SECRYPT C

71 papers

YearTitle / Authors
2013A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software.
Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos
2013A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data Mining.
Nirali R. Nanavati, Devesh C. Jinwala
2013A Key-revocable Attribute-based Encryption for Mobile Cloud Environments.
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake
2013A Model-driven Approach for Securing Software Architectures.
Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, Stefano Paraboschi
2013A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities.
Maider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías, Juan J. Igarza
2013A Preliminary Application of Generalized Fault Trees to Security.
Daniele Codetta Raiteri
2013A Security-enhanced Design Methodology for Embedded Systems.
Alberto Ferrante, Jelena Milosevic, Marija Janjusevic
2013AVON - A Fast Hash Function for Intel SIMD Architectures.
Matt Henricksen, Shinsaku Kiyomoto
2013Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks.
Slim Trabelsi, Hana Bouafif
2013Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing.
Ravi Jhawar, Vincenzo Piuri
2013An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.
Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang
2013An Efficient and Provably Secure Certificateless Identification Scheme.
Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng
2013Approaching Encryption through Complex Number Logarithms.
George Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis
2013Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks.
Dustin van der Haar, Basie von Solms
2013Behavior-based Malware Analysis using Profile Hidden Markov Models.
Saradha Ravi, N. Balakrishnan, Bharath Venkatesh
2013Database Anomalous Activities - Detection and Quantification.
Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone
2013Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs.
Jonny Milliken, Valerio Selis, Kian Meng Yap, Alan Marshall
2013Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication.
Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz
2013Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model.
Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre
2013Dynamic Proofs of Retrievability from Chameleon-Hashes.
Stefan Rass
2013E3SN - Efficient Security Scheme for Sensor Networks.
Hassan Noura, Steven Martin, Khaldoun Al Agha
2013Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications.
Vinay S. Iyengar
2013Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration.
Lukas Malina, Jan Hajny, Zdenek Martinasek
2013Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves.
Christian Hanser, Daniel Slamanig
2013Enhanced Truncated Differential Cryptanalysis of GOST.
Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal
2013Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control.
Bo Lang, Runhua Xu, Yawei Duan
2013From a Logical Approach to Internal States of Hash Functions - How SAT Problem Can Help to Understand SHA-* and MD*.
Florian Legendre, Gilles Dequen, Michaël Krajecki
2013HoneydV6: A Low-interaction IPv6 Honeypot.
Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack
2013Identity Security in Biometric Systems based on Keystroking.
Lucjan Hanzlik, Wojciech Wodo
2013Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting.
Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen, Aurélien Francillon
2013Improving Block Cipher Design by Rearranging Internal Operations.
Liran Lerman, Jorge Nakahara Jr., Nikita Veshchikov
2013InCC: Hiding Information by Mimicking Traffic In Network Flows.
Luis Campo-Giralte, Cristina Conde, Isaac Martín de Diego, Enrique Cabello
2013Instance-based Anomaly Method for Android Malware Detection.
Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas
2013Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components.
Sébastien Salva, Stassia R. Zafimiharisoa, Patrice Laurençot
2013Keystroke Authentication with a Capacitive Display using Different Mobile Devices.
Matthias Trojahn, Christian Schadewald, Frank Ortmeier
2013LMM - A Common Component for Software License Management on Cloud.
Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake
2013MINHO - A Novel Authentication Scheme based on Pre-Authentication Service.
Hasan Kadhem
2013Massive Group Message Authentication with Revocable Anonymity.
Boaz Catane, Amir Herzberg
2013Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL.
Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta
2013Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks.
Ester Ciancamerla, Michele Minichino, S. Palmieri
2013Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis.
Daniel Santana de Freitas, Jorge Nakahara Jr.
2013Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs.
Z. Cliffe Schreuders, Adil M. Bhat
2013On the Connection between t-Closeness and Differential Privacy for Data Releases.
Josep Domingo-Ferrer
2013On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices.
Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed Ali Kâafar
2013On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers.
Ruth Ng Ii-Yung, Khoongming Khoo, Raphael C.-W. Phan
2013Partially Wildcarded Attribute-based Encryption and Its Efficient Construction.
Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai
2013Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE.
Michael Clear, Ciaran McGoldrick
2013Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones.
Thomas Zefferer, Peter Teufl
2013Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles.
Kazuki Yoneyama
2013Preimage Attack on BioHashing.
Patrick Lacharme, Estelle Cherrier, Christophe Rosenberger
2013Privacy-enhanced Perceptual Hashing of Audio Data.
Heiko Knospe
2013Privacy-preserving Realization of the STORK Framework in the Public Cloud.
Bernd Zwattendorfer, Daniel Slamanig
2013Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks.
Jan Hajny, Lukas Malina, Zdenek Martinasek, Vaclav Zeman
2013Public-key Cryptography from Different Assumptions - A Multi-bit Version.
Hervé Chabanne, Gérard D. Cohen, Alain Patey
2013Recovering RSA Private Keys on Implementations with Tampered LSBs.
Constantinos Patsakis
2013Redactable Signature Scheme for Tree-structured Data based on Merkle Tree.
Shoichi Hirose, Hidenori Kuwakado
2013Related-key Impossible Differential Cryptanalysis of Full-round HIGHT.
Saeed Rostami, Sadegh Bamohabbat Chafjiri, Seyed Amir Hossein Tabatabaei
2013SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013
Pierangela Samarati
2013SVD-based Digital Image Watermarking on approximated Orthogonal Matrix.
Yevhen Zolotavkin, Martti Juhola
2013Secure Alert Tracking in Supply Chain.
Mehdi Khalfaoui, Refik Molva, Laurent Gomez
2013Secure Computation of Hidden Markov Models.
Mehrdad Aliasgari, Marina Blanton
2013Secure Second Price Auctions with a Rational Auctioneer.
Boaz Catane, Amir Herzberg
2013Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data.
Simone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti
2013Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks.
Mickaël Cazorla, Kevin Marquet, Marine Minier
2013Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs.
Rolf Haynberg, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade
2013The Usability of CAPTCHAs on Smartphones.
Gerardo Reynaga, Sonia Chiasson
2013Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme.
Jacques M. Bahi, Nicolas Friot, Christophe Guyeux
2013Towards Cryptographic Function Distinguishers with Evolutionary Circuits.
Petr Svenda, Martin Ukrop, Vashek Matyas
2013Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control.
Lan Zhou, Vijay Varadharajan, Michael Hitchens
2013Which Side Are You On? - A New Panopticon vs. Privacy.
Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis
2013iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments.
Peter Teufl, Thomas Zefferer, Christof Stromberger, Christoph Hechenblaikner