Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Germán Retamosa, Jorge E. López de Vergara |
Assessment of Mobile Security Platforms. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Anton Romanov, Eiji Okamoto |
An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk Assessment. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Tord Ingolf Reistad |
Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared Values. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Hicham Tout |
Phishpin: An Integrated, Identity-based Anti-phishing Approach. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos |
Network Stack Optimization for Improved IPsec Performance on Linux. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Saraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash Darapureddi, Radhesh Mohandas, Alwyn R. Pais |
Throttling DDoS Attacks. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Magdy Saeb |
The Chameleon Cipher-192 (CC-192) - A Polymorphic Cipher. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Nathalie Dagorn |
Identifying Security Elements for Cooperative Information Systems. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Jaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim |
Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Octavian Cret, Radu Tudoran, Alin Suciu, Tamas Györfi |
Implementing True Random Number Generators in FPGAs by Chip Filling. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Young-Jun Heo, Jintae Oh, Jongsoo Jang |
Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Nicolas T. Courtois |
The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Hamza Rahmani, Nabil Sahli, Farouk Kamoun |
A Traffic Coherence Analysis Model for DDoS Attack Detection. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | S. Arash Sheikholeslam |
A Chaos based Encryption Method using Dynamical Systems with Strange Attractors. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Hanh Quyen Nguyen, Friedrich Köster, Michael Klaas, Walter Brenner, Sebastian Obermeier 0001, Markus Brändle |
Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative Analysis. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Hongxia Jin |
Efficient Traitor Tracing for Content Protection. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Salem Benferhat, Abdelhamid Boudjelida, Habiba Drias |
Adding Expert Knowledge to TAN-based Intrusion Detection Systems. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda |
On the Need to Divide the Signature Creation Environment. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Sudip Misra, Mohammad S. Obaidat, Atig Bagchi, Ravindara Bhatt, Soumalya Ghosh |
Attack Graph Generation with Infused Fuzzy Clustering. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos |
Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang |
Certified Pseudonyms Colligated with Master Secret Key. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin |
An Offline Peer-to-peer Broadcasting Scheme with Anonymity. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Javier Corral-García, Carlos-Jorge del Arco González, José Luis González Sánchez 0003, José Luis Redondo García |
Free Security Suite 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | David A. Marca |
e-Business Design - A Shift to Adaptability. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Eduardo Fernández-Medina, Manu Malek, Javier Hernando (eds.) |
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Hideo Sato |
Finger Vein Verification Technology for Mobile Apparatus. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan |
Iterated Transformations and Quantitative Metrics for Software Protection. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Michael Hutter |
RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez |
An Anomaly-based Web Application Firewall. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Rodrigo Sanches Miani, Felipe Marques Pires, Leonardo de Souza Mendes |
An Alternative Approach for Formula Modelling in Security Metrics. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Mounita Saha, Dipanwita Roy Chowdhury |
An Efficient Group Key Agreement Protocol for Heterogeneous Environment. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Wataru Senga, Hiroshi Doi |
On the Security of Adding Confirmers into Designated Confirmer Signatures. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Peng Yang, Yuanchen Ma, Satoshi Yoshizawa |
Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Constantin Catalin Dragan |
Interactive Secret Share Management. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Andreas Wiesauer, Johannes Sametinger |
A Security Design Pattern Taxonomy based on Attack Patterns - Findings of a Systematic Literature Review. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani |
Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Blagovest Shishkov |
Adaptive Antennas in Wireless Communication Networks. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Shiwei Chen, Chenhui Jin |
A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Jan Hajny, Tomas Pelka, Petra Lambertova |
Universal Authentication Framework - Requirements and Phase Design. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Renan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini |
Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Frank Leymann |
Cloud Computing - Fundamental Architecture & Future Applications. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan |
On the Security of Two Ring Signcryption Schemes. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Jaydeb Bhaumik, Dipanwita Roy Chowdhury |
Nmix: An Ideal Candidate for Key Mixing. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Pierangela Samarati |
Protecting Information Privacy in the Electronic Society. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Daniel Slamanig, Peter Schartner, Christian Stingl |
Practical Traceable Anonymous Identification. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Gottfried Vossen |
Web 2.0: A Buzzword, a Serious Development, just Fun, or What? |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Kristof Verslype, Bart De Decker |
Service and Timeframe Dependent Unlinkable One-time Pseudonyms. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Ola M. Hegazy, Ayman M. Bahaa Eldin, Yasser H. Dakroury |
Quantum Secure Direct Communication using Entanglement and Super Dense Coding. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Leonardo Ribeiro, Guerra Ruy |
Safe Reverse Auctions Protocol - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Mayank Varshney, Dipanwita Roy Chowdhury |
A New Image Encryption Algorithm using Cellular Automata. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar |
One-touch Financial Transaction Authentication. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Changlu Lin, Lein Harn, Dingfeng Ye |
Information-theoretically Secure Strong Verifiable Secret Sharing. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | A. M. Hamad, Walid I. Khedr |
Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Friedrich Köster, Michael Klaas, Hanh Quyen Nguyen, Walter Brenner, Markus Brändle, Sebastian Obermeier 0001 |
Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative Analysis. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Jingde Cheng, Yuichi Goto, Daisuke Horie |
ISEE: An Information Security Engineering Environment. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Dherik Barison, Rodrigo Sanches Miani, Leonardo de Souza Mendes |
Evaluation of Quality and Security of a VoIP Network based on Asterisk and OpenVPN. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
1 | Volker Müller 0001 |
A Short Note on Secret Sharing using Elliptic Curves. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | B. B. Amberker, N. R. Sunitha |
Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Kazuki Yoneyama |
Anonymous Message Authentication - Universally Composable Definition and Construction. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Tim Good, Mohammed Benaissa |
Price to Provide RFID Security and Privacy?. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Muhammad Awais Shibli, Sead Muftic |
Intrusion Detection and Prevention System using Secure Mobile Agents. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Andreas Neppach, Christian Pfaffel-Janser, Ilse Wimberger, Thomas Lorünser, Michael Meyenburg, Alexander Szekely, Johannes Wolkerstorfer |
Key Management of Quantum Generated Keys in IPsec. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Mohamed N. Hassan, Mohammed Benaissa |
Low Area Scalable Montgomery Inversion Over GF(2m). |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano, Kensuke Baba, Hiroto Yasuura |
A Note on Biometrics-based Authentication with Portable Device. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Yaakov Kogan |
Improving Reliability in Commercial IP Networks. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Celalettin Kilinc, Ali Gökhan Yavuz |
Applying SRP on SIP Authentication. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Hanane Houmani, Mohamed Mejri |
Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Salem Benferhat, Karima Sedki |
Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Shankar Joshi, Alwyn R. Pais |
A New Probabilistic Rekeying Method for Secure Dynamic Groups. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Yehia ElRakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia |
Interactivity for Reactive Access Control. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Azzam Mourad, Dima Alhadidi, Mourad Debbabi |
Towards Language-Independent Approach for Security Concerns Weaving. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Muhammed Nauman Qureshi, Muhammad Nadeem Sial, Nassar Ikram |
An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP Slices. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro |
An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho |
CSteg: Talking in C Code - Steganography of C Source Code in Text. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Raphael Overbeck |
A Multiple Birthday Attack on NTRU. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Salem Benferhat, Karim Tabia |
New Schemes for Anomaly Score Aggregation and Thresholding. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Ioanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke |
Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Ueli M. Maurer |
Rethinking Digital Signatures. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Kikelomo Maria Apampa, Tian Zhang, Gary B. Wills, David Argles |
Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Tarik Guelzim, Mohammad S. Obaidat |
Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Nasour Bagheri, Babak Sadeghiyan, Majid Naderi |
Multi-Collisions Attack in Ring Hash Structure. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | V. Kumar Murty, Nikolajs Volkovs |
A Polynomial based Hashing Algorithm. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Mukund Sundararajan, Mohammad S. Obaidat |
New Techniques to Enhance the Capabilities of the Socks Network Security Protocol. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Hsiao-Hwa Chen |
Next Generation CDMA Technologies for Futuristic Wireless Communications. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Kaiqi Xiong, David J. Thuente |
Efficient Localization Schemes in Sensor Networks with Malicious Nodes. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini |
Security Requirements in Software Product Lines. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra |
Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using OWL and SWRL. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Juan Vera del Campo, Juan Hernández-Serrano, Josep Pegueroles |
SCFS: Towards Design and Implementation of a Secure Distributed Filesystem. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Geong Sen Poh, Keith M. Martin |
On the (In)Security of Two Buyer-Seller Watermarking Protocols. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Eduardo da Silva, Aldri Luiz dos Santos, Luiz Carlos Pessoa Albini, Michele Nogueira Lima |
Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Qinghua Wang 0001, Tingting Zhang |
Sec-SNMP: Policy-based Security Management for Sensor Networks. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Nuno Borges Carvalho |
The Importance of Metrology in Wireless Communication Systems - From AM/FM to SDR Systems. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Lourdes López-García, Francisco Rodríguez-Henríquez, Miguel León Chávez |
An e-Voting Protocol based on Pairing Blind Signatures. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | David A. Marca |
e-Business Innovation - Surviving the Coming Decades. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Marius Nagy, Selim G. Akl, Sean Kershaw |
Key Distribution based on Quantum Fourier Transform. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Malte Diehl |
Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Zheng Yan 0002 |
Autonomic Trust Management for a Pervasive System. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Atta-ur-Rahman 0001, Mureed Hussain, Kahina Kabri, Dominique Seret |
Kerberos Implementation in Manets. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Ingemar J. Cox |
Watermarking, Steganography and Content Forensics. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|
1 | Loránd Szöllösi, Gábor Fehér, Tamás Marosits |
Proper Key Generation for the IzoSign Algorithm. |
SECRYPT |
2008 |
DBLP BibTeX RDF |
|