


default search action
12. ICICS 2010: Barcelona, Spain
- Miguel Soriano

, Sihan Qing, Javier López:
Information and Communications Security - 12th International Conference, ICICS 2010, Barcelona, Spain, December 15-17, 2010. Proceedings. Lecture Notes in Computer Science 6476, Springer 2010, ISBN 978-3-642-17649-4 - Bart Preneel

:
Cryptographic Hash Functions: Theory and Practice. 1-3
Access Control
- Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci:

Rewriting of SPARQL/Update Queries for Securing Data Access. 4-15 - Claudio Agostino Ardagna

, Sabrina De Capitani di Vimercati
, Sara Foresti
, Gregory Neven, Stefano Paraboschi
, Franz-Stefan Preiss, Pierangela Samarati
, Mario Verdicchio:
Fine-Grained Disclosure of Access Policies. 16-30
Public Key Cryptography and Cryptanalysis
- Falko Strenzke:

Manger's Attack Revisited. 31-45 - Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil:

Horizontal Correlation Analysis on Exponentiation. 46-61 - Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferrer

:
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts. 62-76
Security in Distributed and Mobile Systems
- Jaydip Sen

:
A Trust-Based Robust and Efficient Searching Scheme for Peer-to-Peer Networks. 77-91 - Flavio Lombardi

, Roberto Di Pietro
:
CUDACS: Securing the Cloud with CUDA-Enabled Secure Virtualization. 92-106 - Xinwen Zhang, Jean-Pierre Seifert, Onur Aciiçmez:

SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. 107-125 - Talal Alharbi, Abdullah Mohammed Almuhaideb

, Phu Dung Le:
Securing Mobile Access in Ubiquitous Networking via Non-roaming Agreement Protocol. 126-139 - Xuan Jiang, Wenhui Hu, Sencun Zhu, Guohong Cao:

Compromise-Resilient Anti-jamming for Wireless Sensor Networks. 140-154
Cryptanalysis
- Renato Menicocci, Andrea Simonetti, Giuseppe Scotti

, Alessandro Trifiletti:
On Practical Second-Order Power Analysis Attacks for Block Ciphers. 155-170 - Billy Bob Brumley

, Risto M. Hakala, Kaisa Nyberg, Sampo Sovio:
Consecutive S-box Lookups: A Timing Attack on SNOW 3G. 171-185
Authentication
- Basel Alomair

, Radha Poovendran
:
Efficient Authentication for Mobile and Pervasive Computing. 186-202 - Jiaxin Pan

, Libin Wang, Changshe Ma:
Security Enhancement and Modular Treatment towards Authenticated Key Exchange. 203-217 - Alessandro Sorniotti, Refik Molva

:
Federated Secret Handshakes with Support for Revocation. 218-234
Fair Exchange Protocols
- Gerard Draper-Gil, Jianying Zhou

, Josep-Lluís Ferrer-Gomila
:
An Agent-Mediated Fair Exchange Protocol. 235-250 - Ming Chen, Kaigui Wu, Jie Xu, Pan He:

A New Method for Formalizing Optimistic Fair Exchange Protocols. 251-265 - Mehrdad Nojoumian, Douglas R. Stinson:

Unconditionally Secure First-Price Auction Protocols Using a Multicomponent Commitment Scheme. 266-280
Anonymity and Privacy
- Ralf Küsters, Tomasz Truderung, Andreas Vogt:

Proving Coercion-Resistance of Scantegrity II. 281-295 - Lucie Langer, Hugo Jonker, Wolter Pieters:

Anonymity and Verifiability in Voting: Understanding (Un)Linkability. 296-310 - Kurt Dietrich, Johannes Winter:

A Secure and Practical Approach for Providing Anonymity Protection for Trusted Platforms. 311-324 - Luciana Marconi, Roberto Di Pietro

, Bruno Crispo, Mauro Conti
:
Time Warp: How Time Affects Privacy in LBSs. 325-339
Software Security
- Ping Chen, Xiao Xing, Bing Mao, Li Xie:

Return-Oriented Rootkit without Returns (on the x86). 340-354 - Jostein Jensen, Inger Anne Tøndel, Per Håkon Meland:

Experimental Threat Model Reuse with Misuse Case Diagrams. 355-366 - Kai Chen, Yifeng Lian, Yingjun Zhang:

Automatically Generating Patch in Binary Programs Using Attribute-Based Taint Analysis. 367-382
Proxy Cryptosystems
- Lihua Wang

, Licheng Wang, Masahiro Mambo, Eiji Okamoto:
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities. 383-400 - Song Luo, Jian-bin Hu, Zhong Chen:

Ciphertext Policy Attribute-Based Proxy Re-encryption. 401-415
Intrusion Detection Systems
- Rolando Salazar-Hernández

, Jesús Esteban Díaz Verdejo:
Hybrid Detection of Application Layer Attacks Using Markov Models for Normality and Attacks. 416-429 - Mohamed Ali Ayachi, Christophe Bidan, Nicolas Prigent:

A Trust-Based IDS for the AODV Protocol. 430-444 - Hadi Shiravi, Ali Shiravi, Ali A. Ghorbani:

IDS Alert Visualization and Monitoring through Heuristic Host Selection. 445-458 - Zhiyuan Tan

, Aruna Jamdagni, Xiangjian He
, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia
, Wei-Chang Yeh
:
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. 459-471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














