WISTP C

19 papers

YearTitle / Authors
2012An Efficient Lattice-Based Secret Sharing Construction.
Rachid El Bansarkhani, Mohammed Meziani
2012Another Fallen Hash-Based RFID Authentication Protocol.
Julio César Hernández Castro, Pedro Peris-Lopez, Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
2012Assisting Server for Secure Multi-Party Computation.
Jens-Matthias Bohli, Wenting Li, Jan Seedorf
2012Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices.
Johann Großschädl, Dan Page, Stefan Tillich
2012HTTP Botnet Detection Using Adaptive Learning Rate Multilayer Feed-Forward Neural Network.
G. Kirubavathi Venkatesh, R. Anitha Nadarajan
2012HiPoLDS: A Security Policy Language for Distributed Systems.
Matteo Dell'Amico, Gabriel Serme, Muhammad Sabir Idrees, Anderson Santana de Oliveira, Yves Roudier
2012How to Break EAP-MD5.
Fanbao Liu, Tao Xie
2012Impossible Differential Cryptanalysis of Reduced-Round LBlock.
Ferhat Karakoç, Hüseyin Demirci, A. Emre Harmanci
2012Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings
Ioannis G. Askoxylakis, Henrich Christopher Pöhls, Joachim Posegga
2012Kynoid: Real-Time Enforcement of Fine-Grained, User-Defined, and Data-Centric Security Policies for Android.
Daniel Schreckling, Joachim Posegga, Johannes Köstler, Matthias Schaff
2012On the Optimality of Correlation Power Attack on Embedded Cryptographic Systems.
Youssef Souissi, Nicolas Debande, Sami Mekki, Sylvain Guilley, Ali Maalaoui, Jean-Luc Danger
2012Optimal Parameters for Efficient Two-Party Computation Protocols.
Chaya Ganesh, C. Pandu Rangan
2012Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications.
Delphine Christin, Pablo Sánchez López, Andreas Reinhardt, Matthias Hollick, Michaela Kauer
2012Privacy Preservation of User History Graph.
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake
2012Privacy Preserving Social Network Publication on Bipartite Graphs.
Jian Zhou, Jiwu Jing, Ji Xiang, Lei Wang
2012ROAC: A Role-Oriented Access Control Model.
Nezar Nassr, Eric Steegmans
2012Recent Developments in Low-Level Software Security.
Pieter Agten, Nick Nikiforakis, Raoul Strackx, Willem De Groef, Frank Piessens
2012Towards a C2I Platform for Combating the Cyber-Threat.
Paul Kearney
2012Veracity, Plausibility, and Reputation.
Dieter Gollmann