


default search action
SECRYPT 2014: Vienna, Austria
- Mohammad S. Obaidat, Andreas Holzinger, Pierangela Samarati:

SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. SciTePress 2014, ISBN 978-989-758-045-1
Invited Speakers
Keynote Speakers
- Seymour E. Goodman:

A Need-based Assessment for Building a National Cyber Security Workforce. IS-5 - Ivona Brandic:

Democratization in Science and Technology through Cloud Computing. IS-7 - Matteo Golfarelli:

Social Business Intelligence - OLAP Applied to User Generated Contents. DATA 2014: IS-9 - Dominik Bork, Dimitris Karagiannis:

Model-driven Development of Multi-View Modelling Tools - The MUVIEMOT Approach. DATA 2014: IS-11 - Edgar R. Weippl:

Advanced Persistent Threats & Social Engineering. IS-13
Full Papers
- Nesrine Kaaniche

, Maryline Laurent
, Mohammed El-Barbori:
CloudaSec: A Novel Public-key Based Framework to Handle Data Sharing Security in Clouds. 5-18 - Paulo Shakarian

, Damon Paulo, Massimiliano Albanese
, Sushil Jajodia:
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. 19-30 - Yun Wei, Fushan Wei, Chuangui Ma:

Certificateless Non-Interactive Key Exchange Protocol without Pairings. 31-42 - Vandana Guleria, Ratna Dutta:

Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction. 43-54 - Vishal Saraswat

, Rajeev Anand Sahu
:
A Secure Anonymous Proxy Multi-signature Scheme. 55-66 - Saikrishna Badrinarayanan, C. Pandu Rangan:

Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols. 67-78 - Nikos Virvilis, Nikolaos Tsalis, Alexios Mylonas

, Dimitris Gritzalis:
Mobile Devices - A Phisher's Paradise. 79-87 - Yehia Elrakaiby

, Jun Pang:
Dynamic Analysis of Usage Control Policies. 88-100 - Jannik Dreier, Rosario Giustolisi

, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. 101-112 - Tsvetoslava Vateva-Gurova, Jesus Luna, Giancarlo Pellegrino, Neeraj Suri

:
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments. 113-124 - Vanesa Daza, Roberto Di Pietro, Flavio Lombardi, Matteo Signorini:

FORCE - Fully Off-line secuRe CrEdits for Mobile Micro Payments. 125-136 - Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:

Privacy Preserving Delegated Word Search in the Cloud. 137-150 - Alexander Oprisnik, Daniel M. Hein, Peter Teufl:

Identifying Cryptographic Functionality in Android Applications. 151-162
Short Papers
- Benjamin Aziz, Philippe Massonet

, Christophe Ponsard:
A Formal Model for Forensic Storage Media Preparation Tools. 165-170 - Hassan Noura

, Steven Martin, Khaldoun Al Agha:
An Efficient Lightweight Security Algorithm for Random Linear Network Coding. 171-177 - Rabiî Dariti, El Mamoun Souidi:

A Steganographic Protocol Based on Linear Error-Block Codes. 178-183 - Adriana-Cristina Enache, Valentin Sgarciu:

Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine. 184-189 - Abdallah Meraoumia

, Salim Chitroub, Ahmed Bouridane:
Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition & Gabor Filter Response. 190-197 - Sven Schindler, Oliver Eggert, Bettina Schnor, Thomas Scheffler:

Shellcode Detection in IPv6 Networks with HoneydV6. 198-205 - Mihajlo Pavloski, Erol Gelenbe:

Signaling Attacks in Mobile Telephony. 206-212 - Sebastian Bittl:

Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions. 213-220 - Lamine M. Aouad, Alejandro Mosquera

, Slawomir Grzonkowski, Dylan Morss:
SMS Spam - A Holistic View. 221-228 - Marek Sýs

, Petr Svenda
, Martin Ukrop
, Vashek Matyas:
Constructing Empirical Tests of Randomness. 229-237 - Byoungcheon Lee:

Hybrid-Style Personal Key Management in Ubiquitous Computing. 238-243 - Andreas Wagner, Johannes Sametinger

:
Using the Juliet Test Suite to Compare Static Security Scanners. 244-252 - Pablo Antón del Pino, Antoine Monsifrot, Charles Salmon-Legagneur, Gwenaël J. Doërr

:
Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism. 253-260 - Dijana Vukovic, Danilo Gligoroski, Zoran Djuric:

On Privacy Protection in the Internet Surveillance Era. 261-266 - Mai Dahshan

, Sherif Elkassas:
Framework for Securing Data in Cloud Storage Services. 267-274 - Omid Zanganeh, Nandita Bhattacharjee, Bala Srinivasan:

Partial Fingerprint Identification Through Correlation-based Approach. 275-284 - Hassane Aissaoui-Mehrez, Pascal Urien

, Guy Pujolle:
Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines. 285-290 - Libor Polcak, Barbora Franková:

On Reliability of Clock-skew-based Remote Computer Identification. 291-298 - Jinyong Chang, Rui Xue:

KDM-CCA Security of the Cramer-Shoup Cryptosystem, Revisited. 299-306 - Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:

A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques. 307-314 - Alberto Ferrante

, Igor Kaitovic, Jelena Milosevic:
Modeling Requirements for Security-enhanced Design of Embedded Systems. 315-320 - Francesco Buccafurri, Gianluca Lax:

A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme. 321-328 - Nirnay Ghosh, Triparna Mondal, Debangshu Chatterjee, Soumya K. Ghosh:

Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - A Formal Approach. 329-336 - Ufuk Celikkan, Can Gelis:

NFC Based Mobile Single Sign-On Solution as a Chrome Extension. 337-343 - Muhammad Awais Shibli, Naveed Ahmad, Ayesha Kanwal, Abdul Ghafoor Abbasi:

Secure Virtual Machine Migration (SV2M) in Cloud Federation. 344-349 - Yuichi Sei, Akihiko Ohsuga:

Randomized Addition of Sensitive Attributes for l-diversity. 350-360 - Pratik Poddar, Achin Bansal, Bernard Menezes:

Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization. 361-370 - Jinse Shin, Christoph Ruland

:
A Hybrid Approach for Content Based Image Authentication. 371-378 - Frederik Armknecht

, Vasily Mikhalev:
Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers. 379-386 - Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Ali Nasir:

Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA. 387-392 - Sandra Diaz-Santiago, Lil María Rodríguez-Henríquez

, Debrup Chakraborty:
A Cryptographic Study of Tokenization Systems. 393-398 - Nicolas T. Courtois, Theodosis Mourouzis, Guangyan Song, Pouyan Sepehrdad, Petr Susil:

Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon. 399-404 - Antonio Muñoz, Antonio Maña

:
Software and Hardware Certification Techniques in a Combined Certification Model. 405-410 - Amir I. Sulimov

, Alexey D. Smolyakov, Arkadij V. Karpov, Oleg N. Sherstyukov:
Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal. 411-416 - Daniel Kavan, Klára Skodová, Martin Klíma:

Network-based Intrusion Prevention System Prototype with Multi-Detection - A Position Paper. 417-425 - Nicolas T. Courtois, Pinar Emirdag, Daniel A. Nagy:

Could Bitcoin Transactions Be 100x Faster?. 426-431 - Lil María Rodríguez-Henríquez

, Debrup Chakraborty:
Using Bitmaps for Executing Range Queries in Encrypted Databases. 432-438 - Silvia Mella, Filippo Melzani

, Andrea Visconti:
Differential Fault Attacks against AES Tampering with the Instruction Flow. 439-444 - Amir I. Sulimov

, Arkadij V. Karpov:
Secure Key Distribution based on Meteor Burst Communications. 445-450 - Damien Couroussé

, Bruno Robisson
, Jean-Louis Lanet, Thierno Barry, Hassan Noura
, Philippe Jaillon, Philippe Lalevée:
COGITO: Code Polymorphism to Secure Devices. 451-456 - Fabio Marfia:

Using Abductive and Inductive Inference to Generate Policy Explanations. 457-462 - Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula:

Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud. 463-468 - Jean-François Couchot, Pierre-Cyrille Héam, Christophe Guyeux, Qianxue Wang, Jacques M. Bahi:

Pseudorandom Number Generators with Balanced Gray Codes. 469-475 - Moussa Ouedraogo, Chien-Ting Kuo, Simon Tjoa

, David Preston, Eric Dubois
, Paulo Simões, Tiago Cruz:
Keeping an Eye on Your Security Through Assurance Indicators. 476-483 - Jordi Cucurull, Sandra Guasch, Alex Escala, Guillermo Navarro-Arribas, Víctor Acín:

QR Steganography - A Threat to New Generation Electronic Voting Systems. 484-491 - Alessandro Barenghi

, Gerardo Pelosi
:
On the Security of Partially Masked Software Implementations. 492-499 - Mikko Kiviharju:

RBAC with ABS - Implementation Practicalities for RBAC Integrity Policies. 500-509

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














