Fast selective encryption scheme for MP3 files - Using GRAIN Stream Cipher
Biswas, Praloy Kr, Chowdhury, Dipanwita Roy, Dasgupta, K. S.
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Information-leakage in hybrid randomized protocols
Rass, Stefan, Schartner, Peter
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
A SNORT-based Mobile Agent for a Distributed Intrusion Detection System
Brahmi, Imen, Yahia, Sadok Ben, Poncelet, Pascal
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
E-commerce and fair exchange - The problem of item validation
Piva, Fabio, Dahab, Ricardo
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Botnet detection based on DNS records and active probing
Prieto, Iria, Magana, Eduardo, Morato, Daniel, Izal, Mikel
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
A method for flexible reduction over binary fields using a field multiplier
Das, Saptarsi, Varadarajan, Keshavan, Garga, Ganesh, Mondal, Rajdeep, Narayan, Ranjani, Nandy, S. K.
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
On the privacy threats of electronic poll books
Popoveniuc, Stefan, Kelsey, John, Leontie, Eugen
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Driver authentication using brain waves while route tracing as a mental task
Nakanishi, Isao, Sadanao, Baba, Inoue, Masahiro
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Data and access management using access tokens for delegating authority to persons and software
Gomi, Hidehito
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Distributed threshold cryptography certification with no trusted dealer
Fournaris, Apostolos P.
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Smartphone security evaluation The malware attack case
Mylonas, Alexios, Dritsas, Stelios, Tsoumas, Bill, Gritzalis, Dimitris
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
A four-concern-oriented secure is development approach
Jiague, Michel Embe, Frappier, Marc, Gervais, Frederic, Konopacki, Pierre, Laleau, Regine, Milhau, Jeremy, St-Denis, Richard
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
On the strength of egglue and other logic captchas
Hernandez-Castro, Carlos Javier, Ribagorda, Arturo, Hernandez-Castro, Julio Cesar
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Differential fault analysis of Hummingbird
Salehani, Yaser Esmaeili, Youssef, Amr
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Towards an authorization system for cloud infrastructure providers
Bernabe, Jorge Bernal, Perez, Juan M. Marin, Calero, Jose M. Alcaraz, Clemente, Felix J. Garcia, Perez, Gregorio Martinez, Skarmeta, Antonio F. Gomez
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Face biometrics without intrusion in airport
Cabello, Enrique
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Three-party password-authenticated key exchange without random oracles
Yi, Xun, Tso, Raylin, Okamoto, Eiji
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Related-key attack against triple encryption based on fixed points
Vaudenay, Serge
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding