default search action
SECRYPT 2011: Seville, Spain
- Javier López, Pierangela Samarati:
SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2011, ISBN 978-989-8425-71-3
Invited Speakers
Keynote Speakers
- Han-Chieh Chao:
WiMAX? - A Case Study on Minimizing Construction Cost for IEEE 802.16j Multi-hop Relay Networks. SECRYPT 2011: 05 - Vincenzo Piuri, Fabio Scotti:
Biometrics Privacy - Technologies and Applications. SECRYPT 2011: 07 - Enrique Cabello:
Face Biometrics without Intrusion in Airport. SECRYPT 2011: 09 - Winfried Lamersdorf:
Paradigms of Distributed Software Systems - Services, Processes, and Self-organization. SECRYPT 2011: 011
Papers
Full Papers
- Igor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz, Pablo García Bringas:
Anomaly-based Spam Filtering. SECRYPT 2011: 5-14 - Xun Yi, Raylin Tso, Eiji Okamoto:
Three-party Password-authenticated Key Exchange without Random Oracles. SECRYPT 2011: 15-24 - Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis:
Smartphone Security Evaluation - The Malware Attack Case . SECRYPT 2011: 25-36 - Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. SECRYPT 2011: 37-49 - Saptarsi Das, Keshavan Varadarajan, Ganesh Garga, Rajdeep Mondal, Ranjani Narayan, S. K. Nandy:
A Method for Flexible Reduction over Binary Fields using a Field Multiplier. SECRYPT 2011: 50-58 - Serge Vaudenay:
Related-key Attack against Triple Encryption based on Fixed Points. SECRYPT 2011: 59-67 - Marina Blanton, Mehrdad Aliasgari:
On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting. SECRYPT 2011: 68-77 - Michael E. Farmer, William Arthur:
Study of the Phenomenology of DDOS Network Attacks in Phase Space. SECRYPT 2011: 78-89 - Isao Nakanishi, Sadanao Baba, Masahiro Inoue:
Driver Authentication using Brain Waves While Route Tracing as a Mental Task. SECRYPT 2011: 90-96 - Chunfang Yang, Tao Zhao, Hanning Li, Fenlin Liu:
Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB. SECRYPT 2011: 97-104 - Zongbin Liu, Luning Xia, Jiwu Jing, Peng Liu:
A Tiny RSA Coprocessor based on Optimized Systolic Montgomery Architecture. SECRYPT 2011: 105-113 - Tobias Jeske:
Privacy-preserving Smart Metering without a Trusted-third-party. SECRYPT 2011: 114-123 - Kazumaro Aoki, Günther Roland, Yu Sasaki, Martin Schläffer:
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl. SECRYPT 2011: 124-133 - Stefan Rass, Peter Schartner:
Information-leakage in Hybrid Randomized Protocols. SECRYPT 2011: 134-143 - Maria-Camilla Fiazza, Michele Peroli, Luca Viganò:
Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis. SECRYPT 2011: 144-156 - Carlos Javier Hernández-Castro, Arturo Ribagorda, Julio César Hernández Castro:
On the Strength of Egglue and Other Logic CAPTCHAs. SECRYPT 2011: 157-167 - Yanling Chen, A. J. Han Vinck:
A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel. SECRYPT 2011: 168-177 - Antonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante:
A Framework for Security and Workload Gradual Adaptation. SECRYPT 2011: 178-187 - Bogdan Groza, Pal-Stefan Murvay:
Higher Layer Authentication for Broadcast in Controller Area Networks. SECRYPT 2011: 188-197 - Imen Brahmi, Sadok Ben Yahia, Pascal Poncelet:
A Snort-based Mobile Agent for a Distributed Intrusion Detection System. SECRYPT 2011: 198-207 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:
CCA Secure Certificateless Encryption Schemes based on RSA. SECRYPT 2011: 208-217 - Nicolas Friot, Christophe Guyeux, Jacques M. Bahi:
Chaotic Iterations for Steganography - Stego-security and Chaos-security. SECRYPT 2011: 218-227
Short Papers
- Xin Xie, Fenlin Liu, Bin Lu, Tao Zhao, Hanning Li:
A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs. SECRYPT 2011: 231-237 - Michael Brenner, Jan Wiebelitz, Gabriele von Voigt, Matthew Smith:
A Smart-gentry based Software System for Secret Program Execution. SECRYPT 2011: 238-244 - Jesus Luna Garcia, Hamza Ghani, Daniel Germanus, Neeraj Suri:
A Security Metrics Framework for the Cloud. SECRYPT 2011: 245-250 - Igor Santos, Carlos Laorden, Pablo García Bringas:
Collective Classification for Unknown Malware Detection. SECRYPT 2011: 251-256 - Rafael Rodríguez-Gómez, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro:
Analysis of Botnets through Life-cycle. SECRYPT 2011: 257-262 - Günther Lackner:
On the Security of Location Determination and Verification Methods for Wireless Networks. SECRYPT 2011: 263-268 - Jing Xu, Wen Tao Zhu, Dengguo Feng:
A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks. SECRYPT 2011: 269-274 - Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis:
IS IP Multimedia Subsystem Affected by ‘Malformed Message' Attacks? - An Evaluation of OpenIMS. SECRYPT 2011: 275-280 - Stefan Popoveniuc, John Kelsey, Eugen Leontie:
On the Privacy Threats of Electronic Poll Books. SECRYPT 2011: 281-286 - Xiaolin Cao, Máire O'Neill:
A Forward Private Protocol based on PRNG and LPN for Low-cost RFID . SECRYPT 2011: 287-292 - Mohammad Reza Sohizadeh Abyaneh:
Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids. SECRYPT 2011: 293-299 - Carlo Maiero, Marino Miculan:
Unobservable Intrusion Detection based on Call Traces in Paravirtualized Systems. SECRYPT 2011: 300-306 - Iria Prieto, Eduardo Magaña, Daniel Morató, Mikel Izal:
Botnet Detection based on DNS Records and Active Probing. SECRYPT 2011: 307-316 - Fabio Piva, Ricardo Dahab:
E-Commerce and Fair Exchange - The Problem of Item Validation. SECRYPT 2011: 317-324 - Nicolas T. Courtois, Theodosis Mourouzis:
Black-box Collision Attacks on the Compression Function of the GOST Hash Function. SECRYPT 2011: 325-332 - Jorge Bernal Bernabé, Juan Manuel Marín Pérez, José M. Alcaraz Calero, Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta:
Towards an Authorization System for Cloud Infrastructure Providers. SECRYPT 2011: 333-338
Posters
- John Solis:
Private Searching for Sensitive File Signatures. SECRYPT 2011: 341-344 - Bechara al Bouna, Richard Chbeir, Alban Gabillon:
The Image Protector - A Flexible Security Rule Specification Toolkit . SECRYPT 2011: 345-350 - Houda Jouhari, El Mamoun Souidi:
A New Steganographic Scheme based on First Order Reed Muller Codes - A New Steganographic Scheme. SECRYPT 2011: 351-356 - Yaser Esmaeili Salehani, Amr M. Youssef:
Differential Fault Analysis of Hummingbird. SECRYPT 2011: 357-361 - Masaki Inamura, Keiichi Iwamura, Ryu Watanabe, Makoto Nishikawa, Toshiaki Tanaka:
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System. SECRYPT 2011: 362-369 - Angel Jesus Varela-Vaca, Rafael M. Gasca, Sergio Pozo:
OPBUS: Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes. SECRYPT 2011: 370-374 - Aline Bousquet, Patrice Clemente, Jean-François Lalande:
SYNEMA: Visual Monitoring of Network and System Security Sensors. SECRYPT 2011: 375-378 - Almudena Alcaide, Esther Palomar, Israel Barroso-Perez, Ali E. Abdallah:
Privacy-enhancing Cryptography-based Materials. SECRYPT 2011: 379-382 - Abdesselam Redouane:
Towards a Calculus for Non Repudiation Protocols. SECRYPT 2011: 383-386 - Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
How to Transmit Messages via WSN in a Hostile Environment. SECRYPT 2011: 387-390 - Julian Schütte:
Apollon: Towards a Semantically Extensible Policy Framework. SECRYPT 2011: 391-395 - Björn Stelte:
Byzantine Decisions for Inferring Trust in Sensor Networks. SECRYPT 2011: 396-399 - Apostolos P. Fournaris:
Distributed Threshold Cryptography Certification with No Trusted Dealer. SECRYPT 2011: 400-404 - Jan Hajny, Lukas Malina, Vaclav Zeman:
Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use. SECRYPT 2011: 405-408 - Andreas Kasten:
Towards an Information Control Policy Model - Achieving More Transparency in Internet Filtering Approaches. SECRYPT 2011: 409-413 - Praloy Kr. Biswas, Dipanwita Roy Chowdhury, Kankar S. Dasgupta:
Fast Selective Encryption Scheme for MP3 Files - Using GRAIN Stream Cipher. SECRYPT 2011: 414-417 - Jinying Yu, Philipp Brune:
No Security by Obscurity - Why Two Factor Authentication Should Be based on an Open Design. SECRYPT 2011: 418-421 - Guillermo Suarez-Tangil, Esther Palomar, Sergio Pastrana, Arturo Ribagorda:
Artificial Immunity-based Correlation System. SECRYPT 2011: 422-425 - Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen:
Internationally Standardized Efficient Cryptographic Hash Function. SECRYPT 2011: 426-433 - Michael J. Fischer, Michaela Iorga, René Peralta:
A Public Randomness Service. SECRYPT 2011: 434-438
Special Session on Model-based and Policy-based Engineering in Information Security
Full Papers
- Giuseppe Di Modica, Orazio Tomarchio:
Semantic Annotations for Security Policy Matching in WS-policy. SECRYPT 2011: 443-449 - Wassim Itani, Ayman I. Kayssi, Ali Chehab:
Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing. SECRYPT 2011: 450-456 - Hidehito Gomi:
Data and Access Management using Access Tokens for Delegating Authority to Persons and Software. SECRYPT 2011: 457-463 - Michel Embe Jiague, Marc Frappier, Frédéric Gervais, Pierre Konopacki, Régine Laleau, Jérémy Milhau, Richard St-Denis:
A Four-concern-oriented Secure IS Development Approach. SECRYPT 2011: 464-471 - Ali Noorollahi Ravari, Mehran S. Fallah:
A Logical View of Nonmonotonicity in Access Control. SECRYPT 2011: 472-481
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.