


default search action
15th ICETE 2018: Porto, Portugal - Volume 2
- Pierangela Samarati, Mohammad S. Obaidat:

Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018. SciTePress 2018, ISBN 978-989-758-319-3
Invited Speakers
- Zeno J. M. H. Geradts:

Forensic Challenges on Multimedia Analytics, Big Data and the Internet of Things. ICETE (1) 2018: 5-99 - Jan Mendling:

The Past, Present and Future of Business Process Management. ICETE (1) 2018: 101 - Ismael Ripoll:

Scientific Research vs Bug Hunting. ICETE (1) 2018: 103-144 - Tobias Hoellwarth:

The CLOUD: Trigger for a Socio-Economic Revolution. ICETE (1) 2018: 145 - Miguel Pupo Correia:

Storing Critical Data in the Cloud: Challenges and Solutions. ICETE (1) 2018: 147-185
Papers
- Vivek Agrawal, Einar Arthur Snekkenes:

Secure Benchmarking using Electronic Voting. 191-206 - François Gérard, Veronika Kuchta

, Rajeev Anand Sahu, Gaurav Sharma, Olivier Markowitch:
Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage. 207-218 - Nikolaos Tsalis, George Stergiopoulos, Evangelos Bitsikas, Dimitris Gritzalis, Theodore K. Apostolopoulos:

Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. 219-229 - Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Víctor Mateu

:
DRANKULA: A McEliece-like Rank Metric based Cryptosystem Implementation. 230-241 - Takahiro Matsuda, Kenta Takahashi, Goichiro Hanaoka:

On the Security of Linear Sketch Schemes against Recovering Attacks. 242-253 - Mohamed Amine Belhamra, El Mamoun Souidi:

A Steganogaphic Scheme for MAC-Independent Opportunistic Routing and Encoding (MORE) Protocol. 254-264 - Georg Bramm

, Mark Gall, Julian Schütte:
BDABE - Blockchain-based Distributed Attribute based Encryption. 265-276 - Catalin V. Bîrjoveanu, Mirela Bîrjoveanu:

An Optimistic Fair Exchange E-commerce Protocol for Complex Transactions. 277-288 - Igor Zavalyshyn, Nuno O. Duarte, Nuno Santos:

An Extended Case Study about Securing Smart Home Hubs through N-version Programming. 289-300 - Sana Belguith

, Nesrine Kaaniche, Giovanni Russello:
Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. 301-312 - Laurent Gomez, Alberto Ibarrondo

, José Márquez, Patrick Duverger:
Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference. 313-320 - Nesrine Kaaniche, Maryline Laurent:

SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. 321-333 - Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse:

A Blockchain based Access Control Scheme. 334-342 - Waheeb Yaqub, Ibrahim Kamel, Zeyar Aung:

Distortion-free Watermarking Scheme for Compressed Data in Columnar Database. ICETE (2) 2018: 343-353 - Danilo Verhaert, Majid Nateghizad, Zekeriya Erkin

:
An Efficient Privacy-preserving Recommender System for e-Healthcare Systems. 354-365 - Jan Hajny, Petr Dzurenda, Lukas Malina, Sara Ricci

:
Anonymous Data Collection Scheme from Short Group Signatures. 366-375 - Adam Szekeres, Einar Arthur Snekkenes:

Unobtrusive Psychological Profiling for Risk Analysis. 376-386 - Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Saïd:

Fuzzy Logic based Model for Energy Consumption Trust Estimation in Electric Vehicular Networks. 387-399 - Sandip Ghosal, R. K. Shyamasundar, N. V. Narendra Kumar:

Static Security Certification of Programs via Dynamic Labelling. 400-411 - Mohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan:

Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques. 412-423 - Luk Bettale

, Emmanuelle Dottax
, Mailody Ramphort:
Algebraic Side-Channel Attacks on Masked Implementations of AES. 424-435 - Majid Nateghizad, Zekeriya Erkin

, Reginald L. Lagendijk:
Efficient Index-based Search Protocols for Encrypted Databases. 436-447 - Luan Huy Pham, Massimiliano Albanese, Benjamin W. Priest:

A Quantitative Framework to Model Advanced Persistent Threats. 448-459 - Yuichi Kaji, Jason Paul Cruz, Yoshio Yatani:

Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains. 463-470 - Josep Domingo-Ferrer:

Big Data Anonymization Requirements vs Privacy Models. 471-478 - Alfredo Cuzzocrea, Fabio Martinelli, Francesco Mercaldo:

Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks. 479-487 - Christian Maulany, Majid Nateghizad, Bart Mennink, Zekeriya Erkin

:
Privacy-preserving Distributed Access Control for Medical Data. 488-497 - Hélène Le Bouder, Gaël Thomas, Edwin Bourget, Mariem Graa, Nora Cuppens, Jean-Louis Lanet:

Theoretical Security Evaluation of the Human Semantic Authentication Protocol. 498-505 - Upendra Kapshikar, Ayan Mahalanobis:

A Quantum-Secure Niederreiter Cryptosystem using Quasi-Cyclic Codes. ICETE (2) 2018: 506-513 - Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:

Secure Grouping and Aggregation with MapReduce. 514-521 - Mriganka Mandal

, Ratna Dutta:
Cost-effective Private Linear Key Agreement with Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors. 522-529 - Nuha Aldausari, Cui Zhang, Jun Dai:

Combining Design by Contract and Inference Rules of Programming Logic towards Software Reliability. 530-537 - Christoph Stach, Sascha Alpers

, Stefanie Betz, Frank Dürr, Andreas Fritsch
, Kai Mindermann, Saravana Murthy Palanisamy, Gunther Schiefer
, Manuela Wagner, Bernhard Mitschang, Andreas Oberweis, Stefan Wagner:
The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things. 538-545 - Dominik Ziegler

, Bernd Prünster
, Alexander Marsalek, Christian Kollmann:
Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes. 546-553 - Abba Garba, Zhi Guan, Anran Li, Zhong Chen:

Analysis of Man-In-The-Middle of Attack on Bitcoin Address. 554-561 - Pedro S. Ribeiro, Nuno Santos, Nuno O. Duarte:

DBStore: A TrustZone-backed Database Management System for Mobile Applications. 562-569 - Audrey Lucas, Arnaud Tisserand:

Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC. 570-577 - Bonan Cuan, Aliénor Damien, Claire Delaplace, Mathieu Valois:

Malware Detection in PDF Files using Machine Learning. 578-585 - Makram W. Hatoum, Rony Darazi, Jean-François Couchot:

Blind PDF Document Watermarking Robust Against PCA and ICA Attacks. 586-593 - Imran Makhdoom

, Mehran Abolhasan
, Wei Ni:
Blockchain for IoT: The Challenges and a Way Forward. 594-605 - Fatemeh Amiri, Gerald Quirchmayr

, Peter Kieseberg:
A Machine Learning Approach for Privacy-preservation in E-business Applications. 609-618 - Gustavo Gonzalez Granadillo, Susana Gonzalez Zarzosa

, Mario Faiella:
Towards an Enhanced Security Data Analytic Platform. 619-624 - Antoine Loiseau, Jacques J. A. Fournier:

Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT. 625-631 - Ricardo Gonçalves, Manuel Eduardo Correia

, Pedro Brandão:
A Flexible Framework for Rogue Access Point Detection. 632-637 - Walid Rjaibi:

Holistic Database Encryption. 638-643 - Panayiotis Charalambous, Marios Karapetris, Elias Athanasopoulos:

KAuth: A Strong Single Sign-On Service based on PKI. 644-649 - Angelo Massimo Perillo, Emiliano De Cristofaro:

PAPEETE: Private, Authorized, and Fast Personal Genomic Testing. 650-655 - Dipayan Das, Vishal Saraswat:

Compact Lattice Signatures. 656-661 - Dipayan Das, Vishal Saraswat:

A Novel Lattice Reduction Algorithm. 662-667 - Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:

Secure Authentication Solution for Cloud-based Smart City Surveillance System. 668-673 - Gautam Srivastava, Ashutosh Dhar Dwivedi

, Rajani Singh:
Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology. 674-679 - Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos

:
Evaluating the Provision of Botnet Defences using Translational Research Concepts. 680-685 - Iulian Aciobanitei, Roxana-Ioana Guinea, Mihai-Lica Pura:

AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols. 686-691 - Lukas Malina, Jan Hajny, Petr Dzurenda, Sara Ricci

:
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions. 692-697 - Andreas Schaad, Björn Grohmann, Oliver Winzenried, Ferdinand Brasser, Ahmad-Reza Sadeghi:

Towards a Cloud-based System for Software Protection and Licensing. 698-702 - Lalitha Muthu Subramanian, Roopa Vishwanathan:

Attribute Based Signatures: The Case for Automation. 703-708 - Brandon Broadnax, Matthias Huber, Bernhard Löwe, Jörn Müller-Quade, Patrik Scheidecker:

Towards Efficient Software Protection Obeying Kerckhoffs's Principle using Tamper-proof Hardware. 719-724 - Tikaram Sanyashi, Sreyans Nahata, Rushang Dhanesha, Bernard Menezes:

Learning Plaintext in Galbraith's LWE Cryptosystem. 725-731 - Fabio Martinelli, Francesco Mercaldo, Christina Michailidou, Andrea Saracino:

Phylogenetic Analysis for Ransomware Detection and Classification into Families. ICETE (2) 2018: 732-737 - Konstantinos Rantos, George Drosatos

, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou:
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem. 738-743

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














