


default search action
SECRYPT 2015: Colmar, Alsace, France
- Mohammad S. Obaidat, Pascal Lorenz, Pierangela Samarati:

SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015. SciTePress 2015, ISBN 978-989-758-117-5
Full Papers
- Jennifer Bellizzi, Mark Vella:

WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification. 5-15 - Alexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu:

A Flexible Architecture for Industrial Control System Honeypots. 16-26 - Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio

:
Mobile Malware Detection using Op-code Frequency Histograms. 27-38 - Yukou Kobayashi, Naoto Yanai

, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto:
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack. 39-52 - Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar:

Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics. 53-64 - Jannik Dreier, Ali Kassem, Pascal Lafourcade

:
Formal Analysis of E-Cash Protocols. 65-75 - Rabih Mohsen, Alexandre Miranda Pinto:

Algorithmic Information Theory for Obfuscation Security. 76-87 - Peter Amthor:

A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux. 88-99 - George Stergiopoulos

, Panagiotis Petsanas, Panagiotis Katsaros, Dimitris Gritzalis:
Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position. 100-111 - Hassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Shafay Shamail, Nabil R. Adam:

Preserving Privacy in Collaborative Business Process Composition. 112-123 - Fabio Marfia, Mario Arrigoni Neri, Filippo Pellegrini, Marco Colombetti:

An OWL-based XACML Policy Framework. 124-135 - Stelvio Cimato, Silvia Mella, Ruggero Susella:

New Results for Partial Key Exposure on RSA with Exponent Blinding. 136-147 - Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen:

On the Instability of Sensor Orientation in Gait Verification on Mobile Phone. 148-159
Short Papers
- Ka Ahmad Khoureich:

hHB: A Harder HB+ Protocol. 163-169 - Catalin V. Bîrjoveanu:

Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery. 170-177 - Roman Schlegel, Ana Hristova, Sebastian Obermeier:

A Framework for Incident Response in Industrial Control Systems. 178-185 - S. Sree Vivek, Guhan Balasubramanian:

Controlled Proxy Re-signing - Conditional Proxy Re-Signatures. 186-193 - Luigi Maria Bottasso:

A Public-Key Cryptography Tool for Personal Use - A Real-world Implementation of ECC for Secure File Exchange. 194-201 - Christophe Nègre, Jean-Marc Robert:

Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve. 202-209 - Claas Lorenz, Bettina Schnor:

Policy Anomaly Detection for Distributed IPv6 Firewalls. 210-219 - Jan Hajny, Petr Dzurenda

, Lukas Malina:
Secure Physical Access Control with Strong Cryptographic Protection. 220-227 - Valerio Selis

, Alan Marshall:
MEDA: A Machine Emulation Detection Algorithm. 228-235 - Slim Trabelsi, Henrik Plate, Amine Abida, M. Marouane Ben Aoun, Anis Zouaoui, Chedy Missaoui, Sofien Gharbi, Alaeddine Ayari:

Monitoring Software Vulnerabilities through Social Networks Analysis. 236-242 - Ewa Syta

, Michael J. Fischer, David Wolinsky, Abraham Silberschatz, Gina Gallegos-García, Bryan Ford
:
Private Eyes: Secure Remote Biometric Authentication. 243-250 - S. Sree Vivek, S. Sharmila Deva Selvi, Aanchal Malhotra, C. Pandu Rangan:

Practical IBE Secure under CBDH - Encrypting Without Pairing. 251-258 - Mario Di Mauro

, Maurizio Longo:
Revealing Encrypted WebRTC Traffic via Machine Learning Tools. 259-266 - Fleura Hajilou, Ehsan Mazidi, Shahab Ardalan:

DPA Resistance Enhancement through a Self-healing PLL based Power Mask. 267-272 - Pankaj Pandey, Einar Arthur Snekkenes:

Design and Performance Aspects of Information Security Prediction Markets for Risk Management. 273-284 - Florian Reimair, Peter Teufl, Christian Kollmann, Christoph Thaller:

MoCrySIL - Carry Your Cryptographic Keys in Your Pocket. 285-292 - Worachet Uttha, Clara Bertolissi, Silvio Ranise:

Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies. 293-300 - Zisis Tsiatsikas, Alexandros Fakis, Dimitrios Papamartzivanos, Dimitris Geneiatakis, Georgios Kambourakis, Constantinos Kolias:

Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?. 301-308 - Jason Reeves, Sean W. Smith:

Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems. 309-316 - Martin Salfer, Claudia Eckert:

Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units. 317-326 - Kaibin Huang, Yu-Chi Chen

, Raylin Tso:
Semantic Secure Public Key Encryption with Filtered Equality Test - PKE-FET. 327-334 - Asma Guesmi, Patrice Clemente, Frédéric Loulergue, Pascal Berthomé:

Cloud Resources Placement based on Functional and Non-functional Requirements. 335-342 - Hajar Benmoussa, Anas Abou El Kalam

, Abdellah Ait Ouahman:
Distributed Intrusion Detection System based on Anticipation and Prediction Approach. 343-348 - Lukas Malina, Petr Munster, Jan Hajny, Tomás Horváth:

Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment. 349-354 - Alexey D. Smolyakov

, Amir I. Sulimov
, Arkadij V. Karpov, Aidar V. Galiev:
Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment. 355-360 - Pierpaolo Cincilla, Aymen Boudguiga, Makhlouf Hadji, Arnaud Kaiser:

Light Blind: Why Encrypt If You Can Share?. 361-368 - Florian Rhinow, Michael Clear:

Scargos: Towards Automatic Vulnerability Distribution. 369-376 - Mahdi Aiash, Jonathan Loo

:
A Formally Verified Access Control Mechanism for Information Centric Networks. 377-383 - Srinivasa Rao Subramanya Rao:

A Note on Schoenmakers Algorithm for Multi Exponentiation. 384-391 - Amir I. Sulimov

, Arkadij V. Karpov:
Performance Evaluation of Meteor Key Distribution. 392-397 - Marc Joye:

A Key-private Cryptosystem from the Quadratic Residuosity. 398-404 - Tayeb Kenaza, Abdenour Labed, Yacine Boulahia, Mohcen Sebehi:

Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection. 405-412 - Mihajlo Pavloski, Gökçe Görbil, Erol Gelenbe:

Counter based Detection and Mitigation of Signalling Attacks. 413-418 - Johan Garcia:

Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints. 419-426 - Rakesh M. Verma, Nirmala Rai:

Phish-IDetector: Message-Id Based Automatic Phishing Detection. 427-434 - Eduardo B. Fernández, Dereje Yimam:

Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations. 435-440 - Bholanath Roy, Ravi Prakash Giri, Ashokkumar C.

, Bernard Menezes:
Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on AES. 441-447 - Francesco Buccafurri, Gianluca Lax, Rajeev Anand Sahu

, Vishal Saraswat
:
Practical and Secure Integrated PKE+PEKS with Keyword Privacy. 448-453 - Faouzi Jaïdi

, Faten Labbene Ayachi:
A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies. 454-459

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














