SECRYPT C

53 papers

YearTitle / Authors
2015A Flexible Architecture for Industrial Control System Honeypots.
Alexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu
2015A Formally Verified Access Control Mechanism for Information Centric Networks.
Mahdi Aiash, Jonathan Loo
2015A Framework for Incident Response in Industrial Control Systems.
Roman Schlegel, Ana Hristova, Sebastian Obermeier
2015A Key-private Cryptosystem from the Quadratic Residuosity.
Marc Joye
2015A Note on Schoenmakers Algorithm for Multi Exponentiation.
Srinivasa Rao Subramanya Rao
2015A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange.
Luigi Maria Bottasso
2015A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies.
Faouzi Jaïdi, Faten Labbene Ayachi
2015A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux.
Peter Amthor
2015Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection.
Tayeb Kenaza, Abdenour Labed, Yacine Boulahia, Mohcen Sebehi
2015Algorithmic Information Theory for Obfuscation Security.
Rabih Mohsen, Alexandre Miranda Pinto
2015An OWL-based XACML Policy Framework.
Fabio Marfia, Mario Arrigoni Neri, Filippo Pellegrini, Marco Colombetti
2015Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery.
Catalin V. Bîrjoveanu
2015Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units.
Martin Salfer, Claudia Eckert
2015Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position.
George Stergiopoulos, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis
2015Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?.
Zisis Tsiatsikas, Alexandros Fakis, Dimitrios Papamartzivanos, Dimitris Geneiatakis, Georgios Kambourakis, Constantinos Kolias
2015Cloud Resources Placement based on Functional and Non-functional Requirements.
Asma Guesmi, Patrice Clemente, Frédéric Loulergue, Pascal Berthomé
2015Controlled Proxy Re-signing - Conditional Proxy Re-Signatures.
S. Sree Vivek, Guhan Balasubramanian
2015Counter based Detection and Mitigation of Signalling Attacks.
Mihajlo Pavloski, Gökçe Görbil, Erol Gelenbe
2015DPA Resistance Enhancement through a Self-healing PLL based Power Mask.
Fleura Hajilou, Ehsan Mazidi, Shahab Ardalan
2015Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES.
Bholanath Roy, Ravi Prakash Giri, Ashokkumar C., Bernard Menezes
2015Design and Performance Aspects of Information Security Prediction Markets for Risk Management.
Pankaj Pandey, Einar Arthur Snekkenes
2015Distributed Intrusion Detection System based on Anticipation and Prediction Approach.
Hajar Benmoussa, Anas Abou El Kalam, Abdellah Ait Ouahman
2015Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics.
Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar
2015Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints.
Johan Garcia
2015Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment.
Alexey D. Smolyakov, Amir I. Sulimov, Arkadij V. Karpov, Aidar V. Galiev
2015Formal Analysis of E-Cash Protocols.
Jannik Dreier, Ali Kassem, Pascal Lafourcade
2015Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto
2015Light Blind: Why Encrypt If You Can Share?.
Pierpaolo Cincilla, Aymen Boudguiga, Makhlouf Hadji, Arnaud Kaiser
2015MEDA: A Machine Emulation Detection Algorithm.
Valerio Selis, Alan Marshall
2015MoCrySIL - Carry Your Cryptographic Keys in Your Pocket.
Florian Reimair, Peter Teufl, Christian Kollmann, Christoph Thaller
2015Mobile Malware Detection using Op-code Frequency Histograms.
Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio
2015Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies.
Worachet Uttha, Clara Bertolissi, Silvio Ranise
2015Monitoring Software Vulnerabilities through Social Networks Analysis.
Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari
2015New Results for Partial Key Exposure on RSA with Exponent Blinding.
Stelvio Cimato, Silvia Mella, Ruggero Susella
2015On the Instability of Sensor Orientation in Gait Verification on Mobile Phone.
Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen
2015Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve.
Christophe Nègre, Jean-Marc Robert
2015Performance Evaluation of Meteor Key Distribution.
Amir I. Sulimov, Arkadij V. Karpov
2015Phish-IDetector: Message-Id Based Automatic Phishing Detection.
Rakesh M. Verma, Nirmala Rai
2015Policy Anomaly Detection for Distributed IPv6 Firewalls.
Claas Lorenz, Bettina Schnor
2015Practical IBE Secure under CBDH - Encrypting Without Pairing.
S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan
2015Practical and Secure Integrated PKE+PEKS with Keyword Privacy.
Francesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu, Vishal Saraswat
2015Preserving Privacy in Collaborative Business Process Composition.
Hassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Shafay Shamail, Nabil R. Adam
2015Private Eyes: Secure Remote Biometric Authentication.
Ewa Syta, Michael J. Fischer, David Wolinsky, Abraham Silberschatz, Gina Gallegos-García, Bryan Ford
2015Revealing Encrypted WebRTC Traffic via Machine Learning Tools.
Mario Di Mauro, Maurizio Longo
2015SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015.
Mohammad S. Obaidat, Pascal Lorenz, Pierangela Samarati
2015Scargos: Towards Automatic Vulnerability Distribution.
Florian Rhinow, Michael Clear
2015Secure Physical Access Control with Strong Cryptographic Protection.
Jan Hajny, Petr Dzurenda, Lukas Malina
2015Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET.
Kaibin Huang, Yu-Chi Chen, Raylin Tso
2015Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems.
Jason Reeves, Sean W. Smith
2015Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations.
Eduardo B. Fernández, Dereje Yimam
2015Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment.
Lukas Malina, Petr Munster, Jan Hajny, Tomás Horváth
2015WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification.
Jennifer Bellizzi, Mark Vella
2015hHB: A Harder HB
Ka Ahmad Khoureich