default search action
SECRYPT 2014: Vienna, Austria
- Mohammad S. Obaidat, Andreas Holzinger, Pierangela Samarati:
SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. SciTePress 2014, ISBN 978-989-758-045-1
Invited Speakers
Keynote Speakers
- Seymour E. Goodman:
A Need-based Assessment for Building a National Cyber Security Workforce. IS-5 - Ivona Brandic:
Democratization in Science and Technology through Cloud Computing. IS-7 - Matteo Golfarelli:
Social Business Intelligence - OLAP Applied to User Generated Contents. DATA 2014: IS-9 - Dominik Bork, Dimitris Karagiannis:
Model-driven Development of Multi-View Modelling Tools - The MUVIEMOT Approach. DATA 2014: IS-11 - Edgar R. Weippl:
Advanced Persistent Threats & Social Engineering. IS-13
Full Papers
- Nesrine Kaaniche, Maryline Laurent, Mohammed El-Barbori:
CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. 5-18 - Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia:
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. 19-30 - Yun Wei, Fushan Wei, Chuangui Ma:
Certificateless Non-Interactive Key Exchange Protocol without Pairings. 31-42 - Vandana Guleria, Ratna Dutta:
Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction. 43-54 - Vishal Saraswat, Rajeev Anand Sahu:
A Secure Anonymous Proxy Multi-signature Scheme. 55-66 - Saikrishna Badrinarayanan, C. Pandu Rangan:
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. 67-78 - Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis:
Mobile Devices - A Phisher's Paradise. 79-87 - Yehia Elrakaiby, Jun Pang:
Dynamic Analysis of Usage Control Policies. 88-100 - Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. 101-112 - Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri:
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments. 113-124 - Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:
FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments. 125-136 - Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:
Privacy Preserving Delegated Word Search in the Cloud. 137-150 - Alexander Oprisnik, Daniel M. Hein, Peter Teufl:
Identifying Cryptographic Functionality in Android Applications. 151-162
Short Papers
- Benjamin Aziz, Philippe Massonet, Christophe Ponsard:
A Formal Model for Forensic Storage Media Preparation Tools. 165-170 - Hassan Noura, Steven Martin, Khaldoun Al Agha:
An Efficient Lightweight Security Algorithm for Random Linear Network Coding. 171-177 - Rabiî Dariti, El Mamoun Souidi:
A Steganographic Protocol Based on Linear Error-Block Codes. 178-183 - Adriana-Cristina Enache, Valentin Sgarciu:
Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine. 184-189 - Abdallah Meraoumia, Salim Chitroub, Ahmed Bouridane:
Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition & Gabor Filter Response. 190-197 - Sven Schindler, Oliver Eggert, Bettina Schnor, Thomas Scheffler:
Shellcode Detection in IPv6 Networks with HoneydV6. 198-205 - Mihajlo Pavloski, Erol Gelenbe:
Signaling Attacks in Mobile Telephony. 206-212 - Sebastian Bittl:
Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions. 213-220 - Lamine M. Aouad, Alejandro Mosquera, Slawomir Grzonkowski, Dylan Morss:
SMS Spam - A Holistic View. 221-228 - Marek Sýs, Petr Svenda, Martin Ukrop, Vashek Matyas:
Constructing Empirical Tests of Randomness. 229-237 - Byoungcheon Lee:
Hybrid-Style Personal Key Management in Ubiquitous Computing. 238-243 - Andreas Wagner, Johannes Sametinger:
Using the Juliet Test Suite to Compare Static Security Scanners. 244-252 - Pablo Antón del Pino, Antoine Monsifrot, Charles Salmon-Legagneur, Gwenaël J. Doërr:
Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism. 253-260 - Dijana Vukovic, Danilo Gligoroski, Zoran Djuric:
On Privacy Protection in the Internet Surveillance Era. 261-266 - Mai Dahshan, Sherif Elkassas:
Framework for Securing Data in Cloud Storage Services. 267-274 - Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan:
Partial Fingerprint Identification Through Correlation-based Approach. 275-284 - Hassane Aissaoui-Mehrez, Pascal Urien, Guy Pujolle:
Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines. 285-290 - Libor Polcak, Barbora Franková:
On Reliability of Clock-skew-based Remote Computer Identification. 291-298 - Jinyong Chang, Rui Xue:
KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. 299-306 - Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques. 307-314 - Alberto Ferrante, Igor Kaitovic, Jelena Milosevic:
Modeling Requirements for Security-enhanced Design of Embedded Systems. 315-320 - Francesco Buccafurri, Gianluca Lax:
A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme. 321-328 - Nirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, Soumya K. Ghosh:
Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach. 329-336 - Ufuk Celikkan, Can Gelis:
NFC Based Mobile Single Sign-On Solution as a Chrome Extension. 337-343 - Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor Abbasi:
Secure Virtual Machine Migration (SV2M) in Cloud Federation. 344-349 - Yuichi Sei, Akihiko Ohsuga:
Randomized Addition of Sensitive Attributes for l-diversity. 350-360 - Pratik Poddar, Achin Bansal, Bernard Menezes:
Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization. 361-370 - Jinse Shin, Christoph Ruland:
A Hybrid Approach for Content Based Image Authentication. 371-378 - Frederik Armknecht, Vasily Mikhalev:
Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers. 379-386 - Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Ali Nasir:
Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA. 387-392 - Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez, Debrup Chakraborty:
A Cryptographic Study of Tokenization Systems. 393-398 - Nicolas T. Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad, Petr Susil:
Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon. 399-404 - Antonio Muñoz, Antonio Maña:
Software and Hardware Certification Techniques in a Combined Certification Model. 405-410 - Amir I. Sulimov, Alexey D. Smolyakov, Arkadij V. Karpov, Oleg N. Sherstyukov:
Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal. 411-416 - Daniel Kavan, Klára Skodová, Martin Klíma:
Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper. 417-425 - Nicolas T. Courtois, Pinar Emirdag, Daniel A. Nagy:
Could Bitcoin Transactions Be 100x Faster?. 426-431 - Lil María Rodríguez-Henríquez, Debrup Chakraborty:
Using Bitmaps for Executing Range Queries in Encrypted Databases. 432-438 - Silvia Mella, Filippo Melzani, Andrea Visconti:
Differential Fault Attacks against AES Tampering with the Instruction Flow. 439-444 - Amir I. Sulimov, Arkadij V. Karpov:
Secure Key Distribution based on Meteor Burst Communications. 445-450 - Damien Couroussé, Bruno Robisson, Jean-Louis Lanet, Thierno Barry, Hassan Noura, Philippe Jaillon, Philippe Lalevée:
COGITO: Code Polymorphism to Secure Devices. 451-456 - Fabio Marfia:
Using Abductive and Inductive Inference to Generate Policy Explanations. 457-462 - Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula:
Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud. 463-468 - Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:
Pseudorandom Number Generators with Balanced Gray Codes. 469-475 - Moussa Ouedraogo, Chien-Ting Kuo, Simon Tjoa, David Preston, Eric Dubois, Paulo Simões, Tiago Cruz:
Keeping an Eye on Your Security Through Assurance Indicators. 476-483 - Jordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas, Víctor Acín:
QR Steganography - A Threat to New Generation Electronic Voting Systems. 484-491 - Alessandro Barenghi, Gerardo Pelosi:
On the Security of Partially Masked Software Implementations. 492-499 - Mikko Kiviharju:
RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies. 500-509
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.