default search action
SECRYPT 2010: Athens, Greece
- Sokratis K. Katsikas, Pierangela Samarati:
SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. SciTePress 2010, ISBN 978-989-8425-18-8
Invited Speakers
Keynote Speakers
- Ian F. Akyildiz:
Nanonetworks - A New Frontier in Communications. SECRYPT 2010: 5 - Petar M. Djuric:
From Nature to Methods and Back to Nature. SECRYPT 2010: 7 - Stamatios V. Kartalopoulos:
Chaotic Quantum Cryptography - The Ultimate for Network Security. SECRYPT 2010: 9 - Nikolaos G. Bourbakis:
Information Security: The SCAN - Secure Processor with Crypto-Biometrics Capabilities. SECRYPT 2010: 11
Access Control and Intrusion Detection
Full Papers
- John A. Clark, Juan E. Tapiador, John A. McDermid, Pau-Chen Cheng, Dakshi Agrawal, Natalie Ivanic, Dave Slogget:
Risk based Access Control with Uncertain and Time-dependent Sensitivity. SECRYPT 2010: 5-13 - Karim Tabia, Philippe Leray:
Handling IDS' Reliability in Alert Correlation - A Bayesian Network-based Model for Handling IDS's Reliability and Controlling Prediction/False Alarm Rate Tradeoffs. SECRYPT 2010: 14-24 - Christoforos Panos, Christos Xenakis, Ioannis Stavrakakis:
A Novel Intrusion Detection System for MANETs. SECRYPT 2010: 25-34
Short Papers
- Jonny Milliken, Alan Marshall:
The Threat-Victim Table - A Security Prioritisation Framework For Diverse WLAN Network Topographies. SECRYPT 2010: 37-42 - Bo Lang:
Trust Degree based Access Control for Social Networks. SECRYPT 2010: 43-48 - Anja Fischer, Winfried E. Kühnhauser:
Efficient Algorithmic Safety Analysis of HRU Security Models. SECRYPT 2010: 49-58 - Carlos Javier Hernández-Castro, Arturo Ribagorda, Yago Sáez:
Side-channel Attack on the HumanAuth CAPTCHA. SECRYPT 2010: 59-65 - Mahjoub Langar, Mohamed Mejri, Kamel Adi:
Rewriting-based Security Enforcement of Concurrent Systems - A Formal Approach. SECRYPT 2010: 66-74
Posters
- Dipankar Dasgupta, Sudip Saha, Aregahegn Negatu:
Techniques for Validation and Controlled Execution of Processes, Codes and Data - A Survey. SECRYPT 2010: 77-85 - Ahmed Al-Khazzar, Nick Savage:
Graphical Authentication based on user Behaviour. SECRYPT 2010: 86-89 - Jan Hajny, Tomas Pelka, Vaclav Zeman:
Privacy Protection for user Authentication. SECRYPT 2010: 90-93 - Marcia Gibson, Marc Conrad, Carsten Maple:
Infinite Alphabet Passwords - A Unified Model for a Class of Authentication Systems. SECRYPT 2010: 94-99 - Abdelhalim Zaidi, Nazim Agoulmine, Tayeb Kenaza:
Piecewise Classification of Attack Patterns for Efficient Network Intrusion Detection. SECRYPT 2010: 100-104
Data and Application Security and Privacy
Full Papers
- Amin Milani Fard, Ke Wang:
An Effective Clustering Approach to Web Query Log Anonymization. SECRYPT 2010: 109-119 - María Isabel González Vasco, Somayeh Heidarvand, Jorge L. Villar:
Anonymous Subscription Schemes - A Flexible Construction for On-line Services Access. SECRYPT 2010: 120-131 - Daniel Slamanig, Stefan Rass:
Anonymous but Authorized Transactions Supporting Selective Traceability. SECRYPT 2010: 132-141 - Alex Hai Wang:
Don't Follow Me - Spam Detection in Twitter. SECRYPT 2010: 142-151
Short Papers
- Tim Dörflinger, Anna Voth, Juliane Krämer, Ronald Fromm:
"My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones. SECRYPT 2010: 155-164 - Stefan Popoveniuc, Eugen Leontie:
Safe RPC - Auditing Mixnets Safely using Randomized Partial Checking. SECRYPT 2010: 165-170 - Nick Papanikolaou, Sadie Creese, Michael Goldsmith, Marco Casassa Mont, Siani Pearson:
EnCoRe: Towards a Holistic Approach to Privacy. SECRYPT 2010: 171-176 - Oliver Gmelch, Günther Pernul:
Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals. SECRYPT 2010: 177-182 - Sandeep S. Kumar:
Anonymous Social Stamps - Authenticating Anonymous Statements to Friends with Privacy. SECRYPT 2010: 183-188 - Elisa Mannes, Eduardo da Silva, Michele Nogueira Lima, Aldri Luiz dos Santos:
Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs. SECRYPT 2010: 189-195 - Bradley Baker, C. Edward Chow:
HTEE: An HMAC based Tamper Evident Encryption. SECRYPT 2010: 196-205
Posters
- Alfonso Muñoz Muñoz, Justo Carracedo Gallardo, Irina Arguelles Álvarez:
Improving N-Gram Linguistic Steganography based on Templates. SECRYPT 2010: 209-212 - Nicola Zannone, Milan Petkovic, Sandro Etalle:
Towards Data Protection Compliance. SECRYPT 2010: 213-216 - Dimitrios Michalopoulos, Ioannis Mavridis:
Towards Risk based Prevention of Grooming Attacks. SECRYPT 2010: 217-220 - Giovanni Cabiddu, Emanuele Cesena, Davide Vernizzi:
Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous Networks. SECRYPT 2010: 221-225
Network Security and Protocols
Full Papers
- Keith B. Frikken, Yihua Zhang:
Confidentiality and Integrity for SUM Aggregation in Sensor Networks. SECRYPT 2010: 231-240 - Antonio Vincenzo Taddeo, Marcello Mura, Alberto Ferrante:
QoS and Security in Energy-harvesting Wireless Sensor Networks. SECRYPT 2010: 241-250 - Khan Ferdous Wahid, Javier Rubio-Loyola:
Secure Bridging in Large Scale Deployment of Ethernet. SECRYPT 2010: 251-260
Short Papers
- Avinash Darapureddi, Radhesh Mohandas, Alwyn Roshan Pais:
Throttling DDoS Attacks using Discrete Logarithm Problem. SECRYPT 2010: 263-269 - Shailesh Vaya:
Realizing Secure Multiparty Computation on Incomplete Networks. SECRYPT 2010: 270-277 - Eliana Stavrou, Andreas Pitsillides, George C. Hadjichristofi, Christoforos N. Hadjicostis:
Security in Future Mobile Sensor Networks - Issues and Challenges. SECRYPT 2010: 278-286 - Mihaela Ion, Giovanni Russello, Bruno Crispo:
Providing Confidentiality in Content-based Publish/subscribe Systems. SECRYPT 2010: 287-292
Posters
- Jorge Munilla, Andrés Ortiz, Alberto Peinado:
What can RFID do for Vanets? - A Cryptographic Point of View. SECRYPT 2010: 295-298 - Mihai-Lica Pura, Victor Valeriu Patriciu, Ion Bica:
Formal Verification of G-PAKE Using Casper/FDR2 - Securing a Group PAKE Protocol Using Casper/FDR2. SECRYPT 2010: 299-303 - Anna Sojka, Krzysztof Piotrowski, Peter Langendörfer:
Short ECC - A Lightweight Security Approach for Wireless Sensor Networks. SECRYPT 2010: 304-308 - Harris E. Michail, George Athanasiou, Angeliki Kritikakou, Costas E. Goutis, Andreas Gregoriades, Vicky G. Papadopoulou:
Ultra High Speed SHA-256 Hashing Cryptographic Module for IPSec Hardware/Software Codesign. SECRYPT 2010: 309-313 - Murthy S. Andukuri, C. Edward Chow:
Efficient Asymmetric IPSec for Secure iSCSI. SECRYPT 2010: 314-317 - Glenford E. Mapp, Mahdi Aiash, Aboubaker Lasebae, Raphael Chung-Wei Phan:
Security Models for Heterogeneous Networking. SECRYPT 2010: 318-321
Cryptographic Techniques and Key Management
Full Papers
- Alex Biryukov, Deike Priemuth-Schmid, Bin Zhang:
Analysis of SNOW 3G⊕ Resynchronization Mechanism. SECRYPT 2010: 327-333 - Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
On a Construction of Stream-cipher-based Hash Functions. SECRYPT 2010: 334-343 - Mebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama:
Proxiable Designated Verifier Signature. SECRYPT 2010: 344-353 - Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-interactive String-commitment Protocols. SECRYPT 2010: 354-361 - S. Sharmila Deva Selvi, S. Sree Vivek, Sakhi S. Anand, C. Pandu Rangan:
An Identity based Ring Signcryption Scheme with Public Verifiability. SECRYPT 2010: 362-371 - Kashi Neupane, Rainer Steinwandt:
Server-assisted Long-term Secure 3-party Key Establishment. SECRYPT 2010: 372-378 - Swarun Kumar, Shivank Agrawal, Ramarathnam Venkatesan, Satyanarayana V. Lokam, C. Pandu Rangan:
Forcing Out a Confession - Threshold Discernible Ring Signatures. SECRYPT 2010: 379-388 - Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. SECRYPT 2010: 389-398 - Luan Ibraimi, Muhammad Asim, Milan Petkovic:
An Encryption Scheme for a Secure Policy Updating. SECRYPT 2010: 399-408
Short Paper
- Vittorio Ottaviani, Alberto Zanoni, Massimo Regoli:
Conjugation as Public Key Agreement Protocol in Mobile Cryptography. SECRYPT 2010: 411-416
Posters
- Kun Peng, Feng Bao:
Vulnerability of a Non-membership Proof Scheme. SECRYPT 2010: 419-422 - Xiaoyu Wu, Duncan S. Wong, Qing Li:
Extended Visual Cryptography Scheme for Color Images with no Pixel Expansion. SECRYPT 2010: 423-426 - Dibyendu Mallik, Debdeep Mukhopadhyay:
New Pseudo Near Collision Attack on Tiger. SECRYPT 2010: 427-430 - Xiaoyi Zhou, Jixin Ma, Wencai Du, Bo Zhao, Miltos Petridis, Yongzhe Zhao:
BMQE System - A MQ Equations System based on Ergodic Matrix. SECRYPT 2010: 431-435
Information Assurance
Short Papers
- David M. Williams, Helen Treharne, Anthony T. S. Ho:
On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols. SECRYPT 2010: 441-446 - Veena H. Bhat, S. Krishna, P. Deepa Shenoy, K. R. Venugopal, Lalit M. Patnaik:
HUBFIRE - A Multi-class SVM based JPEG Steganalysis using HBCL Statistics and FR Index. SECRYPT 2010: 447-452
Posters
- Christophe Guyeux, Jacques M. Bahi:
A New Chaos-based Watermarking Algorithm. SECRYPT 2010: 455-458 - Aristeidis Chatzipoulidis, Ioannis Mavridis:
An ICT Security Management Framework. SECRYPT 2010: 459-462
Security in Information Systems and Software Engineering
Full Papers
- Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson:
Management of Security Policies in Virtual Organisations. SECRYPT 2010: 467-477 - Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu:
Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures. SECRYPT 2010: 478-485
Short Papers
- Vahid R. Karimi, Donald D. Cowan:
Access Control Models for Business Processes. SECRYPT 2010: 489-498 - Vipul Patel, Radhesh Mohandas, Alwyn R. Pais:
Attacks on Web Services and Mitigation Schemes. SECRYPT 2010: 499-504 - Lwin Khin Shar, Hee Beng Kuan Tan:
Auditing the Defense Against Cross Site Scripting in Web Applications. SECRYPT 2010: 505-511 - José Antonio Álvarez-Cubero, Pedro J. Zufiria:
A C++ Class for Analysing Vector Boolean Functions from a Cryptographic Perspective. SECRYPT 2010: 512-520 - George Yee, Xingli Xie, Shikharesh Majumdar:
Automated Threat Identification for UML. SECRYPT 2010: 521-527
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.