


default search action
SECRYPT 2011: Seville, Spain
- Javier López, Pierangela Samarati:

SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2011, ISBN 978-989-8425-71-3
Invited Speakers
Keynote Speakers
- Han-Chieh Chao:

WiMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks. SECRYPT 2011: 05 - Vincenzo Piuri, Fabio Scotti:

Biometrics Privacy - Technologies and Applications. SECRYPT 2011: 07 - Enrique Cabello:

Face Biometrics without Intrusion in Airport. SECRYPT 2011: 09 - Winfried Lamersdorf:

Paradigms of Distributed Software Systems - Services, Processes, and Self-organization. SECRYPT 2011: 011
Papers
Full Papers
- Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz, Pablo García Bringas:

Anomaly-based Spam Filtering. SECRYPT 2011: 5-14 - Xun Yi, Raylin Tso, Eiji Okamoto:

Three-party Password-authenticated Key Exchange without Random Oracles. SECRYPT 2011: 15-24 - Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:

Smartphone Security Evaluation - The Malware Attack Case . SECRYPT 2011: 25-36 - Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:

Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. SECRYPT 2011: 37-49 - Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan, S. K. Nandy:

A Method for Flexible Reduction over Binary Fields using a Field Multiplier. SECRYPT 2011: 50-58 - Serge Vaudenay:

Related-key Attack against Triple Encryption based on Fixed Points. SECRYPT 2011: 59-67 - Marina Blanton, Mehrdad Aliasgari:

On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting. SECRYPT 2011: 68-77 - Michael E. Farmer, William Arthur:

Study of the Phenomenology of DDOS Network Attacks in Phase Space. SECRYPT 2011: 78-89 - Isao Nakanishi, Sadanao Baba, Masahiro Inoue:

Driver Authentication using Brain Waves While Route Tracing as a Mental Task. SECRYPT 2011: 90-96 - Chunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu:

Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB. SECRYPT 2011: 97-104 - Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu:

A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. SECRYPT 2011: 105-113 - Tobias Jeske:

Privacy-preserving Smart Metering without a Trusted-third-party. SECRYPT 2011: 114-123 - Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer:

Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. SECRYPT 2011: 124-133 - Stefan Rass, Peter Schartner:

Information-leakage in Hybrid Randomized Protocols. SECRYPT 2011: 134-143 - Maria-Camilla Fiazza, Michele Peroli, Luca Viganò:

Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis. SECRYPT 2011: 144-156 - Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro:

On the Strength of Egglue and Other Logic CAPTCHAs. SECRYPT 2011: 157-167 - Yanling Chen, A. J. Han Vinck:

A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel. SECRYPT 2011: 168-177 - Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante:

A Framework for Security and Workload Gradual Adaptation. SECRYPT 2011: 178-187 - Bogdan Groza, Pal-Stefan Murvay:

Higher Layer Authentication for Broadcast in Controller Area Networks. SECRYPT 2011: 188-197 - Imen Brahmi, Sadok Ben Yahia, Pascal Poncelet:

A Snort-based Mobile Agent for a Distributed Intrusion Detection System. SECRYPT 2011: 198-207 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:

CCA Secure Certificateless Encryption Schemes based on RSA. SECRYPT 2011: 208-217 - Nicolas Friot, Christophe Guyeux, Jacques M. Bahi:

Chaotic Iterations for Steganography - Stego-security and Chaos-security. SECRYPT 2011: 218-227
Short Papers
- Xin Xie, Fenlin Liu, Bin Lu, Tao Zhao, Hanning Li:

A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs. SECRYPT 2011: 231-237 - Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith:

A Smart-gentry based Software System for Secret Program Execution. SECRYPT 2011: 238-244 - Jesus Luna Garcia, Hamza Ghani, Daniel Germanus, Neeraj Suri:

A Security Metrics Framework for the Cloud. SECRYPT 2011: 245-250 - Igor Santos, Carlos Laorden, Pablo García Bringas:

Collective Classification for Unknown Malware Detection. SECRYPT 2011: 251-256 - Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro:

Analysis of Botnets through Life-cycle. SECRYPT 2011: 257-262 - Günther Lackner:

On the Security of Location Determination and Verification Methods for Wireless Networks. SECRYPT 2011: 263-268 - Jing Xu, Wen Tao Zhu, Dengguo Feng:

A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks. SECRYPT 2011: 269-274 - Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis:

IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS. SECRYPT 2011: 275-280 - Stefan Popoveniuc, John Kelsey, Eugen Leontie:

On the Privacy Threats of Electronic Poll Books. SECRYPT 2011: 281-286 - Xiaolin Cao, Máire O'Neill:

A Forward Private Protocol based on PRNG and LPN for Low-cost RFID . SECRYPT 2011: 287-292 - Mohammad Reza Sohizadeh Abyaneh:

Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids. SECRYPT 2011: 293-299 - Carlo Maiero, Marino Miculan:

Unobservable Intrusion Detection based on Call Traces in Paravirtualized Systems. SECRYPT 2011: 300-306 - Iria Prieto, Eduardo Magaña, Daniel Morató, Mikel Izal:

Botnet Detection based on DNS Records and Active Probing. SECRYPT 2011: 307-316 - Fabio Piva, Ricardo Dahab:

E-Commerce and Fair Exchange - The Problem of Item Validation. SECRYPT 2011: 317-324 - Nicolas T. Courtois, Theodosis Mourouzis:

Black-box Collision Attacks on the Compression Function of the GOST Hash Function. SECRYPT 2011: 325-332 - Jorge Bernal Bernabé, Juan Manuel Marín Pérez, José M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:

Towards an Authorization System for Cloud Infrastructure Providers. SECRYPT 2011: 333-338
Posters
- John Solis:

Private Searching for Sensitive File Signatures. SECRYPT 2011: 341-344 - Bechara al Bouna, Richard Chbeir, Alban Gabillon:

The Image Protector - A Flexible Security Rule Specification Toolkit . SECRYPT 2011: 345-350 - Houda Jouhari, El Mamoun Souidi:

A New Steganographic Scheme based on First Order Reed Muller Codes - A New Steganographic Scheme. SECRYPT 2011: 351-356 - Yaser Esmaeili Salehani, Amr M. Youssef:

Differential Fault Analysis of Hummingbird. SECRYPT 2011: 357-361 - Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka:

A New Tree-structure-specified Multisignature Scheme for a Document Circulation System. SECRYPT 2011: 362-369 - Angel Jesus Varela-Vaca, Rafael M. Gasca, Sergio Pozo:

OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes. SECRYPT 2011: 370-374 - Aline Bousquet, Patrice Clemente, Jean-François Lalande:

SYNEMA: Visual Monitoring of Network and System Security Sensors. SECRYPT 2011: 375-378 - Almudena Alcaide, Esther Palomar, Israel Barroso-Perez, Ali E. Abdallah:

Privacy-enhancing Cryptography-based Materials. SECRYPT 2011: 379-382 - Abdesselam Redouane:

Towards a Calculus for Non Repudiation Protocols. SECRYPT 2011: 383-386 - Marek Klonowski, Michal Koza, Miroslaw Kutylowski:

How to Transmit Messages via WSN in a Hostile Environment. SECRYPT 2011: 387-390 - Julian Schütte:

Apollon: Towards a Semantically Extensible Policy Framework. SECRYPT 2011: 391-395 - Björn Stelte:

Byzantine Decisions for Inferring Trust in Sensor Networks. SECRYPT 2011: 396-399 - Apostolos P. Fournaris:

Distributed Threshold Cryptography Certification with No Trusted Dealer. SECRYPT 2011: 400-404 - Jan Hajny, Lukas Malina, Vaclav Zeman:

Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use. SECRYPT 2011: 405-408 - Andreas Kasten:

Towards an Information Control Policy Model - Achieving More Transparency in Internet Filtering Approaches. SECRYPT 2011: 409-413 - Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta:

Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher. SECRYPT 2011: 414-417 - Jinying Yu, Philipp Brune:

No Security by Obscurity - Why Two Factor Authentication Should Be based on an Open Design. SECRYPT 2011: 418-421 - Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda:

Artificial Immunity-based Correlation System. SECRYPT 2011: 422-425 - Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen:

Internationally Standardized Efficient Cryptographic Hash Function. SECRYPT 2011: 426-433 - Michael J. Fischer, Michaela Iorga, René Peralta:

A Public Randomness Service. SECRYPT 2011: 434-438
Special Session on Model-based and Policy-based Engineering in Information Security
Full Papers
- Giuseppe Di Modica, Orazio Tomarchio:

Semantic Annotations for Security Policy Matching in WS-policy. SECRYPT 2011: 443-449 - Wassim Itani, Ayman I. Kayssi, Ali Chehab:

Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing. SECRYPT 2011: 450-456 - Hidehito Gomi:

Data and Access Management using Access Tokens for Delegating Authority to Persons and Software. SECRYPT 2011: 457-463 - Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Pierre Konopacki, Régine Laleau, Jérémy Milhau, Richard St-Denis:

A Four-concern-oriented Secure IS Development Approach. SECRYPT 2011: 464-471 - Ali Noorollahi Ravari, Mehran S. Fallah:

A Logical View of Nonmonotonicity in Access Control. SECRYPT 2011: 472-481

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














