


default search action
CD-ARES Workshops 2013: Regensburg, Germany
- Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar R. Weippl, Lida Xu:

Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Lecture Notes in Computer Science 8128, Springer 2013, ISBN 978-3-642-40587-7
Modern Cryptography
- Jiageng Chen

, Atsuko Miyaji
:
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock. 1-15 - Asato Kubai, Junji Shikata, Yohei Watanabe:

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions. 16-28 - Kishan Chand Gupta, Indranil Ghosh Ray:

On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography. 29-43 - Edoardo Persichetti

:
Code-Based Public-Key Encryption Resistant to Key Leakage. 44-54 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba

:
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics. 55-74 - Abdel Alim Kamal, Roger Zahno, Amr M. Youssef:

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images. 75-90 - Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann:

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method. 91-104 - Saad Islam, Mehreen Afzal

, Adnan Rashdi:
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack. 105-121
Security Engineering
- Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann:

Code-Based Identification and Signature Schemes in Software. 122-136 - Danilo F. Câmara, Conrado Porto Lopes Gouvêa, Julio López, Ricardo Dahab

:
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine. 137-154 - Gerwin Gsenger, Christian Hanser:

Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves. 155-167 - Christian Hanser, Christian Wagner:

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves. 168-179 - Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber:

Cumulus4j: A Provably Secure Database Abstraction Layer. 180-193 - Andreas Hülsing

, Lea Rausch
, Johannes Buchmann:
Optimal Parameters for XMSS MT. 194-208 - James Heather, Chris Culnane

, Steve A. Schneider
, Sriramkrishnan Srinivasan, Zhe Xia:
Solving the Discrete Logarithm Problem for Packing Candidate Preferences. 209-221 - Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen:

SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences. 222-235 - Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione

:
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace. 236-252 - Francesco Palmieri

, Ugo Fiore
, Aniello Castiglione
, Fang-Yie Leu, Alfredo De Santis
:
Analyzing the Internet Stability in Presence of Disasters. 253-268 - Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry

, Juha Röning
, Djamel Khadraoui:
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project. 269-287 - Wolfgang Boehmer:

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function. 288-304 - Atif Mashkoor

, Osman Hasan
, Wolfgang Beer:
Using Probabilistic Analysis for the Certification of Machine Control Systems. 305-320 - Suliman A. Alsuhibany

, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel:
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms. 321-336 - Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang

, William Cheng-Chung Chu:
A Multiple-Key Management Scheme in Wireless Sensor Networks. 337-344 - Igor V. Kotenko

, Evgenia Novikova
:
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment. 345-360 - Nicola Gobbo, Alessio Merlo, Mauro Migliardi

:
A Denial of Service Attack to GSM Networks via Attach Procedure. 361-376 - Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake:

PPM: Privacy Policy Manager for Personalized Services. 377-392 - Bo Liu, Baokang Zhao, Bo Liu, Chunqing Wu:

An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks. 393-407 - Lidia Ogiela, Marek R. Ogiela:

Intelligent UBMSS Systems for Strategic Information Management. 408-413 - Arcangelo Castiglione

, Ciriaco D'Ambrosio
, Alfredo De Santis
, Francesco Palmieri
:
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness. 414-429 - Tomasz Hachaj

, Marek R. Ogiela:
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense. 430-441 - Francesco Flammini

, Stefano Marrone
, Nicola Mazzocca
, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini:
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios. 442-456 - Vaise Patu, Shuichiro Yamamoto:

A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process. 457-464

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














