


default search action
1. InfoSecHiComNet 2011: Haldia, India
- Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall
:
Security Aspects in Information Technology - First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings. Lecture Notes in Computer Science 7011, Springer 2011, ISBN 978-3-642-24585-5
Invited Talks
- Sanjay Burman:
Engineering Trustworthy Systems. 1 - Jörn-Marc Schmidt:
Secure Implementations for the Internet of Things. 2
Embedded Security
- Kunal Sadalkar, Radhesh Mohandas, Alwyn R. Pais
:
Model Based Hybrid Approach to Prevent SQL Injection Attacks in PHP. 3-15 - Santosh Ghosh, Dipanwita Roy Chowdhury:
Security of Prime Field Pairing Cryptoprocessor against Differential Power Attack. 16-29 - Rajat Subhra Chakraborty, Seetharam Narasimhan, Swarup Bhunia
:
Embedded Software Security through Key-Based Control Flow Obfuscation. 30-44
Digital Rights Management
- Sambaran Bandyopadhyay, Ruchira Naskar, Rajat Subhra Chakraborty:
Reversible Watermarking Using Priority Embedding through Repeated Application of Integer Wavelet Transform. 45-56 - Ratna Dutta, Dheerendra Mishra
, Sourav Mukhopadhyay:
Access Policy Based Key Management in Multi-level Multi-distributor DRM Architecture. 57-71 - Ratna Dutta:
Access Polynomial Based Self-healing Key Distribution with Improved Security and Performance. 72-82
Cryptographic Protocols
- Namita Tiwari, Sahadeo Padhye
:
An ID-Based Proxy Multi Signature Scheme without Bilinear Pairings. 83-92 - Indivar Gupta, P. K. Saxena:
Distributed Signcryption Schemes with Formal Proof of Security. 93-110 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Identity Based Online/Offline Encryption and Signcryption Schemes Revisited. 111-127
Cryptanalysis/Side Channel Attacks
- Maxime Nassar, Youssef Souissi, Sylvain Guilley, Jean-Luc Danger:
"Rank Correction": A New Side-Channel Approach for Secret Key Recovery. 128-143 - Rishabh Poddar, Amit Datta, Chester Rebeiro
:
A Cache Trace Attack on CAMELLIA. 144-156 - Satrajit Ghosh, Abhijit Das:
An Improvement of Linearization-Based Algebraic Attacks. 157-167
Cipher Primitives
- Prasanna Raghaw Mishra, Indivar Gupta, N. Rajesh Pillai:
Generalized Avalanche Test for Stream Cipher Analysis. 168-180 - Dhirendra Singh Yadav, Rajendra Kumar Sharma
, Wagish Shukla:
On Applications of Singular Matrices over Finite Fields in Cryptography. 181-185

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.