default search action
SECRYPT 2013: Reykjavík, Iceland
- Pierangela Samarati:
SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013. SciTePress 2013, ISBN 978-989-8565-73-0
Invited Speakers
Full Papers
- Luis Campo-Giralte, Cristina Conde, Isaac Martín de Diego, Enrique Cabello:
InCC: Hiding Information by Mimicking Traffic In Network Flows. 5-14 - Christian Hanser, Daniel Slamanig:
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves. 15-26 - Liran Lerman, Jorge Nakahara Jr., Nikita Veshchikov:
Improving Block Cipher Design by Rearranging Internal Operations. 27-38 - Alberto Ferrante, Jelena Milosevic, Marija Janjusevic:
A Security-enhanced Design Methodology for Embedded Systems. 39-50 - Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake:
A Key-revocable Attribute-based Encryption for Mobile Cloud Environments. 51-61 - Lan Zhou, Vijay Varadharajan, Michael Hitchens:
Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control. 62-73 - Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos:
A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software. 74-85 - Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack:
HoneydV6: A Low-interaction IPv6 Honeypot. 86-97 - Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:
Which Side Are You On? - A New Panopticon vs. Privacy. 98-110 - Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. 111-122 - Ester Ciancamerla, Michele Minichino, S. Palmieri:
Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks. 123-134 - Petr Svenda, Martin Ukrop, Vashek Matyas:
Towards Cryptographic Function Distinguishers with Evolutionary Circuits. 135-146 - Bo Lang, Runhua Xu, Yawei Duan:
Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control. 147-157 - Boaz Catane, Amir Herzberg:
Secure Second Price Auctions with a Rational Auctioneer. 158-169 - Peter Teufl, Thomas Zefferer, Christof Stromberger, Christoph Hechenblaikner:
iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments. 170-182 - Simone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti:
Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data. 183-194 - Saradha Ravi, N. Balakrishnan, Bharath Venkatesh:
Behavior-based Malware Analysis using Profile Hidden Markov Models. 195-206 - Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. 207-218 - Mehdi Khalfaoui, Refik Molva, Laurent Gomez:
Secure Alert Tracking in Supply Chain. 219-229 - Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre:
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. 230-241 - Mehrdad Aliasgari, Marina Blanton:
Secure Computation of Hidden Markov Models. 242-253 - Ravi Jhawar, Vincenzo Piuri:
Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing. 254-264
Short Papers
- Jan Hajny, Lukas Malina, Zdenek Martinasek, Vaclav Zeman:
Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks. 267-274 - Jacques M. Bahi, Nicolas Friot, Christophe Guyeux:
Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme. 275-283 - Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake:
LMM - A Common Component for Software License Management on Cloud. 284-295 - Stefan Rass:
Dynamic Proofs of Retrievability from Chameleon-Hashes. 296-304 - Ruth Ng Ii-Yung, Khoongming Khoo, Raphael C.-W. Phan:
On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers. 305-312 - Shoichi Hirose, Hidenori Kuwakado:
Redactable Signature Scheme for Tree-structured Data based on Merkle Tree. 313-320 - Yevhen Zolotavkin, Martti Juhola:
SVD-based Digital Image Watermarking on approximated Orthogonal Matrix. 321-330 - Boaz Catane, Amir Herzberg:
Massive Group Message Authentication with Revocable Anonymity. 331-338 - Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. 339-346 - Thomas Zefferer, Peter Teufl:
Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones. 347-354 - Sébastien Salva, Stassia R. Zafimiharisoa, Patrice Laurençot:
Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components. 355-362 - Patrick Lacharme, Estelle Cherrier, Christophe Rosenberger:
Preimage Attack on BioHashing. 363-370 - Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng:
An Efficient and Provably Secure Certificateless Identification Scheme. 371-378 - Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen, Aurélien Francillon:
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting. 379-386 - Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas:
Instance-based Anomaly Method for Android Malware Detection. 387-394 - Maider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías, Juan J. Igarza:
A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities. 395-402 - Rolf Haynberg, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade:
Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs. 403-410 - Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal:
Enhanced Truncated Differential Cryptanalysis of GOST. 411-418 - Bernd Zwattendorfer, Daniel Slamanig:
Privacy-preserving Realization of the STORK Framework in the Public Cloud. 419-426 - Gerardo Reynaga, Sonia Chiasson:
The Usability of CAPTCHAs on Smartphones. 427-434 - Florian Legendre, Gilles Dequen, Michaël Krajecki:
From a Logical Approach to Internal States of Hash Functions - How SAT Problem Can Help to Understand SHA-* and MD*. 435-443 - Michael Clear, Ciaran McGoldrick:
Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE. 444-452 - Constantinos Patsakis:
Recovering RSA Private Keys on Implementations with Tampered LSBs. 453-460 - Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed Ali Kâafar:
On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices. 461-468
Posters
- Daniel Santana de Freitas, Jorge Nakahara Jr.:
Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis. 471-477 - Josep Domingo-Ferrer:
On the Connection between t-Closeness and Differential Privacy for Data Releases. 478-481 - Matt Henricksen, Shinsaku Kiyomoto:
AVON - A Fast Hash Function for Intel SIMD Architectures. 482-487 - Jonny Milliken, Valerio Selis, Kian Meng Yap, Alan Marshall:
Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs. 488-493 - Dustin van der Haar, Basie von Solms:
Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks. 494-499 - Slim Trabelsi, Hana Bouafif:
Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks. 500-505 - Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:
Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication. 506-511 - Kazuki Yoneyama:
Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles. 518-523 - Lucjan Hanzlik, Wojciech Wodo:
Identity Security in Biometric Systems based on Keystroking. 524-530 - Vinay S. Iyengar:
Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications. 531-536 - Saeed Rostami, Sadegh Bamohabbat Chafjiri, Seyed Amir Hossein Tabatabaei:
Related-key Impossible Differential Cryptanalysis of Full-round HIGHT. 537-542 - Mickaël Cazorla, Kevin Marquet, Marine Minier:
Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks. 543-548 - Heiko Knospe:
Privacy-enhanced Perceptual Hashing of Audio Data. 549-554 - Lukas Malina, Jan Hajny, Zdenek Martinasek:
Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration. 555-560 - Hervé Chabanne, Gérard D. Cohen, Alain Patey:
Public-key Cryptography from Different Assumptions - A Multi-bit Version. 561-567 - Z. Cliffe Schreuders, Adil M. Bhat:
Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs. 568-573 - George Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis:
Approaching Encryption through Complex Number Logarithms. 574-579 - Matthias Trojahn, Christian Schadewald, Frank Ortmeier:
Keystroke Authentication with a Capacitive Display using Different Mobile Devices. 580-585 - Hasan Kadhem:
MINHO - A Novel Authentication Scheme based on Pre-Authentication Service. 586-594 - Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, Stefano Paraboschi:
A Model-driven Approach for Securing Software Architectures. 595-602 - Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone:
Database Anomalous Activities - Detection and Quantification. 603-608 - Daniele Codetta Raiteri:
A Preliminary Application of Generalized Fault Trees to Security. 609-614 - Hassan Noura, Steven Martin, Khaldoun Al Agha:
E3SN - Efficient Security Scheme for Sensor Networks. 615-621
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.