


default search action
SECRYPT 2012: Rome, Italy
- Pierangela Samarati, Wenjing Lou, Jianying Zhou:

SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2012, ISBN 978-989-8565-24-2
Invited Speakers
Keynote Speakers
- Venu Govindaraju:

Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes. SECRYPT 2012 - Sushil Jajodia:

A Mission-centric Framework for Cyber Situational Awareness. SECRYPT 2012 - Andreas Holzinger:

On Knowledge Discovery and Interactive Intelligent Visualization of Biomedical Data - Challenges in Human-Computer Interaction & Biomedical Informatics. DATA 2012 - Geoffrey Charles Fox:

Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale. SECRYPT 2012 - Luís M. Correia:

A Perspective of the Networks of the Future and Smart Cities. SECRYPT 2012
Full Papers
- Michael Brenner, Henning Perl, Matthew Smith:

Practical Applications of Homomorphic Encryption. SECRYPT 2012: 5-14 - Nagaraj V. Dharwadkar, B. B. Amberker:

Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images. SECRYPT 2012: 15-24 - Michael Tunstall:

Improved "Partial Sums"-based Square Attack on AES. SECRYPT 2012: 25-34 - Matt Henricksen:

Two Dragons - A Family of Fast Word-based Stream Ciphers. SECRYPT 2012: 35-44 - Xun Yi, Raylin Tso, Eiji Okamoto:

Identity-based Password-Authenticated Key Exchange for Client/Server Model. SECRYPT 2012: 45-54 - Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc:

Tampering with Java Card Exceptions - The Exception Proves the Rule. SECRYPT 2012: 55-63 - Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri:

Quantitative Assessment of Cloud Security Level Agreements - A Case Study. SECRYPT 2012: 64-73 - Leyli Javid Khayati, Erkay Savas, Berkant Ustaoglu, Cengiz Örencik:

Privacy-preserving Targeted Advertising Scheme for IPTV using the Cloud. SECRYPT 2012: 74-83 - Keita Emura, Mohammad Shahriar Rahman:

Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure. SECRYPT 2012: 84-93 - Anup Kumar Bhattacharya, Abhijit Das, Dipanwita Roy Chowdhury, Bhargav Bellur, Aravind Iyer:

SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics. SECRYPT 2012: 94-101 - Benjamin Vetter, Osman Ugus, Dirk Westhoff, Christoph Sorge:

Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture. SECRYPT 2012: 102-112 - Henrich Christopher Pöhls, Kai Samelin, Hermann de Meer, Joachim Posegga:

Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction. SECRYPT 2012: 113-125 - George Athanasiou, Chara I. Chalkou, D. Bardis, Harris E. Michail, George Theodoridis, Costas E. Goutis:

High-throughput Hardware Architectures of the JH Round-three SHA-3 Candidate - An FPGA Design and Implementation Approach. SECRYPT 2012: 126-135 - Mikhail J. Atallah, Keith B. Frikken, Shumiao Wang:

Private Outsourcing of Matrix Multiplication over Closed Semi-rings. SECRYPT 2012: 136-144 - Nicolas T. Courtois, Theodosis Mourouzis, Pho V. Le:

Extension of de Weger's Attack on RSA with Large Public Keys. SECRYPT 2012: 145-153 - Sandra Diaz-Santiago, Debrup Chakraborty:

On Securing Communication from Profilers. SECRYPT 2012: 154-162 - Chenguang Yang, Ghaith Hammouri, Berk Sunar:

Voice Passwords Revisited. SECRYPT 2012: 163-171 - Domenico Vitali, Antonio Villani, Angelo Spognardi, Roberto Battistoni, Luigi V. Mancini:

DDoS Detection with Information Theory Metrics and Netflows - A Real Case. SECRYPT 2012: 172-181 - Alessio Di Mauro, Alessandro Mei, Sushil Jajodia:

Secure File Allocation and Caching in Large-scale Distributed Systems. SECRYPT 2012: 182-191 - Hanane Houmani, Mourad Debbabi:

Formal Analysis of the TLS Handshake Protocol. SECRYPT 2012: 192-205
Short Papers
- Rodolphe Lampe, Jacques Patarin:

Analysis of Some Natural Variants of the PKP Algorithm. SECRYPT 2012: 209-214 - Julien Bringer, Alain Patey:

VLR Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks. SECRYPT 2012: 215-220 - Constantinos Patsakis, Kleanthis Dellios:

Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer. SECRYPT 2012: 221-226 - Yuyu Chou, Jan Oetting, Olga Levina:

Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection. SECRYPT 2012: 227-232 - Julian Schütte, Hervais Simo Fhom, Mark Gall:

Security Policies in Dynamic Service Compositions. SECRYPT 2012: 233-238 - Mikko Kiviharju:

Towards Pervasive Cryptographic Access Control Models. SECRYPT 2012: 239-244 - Keith B. Frikken:

Cryptographic Enforcement of Access Control while Mitigating Key Sharing. SECRYPT 2012: 245-250 - Denis Butin, Giampaolo Bella:

Verifying Privacy by Little Interaction and No Process Equivalence. SECRYPT 2012: 251-256 - Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen:

A Security Analysis of Emerging Web Standards - HTML5 and Friends, from Specification to Implementation. SECRYPT 2012: 257-262 - Ahmed Al-Khazzar, Nick Savage:

Biometric Identification in Virtual Worlds using Biometric Fusion Techniques. SECRYPT 2012: 263-269 - Harris E. Michail, George Athanasiou, Andreas Gregoriades, George Theodoridis, Costas E. Goutis:

On the Development of Totally Self-checking Hardware Design for the SHA-1 Hash Function. SECRYPT 2012: 270-275 - Liran Lerman, Olivier Markowitch, Jorge Nakahara Jr.:

Key Management as a Service. SECRYPT 2012: 276-281 - Ali Hammami, Noëmie Simoni:

Secure and Seamless Session Management in Mobile and Heterogeneous Environment. SECRYPT 2012: 282-289 - Leonardo Maccari:

A Collaborative Firewall for Wireless Ad-Hoc Social Networks. SECRYPT 2012: 290-295 - Marek Klonowski, Piotr Syga, Wojciech Wodo:

Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures. SECRYPT 2012: 296-301 - Chiara Valentina Schiavo, Andrea Visconti:

An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size. SECRYPT 2012: 302-307 - Igor V. Kotenko, Olga Polubelova, Igor Saenko:

Data Repository for Security Information and Event Management in Service Infrastructures. SECRYPT 2012: 308-313 - Apostolos P. Fournaris:

Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer. SECRYPT 2012: 314-320 - Min Li, Yulong Zhang, Kun Bai, Wanyu Zang, Meng Yu, Xubin He:

Improving Cloud Survivability through Dependency based Virtual Machine Placement. SECRYPT 2012: 321-326 - Tzachy Reinman, Erez Waisbard:

PPiTTA - Preserving Privacy in TV Targeted Advertising. SECRYPT 2012: 327-332 - Johan Garcia:

Quantifying the Benefits of File Size Information for Forensic Hash Matching. SECRYPT 2012: 333-338 - Florian Legendre, Gilles Dequen, Michaël Krajecki:

Inverting Thanks to SAT Solving - An Application on Reduced-step MD*. SECRYPT 2012: 339-344 - Deepthi N. Ratnayake, Hassan B. Kazemian, Syed A. Yusuf:

Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm. SECRYPT 2012: 345-350
Posters
- Keita Emura, Takashi Sato:

Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization. SECRYPT 2012: 353-357 - Anna Sojka, Krzysztof Piotrowski:

lmRNG: A Lightweight Pseudorandom Number Generator for Wireless Sensor Networks. SECRYPT 2012: 358-363 - Stefan Rass, Michal Koza:

On Secure Communication over Wireless Sensor Networks. SECRYPT 2012: 364-367 - Yonglin Sun, Yongjun Wang, Yi Zhang:

Self-ad-MCNHA-SLOS - A Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy. SECRYPT 2012: 372-378 - Andreas C. Sonnenbichler, Andreas Geyer-Schulz:

ADQL: A Flexible Access Definition and Query Language to Define Access Control Models. SECRYPT 2012: 379-386 - Rainer Schick, Christoph Ruland:

Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients. SECRYPT 2012: 387-390 - Igor V. Kotenko, Andrey Chechulin, Evgenia Novikova:

Attack Modelling and Security Evaluation for Security Information and Event Management. SECRYPT 2012: 391-394 - Denis Efremov, Nikolay V. Pakulin:

Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems. SECRYPT 2012: 395-398 - Martin Schütte, Thomas Scheffler, Bettina Schnor:

Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol. SECRYPT 2012: 399-402 - Antigoni Polychroniadou, Konstantinos Chalkias, George Stephanides:

The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes. SECRYPT 2012: 403-407 - Sufian Hameed, Tobias Kloht, Xiaoming Fu:

iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation. SECRYPT 2012: 408-411 - Mehdi Fallahpour, David Megías, Hossein Najaf-Zadeh:

Adaptive Speech Watermarking in Wavelet Domain based on Logarithm. SECRYPT 2012: 412-415 - Seungyong Yoon, Jintae Oh, Ikkyun Kim, Jongsoo Jang:

Defense Against TCP Flooding Attack. SECRYPT 2012: 416-420 - Julien Bringer, Hervé Chabanne, Alain Patey:

An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management. SECRYPT 2012: 421-425 - Lin You, Jie Lu:

A Novel Fuzzy Vault Scheme for Secret Key Exchange. SECRYPT 2012: 426-429 - Byoung-Koo Kim, Ikkyun Kim, Tai-Myoung Chung:

Network-based Executable File Extraction and Analysis for Malware Detection. SECRYPT 2012: 430-433 - Patrice Clemente, Jean-François Lalande, Jonathan Rouzaud-Cornabas:

HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots. SECRYPT 2012: 434-439 - Marcelo Carlomagno Carlos, Jean Everson Martina, Geraint Price, Ricardo Felipe Custódio:

A Proposed Framework for Analysing Security Ceremonies. SECRYPT 2012: 440-445

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














