default search action
12. ICICS 2010: Barcelona, Spain
- Miguel Soriano, Sihan Qing, Javier López:
Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6476, Springer 2010, ISBN 978-3-642-17649-4 - Bart Preneel:
Cryptographic Hash Functions: Theory and Practice. 1-3
Access Control
- Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:
Rewriting of SPARQL/Update Queries for Securing Data Access. 4-15 - Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio:
Fine-Grained Disclosure of Access Policies. 16-30
Public Key Cryptography and Cryptanalysis
- Falko Strenzke:
Manger's Attack Revisited. 31-45 - Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil:
Horizontal Correlation Analysis on Exponentiation. 46-61 - Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer:
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts. 62-76
Security in Distributed and Mobile Systems
- Jaydip Sen:
A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks. 77-91 - Flavio Lombardi, Roberto Di Pietro:
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization. 92-106 - Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:
SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. 107-125 - Talal Alharbi, Abdullah Mohammed Almuhaideb, Phu Dung Le:
Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol. 126-139 - Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao:
Compromise-Resilient Anti-jamming for Wireless Sensor Networks. 140-154
Cryptanalysis
- Renato Menicocci, Andrea Simonetti, Giuseppe Scotti, Alessandro Trifiletti:
On Practical Second-Order Power Analysis Attacks for Block Ciphers. 155-170 - Billy Bob Brumley, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio:
Consecutive S-box Lookups: A Timing Attack on SNOW 3G. 171-185
Authentication
- Basel Alomair, Radha Poovendran:
Efficient Authentication for Mobile and Pervasive Computing. 186-202 - Jiaxin Pan, Libin Wang, Changshe Ma:
Security Enhancement and Modular Treatment towards Authenticated Key Exchange. 203-217 - Alessandro Sorniotti, Refik Molva:
Federated Secret Handshakes with Support for Revocation. 218-234
Fair Exchange Protocols
- Gerard Draper-Gil, Jianying Zhou, Josep Lluís Ferrer-Gomila:
An Agent-Mediated Fair Exchange Protocol. 235-250 - Ming Chen, Kaigui Wu, Jie Xu, Pan He:
A New Method for Formalizing Optimistic Fair Exchange Protocols. 251-265 - Mehrdad Nojoumian, Douglas R. Stinson:
Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme. 266-280
Anonymity and Privacy
- Ralf Küsters, Tomasz Truderung, Andreas Vogt:
Proving Coercion-Resistance of Scantegrity II. 281-295 - Lucie Langer, Hugo Jonker, Wolter Pieters:
Anonymity and Verifiability in Voting: Understanding (Un)Linkability. 296-310 - Kurt Dietrich, Johannes Winter:
A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms. 311-324 - Luciana Marconi, Roberto Di Pietro, Bruno Crispo, Mauro Conti:
Time Warp: How Time Affects Privacy in LBSs. 325-339
Software Security
- Ping Chen, Xiao Xing, Bing Mao, Li Xie:
Return-Oriented Rootkit without Returns (on the x86). 340-354 - Jostein Jensen, Inger Anne Tøndel, Per Håkon Meland:
Experimental Threat Model Reuse with Misuse Case Diagrams. 355-366 - Kai Chen, Yifeng Lian, Yingjun Zhang:
Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis. 367-382
Proxy Cryptosystems
- Lihua Wang, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. 383-400 - Song Luo, Jian-bin Hu, Zhong Chen:
Ciphertext Policy Attribute-Based Proxy Re-encryption. 401-415
Intrusion Detection Systems
- Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo:
Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks. 416-429 - Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent:
A Trust-Based IDS for the AODV Protocol. 430-444 - Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani:
IDS Alert Visualization and Monitoring through Heuristic Host Selection. 445-458 - Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia, Wei-Chang Yeh:
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. 459-471
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.