SECRYPT C

67 papers

YearTitle / Authors
2017(In) Security in Graph Databases - Analysis and Data Leaks.
Miguel Hernández Boza, Alfonso Muñoz
2017A Card-less TEE-based Solution for Trusted Access Control.
Mohamed Amine Bouazzouni, Emmanuel Conchon, Fabrice Peyrard, Pierre-François Bonnefoi
2017A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid.
Alireza Jolfaei, Krishna Kant
2017A Lightweight Online Advertising Classification System using Lexical-based Features.
Xichen Zhang, Arash Habibi Lashkari, Ali A. Ghorbani
2017A Probabilistic Baby-step Giant-step Algorithm.
Prabhat Kushwaha, Ayan Mahalanobis
2017A Review of PROFIBUS Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization Controls.
Venesa Watson, Xinxin Lou, Yuan Gao
2017Accelerating Square Root Computations Over Large GF (2m).
Salah S. Harb, Moath H. A. Jarrah
2017Adding Privacy Protection to Distributed Software Systems.
George O. M. Yee
2017Analysis of Intrusion Detection Systems in Industrial Ecosystems.
Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier López
2017Anonymous Credentials with Practical Revocation using Elliptic Curves.
Petr Dzurenda, Jan Hajny, Lukas Malina, Sara Ricci
2017Attribute based Encryption for Multi-level Access Control Policies.
Nesrine Kaaniche, Maryline Laurent
2017Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases.
Debanjan Sadhya, Bodhi Chakraborty, Sanjay Kumar Singh
2017Clustering-based Approach for Anomaly Detection in XACML Policies.
Maryem Ait El Hadj, Meryeme Ayache, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi
2017Constant-size Threshold Attribute based SignCryption for Cloud Applications.
Sana Belguith, Nesrine Kaaniche, Maryline Laurent, Abderrazak Jemai, Rabah Attia
2017Context-based Encryption Applied to Data Leakage Prevention Solutions.
Alberto García, Alberto Garcia Moro, José Javier García, Jorge Roncero, Víctor A. Villagrá, Helena Jalain
2017Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth.
Florian Reimair, Johannes Feichtner, Dominik Ziegler, Sandra Kreuzhuber, Thomas Zefferer
2017Differential and Rotational Cryptanalysis of Round-reduced MORUS.
Ashutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz
2017Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream.
Ashutosh Dhar Dwivedi, Pawel Morawiecki, Sebastian Wójtowicz
2017Efficient Heuristic Safety Analysis of Core-based Security Policies.
Peter Amthor
2017Evaluating Credit Card Transactions in the Frequency Domain for a Proactive Fraud Detection Approach.
Roberto Saia, Salvatore Carta
2017Experimental Assessment of Private Information Disclosure in LTE Mobile Networks.
Stig Fr. Mjølsnes, Ruxandra F. Olimid
2017Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge.
João Amarante, João Paulo Barros
2017Face Recognition-based Presentation Attack Detection in a Two-step Segregated Automated Border Control e-Gate - Results of a Pilot Experience at Adolfo Suárez Madrid-Barajas Airport.
David Ortega del Campo, Cristina Conde, Ángel Serrano, Isaac Martín de Diego, Enrique Cabello
2017Fair and Accountable Anonymity for the Tor Network.
Jesus Diaz, David Arroyo, Francisco B. Rodríguez
2017First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography.
Damien Jauvart, Jacques J. A. Fournier, Louis Goubin
2017FlowSlicer - A Hybrid Approach to Detect and Avoid Sensitive Information Leaks in Android Applications using Program Slicing and Instrumentation.
Luis Menezes, Roland Wismüller
2017Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory.
Diogo Barradas, Tiago Brito, David Duarte, Nuno Santos, Luís E. T. Rodrigues
2017Formal Analyze of a Private Access Control Protocol to a Cloud Storage.
Mouhebeddine Berrima, Pascal Lafourcade, Matthieu Giraud, Narjes Ben Rajeb
2017Formally Verifying Flow Properties in Industrial Systems.
Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch
2017Freeze & Crypt: Linux Kernel Support for Main Memory Encryption.
Manuel Huber, Julian Horsch, Junaid Ali, Sascha Wessel
2017GLITCH: A Discrete Gaussian Testing Suite for Lattice-based Cryptography.
James Howe, Máire O'Neill
2017HAIT: Heap Analyzer with Input Tracing.
Andrea S. Atzeni, Andrea Marcelli, Francesco Muroni, Giovanni Squillero
2017Improving Throughput in BB84 Quantum Key Distribution.
Shawn A. Prestridge, James G. Dunham
2017Information Flows at OS Level Unmask Sophisticated Android Malware.
Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande
2017Interaction Platform for Improving Detection Capability of Dynamic Application Security Testing.
Jonghwan Im, Jongwon Yoon, Minsik Jin
2017LOCALPKI: A User-Centric Formally Proven Alternative to PKIX.
Jean-Guillaume Dumas, Pascal Lafourcade, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel
2017Mining Encrypted Software Logs using Alpha Algorithm.
Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk
2017Mobile Silent and Continuous Authentication using Apps Sequence.
Gerardo Canfora, Giovanni Cappabianca, Pasquale Carangelo, Fabio Martinelli, Francesco Mercaldo, Ernesto Rosario Russo, Corrado Aaron Visaggio
2017On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes.
Gaurav Pareek, B. R. Purushothama
2017On Obfuscating Compilation for Encrypted Computing.
Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu
2017On the Application of Fuzzy Set Theory for Access Control Enforcement.
Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar
2017On the Relation Between SIM and IND-RoR Security Models for PAKEs.
José Becerra, Vincenzo Iovino, Dimiter Ostrev, Marjan Skrobot
2017One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA.
Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux
2017PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes.
Cyrielle Feron, Vianney Lapotre, Loïc Lagadec
2017PB-PKI: A Privacy-aware Blockchain-based PKI.
Louise Axon, Michael Goldsmith
2017Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption.
Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade
2017Privacy as a Currency: Un-regulated?.
Vishwas T. Patil, R. K. Shyamasundar
2017Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol.
Rosario Giustolisi, Vincenzo Iovino, Gabriele Lenzini
2017Privacy-preserving Disease Susceptibility Test with Shamir's Secret Sharing.
Guyu Fan, Manoranjan Mohanty
2017Privacy-preserving Regression on Partially Encrypted Data.
Matús Harvan, Thomas Locher, Marta Mularczyk, Yvonne-Anne Pignolet
2017Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017.
Pierangela Samarati, Mohammad S. Obaidat, Enrique Cabello
2017Program Execution Analysis using UserAssist Key in Modern Windows.
Bhupendra Singh, Upasna Singh
2017Reputation Management in Online Social Networks - A New Clustering-based Approach.
Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia
2017RmPerm: A Tool for Android Permissions Removal.
Simone Aonzo, Giovanni Lagorio, Alessio Merlo
2017SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition.
Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk, Sebastian Wójtowicz
2017SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices.
Giulio Aliberti, Roberto Di Pietro, Stefano Guarino
2017Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System.
Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim
2017Short Paper: Industrial Feasibility of Private Information Retrieval.
Angela Jäschke, Björn Grohmann, Frederik Armknecht, Andreas Schaad
2017Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure.
Jaroslaw Bernacki, Marek Klonowski, Piotr Syga
2017Strong Authentication for e-Banking: A Survey on European Regulations and Implementations.
Federico Sinigaglia, Roberto Carbone, Gabriele Costa
2017The Efficient Randomness Testing using Boolean Functions.
Marek Sýs, Dusan Klinec, Petr Svenda
2017The Net Rat - Rethinking Connected Services for Increased Security.
Bernd Prünster, Florian Reimair, Andreas Reiter
2017The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity.
Louis Philippe Sondeck, Maryline Laurent, Vincent Frey
2017Towards a Self-adaptive Trust Management Model for VANETs.
Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia
2017Using a History-based Profile to Detect and Respond to DDoS Attacks.
Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray
2017Vector Quantization based Steganography for Secure Speech Communication System.
Bekkar Laskar, Merouane Bouzid
2017s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables.
Gerardo Canfora, Antonio Pirozzi, Aaron Visaggio