


default search action
SECRYPT 2016: Lisbon, Portugal
- Christian Callegari, Marten van Sinderen, Panagiotis G. Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, Mohammad S. Obaidat:

Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016. SciTePress 2016, ISBN 978-989-758-196-0
Papers
Full Papers
- Cristina Alcaraz, Javier López, Kim-Kwang Raymond Choo:

Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems. 19-27 - George Stergiopoulos

, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. 28-40 - Gerben Geltink, Sergei Volokitin:

FPGA Implementation of HS1-SIV. 41-48 - Johannes Schneider, Bin Lu, Thomas Locher, Yvonne-Anne Pignolet, Matús Harvan, Sebastian Obermeier:

Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance. 49-60 - Jean-Guillaume Dumas

, Pascal Lafourcade
, Jean-Baptiste Orfila, Maxime Puys
:
Private Multi-party Matrix Multiplication and Trust Computations. 61-72 - Jelena Milosevic, Miroslaw Malek, Alberto Ferrante

:
A Friend or a Foe? Detecting Malware using Memory and CPU Features. 73-84 - Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill:

Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting. 85-96 - Gerardo Canfora, Paolo Di Notte, Francesco Mercaldo, Corrado Aaron Visaggio:

Silent and Continuous Authentication in Mobile Environment. 97-108 - Bogdan Groza

, Pal-Stefan Murvay
, Tudor Andreica:
Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers. 109-120 - Jordi Cucurull, Sandra Guasch, David Galindo:

Transitioning to a Javascript Voting Client for Remote Online Voting. 121-132 - Sana Belguith

, Nesrine Kaaniche
, Abderrazak Jemai
, Maryline Laurent
, Rabah Attia:
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. 133-146 - Giada Sciarretta, Alessandro Armando, Roberto Carbone, Silvio Ranise:

Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution. 147-158 - Andreas Put, Bart De Decker:

PACCo: Privacy-friendly Access Control with Context. 159-170 - Kirill Belyaev, Indrakshi Ray:

Towards Access Control for Isolated Applications. 171-182 - Asma Patel, Esther Palomar

:
LP-Cache: Privacy-aware Cache Model for Location-based Apps. 183-194
Short Papers
- Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner:

The Mathematical Foundations for Mapping Policies to Network Devices. 197-206 - Kazuhide Fukushima

, Seira Hidano, Shinsaku Kiyomoto:
Sensor-based Wearable PUF. 207-214 - Debjyoti Bhattacharjee, Anupam Chattopadhyay:

Hardware Accelerator for Stream Cipher Spritz. 215-222 - Johannes Schneider:

Lean and Fast Secure Multi-party Computation: Minimizing Communication and Local Computation using a Helper. 223-230 - Hélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet, Ronan Lashermes:

A Template Attack Against VERIFY PIN Algorithms. 231-238 - Peter T. Breuer

, Jonathan P. Bowen
, Esther Palomar
, Zhiming Liu:
A Practical Encrypted Microprocessor. 239-250 - Olivier Blazy

, Xavier Bultel, Pascal Lafourcade
:
Two Secure Anonymous Proxy-based Data Storages. 251-258 - Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen:

User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme. 259-270 - Vitor Bernardo, Dulce Domingos

:
Web-based Fingerprinting Techniques. 271-282 - Manoranjan Mohanty, Muhammad Rizwan Asghar

, Giovanni Russello:
3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud. 283-291 - Óscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar

:
Protecting Databases from Schema Disclosure - A CRUD-Based Protection Model. 292-301 - Mohammed Bakiri

, Jean-François Couchot, Christophe Guyeux
:
FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study. 302-309 - Gerardo Canfora

, Francesco Mercaldo, Antonio Pirozzi, Corrado Aaron Visaggio:
How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis. 310-317 - Sara Barakat, Bechara al Bouna, Mohamed Nassar

, Christophe Guyeux
:
On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. 318-326 - Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:

OSCIDS: An Ontology based SCADA Intrusion Detection Framework. 327-335 - Srinivasa Rao Subramanya Rao:

Differential Addition in Edwards Coordinates Revisited and a Short Note on Doubling in Twisted Edwards Form. 336-343 - Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung X. Nguyen, Marian Mihailescu, Michelle McClintock:

Verifiable Policy-defined Networking for Security Management. 344-351 - Tim Waage, Daniel Homann

, Lena Wiese
:
Practical Application of Order-preserving Encryption in Wide Column Stores. 352-359 - Rosario Giustolisi

, Christian Gehrmann:
Threats to 5G Group-based Authentication. 360-367 - Andrea Lesavourey

, Christophe Nègre, Thomas Plantard
:
Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications. 368-375 - Kenta Muranaka, Naoto Yanai

, Shingo Okamura, Toru Fujiwara:
ISDSR: Secure DSR with ID-based Sequential Aggregate Signature. 376-387
Posters
- Denis Hock, Martin Kappes, Bogdan V. Ghita

:
A Pre-clustering Method To Improve Anomaly Detection. 391-396 - Abir Awad, Brian Lee

:
A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management. 397-402 - Ibraheem Frieslaar

, Barry Irwin
:
Towards a Software Approach to Mitigate Correlation Power Analysis. 403-410 - Tomoaki Mimoto, Anirban Basu

, Shinsaku Kiyomoto:
Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy. 411-418 - Ahmet Emin Tatar, Marius Nagy, Naya Nagy:

The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence Classes. SECRYPT 2016: 419-423 - Jean-François Couchot, Raphaël Couturier

, Yousra Ahmed Fadil, Christophe Guyeux
:
A Second Order Derivatives based Approach for Steganography. 424-431 - Hafsa Assidi, Edoukou Berenger Ayebie

, El Mamoun Souidi
:
A Code-based Group Signature Scheme with Shorter Public Key Length. 432-439 - Sumanta Chatterjee, Alwyn R. Pais

, Sumit Saurabh:
Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification. 440-445 - Mohsen Ahmadvand, Antoine Scemama, Martín Ochoa

, Alexander Pretschner:
Enhancing Operation Security using Secret Sharing. 446-451 - Wojciech Wodo

, Lucjan Hanzlik, Kamil Kluczniak:
Computations on Private Sets and their Application to Biometric based Authentication Systems. 452-457 - Wojciech Wodo

, Lucjan Hanzlik:
Thermal Imaging Attacks on Keypad Security Systems. 458-464 - Nicolas T. Courtois, Pouyan Sepehrdad, Guangyan Song, Iason Papapanagiotakis-Bousy:

Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon. 465-470 - Francesco Buccafurri, Rajeev Anand Sahu

, Vishal Saraswat
:
Efficient Proxy Signature Scheme from Pairings. 471-476 - Slim Trabelsi, Skander Ben Mahmoud, Anis Zouaoui:

Predictive Model for Exploit Kit based Attacks. 477-482 - Jan Hajny, Petr Dzurenda

, Lukas Malina
:
Multi-Device Authentication using Wearables and IoT. 483-488

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














