default search action
SECRYPT 2012: Rome, Italy
- Pierangela Samarati, Wenjing Lou, Jianying Zhou:
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2012, ISBN 978-989-8565-24-2
Invited Speakers
Keynote Speakers
- Venu Govindaraju:
Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes. SECRYPT 2012 - Sushil Jajodia:
A Mission-centric Framework for Cyber Situational Awareness. SECRYPT 2012 - Andreas Holzinger:
On Knowledge Discovery and Interactive Intelligent Visualization of Biomedical Data - Challenges in Human-Computer Interaction & Biomedical Informatics. DATA 2012 - Geoffrey Charles Fox:
Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale. SECRYPT 2012 - Luís M. Correia:
A Perspective of the Networks of the Future and Smart Cities. SECRYPT 2012
Full Papers
- Michael Brenner, Henning Perl, Matthew Smith:
Practical Applications of Homomorphic Encryption. SECRYPT 2012: 5-14 - Nagaraj V. Dharwadkar, B. B. Amberker:
Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images. SECRYPT 2012: 15-24 - Michael Tunstall:
Improved "Partial Sums"-based Square Attack on AES. SECRYPT 2012: 25-34 - Matt Henricksen:
Two Dragons - A Family of Fast Word-based Stream Ciphers. SECRYPT 2012: 35-44 - Xun Yi, Raylin Tso, Eiji Okamoto:
Identity-based Password-Authenticated Key Exchange for Client/Server Model. SECRYPT 2012: 45-54 - Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc:
Tampering with Java Card Exceptions - The Exception Proves the Rule. SECRYPT 2012: 55-63 - Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri:
Quantitative Assessment of Cloud Security Level Agreements - A Case Study. SECRYPT 2012: 64-73 - Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik:
Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud. SECRYPT 2012: 74-83 - Keita Emura, Mohammad Shahriar Rahman:
Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure. SECRYPT 2012: 84-93 - Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:
SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. SECRYPT 2012: 94-101 - Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge:
Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture. SECRYPT 2012: 102-112 - Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga:
Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction. SECRYPT 2012: 113-125 - George Athanasiou, Chara I. Chalkou, D. Bardis, Harris E. Michail, George Theodoridis, Costas E. Goutis:
High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach. SECRYPT 2012: 126-135 - Mikhail J. Atallah, Keith B. Frikken, Shumiao Wang:
Private Outsourcing of Matrix Multiplication over Closed Semi-rings. SECRYPT 2012: 136-144 - Nicolas T. Courtois, Theodosis Mourouzis, Pho V. Le:
Extension of de Weger's Attack on RSA with Large Public Keys. SECRYPT 2012: 145-153 - Sandra Diaz-Santiago, Debrup Chakraborty:
On Securing Communication from Profilers. SECRYPT 2012: 154-162 - Chenguang Yang, Ghaith Hammouri, Berk Sunar:
Voice Passwords Revisited. SECRYPT 2012: 163-171 - Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini:
DDoS Detection with Information Theory Metrics and Netflows - A Real Case. SECRYPT 2012: 172-181 - Alessio Di Mauro, Alessandro Mei, Sushil Jajodia:
Secure File Allocation and Caching in Large-scale Distributed Systems. SECRYPT 2012: 182-191 - Hanane Houmani, Mourad Debbabi:
Formal Analysis of the TLS Handshake Protocol. SECRYPT 2012: 192-205
Short Papers
- Rodolphe Lampe, Jacques Patarin:
Analysis of Some Natural Variants of the PKP Algorithm. SECRYPT 2012: 209-214 - Julien Bringer, Alain Patey:
VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks. SECRYPT 2012: 215-220 - Constantinos Patsakis, Kleanthis Dellios:
Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer. SECRYPT 2012: 221-226 - Yuyu Chou, Jan Oetting, Olga Levina:
Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection. SECRYPT 2012: 227-232 - Julian Schütte, Hervais Simo Fhom, Mark Gall:
Security Policies in Dynamic Service Compositions. SECRYPT 2012: 233-238 - Mikko Kiviharju:
Towards Pervasive Cryptographic Access Control Models. SECRYPT 2012: 239-244 - Keith B. Frikken:
Cryptographic Enforcement of Access Control while Mitigating Key Sharing. SECRYPT 2012: 245-250 - Denis Butin, Giampaolo Bella:
Verifying Privacy by Little Interaction and No Process Equivalence. SECRYPT 2012: 251-256 - Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:
A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. SECRYPT 2012: 257-262 - Ahmed Al-Khazzar, Nick Savage:
Biometric Identification in Virtual Worlds using Biometric Fusion Techniques. SECRYPT 2012: 263-269 - Harris E. Michail, George Athanasiou, Andreas Gregoriades, George Theodoridis, Costas E. Goutis:
On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function. SECRYPT 2012: 270-275 - Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr.:
Key Management as a Service. SECRYPT 2012: 276-281 - Ali Hammami, Noëmie Simoni:
Secure and Seamless Session Management in Mobile and Heterogeneous Environment. SECRYPT 2012: 282-289 - Leonardo Maccari:
A Collaborative Firewall for Wireless Ad-Hoc Social Networks. SECRYPT 2012: 290-295 - Marek Klonowski, Piotr Syga, Wojciech Wodo:
Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures. SECRYPT 2012: 296-301 - Chiara Valentina Schiavo, Andrea Visconti:
An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size. SECRYPT 2012: 302-307 - Igor V. Kotenko, Olga Polubelova, Igor Saenko:
Data Repository for Security Information and Event Management in Service Infrastructures. SECRYPT 2012: 308-313 - Apostolos P. Fournaris:
Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer. SECRYPT 2012: 314-320 - Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He:
Improving Cloud Survivability through Dependency based Virtual Machine Placement. SECRYPT 2012: 321-326 - Tzachy Reinman, Erez Waisbard:
PPiTTA - Preserving Privacy in TV Targeted Advertising. SECRYPT 2012: 327-332 - Johan Garcia:
Quantifying the Benefits of File Size Information for Forensic Hash Matching. SECRYPT 2012: 333-338 - Florian Legendre, Gilles Dequen, Michaël Krajecki:
Inverting Thanks to SAT Solving - An Application on Reduced-step MD*. SECRYPT 2012: 339-344 - Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf:
Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm. SECRYPT 2012: 345-350
Posters
- Keita Emura, Takashi Sato:
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization. SECRYPT 2012: 353-357 - Anna Sojka, Krzysztof Piotrowski:
lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks. SECRYPT 2012: 358-363 - Stefan Rass, Michal Koza:
On Secure Communication over Wireless Sensor Networks. SECRYPT 2012: 364-367 - Yonglin Sun, Yongjun Wang, Yi Zhang:
Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy. SECRYPT 2012: 372-378 - Andreas C. Sonnenbichler, Andreas Geyer-Schulz:
ADQL: A Flexible Access Definition and Query Language to Define Access Control Models. SECRYPT 2012: 379-386 - Rainer Schick, Christoph Ruland:
Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients. SECRYPT 2012: 387-390 - Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova:
Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012: 391-394 - Denis Efremov, Nikolay V. Pakulin:
Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems. SECRYPT 2012: 395-398 - Martin Schütte, Thomas Scheffler, Bettina Schnor:
Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol. SECRYPT 2012: 399-402 - Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides:
The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes. SECRYPT 2012: 403-407 - Sufian Hameed, Tobias Kloht, Xiaoming Fu:
iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation. SECRYPT 2012: 408-411 - Mehdi Fallahpour, David Megías, Hossein Najaf-Zadeh:
Adaptive Speech Watermarking in Wavelet Domain based on Logarithm. SECRYPT 2012: 412-415 - Seungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang:
Defense Against TCP Flooding Attack. SECRYPT 2012: 416-420 - Julien Bringer, Hervé Chabanne, Alain Patey:
An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management. SECRYPT 2012: 421-425 - Lin You, Jie Lu:
A Novel Fuzzy Vault Scheme for Secret Key Exchange. SECRYPT 2012: 426-429 - Byoung-Koo Kim, Ikkyun Kim, Tai-Myoung Chung:
Network-based Executable File Extraction and Analysis for Malware Detection. SECRYPT 2012: 430-433 - Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas:
HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots. SECRYPT 2012: 434-439 - Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio:
A Proposed Framework for Analysing Security Ceremonies. SECRYPT 2012: 440-445
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.