default search action
13. ISC 2010: Boca Raton, FL, USA
- Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic:
Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6531, Springer 2011, ISBN 978-3-642-18177-1
Attacks and Analysis
- Kota Ideguchi, Elmar Tischhauser, Bart Preneel:
Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. 1-16 - Yi Lu, Yvo Desmedt:
Improved Distinguishing Attack on Rabbit. 17-23 - Hassan Jameel Asghar, Shujun Li, Josef Pieprzyk, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. 24-30 - Nadhem J. AlFardan, Kenneth G. Paterson:
An Analysis of DepenDNS. 31-38
Analysis
- Elena Andreeva, Bart Mennink, Bart Preneel:
Security Reductions of the Second Round SHA-3 Candidates. 39-53 - Özgür Dagdelen, Marc Fischlin:
Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents. 54-68 - Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho:
Revisiting the Security of the Alred Design. 69-83
Authentication, PIR and Content Identification
- Christian Wachsmann, Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. 84-98 - Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow:
Implicit Authentication through Learning User Behavior. 99-113 - Jonathan T. Trostle, Andy Parrish:
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups. 114-128 - Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee:
Video Streaming Forensic - Content Identification with Traffic Snooping. 129-135
Privacy
- Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:
Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets. 136-151 - Arne Tauber, Thomas Rössler:
Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation. 152-158 - Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée, Ingrid Verbauwhede:
Privacy-Preserving ECC-Based Grouping Proofs for RFID. 159-165
Malware, Crimeware and Code Injection
- Xinyuan Wang, Xuxian Jiang:
Artificial Malware Immunization Based on Dynamically Assigned Sense of Self. 166-180 - Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie:
Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. 181-195 - Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis:
Crimeware Swindling without Virtual Machines. 196-202 - Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos:
An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications. 203-209
Intrusion Detection
- Lei Wei, Michael K. Reiter, Ketan Mayer-Patel:
Summary-Invisible Networking: Techniques and Defenses. 210-225 - Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani:
Selective Regular Expression Matching. 226-240 - Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. S. Machado, Charles B. Prado, Luiz F. R. C. Carmo:
Traceability of Executable Codes Using Neural Networks. 241-253
Side Channels
- Jorge Guajardo, Bart Mennink:
On Side-Channel Resistant Block Cipher Usage. 254-268 - Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes:
Security Implications of Crosstalk in Switching CMOS Gates. 269-275 - Ye Zhu:
On Privacy Leakage through Silence Suppression. 276-282
Cryptography
- Julien Cathalo, Christophe Petit:
One-Time Trapdoor One-Way Functions. 283-298 - Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento:
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. 299-306 - Ping Yu, Rui Xue:
A Short Signature Scheme from the RSA Family. 307-318 - Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo:
Efficient Message Space Extension for Automorphic Signatures. 319-330
Smartphones
- Mauro Conti, Vu Thien Nga Nguyen, Bruno Crispo:
CRePE: Context-Related Policy Enforcement for Android. 331-345 - Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy:
Privilege Escalation Attacks on Android. 346-360
Biometrics
- Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski:
Walk the Walk: Attacking Gait Biometrics by Imitation. 361-380
Cryptography, Application
- Kun Peng, Feng Bao:
Efficient Multiplicative Homomorphic E-Voting. 381-393 - Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré:
Double Spending Protection for E-Cash Based on Risk Management. 394-408
Buffer Overflow
- Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:
Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. 409-415
Cryptography, Theory
- Zhiwei Li, Weichao Wang:
Deciding Recognizability under Dolev-Yao Intruder Model. 416-429 - Kazuki Yoneyama:
Indifferentiable Security Reconsidered: Role of Scheduling. 430-444
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.