SECRYPT C

52 papers

YearTitle / Authors
20163DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud.
Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello
2016A Code-based Group Signature Scheme with Shorter Public Key Length.
Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi
2016A Friend or a Foe? Detecting Malware using Memory and CPU Features.
Jelena Milosevic, Miroslaw Malek, Alberto Ferrante
2016A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management.
Abir Awad, Brian Lee
2016A Practical Encrypted Microprocessor.
Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu
2016A Pre-clustering Method To Improve Anomaly Detection.
Denis Hock, Martin Kappes, Bogdan V. Ghita
2016A Second Order Derivatives based Approach for Steganography.
Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux
2016A Template Attack Against VERIFY PIN Algorithms.
Hélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet, Ronan Lashermes
2016Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions.
George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos
2016Computations on Private Sets and their Application to Biometric based Authentication Systems.
Wojciech Wodo, Lucjan Hanzlik, Kamil Kluczniak
2016Differential Addition in Edwards Coordinates Revisited and a Short Note on Doubling in Twisted Edwards Form.
Srinivasa Rao Subramanya Rao
2016Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification.
Sumanta Chatterjee, Alwyn R. Pais, Sumit Saurabh
2016Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems.
Cristina Alcaraz, Javier López, Kim-Kwang Raymond Choo
2016Efficient Proxy Signature Scheme from Pairings.
Francesco Buccafurri, Rajeev Anand Sahu, Vishal Saraswat
2016Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications.
Andrea Lesavourey, Christophe Nègre, Thomas Plantard
2016Enhancing Operation Security using Secret Sharing.
Mohsen Ahmadvand, Antoine Scemama, Martín Ochoa, Alexander Pretschner
2016Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers.
Bogdan Groza, Pal-Stefan Murvay, Tudor Andreica
2016FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study.
Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux
2016FPGA Implementation of HS1-SIV.
Gerben Geltink, Sergei Volokitin
2016Hardware Accelerator for Stream Cipher Spritz.
Debjyoti Bhattacharjee, Anupam Chattopadhyay
2016How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis.
Gerardo Canfora, Francesco Mercaldo, Antonio Pirozzi, Corrado Aaron Visaggio
2016ISDSR: Secure DSR with ID-based Sequential Aggregate Signature.
Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara
2016LP-Cache: Privacy-aware Cache Model for Location-based Apps.
Asma Patel, Esther Palomar
2016Lean and Fast Secure Multi-party Computation: Minimizing Communication and Local Computation using a Helper.
Johannes Schneider
2016Multi-Device Authentication using Wearables and IoT.
Jan Hajny, Petr Dzurenda, Lukas Malina
2016OSCIDS: An Ontology based SCADA Intrusion Detection Framework.
Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer
2016Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting.
Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill
2016On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets.
Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux
2016PACCo: Privacy-friendly Access Control with Context.
Andreas Put, Bart De Decker
2016PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds.
Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia
2016Practical Application of Order-preserving Encryption in Wide Column Stores.
Tim Waage, Daniel Homann, Lena Wiese
2016Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon.
Nicolas T. Courtois, Pouyan Sepehrdad, Guangyan Song, Iason Papapanagiotakis-Bousy
2016Predictive Model for Exploit Kit based Attacks.
Slim Trabelsi, Skander Ben Mahmoud, Anis Zouaoui
2016Private Multi-party Matrix Multiplication and Trust Computations.
Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys
2016Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016.
Christian Callegari, Marten van Sinderen, Panagiotis G. Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, Mohammad S. Obaidat
2016Protecting Databases from Schema Disclosure - A CRUD-Based Protection Model.
Óscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar
2016Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution.
Giada Sciarretta, Alessandro Armando, Roberto Carbone, Silvio Ranise
2016Sensor-based Wearable PUF.
Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto
2016Silent and Continuous Authentication in Mobile Environment.
Gerardo Canfora, Paolo Di Notte, Francesco Mercaldo, Corrado Aaron Visaggio
2016Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance.
Johannes Schneider, Bin Lu, Thomas Locher, Yvonne-Anne Pignolet, Matús Harvan, Sebastian Obermeier
2016The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence Classes.
Ahmet Emin Tatar, Marius Nagy, Naya Nagy
2016The Mathematical Foundations for Mapping Policies to Network Devices.
Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner
2016Thermal Imaging Attacks on Keypad Security Systems.
Wojciech Wodo, Lucjan Hanzlik
2016Threats to 5G Group-based Authentication.
Rosario Giustolisi, Christian Gehrmann
2016Towards Access Control for Isolated Applications.
Kirill Belyaev, Indrakshi Ray
2016Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy.
Tomoaki Mimoto, Anirban Basu, Shinsaku Kiyomoto
2016Towards a Software Approach to Mitigate Correlation Power Analysis.
Ibraheem Frieslaar, Barry Irwin
2016Transitioning to a Javascript Voting Client for Remote Online Voting.
Jordi Cucurull, Sandra Guasch, David Galindo
2016Two Secure Anonymous Proxy-based Data Storages.
Olivier Blazy, Xavier Bultel, Pascal Lafourcade
2016User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme.
Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen
2016Verifiable Policy-defined Networking for Security Management.
Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung X. Nguyen, Marian Mihailescu, Michelle McClintock
2016Web-based Fingerprinting Techniques.
Vitor Bernardo, Dulce Domingos