SECRYPT C

64 papers

YearTitle / Authors
2014A Cryptographic Study of Tokenization Systems.
Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty
2014A Formal Model for Forensic Storage Media Preparation Tools.
Benjamin Aziz, Philippe Massonet, Christophe Ponsard
2014A Hybrid Approach for Content Based Image Authentication.
Jinse Shin, Christoph Ruland
2014A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake
2014A Need-based Assessment for Building a National Cyber Security Workforce.
Seymour E. Goodman
2014A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme.
Francesco Buccafurri, Gianluca Lax
2014A Secure Anonymous Proxy Multi-signature Scheme.
Vishal Saraswat, Rajeev Anand Sahu
2014A Steganographic Protocol Based on Linear Error-Block Codes.
Rabiî Dariti, El Mamoun Souidi
2014Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction.
Vandana Guleria, Ratna Dutta
2014Advanced Persistent Threats & Social Engineering.
Edgar R. Weippl
2014An Efficient Lightweight Security Algorithm for Random Linear Network Coding.
Hassan Noura, Steven Martin, Khaldoun Al Agha
2014COGITO: Code Polymorphism to Secure Devices.
Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée
2014Certificateless Non-Interactive Key Exchange Protocol without Pairings.
Yun Wei, Fushan Wei, Chuangui Ma
2014CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds.
Nesrine Kaaniche, Maryline Laurent, Mohammed El-Barbori
2014Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon.
Nicolas T. Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad, Petr Susil
2014Constructing Empirical Tests of Randomness.
Marek Sýs, Petr Svenda, Martin Ukrop, Vashek Matyas
2014Could Bitcoin Transactions Be 100x Faster?.
Nicolas T. Courtois, Pinar Emirdag, Daniel A. Nagy
2014Democratization in Science and Technology through Cloud Computing.
Ivona Brandic
2014Differential Fault Attacks against AES Tampering with the Instruction Flow.
Silvia Mella, Filippo Melzani, Andrea Visconti
2014Dynamic Analysis of Usage Control Policies.
Yehia Elrakaiby, Jun Pang
2014Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions.
Sebastian Bittl
2014Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine.
Adriana-Cristina Enache, Valentin Sgarciu
2014Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal.
Amir I. Sulimov, Alexey D. Smolyakov, Arkadij V. Karpov, Oleg N. Sherstyukov
2014FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments.
Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini
2014Formal Analysis of Electronic Exams.
Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan
2014Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines.
Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle
2014Framework for Securing Data in Cloud Storage Services.
Mai Dahshan, Sherif Elkassas
2014Hybrid-Style Personal Key Management in Ubiquitous Computing.
Byoungcheon Lee
2014Identifying Cryptographic Functionality in Android Applications.
Alexander Oprisnik, Daniel M. Hein, Peter Teufl
2014KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited.
Jinyong Chang, Rui Xue
2014Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia
2014Keeping an Eye on Your Security Through Assurance Indicators.
Moussa Ouedraogo, Chien-Ting Kuo, Simon Tjoa, David Preston, Eric Dubois, Paulo Simões, Tiago Cruz
2014Mobile Devices - A Phisher's Paradise.
Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis
2014Modeling Requirements for Security-enhanced Design of Embedded Systems.
Alberto Ferrante, Igor Kaitovic, Jelena Milosevic
2014NFC Based Mobile Single Sign-On Solution as a Chrome Extension.
Ufuk Celikkan, Can Gelis
2014Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper.
Daniel Kavan, Klára Skodová, Martin Klíma
2014On Privacy Protection in the Internet Surveillance Era.
Dijana Vukovic, Danilo Gligoroski, Zoran Djuric
2014On Reliability of Clock-skew-based Remote Computer Identification.
Libor Polcak, Barbora Franková
2014On the Security of Partially Masked Software Implementations.
Alessandro Barenghi, Gerardo Pelosi
2014Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization.
Pratik Poddar, Achin Bansal, Bernard Menezes
2014Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols.
Saikrishna Badrinarayanan, C. Pandu Rangan
2014Partial Fingerprint Identification Through Correlation-based Approach.
Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan
2014Privacy Preserving Delegated Word Search in the Cloud.
Kaoutar Elkhiyaoui, Melek Önen, Refik Molva
2014Pseudorandom Number Generators with Balanced Gray Codes.
Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi
2014QR Steganography - A Threat to New Generation Electronic Voting Systems.
Jordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas, Víctor Acín
2014RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies.
Mikko Kiviharju
2014Randomized Addition of Sensitive Attributes for l-diversity.
Yuichi Sei, Akihiko Ohsuga
2014Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers.
Frederik Armknecht, Vasily Mikhalev
2014Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition & Gabor Filter Response.
Abdallah Meraoumia, Salim Chitroub, Ahmed Bouridane
2014SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014
Mohammad S. Obaidat, Andreas Holzinger, Pierangela Samarati
2014SMS Spam - A Holistic View.
Lamine M. Aouad, Alejandro Mosquera, Slawomir Grzonkowski, Dylan Morss
2014Secure Key Distribution based on Meteor Burst Communications.
Amir I. Sulimov, Arkadij V. Karpov
2014Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA.
Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Ali Nasir
2014Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism.
Pablo Antón del Pino, Antoine Monsifrot, Charles Salmon-Legagneur, Gwenaël J. Doërr
2014Secure Virtual Machine Migration (SV2M) in Cloud Federation.
Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor Abbasi
2014Shellcode Detection in IPv6 Networks with HoneydV6.
Sven Schindler, Oliver Eggert, Bettina Schnor, Thomas Scheffler
2014Signaling Attacks in Mobile Telephony.
Mihajlo Pavloski, Erol Gelenbe
2014Software and Hardware Certification Techniques in a Combined Certification Model.
Antonio Muñoz, Antonio Maña
2014Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments.
Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri
2014Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud.
Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula
2014Using Abductive and Inductive Inference to Generate Policy Explanations.
Fabio Marfia
2014Using Bitmaps for Executing Range Queries in Encrypted Databases.
Lil María Rodríguez-Henríquez, Debrup Chakraborty
2014Using the Juliet Test Suite to Compare Static Security Scanners.
Andreas Wagner, Johannes Sametinger
2014Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach.
Nirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, Soumya K. Ghosh