


default search action
SECRYPT 2010: Athens, Greece
- Sokratis K. Katsikas, Pierangela Samarati:

SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2010, ISBN 978-989-8425-18-8
Invited Speakers
Keynote Speakers
- Ian F. Akyildiz:

Nanonetworks - A New Frontier in Communications. SECRYPT 2010: 5 - Petar M. Djuric:

From Nature to Methods and Back to Nature. SECRYPT 2010: 7 - Stamatios V. Kartalopoulos:

Chaotic Quantum Cryptography - The Ultimate for Network Security. SECRYPT 2010: 9 - Nikolaos G. Bourbakis:

Information Security: The SCAN - Secure Processor with Crypto-Biometrics Capabilities. SECRYPT 2010: 11
Access Control and Intrusion Detection
Full Papers
- John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:

Risk based Access Control with Uncertain and Time-dependent Sensitivity. SECRYPT 2010: 5-13 - Karim Tabia, Philippe Leray:

Handling IDS' Reliability in Alert Correlation - A Bayesian Network-based Model for Handling IDS's Reliability and Controlling Prediction/False Alarm Rate Tradeoffs. SECRYPT 2010: 14-24 - Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis:

A Novel Intrusion Detection System for MANETs. SECRYPT 2010: 25-34
Short Papers
- Jonny Milliken, Alan Marshall:

The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies. SECRYPT 2010: 37-42 - Bo Lang:

Trust Degree based Access Control for Social Networks. SECRYPT 2010: 43-48 - Anja Fischer, Winfried E. Kühnhauser:

Efficient Algorithmic Safety Analysis of HRU Security Models. SECRYPT 2010: 49-58 - Carlos Javier Hernández-Castro, Arturo Ribagorda, Yago Sáez:

Side-channel Attack on the HumanAuth CAPTCHA. SECRYPT 2010: 59-65 - Mahjoub Langar, Mohamed Mejri, Kamel Adi:

Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach. SECRYPT 2010: 66-74
Posters
- Dipankar Dasgupta, Sudip Saha, Aregahegn Negatu:

Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey. SECRYPT 2010: 77-85 - Ahmed Al-Khazzar, Nick Savage:

Graphical Authentication based on user Behaviour. SECRYPT 2010: 86-89 - Jan Hajny, Tomas Pelka, Vaclav Zeman:

Privacy Protection for user Authentication. SECRYPT 2010: 90-93 - Marcia Gibson, Marc Conrad, Carsten Maple:

Infinite Alphabet Passwords - A Unified Model for a Class of Authentication Systems. SECRYPT 2010: 94-99 - Abdelhalim Zaidi, Nazim Agoulmine, Tayeb Kenaza:

Piecewise Classification of Attack Patterns for Efficient Network Intrusion Detection. SECRYPT 2010: 100-104
Data and Application Security and Privacy
Full Papers
- Amin Milani Fard, Ke Wang:

An Effective Clustering Approach to Web Query Log Anonymization. SECRYPT 2010: 109-119 - María Isabel González Vasco, Somayeh Heidarvand, Jorge L. Villar:

Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access. SECRYPT 2010: 120-131 - Daniel Slamanig, Stefan Rass:

Anonymous but Authorized Transactions Supporting Selective Traceability. SECRYPT 2010: 132-141 - Alex Hai Wang:

Don't Follow Me - Spam Detection in Twitter. SECRYPT 2010: 142-151
Short Papers
- Tim Dörflinger, Anna Voth, Juliane Krämer, Ronald Fromm:

"My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones. SECRYPT 2010: 155-164 - Stefan Popoveniuc, Eugen Leontie:

Safe RPC - Auditing Mixnets Safely using Randomized Partial Checking. SECRYPT 2010: 165-170 - Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson:

EnCoRe: Towards a Holistic Approach to Privacy. SECRYPT 2010: 171-176 - Oliver Gmelch, Günther Pernul:

Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals. SECRYPT 2010: 177-182 - Sandeep S. Kumar:

Anonymous Social Stamps - Authenticating Anonymous Statements to Friends with Privacy. SECRYPT 2010: 183-188 - Elisa Mannes, Eduardo da Silva, Michele Nogueira Lima, Aldri Luiz dos Santos:

Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs. SECRYPT 2010: 189-195 - Bradley Baker, C. Edward Chow:

HTEE: An HMAC based Tamper Evident Encryption. SECRYPT 2010: 196-205
Posters
- Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Álvarez:

Improving N-Gram Linguistic Steganography based on Templates. SECRYPT 2010: 209-212 - Nicola Zannone, Milan Petkovic, Sandro Etalle:

Towards Data Protection Compliance. SECRYPT 2010: 213-216 - Dimitrios Michalopoulos, Ioannis Mavridis:

Towards Risk based Prevention of Grooming Attacks. SECRYPT 2010: 217-220 - Giovanni Cabiddu, Emanuele Cesena, Davide Vernizzi:

Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous Networks. SECRYPT 2010: 221-225
Network Security and Protocols
Full Papers
- Keith B. Frikken, Yihua Zhang:

Confidentiality and Integrity for SUM Aggregation in Sensor Networks. SECRYPT 2010: 231-240 - Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante:

QoS and Security in Energy-harvesting Wireless Sensor Networks. SECRYPT 2010: 241-250 - Khan Ferdous Wahid, Javier Rubio-Loyola:

Secure Bridging in Large Scale Deployment of Ethernet. SECRYPT 2010: 251-260
Short Papers
- Avinash Darapureddi, Radhesh Mohandas, Alwyn Roshan Pais:

Throttling DDoS Attacks using Discrete Logarithm Problem. SECRYPT 2010: 263-269 - Shailesh Vaya:

Realizing Secure Multiparty Computation on Incomplete Networks. SECRYPT 2010: 270-277 - Eliana Stavrou, Andreas Pitsillides, George C. Hadjichristofi, Christoforos N. Hadjicostis:

Security in Future Mobile Sensor Networks - Issues and Challenges. SECRYPT 2010: 278-286 - Mihaela Ion, Giovanni Russello, Bruno Crispo:

Providing Confidentiality in Content-based Publish/subscribe Systems. SECRYPT 2010: 287-292
Posters
- Jorge Munilla, Andrés Ortiz, Alberto Peinado:

What can RFID do for Vanets? - A Cryptographic Point of View. SECRYPT 2010: 295-298 - Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica:

Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2. SECRYPT 2010: 299-303 - Anna Sojka, Krzysztof Piotrowski, Peter Langendörfer:

Short ECC - A Lightweight Security Approach for Wireless Sensor Networks. SECRYPT 2010: 304-308 - Harris E. Michail, George Athanasiou, Angeliki Kritikakou, Costas E. Goutis, Andreas Gregoriades, Vicky G. Papadopoulou:

Ultra High Speed SHA-256 Hashing Cryptographic Module for IPSec Hardware/Software Codesign. SECRYPT 2010: 309-313 - Murthy S. Andukuri, C. Edward Chow:

Efficient Asymmetric IPSec for Secure iSCSI. SECRYPT 2010: 314-317 - Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, Raphael Chung-Wei Phan:

Security Models for Heterogeneous Networking. SECRYPT 2010: 318-321
Cryptographic Techniques and Key Management
Full Papers
- Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:

Analysis of SNOW 3G⊕ Resynchronization Mechanism. SECRYPT 2010: 327-333 - Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:

On a Construction of Stream-cipher-based Hash Functions. SECRYPT 2010: 334-343 - Mebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama:

Proxiable Designated Verifier Signature. SECRYPT 2010: 344-353 - Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:

Adaptive and Composable Non-interactive String-commitment Protocols. SECRYPT 2010: 354-361 - S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan:

An Identity based Ring Signcryption Scheme with Public Verifiability. SECRYPT 2010: 362-371 - Kashi Neupane, Rainer Steinwandt:

Server-assisted Long-term Secure 3-party Key Establishment. SECRYPT 2010: 372-378 - Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan:

Forcing Out a Confession - Threshold Discernible Ring Signatures. SECRYPT 2010: 379-388 - Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:

Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. SECRYPT 2010: 389-398 - Luan Ibraimi, Muhammad Asim, Milan Petkovic:

An Encryption Scheme for a Secure Policy Updating. SECRYPT 2010: 399-408
Short Paper
- Vittorio Ottaviani, Alberto Zanoni, Massimo Regoli:

Conjugation as Public Key Agreement Protocol in Mobile Cryptography. SECRYPT 2010: 411-416
Posters
- Kun Peng, Feng Bao:

Vulnerability of a Non-membership Proof Scheme. SECRYPT 2010: 419-422 - Xiaoyu Wu, Duncan S. Wong, Qing Li:

Extended Visual Cryptography Scheme for Color Images with no Pixel Expansion. SECRYPT 2010: 423-426 - Dibyendu Mallik, Debdeep Mukhopadhyay:

New Pseudo Near Collision Attack on Tiger. SECRYPT 2010: 427-430 - Xiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Miltos Petridis, Yongzhe Zhao:

BMQE System - A MQ Equations System based on Ergodic Matrix. SECRYPT 2010: 431-435
Information Assurance
Short Papers
- David M. Williams, Helen Treharne, Anthony T. S. Ho:

On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols. SECRYPT 2010: 441-446 - Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:

HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index. SECRYPT 2010: 447-452
Posters
- Christophe Guyeux, Jacques M. Bahi:

A New Chaos-based Watermarking Algorithm. SECRYPT 2010: 455-458 - Aristeidis Chatzipoulidis, Ioannis Mavridis:

An ICT Security Management Framework. SECRYPT 2010: 459-462
Security in Information Systems and Software Engineering
Full Papers
- Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson:

Management of Security Policies in Virtual Organisations. SECRYPT 2010: 467-477 - Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu:

Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures. SECRYPT 2010: 478-485
Short Papers
- Vahid R. Karimi, Donald D. Cowan:

Access Control Models for Business Processes. SECRYPT 2010: 489-498 - Vipul Patel, Radhesh Mohandas, Alwyn R. Pais:

Attacks on Web Services and Mitigation Schemes. SECRYPT 2010: 499-504 - Lwin Khin Shar, Hee Beng Kuan Tan:

Auditing the Defense Against Cross Site Scripting in Web Applications. SECRYPT 2010: 505-511 - José Antonio Álvarez-Cubero, Pedro J. Zufiria:

A C++ Class for Analysing Vector Boolean Functions from a Cryptographic Perspective. SECRYPT 2010: 512-520 - George Yee, Xingli Xie, Shikharesh Majumdar:

Automated Threat Identification for UML. SECRYPT 2010: 521-527

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














