default search action
SECRYPT 2009: Milan, Italy
- Eduardo Fernández-Medina, Manu Malek, Javier Hernando:
SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2009, ISBN 978-989-674-005-4
Invited Speakers
Keynote Lectures
- Blagovest Shishkov:
Adaptive Antennas in Wireless Communication Networks. SECRYPT 2009: 5-17 - Pierangela Samarati:
Protecting Information Privacy in the Electronic Society. SECRYPT 2009: 19-19 - David A. Marca:
e-Business Design - A Shift to Adaptability. SECRYPT 2009: 21-29 - Frank Leymann:
Cloud Computing - Fundamental Architecture & Future Applications. SECRYPT 2009: 31-31 - Gottfried Vossen:
Web 2.0: A Buzzword, a Serious Development, just Fun, or What? SECRYPT 2009: 33-40
Access Control and Intrusion Detection
Full Papers
- Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar:
One-touch Financial Transaction Authentication. SECRYPT 2009: 5-12 - Kristof Verslype, Bart De Decker:
Service and Timeframe Dependent Unlinkable One-time Pseudonyms. SECRYPT 2009: 13-20
Short Papers
- Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez:
An Anomaly-based Web Application Firewall. SECRYPT 2009: 23-28 - Mirad Zadic, Andrea Nowak:
Visual Programming Language for Security Requirements in Business Processes as Model-driven Software Development. SECRYPT 2009: 29-36 - Hideo Sato:
Finger Vein Verification Technology for Mobile Apparatus. SECRYPT 2009: 37-41 - Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos:
Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs. SECRYPT 2009: 42-53
Posters
- Jan Hajny, Tomas Pelka, Petra Lambertova:
Universal Authentication Framework - Requirements and Phase Design. SECRYPT 2009: 57-60 - Salem Benferhat, Abdelhamid Boudjelida, Habiba Drias:
Adding Expert Knowledge to TAN-based Intrusion Detection Systems. SECRYPT 2009: 61-64
Network Security and Protocols
Full Paper
- Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:
Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes. SECRYPT 2009: 69-74 - Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:
An Offline Peer-to-peer Broadcasting Scheme with Anonymity. SECRYPT 2009: 75-82 - Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos:
Network Stack Optimization for Improved IPsec Performance on Linux. SECRYPT 2009: 83-91 - Sudip Misra, Mohammad S. Obaidat, Atig Bagchi, Ravindara Bhatt, Soumalya Ghosh:
Attack Graph Generation with Infused Fuzzy Clustering. SECRYPT 2009: 92-98
Short Paper
- Michael Hutter:
RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey. SECRYPT 2009: 101-110 - Peng Yang, Yuanchen Ma, Satoshi Yoshizawa:
Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network. SECRYPT 2009: 111-116 - Jaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim:
Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network. SECRYPT 2009: 117-120 - Saraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash Darapureddi, Radhesh Mohandas, Alwyn R. Pais:
Throttling DDoS Attacks. SECRYPT 2009: 121-126 - Germán Retamosa, Jorge E. López de Vergara:
Assessment of Mobile Security Platforms. SECRYPT 2009: 127-132
Posters
- Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica:
Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks. SECRYPT 2009: 135-139 - Young-Jun Heo, Jintae Oh, Jongsoo Jang:
Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks. SECRYPT 2009: 140-143 - Dherik Barison, Rodrigo Sanches Miani, Leonardo de Souza Mendes:
Evaluation of Quality and Security of a VoIP Network based on Asterisk and OpenVPN. SECRYPT 2009: 144-147 - Hamza Rahmani, Nabil Sahli, Farouk Kamoun:
A Traffic Coherence Analysis Model for DDoS Attack Detection. SECRYPT 2009: 148-154 - Renan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini:
Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management. SECRYPT 2009: 155-158 - Guanhan Chew, Aileen Zhang, Khoongming Khoo:
Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions. SECRYPT 2009: 159-162
Cryptographic Techniques and Key Management
Full Papers
- Octavian Cret, Radu Tudoran, Alin Suciu, Tamas Györfi:
Implementing True Random Number Generators in FPGAs by Chip Filling. SECRYPT 2009: 167-174 - Ola M. Hegazy, Ayman M. Bahaa Eldin, Yasser H. Dakroury:
Quantum Secure Direct Communication using Entanglement and Super Dense Coding. SECRYPT 2009: 175-181 - Mounita Saha, Dipanwita Roy Chowdhury:
An Efficient Group Key Agreement Protocol for Heterogeneous Environment. SECRYPT 2009: 182-189 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Certified Pseudonyms Colligated with Master Secret Key. SECRYPT 2009: 190-197 - Magdy Saeb:
The Chameleon Cipher-192 (CC-192) - A Polymorphic Cipher. SECRYPT 2009: 198-209
Short Papers
- Mohsen Hajsalehi Sichani, Ali Movaghar:
A New Analysis of RC4 - A Data Mining Approach (J48). SECRYPT 2009: 213-218 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
On the Security of Two Ring Signcryption Schemes. SECRYPT 2009: 219-224 - Daniel Slamanig, Peter Schartner, Christian Stingl:
Practical Traceable Anonymous Identification. SECRYPT 2009: 225-232 - Changlu Lin, Lein Harn, Dingfeng Ye:
Information-theoretically Secure Strong Verifiable Secret Sharing. SECRYPT 2009: 233-238 - Leonardo Ribeiro, Guerra Ruy:
Safe Reverse Auctions Protocol - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks. SECRYPT 2009: 239-244 - Shiwei Chen, Chenhui Jin:
A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. SECRYPT 2009: 245-248 - Wataru Senga, Hiroshi Doi:
On the Security of Adding Confirmers into Designated Confirmer Signatures. SECRYPT 2009: 249-256
Posters
- S. Arash Sheikholeslam:
A Chaos based Encryption Method using Dynamical Systems with Strange Attractors. SECRYPT 2009: 259-265 - Constantin Catalin Dragan:
Interactive Secret Share Management. SECRYPT 2009: 266-269 - Hongxia Jin:
Efficient Traitor Tracing for Content Protection. SECRYPT 2009: 270-273 - A. M. Hamad, Walid I. Khedr:
Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks. SECRYPT 2009: 274-284 - Jaydeb Bhaumik, Dipanwita Roy Chowdhury:
Nmix: An Ideal Candidate for Key Mixing. SECRYPT 2009: 285-288 - Mayank Varshney, Dipanwita Roy Chowdhury:
A New Image Encryption Algorithm using Cellular Automata. SECRYPT 2009: 289-292
Information Assurance
Short Papers
- Hanh Quyen Nguyen, Friedrich Köster, Michael Klaas, Walter Brenner, Sebastian Obermeier, Markus Brändle:
Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative Analysis. SECRYPT 2009: 297-304 - Friedrich Köster, Michael Klaas, Hanh Quyen Nguyen, Walter Brenner, Markus Brändle, Sebastian Obermeier:
Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative Analysis. SECRYPT 2009: 305-312 - Anton Romanov, Eiji Okamoto:
An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk Assessment. SECRYPT 2009: 313-318 - Nathalie Dagorn:
Identifying Security Elements for Cooperative Information Systems. SECRYPT 2009: 319-324 - Tord Ingolf Reistad:
Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared Values. SECRYPT 2009: 325-330 - Nicolas T. Courtois:
The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. SECRYPT 2009: 331-338
Posters
- Javier Corral-García, Carlos-Jorge del Arco González, José Luis González Sánchez, José Luis Redondo García:
Free Security Suite 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration. SECRYPT 2009: 341-344
Security in Information Systems and Software Engineering
Full Paper
- Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano:
Security Patterns, Towards a Further Level. SECRYPT 2009: 349-356
Short Papers
- Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan:
Iterated Transformations and Quantitative Metrics for Software Protection. SECRYPT 2009: 359-368 - Hicham Tout:
Phishpin: An Integrated, Identity-based Anti-phishing Approach. SECRYPT 2009: 369-374 - Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda:
On the Need to Divide the Signature Creation Environment. SECRYPT 2009: 375-380 - Rodrigo Sanches Miani, Felipe Marques Pires, Leonardo de Souza Mendes:
An Alternative Approach for Formula Modelling in Security Metrics. SECRYPT 2009: 381-386 - Andreas Wiesauer, Johannes Sametinger:
A Security Design Pattern Taxonomy based on Attack Patterns - Findings of a Systematic Literature Review. SECRYPT 2009: 387-394 - Jingde Cheng, Yuichi Goto, Daisuke Horie:
ISEE: An Information Security Engineering Environment. SECRYPT 2009: 395-400
Posters
- Julien Bourgeois, Syed Raheel Hassan:
Managing Security of Grid Architecture with a Grid Security Operation Center. SECRYPT 2009: 403-408
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.