Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Geoffrey Charles Fox |
Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Nirali R. Nanavati, Devesh C. Jinwala |
Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Denis Efremov, Nikolay V. Pakulin |
Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Apostolos P. Fournaris |
Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio |
A Proposed Framework for Analysing Security Ceremonies. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Xun Yi, Raylin Tso, Eiji Okamoto |
Identity-based Password-Authenticated Key Exchange for Client/Server Model. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr. |
Key Management as a Service. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Mehdi Fallahpour, David Megías 0001, Hossein Najaf-Zadeh |
Adaptive Speech Watermarking in Wavelet Domain based on Logarithm. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Byoung-Koo Kim, Ikkyun Kim, Tai-Myoung Chung |
Network-based Executable File Extraction and Analysis for Malware Detection. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Venu Govindaraju |
Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Yuyu Chou, Jan Oetting, Olga Levina |
Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik |
Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Igor V. Kotenko, Olga Polubelova, Igor Saenko 0001 |
Data Repository for Security Information and Event Management in Service Infrastructures. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Johan Garcia 0001 |
Quantifying the Benefits of File Size Information for Forensic Hash Matching. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova |
Attack Modelling and Security Evaluation for Security Information and Event Management. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Martin Schütte, Thomas Scheffler, Bettina Schnor |
Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Constantinos Patsakis, Kleanthis Dellios |
Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Tzachy Reinman, Erez Waisbard |
PPiTTA - Preserving Privacy in TV Targeted Advertising. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Stefan Rass, Michal Koza |
On Secure Communication over Wireless Sensor Networks. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Julian Schütte, Hervais Simo Fhom, Mark Gall |
Security Policies in Dynamic Service Compositions. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge |
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga |
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu 0001, Xubin He |
Improving Cloud Survivability through Dependency based Virtual Machine Placement. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Andreas C. Sonnenbichler, Andreas Geyer-Schulz |
ADQL: A Flexible Access Definition and Query Language to Define Access Control Models. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Michael Tunstall |
Improved "Partial Sums"-based Square Attack on AES. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Nagaraj V. Dharwadkar, B. B. Amberker |
Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Anna Sojka, Krzysztof Piotrowski |
lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Chiara Valentina Schiavo, Andrea Visconti |
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Keita Emura, Mohammad Shahriar Rahman |
Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Florian Legendre, Gilles Dequen, Michaël Krajecki |
Inverting Thanks to SAT Solving - An Application on Reduced-step MD*. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Harris E. Michail, George Athanasiou, Andreas Gregoriades, George Theodoridis, Costas E. Goutis |
On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Sushil Jajodia |
A Mission-centric Framework for Cyber Situational Awareness. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Rodolphe Lampe, Jacques Patarin |
Analysis of Some Natural Variants of the PKP Algorithm. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Ali Hammami, Noëmie Simoni |
Secure and Seamless Session Management in Mobile and Heterogeneous Environment. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Alessio Di Mauro, Alessandro Mei, Sushil Jajodia |
Secure File Allocation and Caching in Large-scale Distributed Systems. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Marek Klonowski, Piotr Syga, Wojciech Wodo |
Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf |
Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Matt Henricksen |
Two Dragons - A Family of Fast Word-based Stream Ciphers. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc |
Tampering with Java Card Exceptions - The Exception Proves the Rule. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Leonardo Maccari |
A Collaborative Firewall for Wireless Ad-Hoc Social Networks. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Keith B. Frikken |
Cryptographic Enforcement of Access Control while Mitigating Key Sharing. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini |
DDoS Detection with Information Theory Metrics and Netflows - A Real Case. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Julien Bringer, Alain Patey |
VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Pierangela Samarati, Wenjing Lou, Jianying Zhou 0001 (eds.) |
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Luís M. Correia |
A Perspective of the Networks of the Future and Smart Cities. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Michael Brenner 0003, Henning Perl, Matthew Smith 0001 |
Practical Applications of Homomorphic Encryption. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | George Athanasiou, Chara I. Chalkou, D. Bardis, Harris E. Michail, George Theodoridis, Costas E. Goutis |
High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Seungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang |
Defense Against TCP Flooding Attack. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Sandra Diaz-Santiago, Debrup Chakraborty |
On Securing Communication from Profilers. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Anup Kumar Bhattacharya, Abhijit Das 0004, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer |
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Rainer Schick, Christoph Ruland |
Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Yonglin Sun, Yongjun Wang, Yi Zhang |
Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Denis Butin, Giampaolo Bella |
Verifying Privacy by Little Interaction and No Process Equivalence. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri |
Quantitative Assessment of Cloud Security Level Agreements - A Case Study. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Keita Emura, Takashi Sato |
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization. |
SECRYPT |
2012 |
DBLP BibTeX RDF |
|
1 | Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka |
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai |
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Enrique Cabello |
Face Biometrics without Intrusion in Airport. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Xun Yi, Raylin Tso, Eiji Okamoto |
Three-party Password-authenticated Key Exchange without Random Oracles. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Isao Nakanishi, Sadanao Baba, Masahiro Inoue |
Driver Authentication using Brain Waves While Route Tracing as a Mental Task. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Yaser Esmaeili Salehani, Amr M. Youssef |
Differential Fault Analysis of Hummingbird. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Javier López 0001, Pierangela Samarati (eds.) |
SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Michael E. Farmer, William Arthur |
Study of the Phenomenology of DDOS Network Attacks in Phase Space. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Nicolas Friot, Christophe Guyeux, Jacques M. Bahi |
Chaotic Iterations for Steganography - Stego-security and Chaos-security. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan, S. K. Nandy 0001 |
A Method for Flexible Reduction over Binary Fields using a Field Multiplier. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta |
Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Yanling Chen, A. J. Han Vinck |
A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Michael J. Fischer, Michaela Iorga, René Peralta 0001 |
A Public Randomness Service. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Imen Brahmi, Sadok Ben Yahia, Pascal Poncelet |
A Snort-based Mobile Agent for a Distributed Intrusion Detection System. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Björn Stelte |
Byzantine Decisions for Inferring Trust in Sensor Networks. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Almudena Alcaide, Esther Palomar, Israel Barroso-Perez, Ali E. Abdallah |
Privacy-enhancing Cryptography-based Materials. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Xin Xie, Fenlin Liu, Bin Lu 0003, Tao Zhao, Hanning Li |
A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Nicolas T. Courtois, Theodosis Mourouzis |
Black-box Collision Attacks on the Compression Function of the GOST Hash Function. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda |
Artificial Immunity-based Correlation System. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Fabio Piva, Ricardo Dahab |
E-Commerce and Fair Exchange - The Problem of Item Validation. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Carlo Maiero, Marino Miculan |
Unobservable Intrusion Detection based on Call Traces in Paravirtualized Systems. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Bechara al Bouna, Richard Chbeir, Alban Gabillon |
The Image Protector - A Flexible Security Rule Specification Toolkit . |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Stefan Rass, Peter Schartner |
Information-leakage in Hybrid Randomized Protocols. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro |
Analysis of Botnets through Life-cycle. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Andreas Kasten |
Towards an Information Control Policy Model - Achieving More Transparency in Internet Filtering Approaches. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Apostolos P. Fournaris |
Distributed Threshold Cryptography Certification with No Trusted Dealer. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | John Solis |
Private Searching for Sensitive File Signatures. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante |
A Framework for Security and Workload Gradual Adaptation. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Han-Chieh Chao |
WiMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis |
IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Winfried Lamersdorf |
Paradigms of Distributed Software Systems - Services, Processes, and Self-organization. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro |
On the Strength of Egglue and Other Logic CAPTCHAs. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer |
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis |
Smartphone Security Evaluation - The Malware Attack Case . |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Chunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu |
Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Vincenzo Piuri, Fabio Scotti |
Biometrics Privacy - Technologies and Applications. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Xiaolin Cao, Máire O'Neill |
A Forward Private Protocol based on PRNG and LPN for Low-cost RFID . |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu 0005 |
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Iria Prieto, Eduardo Magaña, Daniel Morató, Mikel Izal |
Botnet Detection based on DNS Records and Active Probing. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Pierre Konopacki, Régine Laleau, Jérémy Milhau, Richard St-Denis |
A Four-concern-oriented Secure IS Development Approach. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Giuseppe Di Modica, Orazio Tomarchio |
Semantic Annotations for Security Policy Matching in WS-policy. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Julian Schütte |
Apollon: Towards a Semantically Extensible Policy Framework. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Marek Klonowski, Michal Koza, Miroslaw Kutylowski |
How to Transmit Messages via WSN in a Hostile Environment. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Maria-Camilla Fiazza, Michele Peroli, Luca Viganò 0001 |
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|
1 | Abdesselam Redouane |
Towards a Calculus for Non Repudiation Protocols. |
SECRYPT |
2011 |
DBLP BibTeX RDF |
|