default search action
14. CANS 2015: Marrakesh, Morocco
- Michael K. Reiter, David Naccache:
Cryptology and Network Security - 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings. Lecture Notes in Computer Science 9476, Springer 2015, ISBN 978-3-319-26822-4
Internet of Things and Privacy
- Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
PUDA - Privacy and Unforgeability for Data Aggregation. 3-18 - Imane Bouij-Pasquier, Anas Abou El Kalam, Abdellah Ait Ouahman, Mina De Montfort:
A Security Framework for Internet of Things. 19-31 - Hannes Groß, Marko Hölbl, Daniel Slamanig, Raphael Spreitzer:
Privacy-Aware Authentication in the Internet of Things. 32-39
Password-Based Authentication
- Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci:
Security of Linear Secret-Sharing Schemes Against Mass Surveillance. 43-58 - Changyu Dong, Franziskus Kiefer:
Secure Set-Based Policy Checking and Its Application to Password Registration. 59-74 - Yutaka Kawai, Takato Hirano, Yoshihiro Koseki, Tatsuji Munaka:
SEPM: Efficient Partial Keyword Search on Encrypted Data. 75-91
Attacks and Malicious Code
- S. Abhishek Anand, Prakash Shrestha, Nitesh Saxena:
Bad Sounds Good Sounds: Attacking and Defending Tap-Based Rhythmic Passwords Using Acoustic Signals. 95-110 - Fatih Kiliç, Claudia Eckert:
iDeFEND: Intrusion Detection Framework for Encrypted Network Data. 111-118 - Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò:
On the Weaknesses of PBKDF2. 119-126
Security Modeling and Verification
- Bei Liang, Hongda Li, Jinyong Chang:
Verifiable Random Functions from (Leveled) Multilinear Maps. 129-143 - Aida Ben Chehida Douss, Ryma Abassi, Nihel Ben Youssef, Sihem Guemara El Fatmi:
A Formal Environment for MANET Organization and Security. 144-159 - Helger Lipmaa, Kateryna Pavlyk:
Analysis and Implementation of an Efficient Ring-LPN Based Commitment Scheme. 160-175
Secure Multi-party Computation
- Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada:
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation. 179-196 - Jan Henrik Ziegeldorf, Jens Hiller, Martin Henze, Hanno Wirtz, Klaus Wehrle:
Bandwidth-Optimized Secure Two-Party Computation of Minima. 197-213 - Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. 214-222
Cryptography and VPNs
- Simone Bossi, Andrea Visconti:
What Users Should Know About Full Disk Encryption Based on LUKS. 225-237 - Aymen Ghilen, Mostafa Azizi, Ridha Bouallegue:
Q-OpenVPN: A New Extension of OpenVPN Based on a Quantum Scheme for Authentication and Key Distribution. 238-247 - Maroua Gharam, Meriem Salhi, Noureddine Boudriga:
An LTE-Based VPN for Enhancing QoS and Authentication in Smallcell Enterprise Networks. 248-256
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.