
2011Related-key Attack against Triple Encryption based on Fixed Points.
Serge Vaudenay
2011SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
Javier López, Pierangela Samarati
2011SYNEMA: Visual Monitoring of Network and System Security Sensors.
Aline Bousquet, Patrice Clemente, Jean-François Lalande
2011Semantic Annotations for Security Policy Matching in WS-policy.
Giuseppe Di Modica, Orazio Tomarchio
2011Smartphone Security Evaluation - The Malware Attack Case .
Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis
2011Study of the Phenomenology of DDOS Network Attacks in Phase Space.
Michael E. Farmer, William Arthur
2011The Image Protector - A Flexible Security Rule Specification Toolkit .
Bechara al Bouna, Richard Chbeir, Alban Gabillon
2011Three-party Password-authenticated Key Exchange without Random Oracles.
Xun Yi, Raylin Tso, Eiji Okamoto
2011Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai
2011Towards a Calculus for Non Repudiation Protocols.
Abdesselam Redouane
2011Towards an Authorization System for Cloud Infrastructure Providers.
Jorge Bernal Bernabé, Juan Manuel Marín Pérez, José M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta
2011Towards an Information Control Policy Model - Achieving More Transparency in Internet Filtering Approaches.
Andreas Kasten
2011Unobservable Intrusion Detection based on Call Traces in Paravirtualized Systems.
Carlo Maiero, Marino Miculan
2011WiMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks.
Han-Chieh Chao