


default search action
SECRYPT 2017: Madrid, Spain
- Pierangela Samarati, Mohammad S. Obaidat, Enrique Cabello:

Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017. SciTePress 2017, ISBN 978-989-758-259-2
Papers
Full Papers
- Manuel Huber, Julian Horsch

, Junaid Ali, Sascha Wessel:
Freeze & Crypt: Linux Kernel Support for Main Memory Encryption. 17-30 - Alireza Jolfaei

, Krishna Kant:
A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid. 31-42 - Diogo Barradas, Tiago Brito, David Duarte, Nuno Santos, Luís E. T. Rodrigues:

Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory. 43-54 - Jannik Dreier, Maxime Puys

, Marie-Laure Potet, Pascal Lafourcade
, Jean-Louis Roch:
Formally Verifying Flow Properties in Industrial Systems. 55-66 - Nesrine Kaaniche

, Maryline Laurent
:
Attribute based Encryption for Multi-level Access Control Policies. 67-78 - Gerardo Canfora, Giovanni Cappabianca, Pasquale Carangelo, Fabio Martinelli, Francesco Mercaldo, Ernesto Rosario Russo, Corrado Aaron Visaggio:

Mobile Silent and Continuous Authentication using Apps Sequence. 79-91 - Marek Sýs

, Dusan Klinec, Petr Svenda:
The Efficient Randomness Testing using Boolean Functions. 92-103 - Damien Jauvart, Jacques J. A. Fournier, Louis Goubin:

First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography. 104-115 - Juan Enrique Rubio

, Cristina Alcaraz, Rodrigo Roman, Javier López:
Analysis of Intrusion Detection Systems in Industrial Ecosystems. 116-128 - David Ortega del Campo, Cristina Conde

, Ángel Serrano, Isaac Martín de Diego, Enrique Cabello
:
Face Recognition-based Presentation Attack Detection in a Two-step Segregated Automated Border Control e-Gate - Results of a Pilot Experience at Adolfo Suárez Madrid-Barajas Airport. 129-138 - Rosario Giustolisi

, Vincenzo Iovino, Gabriele Lenzini:
Privacy-Preserving Verifiability - A Case for an Electronic Exam Protocol. 139-150 - José Becerra, Vincenzo Iovino, Dimiter Ostrev

, Marjan Skrobot
:
On the Relation Between SIM and IND-RoR Security Models for PAKEs. 151-162 - Giulio Aliberti, Roberto Di Pietro, Stefano Guarino

:
SLAP: Secure Lightweight Authentication Protocol for Resource-constrained Devices. 163-174 - Negar Mosharraf, Anura P. Jayasumana, Indrakshi Ray:

Using a History-based Profile to Detect and Respond to DDoS Attacks. 175-186 - Jean-Guillaume Dumas

, Pascal Lafourcade
, Francis Melemedjian, Jean-Baptiste Orfila, Pascal Thoniel:
LOCALPKI: A User-Centric Formally Proven Alternative to PKIX. 187-199 - Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard

, Pascal Lafourcade
:
Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption. 200-211 - Sana Belguith

, Nesrine Kaaniche
, Maryline Laurent
, Abderrazak Jemai
, Rabah Attia:
Constant-size Threshold Attribute based SignCryption for Cloud Applications. 212-225
Short Papers
- Salah S. Harb, Moath H. A. Jarrah:

Accelerating Square Root Computations Over Large GF (2m). 229-236 - Ashutosh Dhar Dwivedi

, Milos Kloucek, Pawel Morawiecki
, Ivica Nikolic
, Josef Pieprzyk
, Sebastian Wójtowicz:
SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. 237-246 - Peter T. Breuer

, Jonathan P. Bowen
, Esther Palomar
, Zhiming Liu:
On Obfuscating Compilation for Encrypted Computing. 247-254 - Matús Harvan, Thomas Locher, Marta Mularczyk

, Yvonne-Anne Pignolet:
Privacy-preserving Regression on Partially Encrypted Data. 255-266 - Gamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk:

Mining Encrypted Software Logs using Alpha Algorithm. 267-274 - Ashutosh Dhar Dwivedi

, Pawel Morawiecki
, Sebastian Wójtowicz:
Differential and Rotational Cryptanalysis of Round-reduced MORUS. 275-284 - Louis Philippe Sondeck, Maryline Laurent

, Vincent Frey:
The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity. 285-294 - Mohammed Bakiri

, Jean-François Couchot, Christophe Guyeux:
One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput PRNG for FPGA. 295-302 - Miguel Hernández Boza

, Alfonso Muñoz:
(In) Security in Graph Databases - Analysis and Data Leaks. 303-310 - Louise Axon

, Michael Goldsmith:
PB-PKI: A Privacy-aware Blockchain-based PKI. 311-318 - Simone Aonzo, Giovanni Lagorio, Alessio Merlo:

RmPerm: A Tool for Android Permissions Removal. 319-326 - Andrea S. Atzeni, Andrea Marcelli, Francesco Muroni, Giovanni Squillero:

HAIT: Heap Analyzer with Input Tracing. 327-334 - Roberto Saia, Salvatore Carta:

Evaluating Credit Card Transactions in the Frequency Domain for a Proactive Fraud Detection Approach. 335-342 - Jaroslaw Bernacki

, Marek Klonowski
, Piotr Syga
:
Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure. 343-350 - George O. M. Yee:

Adding Privacy Protection to Distributed Software Systems. 351-358 - Cyrielle Feron, Vianney Lapotre, Loïc Lagadec:

PAnTHErS: A Prototyping and Analysis Tool for Homomorphic Encryption Schemes. 359-366 - Florian Reimair, Johannes Feichtner, Dominik Ziegler

, Sandra Kreuzhuber, Thomas Zefferer
:
Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth. 367-374 - Bernd Prünster, Florian Reimair, Andreas Reiter:

The Net Rat - Rethinking Connected Services for Increased Security. 375-383 - Peter Amthor:

Efficient Heuristic Safety Analysis of Core-based Security Policies. 384-392
Posters
- Angela Jäschke, Björn Grohmann, Frederik Armknecht

, Andreas Schaad:
Short Paper: Industrial Feasibility of Private Information Retrieval. 395-400 - Prabhat Kushwaha, Ayan Mahalanobis:

A Probabilistic Baby-step Giant-step Algorithm. SECRYPT 2017: 401-406 - Bekkar Laskar

, Merouane Bouzid
:
Vector Quantization based Steganography for Secure Speech Communication System. 407-412 - James Howe, Máire O'Neill:

GLITCH: A Discrete Gaussian Testing Suite for Lattice-based Cryptography. 413-419 - Bhupendra Singh, Upasna Singh

:
Program Execution Analysis using UserAssist Key in Modern Windows. 420-429 - Debanjan Sadhya, Bodhi Chakraborty, Sanjay Kumar Singh

:
Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases. 430-436 - Shawn A. Prestridge, James G. Dunham:

Improving Throughput in BB84 Quantum Key Distribution. 437-443 - Venesa Watson, Xinxin Lou, Yuan Gao:

A Review of PROFIBUS Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization Controls. 444-449 - Luis Menezes, Roland Wismüller:

FlowSlicer - A Hybrid Approach to Detect and Avoid Sensitive Information Leaks in Android Applications using Program Slicing and Instrumentation. 450-455 - Mohamed Amine Bouazzouni, Emmanuel Conchon, Fabrice Peyrard, Pierre-François Bonnefoi:

A Card-less TEE-based Solution for Trusted Access Control. 456-461 - Gerardo Canfora, Antonio Pirozzi, Aaron Visaggio:

s2ipt: A Lightweight Network Intrusion Detection/Prevention System based on IPtables. 462-467 - Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia

:
Reputation Management in Online Social Networks - A New Clustering-based Approach. 468-473 - Jonghwan Im, Jongwon Yoon, Minsik Jin:

Interaction Platform for Improving Detection Capability of Dynamic Application Security Testing. 474-479 - Federico Sinigaglia, Roberto Carbone, Gabriele Costa:

Strong Authentication for e-Banking: A Survey on European Regulations and Implementations. 480-485 - Xichen Zhang, Arash Habibi Lashkari

, Ali A. Ghorbani:
A Lightweight Online Advertising Classification System using Lexical-based Features. 486-494 - Mouhebeddine Berrima, Pascal Lafourcade

, Matthieu Giraud, Narjes Ben Rajeb:
Formal Analyze of a Private Access Control Protocol to a Cloud Storage. 495-500 - Ashutosh Dhar Dwivedi

, Pawel Morawiecki
, Sebastian Wójtowicz:
Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream. 501-506 - Stig Fr. Mjølsnes

, Ruxandra F. Olimid:
Experimental Assessment of Private Information Disclosure in LTE Mobile Networks. 507-512 - Ilhem Souissi

, Nadia Ben Azzouna, Tahar Berradia:
Towards a Self-adaptive Trust Management Model for VANETs. 513-518 - Gaurav Pareek, B. R. Purushothama:

On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes. 519-524 - Guyu Fan, Manoranjan Mohanty:

Privacy-preserving Disease Susceptibility Test with Shamir's Secret Sharing. 525-533 - Petr Dzurenda

, Jan Hajny, Lukas Malina, Sara Ricci:
Anonymous Credentials with Practical Revocation using Elliptic Curves. 534-539 - Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar

:
On the Application of Fuzzy Set Theory for Access Control Enforcement. 540-547 - Maryem Ait El Hadj, Meryeme Ayache, Yahya Benkaouz, Ahmed Khoumsi, Mohammed Erradi:

Clustering-based Approach for Anomaly Detection in XACML Policies. 548-553 - Neila Mekki, Mohamed Hamdi, Taoufik Aguili, Tai-Hoon Kim:

Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System. 554-559 - Jesus Diaz, David Arroyo, Francisco B. Rodríguez:

Fair and Accountable Anonymity for the Tor Network. 560-565 - Alberto García, Alberto Garcia Moro, José Javier García, Jorge Roncero, Víctor A. Villagrá, Helena Jalain:

Context-based Encryption Applied to Data Leakage Prevention Solutions. 566-571 - João Amarante, João Paulo Barros

:
Exploring USB Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge. 572-577 - Valérie Viet Triem Tong, Aurélien Trulla, Mourad Leslous, Jean-François Lalande:

Information Flows at OS Level Unmask Sophisticated Android Malware. 578-585 - Vishwas T. Patil, R. K. Shyamasundar:

Privacy as a Currency: Un-regulated?. 586-595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














