


default search action
13. ISC 2010: Boca Raton, FL, USA
- Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic:

Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6531, Springer 2011, ISBN 978-3-642-18177-1
Attacks and Analysis
- Kota Ideguchi, Elmar Tischhauser, Bart Preneel

:
Improved Collision Attacks on the Reduced-Round Grøstl Hash Function. 1-16 - Yi Lu, Yvo Desmedt:

Improved Distinguishing Attack on Rabbit. 17-23 - Hassan Jameel Asghar

, Shujun Li
, Josef Pieprzyk
, Huaxiong Wang:
Cryptanalysis of the Convex Hull Click Human Identification Protocol. 24-30 - Nadhem J. AlFardan, Kenneth G. Paterson:

An Analysis of DepenDNS. 31-38
Analysis
- Elena Andreeva

, Bart Mennink, Bart Preneel
:
Security Reductions of the Second Round SHA-3 Candidates. 39-53 - Özgür Dagdelen, Marc Fischlin:

Security Analysis of the Extended Access Control Protocol for Machine Readable Travel Documents. 54-68 - Marcos A. Simplício Jr., Paulo S. L. M. Barreto, Tereza Cristina M. B. Carvalho

:
Revisiting the Security of the Alred Design. 69-83
Authentication, PIR and Content Identification
- Christian Wachsmann, Liqun Chen

, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. 84-98 - Elaine Shi, Yuan Niu, Markus Jakobsson, Richard Chow:

Implicit Authentication through Learning User Behavior. 99-113 - Jonathan T. Trostle, Andy Parrish:

Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups. 114-128 - Yali Liu, Ahmad-Reza Sadeghi, Dipak Ghosal, Biswanath Mukherjee:

Video Streaming Forensic - Content Identification with Traffic Snooping. 129-135
Privacy
- Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:

Fair and Privacy-Preserving Multi-party Protocols for Reconciling Ordered Input Sets. 136-151 - Arne Tauber, Thomas Rössler:

Enhancing Security and Privacy in Certified Mail Systems Using Trust Domain Separation. 152-158 - Lejla Batina, Yong Ki Lee, Stefaan Seys, Dave Singelée

, Ingrid Verbauwhede
:
Privacy-Preserving ECC-Based Grouping Proofs for RFID. 159-165
Malware, Crimeware and Code Injection
- Xinyuan Wang, Xuxian Jiang:

Artificial Malware Immunization Based on Dynamically Assigned Sense of Self. 166-180 - Zhi Xin, Huiyu Chen, Hao Han, Bing Mao, Li Xie:

Misleading Malware Similarities Analysis by Automatic Data Structure Obfuscation. 181-195 - Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis:

Crimeware Swindling without Virtual Machines. 196-202 - Elias Athanasopoulos, Antonis Krithinakis, Evangelos P. Markatos:

An Architecture for Enforcing JavaScript Randomization in Web2.0 Applications. 203-209
Intrusion Detection
- Lei Wei, Michael K. Reiter, Ketan Mayer-Patel:

Summary-Invisible Networking: Techniques and Defenses. 210-225 - Natalia Stakhanova, Hanli Ren, Ali A. Ghorbani:

Selective Regular Expression Matching. 226-240 - Davidson R. Boccardo, Tiago M. Nascimento, Raphael C. S. Machado, Charles B. Prado, Luiz F. R. C. Carmo:

Traceability of Executable Codes Using Neural Networks. 241-253
Side Channels
- Jorge Guajardo, Bart Mennink:

On Side-Channel Resistant Block Cipher Usage. 254-268 - Geir Olav Dyrkolbotn, Knut Wold, Einar Snekkenes:

Security Implications of Crosstalk in Switching CMOS Gates. 269-275 - Ye Zhu:

On Privacy Leakage through Silence Suppression. 276-282
Cryptography
- Julien Cathalo, Christophe Petit

:
One-Time Trapdoor One-Way Functions. 283-298 - Mayana Pereira, Rafael Dowsley, Goichiro Hanaoka, Anderson C. A. Nascimento

:
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption. 299-306 - Ping Yu, Rui Xue:

A Short Signature Scheme from the RSA Family. 307-318 - Masayuki Abe, Kristiyan Haralambiev, Miyako Ohkubo:

Efficient Message Space Extension for Automorphic Signatures. 319-330
Smartphones
- Mauro Conti

, Vu Thien Nga Nguyen, Bruno Crispo:
CRePE: Context-Related Policy Enforcement for Android. 331-345 - Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Marcel Winandy:

Privilege Escalation Attacks on Android. 346-360
Biometrics
- Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski:

Walk the Walk: Attacking Gait Biometrics by Imitation. 361-380
Cryptography, Application
- Kun Peng, Feng Bao:

Efficient Multiplicative Homomorphic E-Voting. 381-393 - Patricia Everaere, Isabelle Simplot-Ryl, Issa Traoré:

Double Spending Protection for E-Cash Based on Risk Management. 394-408
Buffer Overflow
- Donghai Tian, Xi Xiong, Changzhen Hu, Peng Liu:

Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks. 409-415
Cryptography, Theory
- Zhiwei Li, Weichao Wang:

Deciding Recognizability under Dolev-Yao Intruder Model. 416-429 - Kazuki Yoneyama:

Indifferentiable Security Reconsidered: Role of Scheduling. 430-444

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














