default search action
SECRYPT 2016: Lisbon, Portugal
- Christian Callegari, Marten van Sinderen, Panagiotis G. Sarigiannidis, Pierangela Samarati, Enrique Cabello, Pascal Lorenz, Mohammad S. Obaidat:
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016. SciTePress 2016, ISBN 978-989-758-196-0
Papers
Full Papers
- Cristina Alcaraz, Javier López, Kim-Kwang Raymond Choo:
Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems. 19-27 - George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. 28-40 - Gerben Geltink, Sergei Volokitin:
FPGA Implementation of HS1-SIV. 41-48 - Johannes Schneider, Bin Lu, Thomas Locher, Yvonne-Anne Pignolet, Matús Harvan, Sebastian Obermeier:
Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance. 49-60 - Jean-Guillaume Dumas, Pascal Lafourcade, Jean-Baptiste Orfila, Maxime Puys:
Private Multi-party Matrix Multiplication and Trust Computations. 61-72 - Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
A Friend or a Foe? Detecting Malware using Memory and CPU Features. 73-84 - Dirk Achenbach, Bernhard Löwe, Jörn Müller-Quade, Jochen Rill:
Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting. 85-96 - Gerardo Canfora, Paolo Di Notte, Francesco Mercaldo, Corrado Aaron Visaggio:
Silent and Continuous Authentication in Mobile Environment. 97-108 - Bogdan Groza, Pal-Stefan Murvay, Tudor Andreica:
Evaluating SRAM as Source for Fingerprints and Randomness on Automotive Grade Controllers. 109-120 - Jordi Cucurull, Sandra Guasch, David Galindo:
Transitioning to a Javascript Voting Client for Remote Online Voting. 121-132 - Sana Belguith, Nesrine Kaaniche, Abderrazak Jemai, Maryline Laurent, Rabah Attia:
PAbAC: A Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds. 133-146 - Giada Sciarretta, Alessandro Armando, Roberto Carbone, Silvio Ranise:
Security of Mobile Single Sign-On: A Rational Reconstruction of Facebook Login Solution. 147-158 - Andreas Put, Bart De Decker:
PACCo: Privacy-friendly Access Control with Context. 159-170 - Kirill Belyaev, Indrakshi Ray:
Towards Access Control for Isolated Applications. 171-182 - Asma Patel, Esther Palomar:
LP-Cache: Privacy-aware Cache Model for Location-based Apps. 183-194
Short Papers
- Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner:
The Mathematical Foundations for Mapping Policies to Network Devices. 197-206 - Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto:
Sensor-based Wearable PUF. 207-214 - Debjyoti Bhattacharjee, Anupam Chattopadhyay:
Hardware Accelerator for Stream Cipher Spritz. 215-222 - Johannes Schneider:
Lean and Fast Secure Multi-party Computation: Minimizing Communication and Local Computation using a Helper. 223-230 - Hélène Le Bouder, Thierno Barry, Damien Couroussé, Jean-Louis Lanet, Ronan Lashermes:
A Template Attack Against VERIFY PIN Algorithms. 231-238 - Peter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu:
A Practical Encrypted Microprocessor. 239-250 - Olivier Blazy, Xavier Bultel, Pascal Lafourcade:
Two Secure Anonymous Proxy-based Data Storages. 251-258 - Sven Kiljan, Harald P. E. Vranken, Marko C. J. D. van Eekelen:
User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - A Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme. 259-270 - Vitor Bernardo, Dulce Domingos:
Web-based Fingerprinting Techniques. 271-282 - Manoranjan Mohanty, Muhammad Rizwan Asghar, Giovanni Russello:
3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud. 283-291 - Óscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar:
Protecting Databases from Schema Disclosure - A CRUD-Based Protection Model. 292-301 - Mohammed Bakiri, Jean-François Couchot, Christophe Guyeux:
FPGA Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: A Chaotic Iterations Post Processing Case Study. 302-309 - Gerardo Canfora, Francesco Mercaldo, Antonio Pirozzi, Corrado Aaron Visaggio:
How I Met Your Mother? - An Empirical Study about Android Malware Phylogenesis. 310-317 - Sara Barakat, Bechara al Bouna, Mohamed Nassar, Christophe Guyeux:
On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets. 318-326 - Abdullah Al Balushi, Kieran McLaughlin, Sakir Sezer:
OSCIDS: An Ontology based SCADA Intrusion Detection Framework. 327-335 - Srinivasa Rao Subramanya Rao:
Differential Addition in Edwards Coordinates Revisited and a Short Note on Doubling in Twisted Edwards Form. 336-343 - Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung X. Nguyen, Marian Mihailescu, Michelle McClintock:
Verifiable Policy-defined Networking for Security Management. 344-351 - Tim Waage, Daniel Homann, Lena Wiese:
Practical Application of Order-preserving Encryption in Wide Column Stores. 352-359 - Rosario Giustolisi, Christian Gehrmann:
Threats to 5G Group-based Authentication. 360-367 - Andrea Lesavourey, Christophe Nègre, Thomas Plantard:
Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications. 368-375 - Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara:
ISDSR: Secure DSR with ID-based Sequential Aggregate Signature. 376-387
Posters
- Denis Hock, Martin Kappes, Bogdan V. Ghita:
A Pre-clustering Method To Improve Anomaly Detection. 391-396 - Abir Awad, Brian Lee:
A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management. 397-402 - Ibraheem Frieslaar, Barry Irwin:
Towards a Software Approach to Mitigate Correlation Power Analysis. 403-410 - Tomoaki Mimoto, Anirban Basu, Shinsaku Kiyomoto:
Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy. 411-418 - Ahmet Emin Tatar, Marius Nagy, Naya Nagy:
The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence Classes. SECRYPT 2016: 419-423 - Jean-François Couchot, Raphaël Couturier, Yousra Ahmed Fadil, Christophe Guyeux:
A Second Order Derivatives based Approach for Steganography. 424-431 - Hafsa Assidi, Edoukou Berenger Ayebie, El Mamoun Souidi:
A Code-based Group Signature Scheme with Shorter Public Key Length. 432-439 - Sumanta Chatterjee, Alwyn R. Pais, Sumit Saurabh:
Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification. 440-445 - Mohsen Ahmadvand, Antoine Scemama, Martín Ochoa, Alexander Pretschner:
Enhancing Operation Security using Secret Sharing. 446-451 - Wojciech Wodo, Lucjan Hanzlik, Kamil Kluczniak:
Computations on Private Sets and their Application to Biometric based Authentication Systems. 452-457 - Wojciech Wodo, Lucjan Hanzlik:
Thermal Imaging Attacks on Keypad Security Systems. 458-464 - Nicolas T. Courtois, Pouyan Sepehrdad, Guangyan Song, Iason Papapanagiotakis-Bousy:
Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon. 465-470 - Francesco Buccafurri, Rajeev Anand Sahu, Vishal Saraswat:
Efficient Proxy Signature Scheme from Pairings. 471-476 - Slim Trabelsi, Skander Ben Mahmoud, Anis Zouaoui:
Predictive Model for Exploit Kit based Attacks. 477-482 - Jan Hajny, Petr Dzurenda, Lukas Malina:
Multi-Device Authentication using Wearables and IoT. 483-488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.