default search action
10th ACNS 2012: Singapore
- Feng Bao, Pierangela Samarati, Jianying Zhou:
Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings. Lecture Notes in Computer Science 7341, Springer 2012, ISBN 978-3-642-31283-0
Authentication
- Feng Hao, Dylan Clarke:
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol. 1-11 - Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
Breaking an Animated CAPTCHA Scheme. 12-29 - Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung:
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens. 30-47
Key Management
- Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao:
RIKE: Using Revocable Identities to Support Key Escrow in PKIs. 48-65 - Tilo Müller, Benjamin Taubmann, Felix C. Freiling:
TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. 66-83
Block Ciphers
- Basel Alomair:
Authenticated Encryption: How Reordering Can Impact Performance. 84-99 - Haibin Zhang:
Length-Doubling Ciphers and Tweakable Ciphers. 100-116 - Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu:
Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. 117-134
Identity-Based Cryptography
- Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Security Enhancements by OR-Proof in Identity-Based Identification. 135-152 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao:
Identity-Based Extractable Hash Proofs and Their Applications. 153-170
Cryptographic Primitives
- Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer:
On Structural Signatures for Tree Data Structures. 171-187 - Xiang Xie, Rui Xue, Rui Zhang:
Inner-Product Lossy Trapdoor Functions and Applications. 188-205 - Afonso Arriaga, Manuel Barbosa, Pooya Farshim:
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification. 206-223 - Helger Lipmaa:
Secure Accumulators from Euclidean Rings without Trusted Setup. 224-240
Cryptanalysis
- Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li:
Linear Fault Analysis of Block Ciphers. 241-256 - Yuki Asano, Shingo Yanagihara, Tetsu Iwata:
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys. 257-274 - Yu Sasaki, Lei Wang:
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions. 275-292
Side Channel Attacks
- Fangguo Zhang, Qiping Lin, Shengli Liu:
Zero-Value Point Attacks on Kummer-Based Cryptosystem. 293-310 - Gilles Piret, Thomas Roche, Claude Carlet:
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance. 311-328 - Xin Ye, Thomas Eisenbarth:
Wide Collisions in Practice. 329-343
Network Security
- Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang:
A General Construction for 1-Round δ-RMT and (0, δ)-SMT. 344-362 - Tingwen Liu, Yong Sun, Alex X. Liu, Li Guo, Binxing Fang:
A Prefiltering Approach to Regular Expression Matching for Network Security Systems. 363-380
Web Security
- Jason Gionta, Peng Ning, Xiaolan Zhang:
iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. 381-399 - Elias Athanasopoulos, Vasileios P. Kemerlis, Michalis Polychronakis, Evangelos P. Markatos:
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. 400-417 - Minh Tran, Xinshu Dong, Zhenkai Liang, Xuxian Jiang:
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations. 418-435
Security and Privacy in Social Networks
- Bogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan:
The Shy Mayor: Private Badges in GeoSocial Networks. 436-454 - Zi Chu, Indra Widjaja, Haining Wang:
Detecting Social Spam Campaigns on Twitter. 455-472
Security and Privacy in RFID Systems
- Shaoying Cai, Robert H. Deng, Yingjiu Li, Yunlei Zhao:
A New Framework for Privacy of RFID Path Authentication. 473-488 - Panagiotis Rizomiliotis, Stefanos Gritzalis:
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. 489-506
Security and Privacy in Cloud Systems
- Boyang Wang, Baochun Li, Hui Li:
Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. 507-525 - Sherman S. M. Chow, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment. 526-543
Security and Privacy in Smart Grids
- Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin:
A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring. 544-560 - Zekeriya Erkin, Gene Tsudik:
Private Computation of Spatial and Temporal Power Consumption with Smart Meters. 561-577
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.