


default search action
9th ACNS 2011: Nerja, Spain
- Javier López, Gene Tsudik:

Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Lecture Notes in Computer Science 6715, 2011, ISBN 978-3-642-21553-7
Malware and Intrusion Detection
- Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao

, Buyun Qu, Li Guo:
Inferring Protocol State Machine from Network Traces: A Probabilistic Approach. 1-18 - Ashwin Chaugule, Zhi Xu, Sencun Zhu:

A Specification Based Intrusion Detection Framework for Mobile Phones. 19-37 - Mansoor Alicherry, Angelos D. Keromytis:

Misuse Detection in Consent-Based Networks. 38-56
Attacks I
- Martin R. Albrecht, Carlos Cid:

Cold Boot Key Recovery by Solving Polynomial Systems with Noise. 57-72 - Werner Schindler, Kouichi Itoh:

Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security. 73-90 - Alex Biryukov

, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. 91-109 - Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux:

Cache Timing Analysis of RC4. 110-129
Applied Crypto I
- Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:

Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. 130-146 - Emiliano De Cristofaro, Mark Manulis

, Bertram Poettering:
Private Discovery of Common Social Contacts. 147-165
Signatures and Friends
- Henrich Christopher Pöhls, Kai Samelin, Joachim Posegga:

Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency. 166-182 - Masayuki Abe, Sherman S. M. Chow

, Kristiyan Haralambiev, Miyako Ohkubo:
Double-Trapdoor Anonymous Tags for Traceable Signatures. 183-200 - Feng Bao, Robert H. Deng

, Xuhua Ding
, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. 201-219
Eclectic Assortment
- Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura

:
Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting. 220-237 - Patrick Butler, Kui Xu, Danfeng (Daphne) Yao

:
Quantitatively Analyzing Stealthy Communication Channels. 238-254 - Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:

Fully Non-interactive Onion Routing with Forward-Secrecy. 255-273
Theory
- Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:

Generic Fully Simulatable Adaptive Oblivious Transfer. 274-291 - Ashish Choudhury

, Kaoru Kurosawa, Arpita Patra:
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. 292-308 - Marc Fischlin, Cristina Onete:

Relaxed Security Notions for Signatures of Knowledge. 309-326
Encryption
- Wenling Wu, Lei Zhang:

LBlock: A Lightweight Block Cipher. 327-344 - Cihangir Tezcan

, Serge Vaudenay:
On Hiding a Plaintext Length by Preencryption. 345-358
Broadcast Encryption
- Paolo D'Arco, Angel L. Pérez del Pozo:

Fighting Pirates 2.0. 359-376 - Duong Hieu Phan

, David Pointcheval
, Mario Strefler:
Security Notions for Broadcast Encryption. 377-394
Security Services
- Kari Kostiainen, N. Asokan

, Alexandra Afanasyeva:
Towards User-Friendly Credential Transfer on Open Credential Platforms. 395-412 - Jacob C. N. Schuldt, Goichiro Hanaoka:

Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks. 413-430 - Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema:

Composable Security Analysis of OS Services. 431-448
Attacks II
- Stefan Kölbl, Florian Mendel

:
Practical Attacks on the Maelstrom-0 Compression Function. 449-461 - Tomer Ashur

, Orr Dunkelman:
Linear Analysis of Reduced-Round CubeHash. 462-478 - Rishiraj Bhattacharyya

, Avradip Mandal:
On the Indifferentiability of Fugue and Luffa. 479-497 - Yuto Nakano, Carlos Cid, Kazuhide Fukushima

, Shinsaku Kiyomoto:
Analysis of Message Injection in Stream Cipher-Based Hash Functions. 498-513
Applied Crypto II
- Keith B. Frikken, Hao Yuan, Mikhail J. Atallah:

Secure Authenticated Comparisons. 514-531 - Luan Ibraimi, Svetla Nikova

, Pieter H. Hartel
, Willem Jonker:
Public-Key Encryption with Delegated Search. 532-549

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














