


default search action
SECRYPT 2009: Milan, Italy
- Eduardo Fernández-Medina, Manu Malek, Javier Hernando:

SECRYPT 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2009, ISBN 978-989-674-005-4
Invited Speakers
Keynote Lectures
- Blagovest Shishkov:

Adaptive Antennas in Wireless Communication Networks. SECRYPT 2009: 5-17 - Pierangela Samarati:

Protecting Information Privacy in the Electronic Society. SECRYPT 2009: 19-19 - David A. Marca:

e-Business Design - A Shift to Adaptability. SECRYPT 2009: 21-29 - Frank Leymann:

Cloud Computing - Fundamental Architecture & Future Applications. SECRYPT 2009: 31-31 - Gottfried Vossen:

Web 2.0: A Buzzword, a Serious Development, just Fun, or What? SECRYPT 2009: 33-40
Access Control and Intrusion Detection
Full Papers
- Daniel V. Bailey, John G. Brainard, Sebastian Rohde, Christof Paar:

One-touch Financial Transaction Authentication. SECRYPT 2009: 5-12 - Kristof Verslype, Bart De Decker:

Service and Timeframe Dependent Unlinkable One-time Pseudonyms. SECRYPT 2009: 13-20
Short Papers
- Carmen Torrano-Gimenez, Alejandro Pérez-Villegas, Gonzalo Álvarez:

An Anomaly-based Web Application Firewall. SECRYPT 2009: 23-28 - Mirad Zadic, Andrea Nowak:

Visual Programming Language for Security Requirements in Business Processes as Model-driven Software Development. SECRYPT 2009: 29-36 - Hideo Sato:

Finger Vein Verification Technology for Mobile Apparatus. SECRYPT 2009: 37-41 - Sergio Pozo, Angel Jesus Varela-Vaca, Rafael M. Gasca, Rafael Ceballos:

Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs. SECRYPT 2009: 42-53
Posters
- Jan Hajny, Tomas Pelka, Petra Lambertova:

Universal Authentication Framework - Requirements and Phase Design. SECRYPT 2009: 57-60 - Salem Benferhat, Abdelhamid Boudjelida, Habiba Drias:

Adding Expert Knowledge to TAN-based Intrusion Detection Systems. SECRYPT 2009: 61-64
Network Security and Protocols
Full Paper
- Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani:

Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes. SECRYPT 2009: 69-74 - Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:

An Offline Peer-to-peer Broadcasting Scheme with Anonymity. SECRYPT 2009: 75-82 - Michael G. Iatrou, Artemios G. Voyiatzis, Dimitrios N. Serpanos:

Network Stack Optimization for Improved IPsec Performance on Linux. SECRYPT 2009: 83-91 - Sudip Misra, Mohammad S. Obaidat, Atig Bagchi, Ravindara Bhatt, Soumalya Ghosh:

Attack Graph Generation with Infused Fuzzy Clustering. SECRYPT 2009: 92-98
Short Paper
- Michael Hutter:

RFID Authentication Protocols based on Elliptic Curves - A Top-Down Evaluation Survey. SECRYPT 2009: 101-110 - Peng Yang, Yuanchen Ma, Satoshi Yoshizawa:

Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network. SECRYPT 2009: 111-116 - Jaeun Choi, Myungjong Lee, Gisung Kim, Sehun Kim:

Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network. SECRYPT 2009: 117-120 - Saraiah Gujjunoori, Taqi Ali Syed, Madhu Babu J., Avinash Darapureddi, Radhesh Mohandas, Alwyn R. Pais:

Throttling DDoS Attacks. SECRYPT 2009: 121-126 - Germán Retamosa, Jorge E. López de Vergara:

Assessment of Mobile Security Platforms. SECRYPT 2009: 127-132
Posters
- Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica:

Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks. SECRYPT 2009: 135-139 - Young-Jun Heo, Jintae Oh, Jongsoo Jang:

Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks. SECRYPT 2009: 140-143 - Dherik Barison, Rodrigo Sanches Miani, Leonardo de Souza Mendes:

Evaluation of Quality and Security of a VoIP Network based on Asterisk and OpenVPN. SECRYPT 2009: 144-147 - Hamza Rahmani, Nabil Sahli, Farouk Kamoun:

A Traffic Coherence Analysis Model for DDoS Attack Detection. SECRYPT 2009: 148-154 - Renan Fischer e Silva, Eduardo da Silva, Luiz Carlos Pessoa Albini:

Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management. SECRYPT 2009: 155-158 - Guanhan Chew, Aileen Zhang, Khoongming Khoo:

Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions. SECRYPT 2009: 159-162
Cryptographic Techniques and Key Management
Full Papers
- Octavian Cret, Radu Tudoran, Alin Suciu, Tamas Györfi:

Implementing True Random Number Generators in FPGAs by Chip Filling. SECRYPT 2009: 167-174 - Ola M. Hegazy, Ayman M. Bahaa Eldin, Yasser H. Dakroury:

Quantum Secure Direct Communication using Entanglement and Super Dense Coding. SECRYPT 2009: 175-181 - Mounita Saha, Dipanwita Roy Chowdhury:

An Efficient Group Key Agreement Protocol for Heterogeneous Environment. SECRYPT 2009: 182-189 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:

Certified Pseudonyms Colligated with Master Secret Key. SECRYPT 2009: 190-197 - Magdy Saeb:

The Chameleon Cipher-192 (CC-192) - A Polymorphic Cipher. SECRYPT 2009: 198-209
Short Papers
- Mohsen Hajsalehi Sichani, Ali Movaghar:

A New Analysis of RC4 - A Data Mining Approach (J48). SECRYPT 2009: 213-218 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:

On the Security of Two Ring Signcryption Schemes. SECRYPT 2009: 219-224 - Daniel Slamanig, Peter Schartner, Christian Stingl:

Practical Traceable Anonymous Identification. SECRYPT 2009: 225-232 - Changlu Lin, Lein Harn, Dingfeng Ye:

Information-theoretically Secure Strong Verifiable Secret Sharing. SECRYPT 2009: 233-238 - Leonardo Ribeiro, Guerra Ruy:

Safe Reverse Auctions Protocol - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks. SECRYPT 2009: 239-244 - Shiwei Chen, Chenhui Jin:

A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. SECRYPT 2009: 245-248 - Wataru Senga, Hiroshi Doi:

On the Security of Adding Confirmers into Designated Confirmer Signatures. SECRYPT 2009: 249-256
Posters
- S. Arash Sheikholeslam:

A Chaos based Encryption Method using Dynamical Systems with Strange Attractors. SECRYPT 2009: 259-265 - Constantin Catalin Dragan:

Interactive Secret Share Management. SECRYPT 2009: 266-269 - Hongxia Jin:

Efficient Traitor Tracing for Content Protection. SECRYPT 2009: 270-273 - A. M. Hamad, Walid I. Khedr:

Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks. SECRYPT 2009: 274-284 - Jaydeb Bhaumik, Dipanwita Roy Chowdhury:

Nmix: An Ideal Candidate for Key Mixing. SECRYPT 2009: 285-288 - Mayank Varshney, Dipanwita Roy Chowdhury:

A New Image Encryption Algorithm using Cellular Automata. SECRYPT 2009: 289-292
Information Assurance
Short Papers
- Hanh Quyen Nguyen, Friedrich Köster, Michael Klaas, Walter Brenner, Sebastian Obermeier, Markus Brändle:

Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The ESSAF Framework for Structured Qualitative Analysis. SECRYPT 2009: 297-304 - Friedrich Köster, Michael Klaas, Hanh Quyen Nguyen, Walter Brenner, Markus Brändle, Sebastian Obermeier:

Collaborative Security Assessments in Embedded Systems Development - The ESSAF Framework for Structured Qualitative Analysis. SECRYPT 2009: 305-312 - Anton Romanov, Eiji Okamoto:

An Approach for Designing of Enterprise IT Landscapes to Perform Quantitave Information Security Risk Assessment. SECRYPT 2009: 313-318 - Nathalie Dagorn:

Identifying Security Elements for Cooperative Information Systems. SECRYPT 2009: 319-324 - Tord Ingolf Reistad:

Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared Values. SECRYPT 2009: 325-330 - Nicolas T. Courtois:

The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime. SECRYPT 2009: 331-338
Posters
- Javier Corral-García, Carlos-Jorge del Arco González, José Luis González Sánchez, José Luis Redondo García:

Free Security Suite 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration. SECRYPT 2009: 341-344
Security in Information Systems and Software Engineering
Full Paper
- Beatriz Gallego-Nicasio, Antonio Muñoz, Antonio Maña, Daniel Serrano:

Security Patterns, Towards a Further Level. SECRYPT 2009: 349-356
Short Papers
- Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam Venkatesan:

Iterated Transformations and Quantitative Metrics for Software Protection. SECRYPT 2009: 359-368 - Hicham Tout:

Phishpin: An Integrated, Identity-based Anti-phishing Approach. SECRYPT 2009: 369-374 - Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda:

On the Need to Divide the Signature Creation Environment. SECRYPT 2009: 375-380 - Rodrigo Sanches Miani, Felipe Marques Pires, Leonardo de Souza Mendes:

An Alternative Approach for Formula Modelling in Security Metrics. SECRYPT 2009: 381-386 - Andreas Wiesauer, Johannes Sametinger:

A Security Design Pattern Taxonomy based on Attack Patterns - Findings of a Systematic Literature Review. SECRYPT 2009: 387-394 - Jingde Cheng, Yuichi Goto, Daisuke Horie:

ISEE: An Information Security Engineering Environment. SECRYPT 2009: 395-400
Posters
- Julien Bourgeois, Syed Raheel Hassan:

Managing Security of Grid Architecture with a Grid Security Operation Center. SECRYPT 2009: 403-408

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














