default search action
10. ICICS 2008: Birmingham, UK
- Liqun Chen, Mark Dermot Ryan, Guilin Wang:
Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings. Lecture Notes in Computer Science 5308, Springer 2008, ISBN 978-3-540-88624-2
Invited Talk
- George Coker, Joshua D. Guttman, Peter A. Loscocco, Justin Sheehy, Brian T. Sniffen:
Attestation: Evidence and Trust. 1-18
Authentication
- Lijun Liao, Jörg Schwenk:
A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. 19-32 - Ghaith Hammouri, Erdinç Öztürk, Berk Birand, Berk Sunar:
Unclonable Lightweight Authentication Scheme. 33-48 - Xun Dong, John A. Clark, Jeremy L. Jacob:
Threat Modelling in User Performed Authentication. 49-64 - Ke Zeng:
Access with Fast Batch Verifiable Anonymous Credentials. 65-80
Side Channel Analysis
- Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky:
Quantifying Timing Leaks and Cost Optimisation. 81-96 - Chong Hee Kim, Jean-Jacques Quisquater:
Method for Detecting Vulnerability to Doubling Attacks. 97-110 - Praveen Gauravaram, Katsuyuki Okeya:
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. 111-127
Cryptanalysis
- Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki:
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. 128-140 - Deniz Toz, Orr Dunkelman:
Analysis of Two Attacks on Reduced-Round Versions of the SMS4. 141-156 - Jiali Choy, Khoongming Khoo, Chuan-Wen Loe:
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. 157-173
Access Control
- Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn:
Beyond User-to-User Access Control for Online Social Networks. 174-189 - Meriam Ben-Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Adel Bouhoula:
Revocation Schemes for Delegation Licences. 190-205 - Z. Cliffe Schreuders, Christian Payne:
Reusability of Functionality-Based Application Confinement Policy Abstractions. 206-221 - Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi:
Towards Role Based Trust Management without Distributed Searching of Credentials. 222-237
Software Security
- Debin Gao, Michael K. Reiter, Dawn Xiaodong Song:
BinHunt: Automatically Finding Semantic Differences in Binary Programs. 238-255 - Alessandro Castrucci, Fabio Martinelli, Paolo Mori, Francesco Roperti:
Enhancing Java ME Security Support with Resource Usage Monitoring. 256-266 - Zhi Guan, Long Zhang, Zhong Chen, Xianghao Nan:
Pseudo-randomness Inside Web Browsers. 267-278
System Security
- Henrich Christopher Pöhls:
Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data. 279-293 - Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Qiang Tang, Raymond N. J. Veldhuis:
Embedding Renewable Cryptographic Keys into Continuous Noisy Data. 294-310 - Nitesh Saxena, Md. Borhan Uddin:
Automated Device Pairing for Asymmetric Pairing Scenarios. 311-327
Applied Cryptography
- Nicolas T. Courtois, Blandine Debraize:
Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.. 328-344 - Saeed Sedghi, Jeroen Doumen, Pieter H. Hartel, Willem Jonker:
Towards an Information Theoretic Analysis of Searchable Encryption. 345-360 - Sam Behseta, Charles Lam, Robert L. Webb:
A Bootstrap Attack on Digital Watermarks in the Frequency Domain. 361-375 - Rabia Sirhindi, Saeed Murtaza, Mehreen Afzal:
Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes. 376-386
Security Protocols
- Mohamed Layouni, Maki Yoshida, Shingo Okamura:
Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval. 387-402 - Mehdi Talbi, Benjamin Morin, Valérie Viet Triem Tong, Adel Bouhoula, Mohamed Mejri:
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study. 403-418 - Ke Zeng:
Publicly Verifiable Remote Data Integrity. 419-434
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.