SECRYPT C

67 papers

YearTitle / Authors
2012A Collaborative Firewall for Wireless Ad-Hoc Social Networks.
Leonardo Maccari
2012A Mission-centric Framework for Cyber Situational Awareness.
Sushil Jajodia
2012A Novel Fuzzy Vault Scheme for Secret Key Exchange.
Lin You, Jie Lu
2012A Perspective of the Networks of the Future and Smart Cities.
Luís M. Correia
2012A Proposed Framework for Analysing Security Ceremonies.
Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio
2012A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation.
Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen
2012ADQL: A Flexible Access Definition and Query Language to Define Access Control Models.
Andreas C. Sonnenbichler, Andreas Geyer-Schulz
2012Adaptive Speech Watermarking in Wavelet Domain based on Logarithm.
Mehdi Fallahpour, David Megías, Hossein Najaf-Zadeh
2012An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management.
Julien Bringer, Hervé Chabanne, Alain Patey
2012An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size.
Chiara Valentina Schiavo, Andrea Visconti
2012Analysis of Some Natural Variants of the PKP Algorithm.
Rodolphe Lampe, Jacques Patarin
2012Attack Modelling and Security Evaluation for Security Information and Event Management.
Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova
2012Biometric Identification in Virtual Worlds using Biometric Fusion Techniques.
Ahmed Al-Khazzar, Nick Savage
2012Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection.
Yuyu Chou, Jan Oetting, Olga Levina
2012Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure.
Keita Emura, Mohammad Shahriar Rahman
2012Cryptographic Enforcement of Access Control while Mitigating Key Sharing.
Keith B. Frikken
2012Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale.
Geoffrey Charles Fox
2012DDoS Detection with Information Theory Metrics and Netflows - A Real Case.
Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini
2012Data Repository for Security Information and Event Management in Service Infrastructures.
Igor V. Kotenko, Olga Polubelova, Igor Saenko
2012Defense Against TCP Flooding Attack.
Seungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang
2012Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol.
Martin Schütte, Thomas Scheffler, Bettina Schnor
2012Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer.
Apostolos P. Fournaris
2012Extension of de Weger's Attack on RSA with Large Public Keys.
Nicolas T. Courtois, Theodosis Mourouzis, Pho V. Le
2012Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization.
Keita Emura, Takashi Sato
2012Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction.
Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga
2012Formal Analysis of the TLS Handshake Protocol.
Hanane Houmani, Mourad Debbabi
2012High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach.
George Athanasiou, Chara I. Chalkou, D. Bardis, Harris E. Michail, George Theodoridis, Costas E. Goutis
2012Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture.
Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge
2012HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots.
Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas
2012Identity-based Password-Authenticated Key Exchange for Client/Server Model.
Xun Yi, Raylin Tso, Eiji Okamoto
2012Improved "Partial Sums"-based Square Attack on AES.
Michael Tunstall
2012Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm.
Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf
2012Improving Cloud Survivability through Dependency based Virtual Machine Placement.
Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He
2012Inverting Thanks to SAT Solving - An Application on Reduced-step MD*.
Florian Legendre, Gilles Dequen, Michaël Krajecki
2012Key Management as a Service.
Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr.
2012Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes.
Venu Govindaraju
2012Network-based Executable File Extraction and Analysis for Malware Detection.
Byoung-Koo Kim, Ikkyun Kim, Tai-Myoung Chung
2012Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients.
Rainer Schick, Christoph Ruland
2012On Secure Communication over Wireless Sensor Networks.
Stefan Rass, Michal Koza
2012On Securing Communication from Profilers.
Sandra Diaz-Santiago, Debrup Chakraborty
2012On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function.
Harris E. Michail, George Athanasiou, Andreas Gregoriades, George Theodoridis, Costas E. Goutis
2012PPiTTA - Preserving Privacy in TV Targeted Advertising.
Tzachy Reinman, Erez Waisbard
2012Practical Applications of Homomorphic Encryption.
Michael Brenner, Henning Perl, Matthew Smith
2012Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases.
Nirali R. Nanavati, Devesh C. Jinwala
2012Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud.
Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik
2012Private Outsourcing of Matrix Multiplication over Closed Semi-rings.
Mikhail J. Atallah, Keith B. Frikken, Shumiao Wang
2012Quantifying the Benefits of File Size Information for Forensic Hash Matching.
Johan Garcia
2012Quantitative Assessment of Cloud Security Level Agreements - A Case Study.
Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri
2012Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images.
Nagaraj V. Dharwadkar, B. B. Amberker
2012SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications
Pierangela Samarati, Wenjing Lou, Jianying Zhou
2012SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics.
Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer
2012Secure File Allocation and Caching in Large-scale Distributed Systems.
Alessio Di Mauro, Alessandro Mei, Sushil Jajodia
2012Secure and Seamless Session Management in Mobile and Heterogeneous Environment.
Ali Hammami, Noëmie Simoni
2012Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer.
Constantinos Patsakis, Kleanthis Dellios
2012Security Policies in Dynamic Service Compositions.
Julian Schütte, Hervais Simo Fhom, Mark Gall
2012Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy.
Yonglin Sun, Yongjun Wang, Yi Zhang
2012Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems.
Denis Efremov, Nikolay V. Pakulin
2012Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures.
Marek Klonowski, Piotr Syga, Wojciech Wodo
2012Tampering with Java Card Exceptions - The Exception Proves the Rule.
Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc
2012The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes.
Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides
2012Towards Pervasive Cryptographic Access Control Models.
Mikko Kiviharju
2012Two Dragons - A Family of Fast Word-based Stream Ciphers.
Matt Henricksen
2012VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks.
Julien Bringer, Alain Patey
2012Verifying Privacy by Little Interaction and No Process Equivalence.
Denis Butin, Giampaolo Bella
2012Voice Passwords Revisited.
Chenguang Yang, Ghaith Hammouri, Berk Sunar
2012iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation.
Sufian Hameed, Tobias Kloht, Xiaoming Fu
2012lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks.
Anna Sojka, Krzysztof Piotrowski