default search action
CD-ARES Workshops 2013: Regensburg, Germany
- Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar R. Weippl, Lida Xu:
Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Lecture Notes in Computer Science 8128, Springer 2013, ISBN 978-3-642-40587-7
Modern Cryptography
- Jiageng Chen, Atsuko Miyaji:
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock. 1-15 - Asato Kubai, Junji Shikata, Yohei Watanabe:
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions. 16-28 - Kishan Chand Gupta, Indranil Ghosh Ray:
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography. 29-43 - Edoardo Persichetti:
Code-Based Public-Key Encryption Resistant to Key Leakage. 44-54 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics. 55-74 - Abdel Alim Kamal, Roger Zahno, Amr M. Youssef:
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images. 75-90 - Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann:
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method. 91-104 - Saad Islam, Mehreen Afzal, Adnan Rashdi:
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack. 105-121
Security Engineering
- Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann:
Code-Based Identification and Signature Schemes in Software. 122-136 - Danilo F. Câmara, Conrado Porto Lopes Gouvêa, Julio López, Ricardo Dahab:
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine. 137-154 - Gerwin Gsenger, Christian Hanser:
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves. 155-167 - Christian Hanser, Christian Wagner:
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves. 168-179 - Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber:
Cumulus4j: A Provably Secure Database Abstraction Layer. 180-193 - Andreas Hülsing, Lea Rausch, Johannes Buchmann:
Optimal Parameters for XMSS MT. 194-208 - James Heather, Chris Culnane, Steve A. Schneider, Sriramkrishnan Srinivasan, Zhe Xia:
Solving the Discrete Logarithm Problem for Packing Candidate Preferences. 209-221 - Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen:
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences. 222-235 - Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione:
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace. 236-252 - Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis:
Analyzing the Internet Stability in Presence of Disasters. 253-268 - Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui:
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project. 269-287 - Wolfgang Boehmer:
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function. 288-304 - Atif Mashkoor, Osman Hasan, Wolfgang Beer:
Using Probabilistic Analysis for the Certification of Machine Control Systems. 305-320 - Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel:
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms. 321-336 - Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu:
A Multiple-Key Management Scheme in Wireless Sensor Networks. 337-344 - Igor V. Kotenko, Evgenia Novikova:
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment. 345-360 - Nicola Gobbo, Alessio Merlo, Mauro Migliardi:
A Denial of Service Attack to GSM Networks via Attach Procedure. 361-376 - Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake:
PPM: Privacy Policy Manager for Personalized Services. 377-392 - Bo Liu, Baokang Zhao, Bo Liu, Chunqing Wu:
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks. 393-407 - Lidia Ogiela, Marek R. Ogiela:
Intelligent UBMSS Systems for Strategic Information Management. 408-413 - Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Francesco Palmieri:
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness. 414-429 - Tomasz Hachaj, Marek R. Ogiela:
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense. 430-441 - Francesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini:
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios. 442-456 - Vaise Patu, Shuichiro Yamamoto:
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process. 457-464
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.