


default search action
SECRYPT 2013: Reykjavík, Iceland
- Pierangela Samarati:

SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013. SciTePress 2013, ISBN 978-989-8565-73-0
Invited Speakers
Full Papers
- Luis Campo-Giralte, Cristina Conde, Isaac Martín de Diego, Enrique Cabello:

InCC: Hiding Information by Mimicking Traffic In Network Flows. 5-14 - Christian Hanser, Daniel Slamanig:

Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves. 15-26 - Liran Lerman, Jorge Nakahara Jr., Nikita Veshchikov:

Improving Block Cipher Design by Rearranging Internal Operations. 27-38 - Alberto Ferrante, Jelena Milosevic, Marija Janjusevic:

A Security-enhanced Design Methodology for Embedded Systems. 39-50 - Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake:

A Key-revocable Attribute-based Encryption for Mobile Cloud Environments. 51-61 - Lan Zhou, Vijay Varadharajan, Michael Hitchens:

Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control. 62-73 - Ioannis Chionis, Maria Chroni, Stavros D. Nikolopoulos:

A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software. 74-85 - Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack:

HoneydV6: A Low-interaction IPv6 Honeypot. 86-97 - Miltiadis Kandias, Lilian Mitrou, Vasilis Stavrou, Dimitris Gritzalis:

Which Side Are You On? - A New Panopticon vs. Privacy. 98-110 - Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:

Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. 111-122 - Ester Ciancamerla, Michele Minichino, S. Palmieri:

Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks. 123-134 - Petr Svenda, Martin Ukrop, Vashek Matyas:

Towards Cryptographic Function Distinguishers with Evolutionary Circuits. 135-146 - Bo Lang, Runhua Xu, Yawei Duan:

Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control. 147-157 - Boaz Catane, Amir Herzberg:

Secure Second Price Auctions with a Rational Auctioneer. 158-169 - Peter Teufl, Thomas Zefferer, Christof Stromberger, Christoph Hechenblaikner:

iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments. 170-182 - Simone Bongiovanni, Giuseppe Scotti, Alessandro Trifiletti:

Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data. 183-194 - Saradha Ravi, N. Balakrishnan, Bharath Venkatesh:

Behavior-based Malware Analysis using Profile Hidden Markov Models. 195-206 - Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:

An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. 207-218 - Mehdi Khalfaoui, Refik Molva, Laurent Gomez:

Secure Alert Tracking in Supply Chain. 219-229 - Sonia Belaïd, Luk Bettale

, Emmanuelle Dottax
, Laurie Genelle, Franck Rondepierre:
Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. 230-241 - Mehrdad Aliasgari, Marina Blanton

:
Secure Computation of Hidden Markov Models. 242-253 - Ravi Jhawar, Vincenzo Piuri:

Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing. 254-264
Short Papers
- Jan Hajny, Lukas Malina, Zdenek Martinasek, Vaclav Zeman:

Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks. 267-274 - Jacques M. Bahi, Nicolas Friot, Christophe Guyeux:

Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme. 275-283 - Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake:

LMM - A Common Component for Software License Management on Cloud. 284-295 - Stefan Rass:

Dynamic Proofs of Retrievability from Chameleon-Hashes. 296-304 - Ruth Ng Ii-Yung, Khoongming Khoo, Raphael C.-W. Phan:

On the Security of the XOR Sandwiching Paradigm for Multiple Keyed Block Ciphers. 305-312 - Shoichi Hirose, Hidenori Kuwakado:

Redactable Signature Scheme for Tree-structured Data based on Merkle Tree. 313-320 - Yevhen Zolotavkin, Martti Juhola:

SVD-based Digital Image Watermarking on approximated Orthogonal Matrix. 321-330 - Boaz Catane, Amir Herzberg:

Massive Group Message Authentication with Revocable Anonymity. 331-338 - Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:

Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. 339-346 - Thomas Zefferer, Peter Teufl:

Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones. 347-354 - Sébastien Salva, Stassia R. Zafimiharisoa, Patrice Laurençot:

Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components. 355-362 - Patrick Lacharme, Estelle Cherrier, Christophe Rosenberger:

Preimage Attack on BioHashing. 363-370 - Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng:

An Efficient and Provably Secure Certificateless Identification Scheme. 371-378 - Clémentine Maurice, Stéphane Onno, Christoph Neumann, Olivier Heen, Aurélien Francillon:

Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting. 379-386 - Borja Sanz, Igor Santos, Xabier Ugarte-Pedrero, Carlos Laorden, Javier Nieves, Pablo García Bringas:

Instance-based Anomaly Method for Android Malware Detection. 387-394 - Maider Huarte, Iñaki Goirizelaia, Juan José Unzilla, Jon Matías, Juan J. Igarza:

A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities. 395-402 - Rolf Haynberg, Jochen Rill, Dirk Achenbach, Jörn Müller-Quade:

Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs. 403-410 - Nicolas T. Courtois, Theodosis Mourouzis, Michal Misztal:

Enhanced Truncated Differential Cryptanalysis of GOST. 411-418 - Bernd Zwattendorfer, Daniel Slamanig:

Privacy-preserving Realization of the STORK Framework in the Public Cloud. 419-426 - Gerardo Reynaga, Sonia Chiasson:

The Usability of CAPTCHAs on Smartphones. 427-434 - Florian Legendre, Gilles Dequen, Michaël Krajecki:

From a Logical Approach to Internal States of Hash Functions - How SAT Problem Can Help to Understand SHA-* and MD*. 435-443 - Michael Clear, Ciaran McGoldrick:

Policy-based Non-interactive Outsourcing of Computation using Multikey FHE and CP-ABE. 444-452 - Constantinos Patsakis:

Recovering RSA Private Keys on Implementations with Tampered LSBs. 453-460 - Golam Sarwar, Olivier Mehani, Roksana Boreli, Mohamed Ali Kâafar:

On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices. 461-468
Posters
- Daniel Santana de Freitas, Jorge Nakahara Jr.:

Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis. 471-477 - Josep Domingo-Ferrer:

On the Connection between t-Closeness and Differential Privacy for Data Releases. 478-481 - Matt Henricksen, Shinsaku Kiyomoto:

AVON - A Fast Hash Function for Intel SIMD Architectures. 482-487 - Jonny Milliken, Valerio Selis, Kian Meng Yap, Alan Marshall:

Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs. 488-493 - Dustin van der Haar, Basie von Solms:

Are Biometric Web Services a Reality? - A Best Practice Analysis for Telebiometric Deployment in Open Networks. 494-499 - Slim Trabelsi, Hana Bouafif:

Abusing Social Networks with Abuse Reports - A Coalition Attack for Social Networks. 500-505 - Joep A. de Groot, Boris Skoric, Niels de Vreede, Jean-Paul M. G. Linnartz:

Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication. 506-511 - Kazuki Yoneyama:

Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles. 518-523 - Lucjan Hanzlik, Wojciech Wodo:

Identity Security in Biometric Systems based on Keystroking. 524-530 - Vinay S. Iyengar:

Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications. 531-536 - Saeed Rostami, Sadegh Bamohabbat Chafjiri, Seyed Amir Hossein Tabatabaei:

Related-key Impossible Differential Cryptanalysis of Full-round HIGHT. 537-542 - Mickaël Cazorla, Kevin Marquet, Marine Minier:

Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks. 543-548 - Heiko Knospe:

Privacy-enhanced Perceptual Hashing of Audio Data. 549-554 - Lukas Malina, Jan Hajny, Zdenek Martinasek:

Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration. 555-560 - Hervé Chabanne, Gérard D. Cohen, Alain Patey:

Public-key Cryptography from Different Assumptions - A Multi-bit Version. 561-567 - Z. Cliffe Schreuders, Adil M. Bhat:

Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by UK ISPs. 568-573 - George Stergiopoulos, Miltiadis Kandias, Dimitris Gritzalis:

Approaching Encryption through Complex Number Logarithms. 574-579 - Matthias Trojahn, Christian Schadewald, Frank Ortmeier:

Keystroke Authentication with a Capacitive Display using Different Mobile Devices. 580-585 - Hasan Kadhem:

MINHO - A Novel Authentication Scheme based on Pre-Authentication Service. 586-594 - Mario Arrigoni Neri, Marco Guarnieri, Eros Magri, Simone Mutti, Stefano Paraboschi:

A Model-driven Approach for Securing Software Architectures. 595-602 - Elisa Costante, Sokratis Vavilis, Sandro Etalle, Jerry den Hartog, Milan Petkovic, Nicola Zannone:

Database Anomalous Activities - Detection and Quantification. 603-608 - Daniele Codetta Raiteri:

A Preliminary Application of Generalized Fault Trees to Security. 609-614 - Hassan Noura, Steven Martin, Khaldoun Al Agha:

E3SN - Efficient Security Scheme for Sensor Networks. 615-621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














