default search action
16th CANS 2017: Hong Kong, China
- Srdjan Capkun, Sherman S. M. Chow:
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11261, Springer 2018, ISBN 978-3-030-02640-0
Foundation of Applied Cryptography
- Mihir Bellare, Adam O'Neill, Igors Stepanovs:
Forward-Security Under Continual Leakage. 3-26 - José Becerra, Vincenzo Iovino, Dimiter Ostrev, Petra Sala, Marjan Skrobot:
Tightly-Secure PAK(E). 27-48
Processing Encrypted Data
- Matteo Maffei, Manuel Reinert, Dominique Schröder:
On the Security of Frequency-Hiding Order-Preserving Encryption. 51-70 - Daniel Demmler, Kay Hamacher, Thomas Schneider, Sebastian Stammler:
Privacy-Preserving Whole-Genome Variant Queries. 71-92 - Lihua Wang, Yoshinori Aono, Le Trieu Phong:
A New Secure Matrix Multiplication from Ring-LWE. 93-111
Predicate Encryption
- Jonathan Katz, Matteo Maffei, Giulio Malavolta, Dominique Schröder:
Subset Predicate Encryption and Its Applications. 115-134 - Tim van de Kamp, Andreas Peter, Maarten H. Everts, Willem Jonker:
Multi-client Predicate-Only Encryption for Conjunctive Equality Tests. 135-157
Credentials and Authentication
- Elena Pagnin, Jing Liu, Aikaterini Mitrokotsa:
Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough? 161-178 - Stephan Krenn, Thomas Lorünser, Anja Salzer, Christoph Striecks:
Towards Attribute-Based Credentials in the Cloud. 179-202 - Xavier Bultel, Pascal Lafourcade:
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures. 203-226
Web Security
- Marcus Niemietz, Jörg Schwenk:
Out of the Dark: UI Redressing and Trustworthy Events. 229-249 - Daniele Enrico Asoni, Samuel Hitz, Adrian Perrig:
A Paged Domain Name System for Query Privacy. 250-273
Bitcoin and Blockchain
- Indra Deep Mastan, Souradyuti Paul:
A New Approach to Deanonymization of Unreachable Bitcoin Nodes. 277-298 - Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias:
Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure. 299-321
Embedded System Security
- Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:
Secure Code Updates for Smart Embedded Devices Based on PUFs. 325-346 - Tomer Ashur, Jeroen Delvaux, Sanghan Lee, Pieter Maene, Eduard Marin, Svetla Nikova, Oscar Reparaz, Vladimir Rozic, Dave Singelée, Bohan Yang, Bart Preneel:
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network. 347-369
Anonymous and Virtual Private Networks
- Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu:
Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps. 373-389 - Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz:
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. 390-412
Wireless and Physical Layer Security
- Daniele Antonioli, Sandra Siby, Nils Ole Tippenhauer:
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN. 415-435 - Mohammad Hossein Chinaei, Diethelm Ostry, Vijay Sivaraman:
A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems. 436-455
Short Papers
- S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan:
A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model. 459-469 - Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang:
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. 470-481 - Angela Jäschke, Frederik Armknecht:
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation. 482-492 - Suvradip Chakraborty, Y. Sreenivasa Rao, Chandrasekaran Pandu Rangan:
An Efficient Attribute-Based Authenticated Key Exchange Protocol. 493-503 - Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui:
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure. 504-514 - Robert Annessi, Tanja Zseby, Joachim Fabini:
A New Direction for Research on Data Origin Authentication in Group Communication. 515-525 - Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge:
Modelling Traffic Analysis in Home Automation Systems. 526-536 - Jack Sturgess, Ivan Martinovic:
VisAuth: Authentication over a Visual Channel Using an Embedded Image. 537-546
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.