PAMMELA: Policy Administration Methodology using Machine Learning
Gumma, Varun, Mitra, Barsha, Dey, Soumyadeep, Patel, Pratik Shashikantbhai, Suman, Sourabh, Das, Saptarshi, Vaidya, Jaideep
Published in SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography (01.07.2022)
Published in SECRYPT ... : proceedings of the International Conference on Security and Cryptography. International Conference on Security and Cryptography (01.07.2022)
Get more information
Journal Article
CCA secure certificateless encryption schemes based on RSA
Vivek, S. Sree, Selvi, S. Sharmila Deva, Rangan, C. Pandu
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Semantic annotations for security policy matching in WS-Policy
Modica, Giuseppe Di, Tomarchio, Orazio
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
On the security of location determination and verification methods for wireless networks
Lackner, Gunther
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
The image protector - A flexible security rule specification toolkit
Bouna, Bechara Al, Chbeir, Richard, Gabillon, Alban
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Information-leakage in hybrid randomized protocols
Rass, Stefan, Schartner, Peter
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Fast selective encryption scheme for MP3 files - Using GRAIN Stream Cipher
Biswas, Praloy Kr, Chowdhury, Dipanwita Roy, Dasgupta, K. S.
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Privacy-preserving smart metering without a trusted-third-party
Jeske, Tobias
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
E-commerce and fair exchange - The problem of item validation
Piva, Fabio, Dahab, Ricardo
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
On the privacy threats of electronic poll books
Popoveniuc, Stefan, Kelsey, John, Leontie, Eugen
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Data and access management using access tokens for delegating authority to persons and software
Gomi, Hidehito
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Driver authentication using brain waves while route tracing as a mental task
Nakanishi, Isao, Sadanao, Baba, Inoue, Masahiro
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
A new tree-structure-specified multisignature scheme for a document circulation system
Inamura, Masaki, Iwamura, Keiichi, Watanabe, Ryu, Nishikawa, Makoto, Tanaka, Toshiaki
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Privacy-enhancing cryptography-based materials
Alcaide, Almudena, Palomar, Esther, Barroso-Perez, Israel, Abdallah, Ali E.
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
On the strength of egglue and other logic captchas
Hernandez-Castro, Carlos Javier, Ribagorda, Arturo, Hernandez-Castro, Julio Cesar
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Towards an authorization system for cloud infrastructure providers
Bernabe, Jorge Bernal, Perez, Juan M. Marin, Calero, Jose M. Alcaraz, Clemente, Felix J. Garcia, Perez, Gregorio Martinez, Skarmeta, Antonio F. Gomez
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Black-box collision attacks on the compression function of the GOST Hash function
Courtois, Nicolas T., Mourouzis, Theodosis
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
Related-key attack against triple encryption based on fixed points
Vaudenay, Serge
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding
A static software birthmark based on use-define chains for detecting the theft of Java programs
Xie, Xin, Liu, Fenlin, Lu, Bin, Zhao, Tao, Li, Hanning
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Get full text
Published in Proceedings of the International Conference on Security and Cryptography (01.07.2011)
Conference Proceeding