Search dblp for Publications

export results for "stream:streams/conf/secrypt:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@inproceedings{DBLP:conf/secrypt/0001F23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {SoK: Towards {CCA} Secure Fully Homomorphic Encryption},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {793--798},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012129800003555},
  doi          = {10.5220/0012129800003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/0001F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/0003YY23,
  author       = {Thomas Schneider and
                  Hossein Yalame and
                  Michael Yonli},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Griffin: Towards Mixed Multi-Key Homomorphic Encryption},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {147--158},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012090200003555},
  doi          = {10.5220/0012090200003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/0003YY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AbbasiMS23,
  author       = {Wisam Abbasi and
                  Paolo Mori and
                  Andrea Saracino},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based
                  Tabular Data Analysis},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {511--519},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012137800003555},
  doi          = {10.5220/0012137800003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AbbasiMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AdebiyiA23,
  author       = {Olutola Adebiyi and
                  Massimiliano Albanese},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards Usable Scoring of Common Weaknesses},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {183--191},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012090900003555},
  doi          = {10.5220/0012090900003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AdebiyiA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AdewoleT23,
  author       = {Kayode S. Adewole and
                  Vicen{\c{c}} Torra},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Privacy Protection of Synthetic Smart Grid Data Simulated via Generative
                  Adversarial Networks},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {279--286},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011956800003555},
  doi          = {10.5220/0011956800003555},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AdewoleT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AgostinelloGP23,
  author       = {Davide Agostinello and
                  Angelo Genovese and
                  Vincenzo Piuri},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Anomaly-Based Intrusion Detection System for DDoS Attack with Deep
                  Learning Techniques},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {267--275},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012146100003555},
  doi          = {10.5220/0012146100003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AgostinelloGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AhmadR23,
  author       = {Shahzad Ahmad and
                  Stefan Rass},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {How to Plausibly Deny Steganographic Secrets},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {731--737},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012120100003555},
  doi          = {10.5220/0012120100003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AhmadR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlalmaieNH23,
  author       = {Abeer Z. Alalmaie and
                  Priyadarsi Nanda and
                  Xiangjian He},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{ZT-NIDS:} Zero Trust, Network Intrusion Detection System},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {99--110},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012080000003555},
  doi          = {10.5220/0012080000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlalmaieNH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlmashaqbehC23,
  author       = {Ghada Almashaqbeh and
                  Rohit Chatterjee},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Unclonable Cryptography: {A} Tale of Two No-Cloning Paradigms},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {469--477},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012118600003555},
  doi          = {10.5220/0012118600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlmashaqbehC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AminAR23,
  author       = {Md. Al Amin and
                  Amani Altarawneh and
                  Indrajit Ray},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Informed Consent as Patient Driven Policy for Clinical Diagnosis and
                  Treatment: {A} Smart Contract Based Approach},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {159--170},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012090600003555},
  doi          = {10.5220/0012090600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AminAR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Anagnostopoulou23,
  author       = {Argiro Anagnostopoulou and
                  Ioannis Mavridis and
                  Dimitris Gritzalis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Risk-Based Illegal Information Flow Detection in the IIoT},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {377--384},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012079800003555},
  doi          = {10.5220/0012079800003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Anagnostopoulou23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AzzazKKKT23,
  author       = {Mohamed Salah Azzaz and
                  Redouane Kaibou and
                  Hamdane Kamelia and
                  Abdenour Kifouche and
                  Djamel Teguig},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Design of a New Hardware {IP-HLS} for Real-Time Image Chaos-Based
                  Encryption},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {478--485},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012119400003555},
  doi          = {10.5220/0012119400003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AzzazKKKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BachaKL23,
  author       = {Amani Bacha and
                  Farah Barika Ktata and
                  Faten Louati},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement
                  Learning: Enhanced Centralized and Decentralized Approaches},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {772--777},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012124600003555},
  doi          = {10.5220/0012124600003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BachaKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenssalahD23,
  author       = {Mustapha Benssalah and
                  Karim Drouiche},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On the Security of the Novel Authentication Scheme for UAV-Ground
                  Station and {UAV-UAV} Communication},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {361--368},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012077400003555},
  doi          = {10.5220/0012077400003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenssalahD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BernackiS23,
  author       = {Jaroslaw Bernacki and
                  Rafal Scherer},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{IMAGINE} Dataset: Digital Camera Identification Image Benchmarking
                  Dataset},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {799--804},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012130300003555},
  doi          = {10.5220/0012130300003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BernackiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BirjoveanuB23,
  author       = {Catalin V. B{\^{\i}}rjoveanu and
                  Mirela B{\^{\i}}rjoveanu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {495--502},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012127100003555},
  doi          = {10.5220/0012127100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BirjoveanuB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BoiS023,
  author       = {Biagio Boi and
                  Marco De Santis and
                  Christian Esposito},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Self-Sovereign Identity {(SSI)} Attribute-Based Web Authentication},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {758--763},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012121400003555},
  doi          = {10.5220/0012121400003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BoiS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BonaventuraEB23,
  author       = {Davide Bonaventura and
                  Sergio Esposito and
                  Giampaolo Bella},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Smart Bulbs Can Be Hacked to Hack into Your Household},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {218--229},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012092900003555},
  doi          = {10.5220/0012092900003555},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BonaventuraEB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BouhaddiA23,
  author       = {Myria Bouhaddi and
                  Kamel Adi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Multi-Environment Training Against Reward Poisoning Attacks on Deep
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {870--875},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012139900003555},
  doi          = {10.5220/0012139900003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BouhaddiA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BuccafurriAL23,
  author       = {Francesco Buccafurri and
                  Vincenzo De Angelis and
                  Sara Lazzaro},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Adapting {P2P} Mixnets to Provide Anonymity for Uplink-Intensive Applications},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {73--84},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012077100003555},
  doi          = {10.5220/0012077100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BuccafurriAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CarmonaLL23,
  author       = {Mikael Carmona and
                  Doryan Lesaignoux and
                  Antoine Loiseau},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On the Implementation of a Lattice-Based Revocable Hierarchical Ibe},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {617--623},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012047800003555},
  doi          = {10.5220/0012047800003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CarmonaLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CascavillaCCMT23,
  author       = {Giuseppe Cascavilla and
                  Gemma Catolino and
                  Mauro Conti and
                  D. Mellios and
                  Damian A. Tamburri},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot
                  Learning},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {324--334},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012049400003555},
  doi          = {10.5220/0012049400003555},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CascavillaCCMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CastellanoPF23,
  author       = {Dario Castellano and
                  Roberto De Prisco and
                  Pompeo Faruolo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {752--757},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012121100003555},
  doi          = {10.5220/0012121100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CastellanoPF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChakrabortyMM23,
  author       = {Trisha Chakraborty and
                  Shaswata Mitra and
                  Sudip Mittal},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {62--72},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012069000003555},
  doi          = {10.5220/0012069000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChakrabortyMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChecriBSB23,
  author       = {Marina Checri and
                  Jean{-}Paul Bultel and
                  Renaud Sirdey and
                  Aymen Boudguiga},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Lightweight FHE-based Protocols Achieving Results Consistency for
                  Data Encrypted Under Different Keys},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {704--709},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012085200003555},
  doi          = {10.5220/0012085200003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChecriBSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChiapputoDM23,
  author       = {Nicolas Chiapputo and
                  Yvo Desmedt and
                  Kirill Morozov},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Using Untrusted and Unreliable Cloud Providers to Obtain Private Email},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {171--182},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012090700003555},
  doi          = {10.5220/0012090700003555},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChiapputoDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChuangHL23,
  author       = {ChihYun Chuang and
                  IHung Hsu and
                  TingFang Lee},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Two-Party Hierarchical Deterministic Wallets in Practice},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {850--856},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012138700003555},
  doi          = {10.5220/0012138700003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChuangHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CzernyKPPZ23,
  author       = {Roland Czerny and
                  Christian Kollmann and
                  Blaz Podgorelec and
                  Bernd Pr{\"{u}}nster and
                  Thomas Zefferer},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Smoothing the Ride: Providing a Seamless Upgrade Path from Established
                  Cross-Border eID Workflows Towards eID Wallet Systems},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {460--468},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012091900003555},
  doi          = {10.5220/0012091900003555},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CzernyKPPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DobiasRDMS23,
  author       = {Patrik Dobias and
                  Sara Ricci and
                  Petr Dzurenda and
                  Lukas Malina and
                  Nikita Snetkov},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Lattice-Based Threshold Signature Implementation for Constrained Devices},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {724--730},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012112700003555},
  doi          = {10.5220/0012112700003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DobiasRDMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DockendorfD23,
  author       = {Mark Dockendorf and
                  Ram Dantu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {192--205},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012091300003555},
  doi          = {10.5220/0012091300003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DockendorfD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DockendorfD23a,
  author       = {Mark Dockendorf and
                  Ram Dantu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Privacy-Preserving Algorithms for Data Cooperatives with Directed
                  Graphs},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {876--884},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012140200003555},
  doi          = {10.5220/0012140200003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DockendorfD23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Evang23,
  author       = {Jan Marius Evang},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A 10-Layer Model for Service Availability Risk Management},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {716--723},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012092600003555},
  doi          = {10.5220/0012092600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Evang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FlaminiRSSS023,
  author       = {Andrea Flamini and
                  Silvio Ranise and
                  Giada Sciarretta and
                  Mario Scuro and
                  Amir Sharif and
                  Alessandro Tomasi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure
                  of Verifiable Credentials},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {123--134},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012084000003555},
  doi          = {10.5220/0012084000003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/FlaminiRSSS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GagnonGC23,
  author       = {Guillaume Gagnon and
                  S{\'{e}}bastien Gambs and
                  Mathieu Cunche},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {RSSI-Based Fingerprinting of Bluetooth Low Energy Devices},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {242--253},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012139600003555},
  doi          = {10.5220/0012139600003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GagnonGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GargT23,
  author       = {Sonakshi Garg and
                  Vicen{\c{c}} Torra},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {K-Anonymous Privacy Preserving Manifold Learning},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {37--48},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012053400003555},
  doi          = {10.5220/0012053400003555},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GargT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Giron23,
  author       = {Alexandre Augusto Giron},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm
                  Replacement},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {857--862},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012138800003555},
  doi          = {10.5220/0012138800003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Giron23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GomezCD23,
  author       = {Laurent Gomez and
                  Francesco Capano and
                  Patrick Duverger},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Security for Next-Gen Analytics for Cross-Organisation Collaboration},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {604--609},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012044900003555},
  doi          = {10.5220/0012044900003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GomezCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GomezYD23,
  author       = {Laurent Gomez and
                  Tianchi Yu and
                  Patrick Duverger},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Security for Distributed Machine Learning},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {838--843},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012137700003555},
  doi          = {10.5220/0012137700003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GomezYD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GrittiH023,
  author       = {Cl{\'{e}}mentine Gritti and
                  Fr{\'{e}}d{\'{e}}ric A. Hayek and
                  Pascal Lafourcade},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Generic Blockchain on Generic Human Behavior},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {206--217},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012091700003555},
  doi          = {10.5220/0012091700003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GrittiH023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HattakIMMS23,
  author       = {Amine Hattak and
                  Giacomo Iadarola and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Method for Robust and Explainable Image-Based Network Traffic Classification
                  with Deep Learning},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {385--393},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012083200003555},
  doi          = {10.5220/0012083200003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HattakIMMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HondaK23,
  author       = {Motonari Honda and
                  Yuichi Kaji},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Improvement of Winternitz {OTS} with a Novel Fingerprinting Function},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {303--311},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012049100003555},
  doi          = {10.5220/0012049100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HondaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Ionita23,
  author       = {Alexandru Ionita},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Optimizing Attribute-Based Encryption for Circuits Using Compartmented
                  Access Structures},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {230--241},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012139000003555},
  doi          = {10.5220/0012139000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Ionita23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JajuAPBAMD23,
  author       = {Chirag Jaju and
                  Dhairya Agrawal and
                  Rishi Poddar and
                  Shubh Badjate and
                  Sidharth Anand and
                  Barsha Mitra and
                  Soumyadeep Dey},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Analyzing Image Based Strategies for Android Malware Detection and
                  Classification: An Empirical Exploration},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {863--869},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012139100003555},
  doi          = {10.5220/0012139100003555},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JajuAPBAMD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KaiKKMSYT23,
  author       = {Satoshi Kai and
                  Takao Kondo and
                  Naghmeh Karimi and
                  Konstantinos Mersinas and
                  Marc Sel and
                  Roberto Yus and
                  Satoru Tezuka},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {International Mutual Recognition: {A} Description of Trust Services
                  in US, UK, {EU} and {JP} and the Testbed "Hakoniwa"},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {764--771},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012124200003555},
  doi          = {10.5220/0012124200003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KaiKKMSYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KaratiCC23,
  author       = {Arijit Karati and
                  Yu{-}Sheng Chang and
                  Ting{-}Yu Chen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Robust Three-Factor Lightweight Authentication Based on Extended Chaotic
                  Maps for Portable Resource-Constrained Devices},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {673--682},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012077600003555},
  doi          = {10.5220/0012077600003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KaratiCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KayaG23,
  author       = {Zeynep Sila Kaya and
                  Mehmet Emre Gursoy},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On the Effectiveness of Re-Identification Attacks and Local Differential
                  Privacy-Based Solutions for Smart Meter Data},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {111--122},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012083300003555},
  doi          = {10.5220/0012083300003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KayaG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhanRCP23,
  author       = {Muhammad Nauman Khan and
                  Asha Rao and
                  Seyit Camtepe and
                  Josef Pieprzyk},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Classical to Post-Quantum Secure {ABE-IBE} Proxy Re-Encryption Scheme},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {85--98},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012078200003555},
  doi          = {10.5220/0012078200003555},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KhanRCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhannaR23,
  author       = {Shabnam Khanna and
                  Ciara Rafferty},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Approximate Homomorphic Pre-Processing for CNNs},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {710--715},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012085400003555},
  doi          = {10.5220/0012085400003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KhannaR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhodjaevaC23,
  author       = {Matluba Khodjaeva and
                  Giovanni Di Crescenzo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On Single-Server Delegation Without Precomputation},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {540--547},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012140100003555},
  doi          = {10.5220/0012140100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KhodjaevaC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KochbergerGSLW23,
  author       = {Patrick Kochberger and
                  Maximilian Gramberger and
                  Sebastian Schrittwieser and
                  Caroline Lawitschka and
                  Edgar R. Weippl},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Large Language Models for Code Obfuscation Evaluation of the Obfuscation
                  Capabilities of OpenAI's {GPT-3.5} on {C} Source Code},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {7--19},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012167000003555},
  doi          = {10.5220/0012167000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KochbergerGSLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KozakJ23,
  author       = {Matous Koz{\'{a}}k and
                  Martin Jurecek},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Combining Generators of Adversarial Malware Examples to Increase Evasion
                  Rate},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {778--786},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012127700003555},
  doi          = {10.5220/0012127700003555},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KozakJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KrawieckaBEM23,
  author       = {Klaudia Krawiecka and
                  Simon Birnbach and
                  Simon Eberz and
                  Ivan Martinovic},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {BeeHIVE: Behavioral Biometric System Based on Object Interactions
                  in Smart Environments},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {135--146},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012088900003555},
  doi          = {10.5220/0012088900003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KrawieckaBEM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LangeSCR23,
  author       = {Lucas Lange and
                  Maja Schneider and
                  Peter Christen and
                  Erhard Rahm},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Privacy in Practice: Private {COVID-19} Detection in X-Ray Images},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {624--633},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012048100003555},
  doi          = {10.5220/0012048100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LangeSCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LeNTTT23,
  author       = {Cong{-}Binh Le and
                  Bao{-}Thi Nguyen{-}Le and
                  Phuoc{-}Loc Truong and
                  Minh{-}Triet Tran and
                  Anh{-}Duy Tran},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {ArmorDroid: {A} Rule-Set Customizable Plugin for Secure Android Application
                  Development},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {634--641},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012049500003555},
  doi          = {10.5220/0012049500003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/LeNTTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lewandowski23,
  author       = {Brian Lewandowski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Guidelines and a Framework to Improve the Delivery of Network Intrusion
                  Detection Datasets},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {649--658},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012052300003555},
  doi          = {10.5220/0012052300003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lewandowski23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiHWAN23,
  author       = {Wenhao Li and
                  Yongqing He and
                  Zhimin Wang and
                  Saleh Mansor Alqahtani and
                  Priyadarsi Nanda},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites
                  Using Novel Cloaking Techniques},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {813--821},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012135600003555},
  doi          = {10.5220/0012135600003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiHWAN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MahmoodAA23,
  author       = {Aimen Mahmood and
                  Haider Abbas and
                  M. Faisal Amjad},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{CNN-HMM} Model for Real Time {DGA} Categorization},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {822--829},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012136800003555},
  doi          = {10.5220/0012136800003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MahmoodAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MarottaM23,
  author       = {Angelica Marotta and
                  Stuart E. Madnick},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Regulating Cyber Incidents: {A} Review of Recent Reporting Requirements},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {410--416},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012086000003555},
  doi          = {10.5220/0012086000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MarottaM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MatsuzakiSH23,
  author       = {Kazutaka Matsuzaki and
                  Kenji Sawada and
                  Shinichi Honiden},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Remote Security Assessment for Cyber-Physical Systems: Adapting Design
                  Patterns for Enhanced Diagnosis},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {805--812},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012132600003555},
  doi          = {10.5220/0012132600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MatsuzakiSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MekkiHAK23,
  author       = {Neila Mekki and
                  Mohamed Hamdi and
                  Taoufik Aguili and
                  Tai{-}Hoon Kim},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Secure Emergency Framework in an IoT Based Patient Monitoring System},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {844--849},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012138400003555},
  doi          = {10.5220/0012138400003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MekkiHAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MerchaCE23,
  author       = {El Mahdi Mercha and
                  El Mostapha Chakir and
                  Mohammed Erradi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Trans-IDS: {A} Transformer-Based Intrusion Detection System},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {402--409},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012085800003555},
  doi          = {10.5220/0012085800003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MerchaCE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MeunierT23,
  author       = {Quentin L. Meunier and
                  Abdul Rahman Taleb},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {VerifMSI: Practical Verification of Hardware and Software Masking
                  Schemes Implementations},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {520--527},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012138600003555},
  doi          = {10.5220/0012138600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MeunierT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MohamedAHK23,
  author       = {Aya Mohamed and
                  Dagmar Auer and
                  Daniel Hofer and
                  Josef K{\"{u}}ng},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{XACML} Extension for Graphs: Flexible Authorization Policy Specification
                  and Datastore-Independent Enforcement},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {442--449},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012090000003555},
  doi          = {10.5220/0012090000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MohamedAHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MohammadianL023,
  author       = {Hesamodin Mohammadian and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Evaluating Label Flipping Attack in Deep Learning-Based {NIDS}},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {597--603},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012038100003555},
  doi          = {10.5220/0012038100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MohammadianL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MuhleAM23,
  author       = {Alexander M{\"{u}}hle and
                  Katja Assaf and
                  Christoph Meinel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {One to Bind Them: Binding Verifiable Credentials to User Attributes},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {345--352},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012057900003555},
  doi          = {10.5220/0012057900003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MuhleAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NandikotkurT023,
  author       = {Achyuth Nandikotkur and
                  Issa Traor{\'{e}} and
                  Mohammad Mamun},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Detecting BrakTooth Attacks},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {787--792},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012128000003555},
  doi          = {10.5220/0012128000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NandikotkurT023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NikulaKLL23,
  author       = {Sara Nikula and
                  Pekka Koskela and
                  Outi{-}Marja Latvala and
                  Sami Lehtonen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Light Quantum Key Distribution Network Security Estimation Tool},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {587--596},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012022100003555},
  doi          = {10.5220/0012022100003555},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NikulaKLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NygardK23,
  author       = {Arne Roar Nyg{\aa}rd and
                  Sokratis K. Katsikas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Leveraging Hardware Reverse Engineering to Improve the Cyber Security
                  and Resilience of the Smart Grid},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {610--616},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012046000003555},
  doi          = {10.5220/0012046000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NygardK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Palfinger23,
  author       = {Gerald Palfinger},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {OCScraper: Automated Analysis of the Fingerprintability of the iOS
                  {API}},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {433--441},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012089600003555},
  doi          = {10.5220/0012089600003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Palfinger23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PaulT23,
  author       = {Sudipta Paul and
                  Vicen{\c{c}} Torra},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{\(\Delta\)} {SFL:} (Decoupled Server Federated Learning) to Utilize
                  {DLG} Attacks in Federated Learning by Decoupling the Server},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {577--584},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012150700003555},
  doi          = {10.5220/0012150700003555},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PaulT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PejoK23,
  author       = {Bal{\'{a}}zs Pej{\'{o}} and
                  Nikolett Kapui},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {SQLi Detection with {ML:} {A} Data-Source Perspective},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {642--648},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012050100003555},
  doi          = {10.5220/0012050100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PejoK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PolcakJ23,
  author       = {Libor Polc{\'{a}}k and
                  Kamil Jer{\'{a}}bek},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Data Protection and Security Issues with Network Error Logging},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {683--690},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012078100003555},
  doi          = {10.5220/0012078100003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PolcakJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PolcakSMHM23,
  author       = {Libor Polc{\'{a}}k and
                  Marek Salon and
                  Giorgio Maone and
                  Radek Hranick{\'{y}} and
                  Michael McMahon},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {JShelter: Give Me My Browser Back},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {287--294},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011965600003555},
  doi          = {10.5220/0011965600003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PolcakSMHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PrasadBSM23,
  author       = {Arjun Prasad and
                  Kevin Kanichery Biju and
                  Soumya Somani and
                  Barsha Mitra},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Context-Aware Behavioral Fingerprinting of IoT Devices via Network
                  Traffic Analysis},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {335--344},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PrasadBSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PriscoSF23,
  author       = {Roberto De Prisco and
                  Sergiy Shevchenko and
                  Pompeo Faruolo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Blockchain Data Replication},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {746--751},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012121000003555},
  doi          = {10.5220/0012121000003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PriscoSF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RahmanNMS23,
  author       = {Hasina Rahman and
                  Priyadarsi Nanda and
                  Manoranjan Mohanty and
                  Nazim Uddin Sheikh},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Anomaly Detection in Smart Grid Networks Using Power Consumption Data},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {830--837},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012137600003555},
  doi          = {10.5220/0012137600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RahmanNMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RajJS23,
  author       = {Shubham Raj and
                  Snehil Joshi and
                  Kannan Srinathan},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{PIUDI:} Private Information Update for Distributed Infrastructure},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {425--432},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012087900003555},
  doi          = {10.5220/0012087900003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RajJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RaulinGHT23,
  author       = {Vincent Raulin and
                  Pierre{-}Fran{\c{c}}ois Gimenez and
                  Yufei Han and
                  Val{\'{e}}rie Viet Triem Tong},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{BAGUETTE:} Hunting for Evidence of Malicious Behavior in Dynamic
                  Analysis Reports},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {417--424},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012086400003555},
  doi          = {10.5220/0012086400003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RaulinGHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RousselotCB23,
  author       = {Axel Rousselot and
                  Nora Cuppens and
                  Samra Bouakkaz},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{AIS} Authentication Using Certificateless Cryptography},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {49--61},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012054600003555},
  doi          = {10.5220/0012054600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RousselotCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RoyS23,
  author       = {Sangita Roy and
                  Rudrapatna K. Shyamasundar},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Rand Index-Based Analysis of Consensus Protocols},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {567--576},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012148200003555},
  doi          = {10.5220/0012148200003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RoyS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RusS023,
  author       = {Catalin Rus and
                  Dipti Kapoor Sarmah and
                  Mohammed El{-}Hajj},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Defeating MageCart Attacks in a {NAISS} Way},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {691--697},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012079300003555},
  doi          = {10.5220/0012079300003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RusS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Sardar023,
  author       = {Laltu Sardar and
                  Subhra Mazumdar},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Fidelis: Verifiable Keyword Search with No Trust Assumption},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {698--703},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012082700003555},
  doi          = {10.5220/0012082700003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Sardar023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchatzAKRS23,
  author       = {David Schatz and
                  Friedrich Altheide and
                  Hedwig Koerfgen and
                  Michael Rossberg and
                  Guenter Schaefer},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Virtual Private Networks in the Quantum Era: {A} Security in Depth
                  Approach},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {486--494},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012121800003555},
  doi          = {10.5220/0012121800003555},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchatzAKRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchrammelSGLDUN23,
  author       = {David Schrammel and
                  Salmin Sultana and
                  Karanvir Grewal and
                  Michael LeMay and
                  David M. Durham and
                  Martin Unterguggenberger and
                  Pascal Nasahl and
                  Stefan Mangard},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{MEMES:} Memory Encryption-Based Memory Safety on Commodity Hardware},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {25--36},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012050300003555},
  doi          = {10.5220/0012050300003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchrammelSGLDUN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SenanayakeKAP023,
  author       = {Janaka Senanayake and
                  Harsha K. Kalutarage and
                  M. Omar Al{-}Kadri and
                  Luca Piras and
                  Andrei Petrovski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to
                  Develop AI-Based Code Vulnerability Detection Models},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {659--666},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012060400003555},
  doi          = {10.5220/0012060400003555},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SenanayakeKAP023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Shafeeq023,
  author       = {Sehrish Shafeeq and
                  Mathias Fischer},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{SEBDA:} {A} Secure and Efficient Blockchain Based Data Aggregation
                  Scheme},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {369--376},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012077900003555},
  doi          = {10.5220/0012077900003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Shafeeq023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SheikhiGS23,
  author       = {Maryam Sheikhi and
                  Rosario Giustolisi and
                  Carsten Sch{\"{u}}rmann},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Receipt-Free Electronic Voting from zk-SNARK},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {254--266},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SheikhiGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ShiS23,
  author       = {Kevin Shi and
                  Sherif Saad},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Automated Feature Engineering for AutoML Using Genetic Algorithms},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {450--459},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012090400003555},
  doi          = {10.5220/0012090400003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ShiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Shyamasundar23,
  author       = {Rudrapatna K. Shyamasundar},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{ERC20:} Correctness via Linearizability and Interference Freedom
                  of the Underlying Smart Contract},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {557--566},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012145800003555},
  doi          = {10.5220/0012145800003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Shyamasundar23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SivaramanN23,
  author       = {Navya Sivaraman and
                  Simin Nadjm{-}Tehrani},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {5G Handover: When Forward Security Breaks},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {503--510},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012128400003555},
  doi          = {10.5220/0012128400003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SivaramanN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StockWDF23,
  author       = {Joshua Stock and
                  Jens Wettlaufer and
                  Daniel Demmler and
                  Hannes Federrath},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Lessons Learned: Defending Against Property Inference Attacks},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {312--323},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012049200003555},
  doi          = {10.5220/0012049200003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/StockWDF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Teseleanu23,
  author       = {George Teseleanu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Threshold Cryptosystems Based on 2k-th Power Residue Symbols},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {295--302},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012007600003555},
  doi          = {10.5220/0012007600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Teseleanu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Teseleanu23a,
  author       = {George Teseleanu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Note on a CBC-Type Mode of Operation},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {353--360},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012059100003555},
  doi          = {10.5220/0012059100003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Teseleanu23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UllahOP23,
  author       = {Syed Sajid Ullah and
                  Vladimir A. Oleshchuk and
                  Harsha S. Gardiyawasam Pussewalage},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled
                  Internet of Things},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {528--539},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012138900003555},
  doi          = {10.5220/0012138900003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/UllahOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WaqdanLM23,
  author       = {Mofareh Waqdan and
                  Habib Louafi and
                  Malek Mouhoub},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare
                  Environment},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {667--672},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012060900003555},
  doi          = {10.5220/0012060900003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WaqdanLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Wenning23,
  author       = {Rigo Wenning},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {The Certification Panacea},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Wenning23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WichmannAF023,
  author       = {Pascal Wichmann and
                  Sam Ansari and
                  Hannes Federrath and
                  Jens Lindemann},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {WebAppAuth: An Architecture to Protect from Compromised First-Party
                  Web Servers},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {548--556},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012141700003555},
  doi          = {10.5220/0012141700003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WichmannAF023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YaqubMS23,
  author       = {Waheeb Yaqub and
                  Manoranjan Mohanty and
                  Basem Suleiman},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Proctoring Online Exam Using Eye Tracking},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {738--745},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012120600003555},
  doi          = {10.5220/0012120600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YaqubMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZaccagninoCGLMZ23,
  author       = {Rocco Zaccagnino and
                  Antonio Cirillo and
                  Alfonso Guarino and
                  Nicola Lettieri and
                  Delfina Malandrino and
                  Gianluca Zaccagnino},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards a Geometric Deep Learning-Based Cyber Security: Network System
                  Intrusion Detection Using Graph Neural Networks},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {394--401},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012085700003555},
  doi          = {10.5220/0012085700003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZaccagninoCGLMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icsbt/2022s,
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45137-9},
  doi          = {10.1007/978-3-031-45137-9},
  isbn         = {978-3-031-45136-2},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/2022s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2023,
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0000167900003555},
  doi          = {10.5220/0000167900003555},
  isbn         = {978-989-758-666-8},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/Chaitou0LP22,
  author       = {Hassan Chaitou and
                  Thomas Robert and
                  Jean Leneutre and
                  Laurent Pautet},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and
                  Their Mitigation},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {122--155},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_6},
  doi          = {10.1007/978-3-031-45137-9\_6},
  timestamp    = {Wed, 31 Jan 2024 07:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/Chaitou0LP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/Cuzzocrea22a,
  author       = {Alfredo Cuzzocrea},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {Compressing Big {OLAP} Data Cubes in Big Data Analytics Systems: New
                  Paradigms, a Reference Architecture, and Future Research Perspectives},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {156--175},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_7},
  doi          = {10.1007/978-3-031-45137-9\_7},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/Cuzzocrea22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/GiarettaMMG22,
  author       = {Lodovico Giaretta and
                  Thomas Marchioro and
                  Evangelos P. Markatos and
                  Sarunas Girdzijauskas},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {Towards a Realistic Decentralized Naive Bayes with Differential Privacy},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {98--121},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_5},
  doi          = {10.1007/978-3-031-45137-9\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/GiarettaMMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/HoangHKKO22,
  author       = {Anh{-}Tuan Hoang and
                  Neil Hanley and
                  Ayesha Khalid and
                  Dur{-}e{-}Shahwar Kundi and
                  M{\'{a}}ire O'Neill},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {Stacked Ensemble Models Evaluation on {DL} Based {SCA}},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {43--68},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_3},
  doi          = {10.1007/978-3-031-45137-9\_3},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/HoangHKKO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/JanovskyMMMG22,
  author       = {Adam Janovsky and
                  Davide Maiorca and
                  Dominik Macko and
                  Vashek Matyas and
                  Giorgio Giacinto},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {Explaining the Use of Cryptographic {API} in Android Malware},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {69--97},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_4},
  doi          = {10.1007/978-3-031-45137-9\_4},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/JanovskyMMMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/MaillardMSCB022,
  author       = {Julien Maillard and
                  Awaleh Houssein Meraneh and
                  Modou Sarry and
                  Christophe Clavier and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  Ga{\"{e}}l Thomas},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {Blind Side Channel Analysis on the Elephant {LFSR} Extended Version},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {20--42},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_2},
  doi          = {10.1007/978-3-031-45137-9\_2},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/MaillardMSCB022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsbt/MasmoudiLK22,
  author       = {Souha Masmoudi and
                  Maryline Laurent and
                  Nesrine Kaaniche},
  editor       = {Marten van Sinderen and
                  Fons Wijnhoven and
                  Slimane Hammoudi and
                  Pierangela Samarati and
                  Sabrina De Capitani di Vimercati},
  title        = {{SPOT+:} Secure and Privacy-Preserving Proximity-Tracing Protocol
                  with Efficient Verification over Multiple Contact Information},
  booktitle    = {E-Business and Telecommunications - 19th International Conference,
                  {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International
                  Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1849},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-45137-9\_1},
  doi          = {10.1007/978-3-031-45137-9\_1},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsbt/MasmoudiLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/000122,
  author       = {Luca Vigan{\`{o}}},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity
                  Show and Tell)},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/000122.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Al-AhmadiA22,
  author       = {Saad Al{-}Ahmadi and
                  Saud Al{-}Eyead},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {GAN-based Approach to Crafting Adversarial Malware Examples against
                  a Heterogeneous Ensemble Classifier},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {451--460},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011338800003283},
  doi          = {10.5220/0011338800003283},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Al-AhmadiA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AnastasiadiAM22,
  author       = {Eva Anastasiadi and
                  Elias Athanasopoulos and
                  Evangelos P. Markatos},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {The Weakest Link: On Breaking the Association between Usernames and
                  Passwords in Authentication Systems},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {560--567},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011276900003283},
  doi          = {10.5220/0011276900003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AnastasiadiAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AudranAHAFHGV22,
  author       = {David Holm Audran and
                  Marcus Braunschweig Andersen and
                  Mark H{\o}jer Hansen and
                  Mikkel M{\o}ller Andersen and
                  Thomas B. Frederiksen and
                  Kasper H. Hansen and
                  Dimitrios Georgoulias and
                  Emmanouil Vasilomanolakis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {357--365},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011273300003283},
  doi          = {10.5220/0011273300003283},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AudranAHAFHGV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AzizBKM22,
  author       = {Benjamin Aziz and
                  Aysha Bukhelli and
                  Rinat Khusainov and
                  Alaa Mohasseb},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Novel Method for Embedding and Extracting Secret Messages in Textual
                  Documents based on Paragraph Resizing},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {714--719},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011384200003283},
  doi          = {10.5220/0011384200003283},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AzizBKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BagR022,
  author       = {Samiran Bag and
                  Indranil Ghosh Ray and
                  Feng Hao},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A New Leakage Resilient Symmetric Searchable Encryption Scheme for
                  Phrase Search},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {366--373},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011273600003283},
  doi          = {10.5220/0011273600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BagR022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BahramiETDGK22,
  author       = {Javad Bahrami and
                  Mohammad Ebrahimabadi and
                  Sofiane Takarabt and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Naghmeh Karimi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On the Practicality of Relying on Simulations in Different Abstraction
                  Levels for Pre-silicon Side-Channel Analysis},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {661--668},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011307600003283},
  doi          = {10.5220/0011307600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BahramiETDGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BaiardiMP22,
  author       = {Fabrizio Baiardi and
                  Daria Maggi and
                  Mauro Passacantando},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Discovering How to Attack a System},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {548--553},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011270000003283},
  doi          = {10.5220/0011270000003283},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BaiardiMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BaigE22,
  author       = {Ahmed Fraz Baig and
                  Sigurd Eskeland},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Generic Privacy-preserving Protocol for Keystroke Dynamics-based
                  Continuous Authentication},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {491--498},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011141400003283},
  doi          = {10.5220/0011141400003283},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BaigE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BarlettaDGLS22,
  author       = {Vita Santa Barletta and
                  Giuseppe Desolda and
                  Domenico Gigante and
                  Rosa Lanzilotti and
                  Marco Saltarella},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {From {GDPR} to Privacy Design Patterns: The {MATERIALIST} Framework},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {642--648},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011305900003283},
  doi          = {10.5220/0011305900003283},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BarlettaDGLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BeetsNS22,
  author       = {Christopher van der Beets and
                  Raine Nieminen and
                  Thomas Schneider},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{FAPRIL:} Towards Faster Privacy-preserving Fingerprint-based Localization},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {108--120},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011263500003283},
  doi          = {10.5220/0011263500003283},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BeetsNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelelDM22,
  author       = {Anushree Belel and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting
                  Featuring Revocation and Key-homomorphic Property},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {349--356},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011271600003283},
  doi          = {10.5220/0011271600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelelDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BielikJJL22,
  author       = {Marek Bielik and
                  Martin Jurecek and
                  Olha Jureckov{\'{a}} and
                  R{\'{o}}bert L{\'{o}}rencz},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Yet Another Algebraic Cryptanalysis of Small Scale Variants of {AES}},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {415--427},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011327900003283},
  doi          = {10.5220/0011327900003283},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BielikJJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BilotGH22,
  author       = {Tristan Bilot and
                  Gr{\'{e}}goire Geis and
                  Badis Hammi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {PhishGNN: {A} Phishing Website Detection Framework using Graph Neural
                  Networks},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {428--435},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328600003283},
  doi          = {10.5220/0011328600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BilotGH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BoranJS22,
  author       = {Nirmal Kumar Boran and
                  Pranil Joshi and
                  Virendra Singh},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{PASS-P:} Performance and Security Sensitive Dynamic Cache Partitioning},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {443--450},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011336900003283},
  doi          = {10.5220/0011336900003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BoranJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BrodschelmG22,
  author       = {Lukas Brodschelm and
                  Marcus Gelderie},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Application Sandboxing for Linux Desktops: {A} User-friendly Approach},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {317--324},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011145800003283},
  doi          = {10.5220/0011145800003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BrodschelmG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CalvoB22,
  author       = {Miguel Calvo and
                  Marta Beltr{\'{a}}n},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {An Adaptive Web Application Firewall},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {96--107},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011146900003283},
  doi          = {10.5220/0011146900003283},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/CalvoB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CascavillaCS22,
  author       = {Giuseppe Cascavilla and
                  Gemma Catolino and
                  Mirella Sangiovanni},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Illicit Darkweb Classification via Natural-language Processing: Classifying
                  Illicit Content of Webpages based on Textual Information},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {620--626},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011298600003283},
  doi          = {10.5220/0011298600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CascavillaCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Chaitou0LP22,
  author       = {Hassan Chaitou and
                  Thomas Robert and
                  Jean Leneutre and
                  Laurent Pautet},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Threats to Adversarial Training for IDSs and Mitigation},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {226--236},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011277600003283},
  doi          = {10.5220/0011277600003283},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Chaitou0LP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChandranHHS22,
  author       = {Gowri R. Chandran and
                  Carmit Hazay and
                  Robin Hundt and
                  Thomas Schneider},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Comparison-based {MPC} in Star Topology},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {69--82},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011144100003283},
  doi          = {10.5220/0011144100003283},
  timestamp    = {Tue, 04 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChandranHHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CrincoliFIRMMS22,
  author       = {Giuseppe Crincoli and
                  Fabiana Fierro and
                  Giacomo Iadarola and
                  Piera Elena La Rocca and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Method for Road Accident Prevention in Smart Cities based on Deep
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {513--518},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011146500003283},
  doi          = {10.5220/0011146500003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CrincoliFIRMMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DedousisRSG22,
  author       = {Panagiotis Dedousis and
                  Melina Raptaki and
                  George Stergiopoulos and
                  Dimitris Gritzalis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards an Automated Business Process Model Risk Assessment: {A} Process
                  Mining Approach},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {35--46},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011135600003283},
  doi          = {10.5220/0011135600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DedousisRSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Desmedt22,
  author       = {Yvo Desmedt},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position
                  Paper)},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {436--442},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328800003283},
  doi          = {10.5220/0011328800003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Desmedt22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DeyD22,
  author       = {Jayashree Dey and
                  Ratna Dutta},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Code-based Key Encapsulation Mechanism Preserving Short Ciphertext
                  and Secret Key},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {374--381},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011273900003283},
  doi          = {10.5220/0011273900003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DeyD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DiegoLRAM22,
  author       = {Santiago de Diego and
                  Oscar Lage and
                  Cristina Regueiro and
                  Sergio Anguita and
                  Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Bypassing Current Limitations for Implementing a Credential Delegation
                  for the Industry 4.0},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {485--490},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011136600003283},
  doi          = {10.5220/0011136600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DiegoLRAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DockendorfDL22,
  author       = {Mark Dockendorf and
                  Ram Dantu and
                  John Long},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Graph Algorithms over Homomorphic Encryption for Data Cooperatives},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {205--214},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011277000003283},
  doi          = {10.5220/0011277000003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DockendorfDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DowsleyFLNV22,
  author       = {Rafael Dowsley and
                  Myl{\`{e}}ne C. Q. Farias and
                  Mario Larangeira and
                  Anderson Nascimento and
                  Jot Virdee},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Spendable Cold Wallet from {QR} Video},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {283--290},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011138300003283},
  doi          = {10.5220/0011138300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DowsleyFLNV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DufkaSS22,
  author       = {Antonin Dufka and
                  Vladimir Sedlacek and
                  Petr Svenda},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{SHINE:} Resilience via Practical Interoperability of Multi-party
                  Schnorr Signature Schemes},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {305--316},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011145600003283},
  doi          = {10.5220/0011145600003283},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DufkaSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DurbetG0MT22,
  author       = {Axel Durbet and
                  Paul{-}Marie Grollemund and
                  Pascal Lafourcade and
                  Denis Migdal and
                  Kevin Thiry{-}Atighehchi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Authentication Attacks on Projection-based Cancelable Biometric Schemes},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {568--573},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011277100003283},
  doi          = {10.5220/0011277100003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DurbetG0MT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DurbetG0T22,
  author       = {Axel Durbet and
                  Paul{-}Marie Grollemund and
                  Pascal Lafourcade and
                  Kevin Thiry{-}Atighehchi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Near-collisions and Their Impact on Biometric Security},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {382--389},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011279200003283},
  doi          = {10.5220/0011279200003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DurbetG0T22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Eskeland22,
  author       = {Sigurd Eskeland},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Collusion-resistant Broadcast Encryption based on Hidden {RSA} Subgroups},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {291--298},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011140000003283},
  doi          = {10.5220/0011140000003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Eskeland22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/EskelandB22,
  author       = {Sigurd Eskeland and
                  Ahmed Fraz Baig},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication
                  Scheme},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {299--304},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011140300003283},
  doi          = {10.5220/0011140300003283},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/EskelandB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaOTKHKS22,
  author       = {Kazuhide Fukushima and
                  Hiroki Okada and
                  Sofiane Takarabt and
                  Amina Korchi and
                  Meziane Hamoud and
                  Khaled Karray and
                  Youssef Souissy and
                  Sylvain Guilley},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Side-channel Analysis and Countermeasure for Implementation of Lattice-based
                  Signature},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {701--706},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328400003283},
  doi          = {10.5220/0011328400003283},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaOTKHKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GelderieBLB22,
  author       = {Marcus Gelderie and
                  Valentin Barth and
                  Maximilian Luff and
                  Julian Birami},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Seccomp Filters from Fuzzing},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {507--512},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011145100003283},
  doi          = {10.5220/0011145100003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GelderieBLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GummaMDPSDV22,
  author       = {Varun Gumma and
                  Barsha Mitra and
                  Soumyadeep Dey and
                  Pratik Shashikantbhai Patel and
                  Sourabh Suman and
                  Saptarshi Das and
                  Jaideep Vaidya},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{PAMMELA:} Policy Administration Methodology using Machine Learning},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {147--157},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011272400003283},
  doi          = {10.5220/0011272400003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GummaMDPSDV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GunawardhanaA22,
  author       = {Rahul Sankalana Gunawardhana and
                  Kavinga Yapa Abeywardana},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Irreversible Applications for Windows {NT} Systems},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {479--484},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011051700003283},
  doi          = {10.5220/0011051700003283},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GunawardhanaA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Harth-KitzerowC22,
  author       = {Christopher Harth{-}Kitzerow and
                  Georg Carle and
                  Fan Fei and
                  Andr{\'{e}} Luckow and
                  Johannes Klepsch},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{CRGC:} {A} Practical Framework for Constructing Reusable Garbled
                  Circuits},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {83--95},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011145300003283},
  doi          = {10.5220/0011145300003283},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Harth-KitzerowC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoangHKKO22,
  author       = {Anh{-}Tuan Hoang and
                  Neil Hanley and
                  Ayesha Khalid and
                  Dur{-}e{-}Shahwar Kundi and
                  M{\'{a}}ire O'Neill},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Stacked Ensemble Model for Enhancing the {DL} based {SCA}},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {59--68},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011139700003283},
  doi          = {10.5220/0011139700003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoangHKKO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IganiboATCM22,
  author       = {Ibifubara Iganibo and
                  Massimiliano Albanese and
                  Kaan Turkmen and
                  Thomas R. Campbell and
                  Marc Mosko},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Mason Vulnerability Scoring Framework: {A} Customizable Framework
                  for Scoring Common Vulnerabilities and Weaknesses},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {215--225},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011277400003283},
  doi          = {10.5220/0011277400003283},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/IganiboATCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Ionita22,
  author       = {Alexandru Ionita},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Weighted Attribute-based Encryption with Parallelized Decryption},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {574--579},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011278400003283},
  doi          = {10.5220/0011278400003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Ionita22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JanovskyMMMG22,
  author       = {Adam Janovsky and
                  Davide Maiorca and
                  Dominik Macko and
                  Vashek Matyas and
                  Giorgio Giacinto},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Longitudinal Study of Cryptographic {API:} {A} Decade of Android
                  Malware},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {121--133},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011265300003283},
  doi          = {10.5220/0011265300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JanovskyMMMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JavedMBG22,
  author       = {Saqib Javed and
                  Muhammad Asim Mukhtar and
                  Muhammad Khurram Bhatti and
                  Guy Gogniat},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel
                  Attacks with Reduced Energy Consumption},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {675--680},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011326700003283},
  doi          = {10.5220/0011326700003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JavedMBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JeyamohanCA0O22,
  author       = {Jeyamohan Neera and
                  Xiaomin Chen and
                  Nauman Aslam and
                  Biju Issac and
                  Eve O'Brien},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Local Differential Privacy based Hybrid Recommendation Model with
                  {BERT} and Matrix Factorization},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {325--332},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011266800003283},
  doi          = {10.5220/0011266800003283},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/JeyamohanCA0O22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KaanicheBG22,
  author       = {Nesrine Kaaniche and
                  Aymen Boudguiga and
                  Gustavo {Gonzalez Granadillo}},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Efficient Hybrid Model for Intrusion Detection Systems},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {694--700},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328300003283},
  doi          = {10.5220/0011328300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KaanicheBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KapustaM22,
  author       = {Katarzyna Kapusta and
                  G{\'{e}}rard Memmi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{PE-AONT:} Partial Encryption All or Nothing Transform},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {636--641},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011300600003283},
  doi          = {10.5220/0011300600003283},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KapustaM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KarNBS22,
  author       = {Animesh Kar and
                  Andrei Natadze and
                  Enrico Branca and
                  Natalia Stakhanova},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {HTTPFuzz: Web Server Fingerprinting with {HTTP} Request Fuzzing},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {261--271},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328900003283},
  doi          = {10.5220/0011328900003283},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KarNBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Katsikas22,
  author       = {Sokratis K. Katsikas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Cyber Security When {IT} Meets {OT}},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Katsikas22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KazlouskiMM22,
  author       = {Andrei Kazlouski and
                  Thomas Marchioro and
                  Evangelos P. Markatos},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {What your Fitbit Says about You: De-anonymizing Users in Lifelogging
                  Datasets},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {341--348},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011268600003283},
  doi          = {10.5220/0011268600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KazlouskiMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KlinecSKSM22,
  author       = {Dusan Klinec and
                  Marek S{\'{y}}s and
                  Karel Kubicek and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Large-scale Randomness Study of Security Margins for 100+ Cryptographic
                  Functions},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {134--146},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011267600003283},
  doi          = {10.5220/0011267600003283},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KlinecSKSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LagoFMS22,
  author       = {Loris Dal Lago and
                  Fabio Federici and
                  Davide Martintoni and
                  Valerio Senni},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Risk-driven Model-based Architecture Design for Secure Information
                  Flows in Manufacturing Infrastructures},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {499--506},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011144700003283},
  doi          = {10.5220/0011144700003283},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/LagoFMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LavaurL22,
  author       = {Thomas Lavaur and
                  J{\'{e}}r{\^{o}}me Lacan},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable
                  Computation},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {406--414},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LavaurL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiT22,
  author       = {Zelong Li and
                  Akhilesh Tyagi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel
                  Prevention},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {655--660},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011307500003283},
  doi          = {10.5220/0011307500003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MalinaRDJHC22,
  author       = {Lukas Malina and
                  Sara Ricci and
                  Patrik Dobias and
                  Petr Jedlicka and
                  Jan Hajny and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On the Efficiency and Security of Quantum-resistant Key Establishment
                  Mechanisms on {FPGA} Platforms},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {605--613},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011294200003283},
  doi          = {10.5220/0011294200003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MalinaRDJHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MarchioroGMG22,
  author       = {Thomas Marchioro and
                  Lodovico Giaretta and
                  Evangelos P. Markatos and
                  Sarunas Girdzijauskas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Federated Naive Bayes under Differential Privacy},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {170--180},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011275300003283},
  doi          = {10.5220/0011275300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MarchioroGMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MasmoudiLK22,
  author       = {Souha Masmoudi and
                  Maryline Laurent and
                  Nesrine Kaaniche},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{SEVIL:} Secure and Efficient VerifIcation over Massive Proofs of
                  KnowLedge},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {13--24},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011125800003283},
  doi          = {10.5220/0011125800003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MasmoudiLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/McDonaldPAR22,
  author       = {Jeffrey Todd McDonald and
                  Jennifer Parnell and
                  Todd R. Andel and
                  Samuel H. Russ},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Effectiveness of Adversarial Component Recovery in Protected Netlist
                  Circuit Designs},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {181--192},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011275400003283},
  doi          = {10.5220/0011275400003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/McDonaldPAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MeranehCBM022,
  author       = {Awaleh Houssein Meraneh and
                  Christophe Clavier and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  Julien Maillard and
                  Ga{\"{e}}l Thomas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Blind Side Channel on the Elephant {LFSR}},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {25--34},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011135300003283},
  doi          = {10.5220/0011135300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MeranehCBM022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MercaldoCCIMRS22,
  author       = {Francesco Mercaldo and
                  Rosangela Casolare and
                  Giovanni Ciaramella and
                  Giacomo Iadarola and
                  Fabio Martinelli and
                  Francesco Ranieri and
                  Antonella Santone},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Real-time Method for {CAN} Bus Intrusion Detection by Means of Supervised
                  Machine Learning},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {534--539},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011267500003283},
  doi          = {10.5220/0011267500003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MercaldoCCIMRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MoralesA022,
  author       = {Daniel Morales Escalera and
                  Isaac Agudo and
                  Javier L{\'{o}}pez},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Real-time Crowd Counting based on Wearable Ephemeral IDs},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {249--260},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011327200003283},
  doi          = {10.5220/0011327200003283},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MoralesA022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MoreHW22,
  author       = {Stefan More and
                  Jakob Heher and
                  Clemens Walluschek},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Offline-verifiable Data from Distributed Ledger-based Registries},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {687--693},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011327600003283},
  doi          = {10.5220/0011327600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MoreHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NygardSK22,
  author       = {Arne Roar Nyg{\aa}rd and
                  Arvind Sharma and
                  Sokratis K. Katsikas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Reverse Engineering for Thwarting Digital Supply Chain Attacks in
                  Critical Infrastructures: Ethical Considerations},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {461--468},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011384300003283},
  doi          = {10.5220/0011384300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NygardSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OleynikovPS22,
  author       = {Ivan Oleynikov and
                  Elena Pagnin and
                  Andrei Sabelfeld},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {CatNap: Leveraging Generic {MPC} for Actively Secure Privacy-enhancing
                  Proximity Testing with a Napping Party},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {237--248},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011279500003283},
  doi          = {10.5220/0011279500003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OleynikovPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OseiLMZ22,
  author       = {Richmond Osei and
                  Habib Louafi and
                  Malek Mouhoub and
                  Zhongwen Zhu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Efficient IoT Device Fingerprinting Approach using Machine Learning},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {525--533},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011260500003283},
  doi          = {10.5220/0011260500003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OseiLMZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PolcakM22,
  author       = {Libor Polc{\'{a}}k and
                  Petr Matousek},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict?},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {47--58},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011139000003283},
  doi          = {10.5220/0011139000003283},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PolcakM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PrazeresCSR22,
  author       = {Nuno Prazeres and
                  Rog{\'{e}}rio Lu{\'{\i}}s C. Costa and
                  Leonel Santos and
                  Carlos Rabad{\~{a}}o},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Evaluation of AI-based Malware Detection in IoT Network Traffic},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {580--585},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011279600003283},
  doi          = {10.5220/0011279600003283},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PrazeresCSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RabasLB22,
  author       = {Tom{\'{a}}s Rabas and
                  R{\'{o}}bert L{\'{o}}rencz and
                  Jir{\'{\i}} Bucek},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Verification of PUF-based IoT Protocols with {AVISPA} and Scyther},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {627--635},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011299000003283},
  doi          = {10.5220/0011299000003283},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/RabasLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RizomiliotisDTK22,
  author       = {Panagiotis Rizomiliotis and
                  Christos Diou and
                  Aikaterini Triakosia and
                  Ilias Kyrannas and
                  Konstantinos Tserpes},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Partially Oblivious Neural Network Inference},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {158--169},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011272500003283},
  doi          = {10.5220/0011272500003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RizomiliotisDTK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RodriguezCA22,
  author       = {David Rodr{\'{\i}}guez Torrado and
                  Miguel Cozar and
                  Jos{\'{e}} M. del {\'{A}}lamo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Identifying Organizations Receiving Personal Data in Android Apps},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {592--596},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011290100003283},
  doi          = {10.5220/0011290100003283},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RodriguezCA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Roy0C22,
  author       = {Rahul Roy and
                  Abhijit Das and
                  Dipanwita Roy Chowdhury},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Parallel and Distributed Implementations of the Wiedemann and the
                  Block-Wiedemann Methods over {GF(2)}},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {540--547},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011267700003283},
  doi          = {10.5220/0011267700003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Roy0C22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RudavskyyM22,
  author       = {Kyrylo Rudavskyy and
                  Ali Miri},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Resilience of GANs against Adversarial Attacks},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {390--397},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011307200003283},
  doi          = {10.5220/0011307200003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RudavskyyM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SaiaCFP22,
  author       = {Roberto Saia and
                  Salvatore Carta and
                  Gianni Fenu and
                  Livio Pompianu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Region-based Training Data Segmentation Strategy to Credit Scoring},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {275--282},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011137400003283},
  doi          = {10.5220/0011137400003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SaiaCFP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SaiaCFP22a,
  author       = {Roberto Saia and
                  Salvatore Carta and
                  Gianni Fenu and
                  Livio Pompianu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Brain Waves and Evoked Potentials as Biometric User Identification
                  Strategy: An Affordable Low-cost Approach},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {614--619},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011297600003283},
  doi          = {10.5220/0011297600003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SaiaCFP22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SalauDMUB22,
  author       = {Abiola Salau and
                  Ram Dantu and
                  Kirill Morozov and
                  Kritagya Upadhyay and
                  Syed Badruddoja},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards a Threat Model and Security Analysis for Data Cooperatives},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {707--713},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328700003283},
  doi          = {10.5220/0011328700003283},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SalauDMUB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SegoviaRCG22,
  author       = {Mariana Segovia and
                  Jose Rubio{-}Hernan and
                  Ana R. Cavalli and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Switched-based Control Testbed to Assure Cyber-physical Resilience
                  by Design},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {681--686},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011327300003283},
  doi          = {10.5220/0011327300003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SegoviaRCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SengGL22,
  author       = {S. Seng and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Y. Laarouci},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Implementation of a Stateful Network Protocol Intrusion Detection
                  Systems},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {398--405},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011327400003283},
  doi          = {10.5220/0011327400003283},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SengGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ShehuPC22,
  author       = {Abubakar{-}Sadiq Shehu and
                  Ant{\'{o}}nio Pinto and
                  Manuel Eduardo Correia},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Decentralised Real Estate Transfer Verification based on Self-Sovereign
                  Identity and Smart Contracts},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {469--476},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011384700003283},
  doi          = {10.5220/0011384700003283},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ShehuPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SinhaS22,
  author       = {Amisha Sinha and
                  Debanjan Sadhya},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Decentralized Public Key Infrastructure with Identity Management using
                  Hyperledger Fabric},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {554--559},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011273000003283},
  doi          = {10.5220/0011273000003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SinhaS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StanTBKZS22,
  author       = {Oana Stan and
                  Vincent Thouvenot and
                  Aymen Boudguiga and
                  Katarzyna Kapusta and
                  Martin Zuber and
                  Renaud Sirdey},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Secure Federated Learning: Analysis of Different Cryptographic Tools},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {669--674},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011322700003283},
  doi          = {10.5220/0011322700003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/StanTBKZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SvendaKND22,
  author       = {Petr Svenda and
                  Rudolf Kvasnovsk{\'{y}} and
                  Imrich Nagy and
                  Antonin Dufka},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {JCAlgTest: Robust Identification Metadata for Certified Smartcards},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {597--604},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011294000003283},
  doi          = {10.5220/0011294000003283},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SvendaKND22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UfukS22,
  author       = {Berkan Ufuk and
                  Mehmet Tahir Sandikkaya},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Moving Target Defense Router: MaTaDoR},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {649--654},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011306500003283},
  doi          = {10.5220/0011306500003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/UfukS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UriawanBHB22,
  author       = {Wisnu Uriawan and
                  Youakim Badr and
                  Omar Hasan and
                  Lionel Brunie},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {TrustLend: Using Borrower Trustworthiness for Lending on Ethereum},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {519--524},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011151900003283},
  doi          = {10.5220/0011151900003283},
  timestamp    = {Thu, 04 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/UriawanBHB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ViescinskiHWM22,
  author       = {Amanda B. Viescinski and
                  Tiago Heinrich and
                  Newton Carlos Will and
                  Carlos Maziero},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Behavior Modeling of a Distributed Application for Anomaly Detection},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {333--340},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011267200003283},
  doi          = {10.5220/0011267200003283},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ViescinskiHWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VoyezAACFS22,
  author       = {Antonin Voyez and
                  Tristan Allard and
                  Gildas Avoine and
                  Pierre Cauchois and
                  {\'{E}}lisa Fromont and
                  Matthieu Simonin},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Membership Inference Attacks on Aggregated Time Series with Linear
                  Programming},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {193--204},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011276100003283},
  doi          = {10.5220/0011276100003283},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/VoyezAACFS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WagnerB22,
  author       = {Paul Georg Wagner and
                  J{\"{u}}rgen Beyerer},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards Heterogeneous Remote Attestation Protocols},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {586--591},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011289000003283},
  doi          = {10.5220/0011289000003283},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WagnerB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2022,
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0000163500003283},
  doi          = {10.5220/0000163500003283},
  isbn         = {978-989-758-590-6},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/0001RS21,
  author       = {Pascal Lafourcade and
                  L{\'{e}}o Robert and
                  Demba Sow},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Fast Cramer-Shoup Cryptosystem},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {766--771},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010580607660771},
  doi          = {10.5220/0010580607660771},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/0001RS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AbrahamSM21,
  author       = {Andreas Abraham and
                  Christopher Schinnerl and
                  Stefan More},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{SSI} Strong Authentication using a Mobile-phone based Identity Wallet
                  Reaching a High Level of Assurance},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {137--148},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010542801370148},
  doi          = {10.5220/0010542801370148},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AbrahamSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Andreea21,
  author       = {Ionita Andreea},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Private Set Intersection: Past, Present and Future},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {680--685},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010525806800685},
  doi          = {10.5220/0010525806800685},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Andreea21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BailluetBL21,
  author       = {Nicolas Bailluet and
                  H{\'{e}}l{\`{e}}ne Le Bouder and
                  David Lubicz},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Ransomware Detection using Markov Chain Models over File Headers},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {403--411},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010513104030411},
  doi          = {10.5220/0010513104030411},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BailluetBL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BayEAV21,
  author       = {Asl{\'{\i}} Bay and
                  Zeki Erkin and
                  Mina Alishahi and
                  Jelle Vos},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Multi-Party Private Set Intersection Protocols for Practical Applications},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {515--522},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010547605150522},
  doi          = {10.5220/0010547605150522},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BayEAV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BellizziV0H21,
  author       = {Jennifer Bellizzi and
                  Mark Vella and
                  Christian Colombo and
                  Julio C. Hernandez{-}Castro},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Responding to Living-Off-the-Land Tactics using Just-In-Time Memory
                  Forensics {(JIT-MF)} for Android},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {356--369},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010603603560369},
  doi          = {10.5220/0010603603560369},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BellizziV0H21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BerlatoCR21,
  author       = {Stefano Berlato and
                  Roberto Carbone and
                  Silvio Ranise},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Cryptographic Enforcement of Access Control Policies in the Cloud:
                  Implementation and Experimental Assessment},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {370--381},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010608003700381},
  doi          = {10.5220/0010608003700381},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BerlatoCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BlinowskiPW21,
  author       = {Grzegorz J. Blinowski and
                  Pawel Piotrowski and
                  Michal Wisniewski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Comparing Support Vector Machine and Neural Network Classifiers of
                  {CVE} Vulnerabilities},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {734--740},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010574807340740},
  doi          = {10.5220/0010574807340740},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BlinowskiPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BouamamaHE21,
  author       = {Jaouhara Bouamama and
                  Mustapha Hedabou and
                  Mohammed Erradi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Cloud Key Management using Trusted Execution Environment},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {560--567},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010558905600567},
  doi          = {10.5220/0010558905600567},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BouamamaHE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CasolareIMMS21,
  author       = {Rosangela Casolare and
                  Giacomo Iadarola and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Antonella Santone},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Mobile Family Detection through Audio Signals Classification},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {479--486},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010543504790486},
  doi          = {10.5220/0010543504790486},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CasolareIMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CermakS21,
  author       = {Milan Cerm{\'{a}}k and
                  Denisa Sramkova},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{GRANEF:} Utilization of a Graph Database for Network Forensics},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {785--790},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010581807850790},
  doi          = {10.5220/0010581807850790},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/CermakS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CichonMK21,
  author       = {Jacek Cichon and
                  Krzysztof Majcher and
                  Miroslaw Kutylowski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Fair Mutual Authentication},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {754--759},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010579507540759},
  doi          = {10.5220/0010579507540759},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CichonMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DashtiOKDR21,
  author       = {Salimeh Dashti and
                  Anderson Santana de Oliveira and
                  Caelin Kaplan and
                  Manuel Dalcastagn{\'{e}} and
                  Silvio Ranise},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection
                  Impact Assessment?},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {827--832},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010602608270832},
  doi          = {10.5220/0010602608270832},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/DashtiOKDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DedousisSAG21,
  author       = {Panagiotis Dedousis and
                  George Stergiopoulos and
                  George Arampatzis and
                  Dimitris Gritzalis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards Integrating Security in Industrial Engineering Design Practices},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {161--172},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010544001610172},
  doi          = {10.5220/0010544001610172},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/DedousisSAG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Demmler00SW21,
  author       = {Daniel Demmler and
                  Stefan Katzenbeisser and
                  Thomas Schneider and
                  Tom Schuster and
                  Christian Weinert},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Improved Circuit Compilation for Hybrid {MPC} via Compiler Intermediate
                  Representation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {444--451},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010540504440451},
  doi          = {10.5220/0010540504440451},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Demmler00SW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DockendorfDMB21,
  author       = {Mark Dockendorf and
                  Ram Dantu and
                  Kirill Morozov and
                  Sanjukta Bhowmick},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Investing Data with Untrusted Parties using {HE}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {845--853},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010606908450853},
  doi          = {10.5220/0010606908450853},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DockendorfDMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DuttaDB21,
  author       = {Ratna Dutta and
                  Sumit Kumar Debnath and
                  Chinmoy Biswas},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Storage Friendly Provably Secure Multivariate Identity-Based Signature
                  from Isomorphism of Polynomials Problem},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {595--602},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010580505950602},
  doi          = {10.5220/0010580505950602},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DuttaDB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/EllingsenRST21,
  author       = {P{\aa}l Ellingsen and
                  Constanza Riera and
                  Pantelimon Stanica and
                  Anton Tkachenko},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {An Extension of the Avalanche Criterion in the Context of c-Differentials},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {460--467},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010541304600467},
  doi          = {10.5220/0010541304600467},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/EllingsenRST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FirsovLLT21,
  author       = {Denis Firsov and
                  Henri Lakk and
                  Sven Laur and
                  Ahto Truu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{BLT+L:} Efficient Signatures from Timestamping and Endorsements},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {75--86},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010530000750086},
  doi          = {10.5220/0010530000750086},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FirsovLLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ForestiL21,
  author       = {Sara Foresti and
                  Giovanni Livraga},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Selective Owner-side Encryption in Digital Data Markets: Strategies
                  for Key Derivation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {620--627},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010603506200627},
  doi          = {10.5220/0010603506200627},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ForestiL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FournierTG21,
  author       = {Beno{\^{\i}}t Fournier and
                  Val{\'{e}}rie Viet Triem Tong and
                  Gilles Guette},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Accurate Measurement of the Energy Consumption of Security Functions},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {487--494},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010544604870494},
  doi          = {10.5220/0010544604870494},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FournierTG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FraijiATHS21,
  author       = {Yosra Fraiji and
                  Lamia Ben Azzouz and
                  Wassim Trojet and
                  Ghaleb Hoblos and
                  Le{\"{\i}}la Azouz Sa{\"{\i}}dane},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{RICAV:} RIsk based Context-Aware Security Solution for the Intra-Electric
                  Vehicle Network},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {772--778},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010581407720778},
  doi          = {10.5220/0010581407720778},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FraijiATHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FrempongSASS21,
  author       = {Yaw Frempong and
                  Yates Snyder and
                  Erfan Al{-}Hossami and
                  Meera Sridhar and
                  Samira Shaikh},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {HIJaX: Human Intent JavaScript {XSS} Generator},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {798--805},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010583807980805},
  doi          = {10.5220/0010583807980805},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FrempongSASS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GranadilloBD21,
  author       = {Gustavo {Gonzalez Granadillo} and
                  Alejandro G. Bedoya and
                  Rodrigo Diaz},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {An Improved Live Anomaly Detection System {(I-LADS)} based on Deep
                  Learning Algorithms},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {568--575},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010573705680575},
  doi          = {10.5220/0010573705680575},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GranadilloBD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GregorczykM21,
  author       = {Marcin Gregorczyk and
                  Wojciech Mazurczyk},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Inferring Flow Table State through Active Fingerprinting in {SDN}
                  Environments: {A} Practical Approach},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {576--586},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010573905760586},
  doi          = {10.5220/0010573905760586},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GregorczykM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Gross21,
  author       = {Thomas Gro{\ss}},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Hashing to Prime in Zero-Knowledge},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {62--74},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010525400620074},
  doi          = {10.5220/0010525400620074},
  timestamp    = {Fri, 06 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Gross21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GuigaSR21,
  author       = {Takoua Guiga and
                  Jean{-}Jacques Schwartzmann and
                  Christophe Rosenberger},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Privacy Aura for Transparent Authentication on Multiple Smart Devices},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {741--746},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010576407410746},
  doi          = {10.5220/0010576407410746},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GuigaSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HagbergHR21,
  author       = {Rasmus Hagberg and
                  Martin Hell and
                  Christoph Reichenbach},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Using Program Analysis to Identify the Use of Vulnerable Functions},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {523--530},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010548205230530},
  doi          = {10.5220/0010548205230530},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HagbergHR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HagemanKHP21,
  author       = {Kaspar Hageman and
                  Egon Kidmose and
                  Ren{\'{e}} Rydhof Hansen and
                  Jens Myrup Pedersen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Can a {TLS} Certificate Be Phishy?},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {38--49},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010516600380049},
  doi          = {10.5220/0010516600380049},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HagemanKHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HekkalaNLH21,
  author       = {Julius Hekkala and
                  Sara Nikula and
                  Outi{-}Marja Latvala and
                  Kimmo Halunen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Involving Humans in the Cryptographic Loop: Introduction and Threat
                  Analysis of {EEVEHAC}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {659--664},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010517806590664},
  doi          = {10.5220/0010517806590664},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HekkalaNLH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HerbautMV21,
  author       = {Fabien Herbaut and
                  Nicolas M{\'{e}}loni and
                  Pascal V{\'{e}}ron},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Compact Variable-base {ECC} Scalar Multiplication using Euclidean
                  Addition Chains},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {531--539},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010551705310539},
  doi          = {10.5220/0010551705310539},
  timestamp    = {Thu, 06 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HerbautMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HocineB21,
  author       = {Nadia Hocine and
                  Ismail Bokhari},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Dynamic Access Control Framework for Enterprise Content Management
                  Systems},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {647--652},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010514806470652},
  doi          = {10.5220/0010514806470652},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HocineB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoogerwerfTBE21,
  author       = {Erwin Hoogerwerf and
                  Daphne van Tetering and
                  Asl{\'{\i}} Bay and
                  Zekeriya Erkin},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Efficient Joint Random Number Generation for Secure Multi-party Computation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {436--443},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010534804360443},
  doi          = {10.5220/0010534804360443},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoogerwerfTBE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HorandnerP21,
  author       = {Felix H{\"{o}}randner and
                  Bernd Pr{\"{u}}nster},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Armored Twins: Flexible Privacy Protection for Digital Twins through
                  Conditional Proxy Re-Encryption and Multi-Party Computation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {149--160},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010543301490160},
  doi          = {10.5220/0010543301490160},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HorandnerP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IganiboAMBB21,
  author       = {Ibifubara Iganibo and
                  Massimiliano Albanese and
                  Marc Mosko and
                  Eric Bier and
                  Alejandro E. Brito},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Vulnerability Metrics for Graph-based Configuration Security},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {259--270},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010559402590270},
  doi          = {10.5220/0010559402590270},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IganiboAMBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IlterS21,
  author       = {Murat Burhan Ilter and
                  Ali Aydin Sel{\c{c}}uk},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A New {MILP} Model for Matrix Multiplications with Applications to
                  {KLEIN} and {PRINCE}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {420--427},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010519504200427},
  doi          = {10.5220/0010519504200427},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IlterS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IslamS21,
  author       = {Md. Morshedul Islam and
                  Reihaneh Safavi{-}Naini},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Model Inversion for Impersonation in Behavioral Authentication Systems},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {271--282},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010559802710282},
  doi          = {10.5220/0010559802710282},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IslamS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IwamuraK21,
  author       = {Keiichi Iwamura and
                  Ahmad Akmal Aminuddin Mohd Kamal},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Secure Computation by Secret Sharing using Input Encrypted with Random
                  Number},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {540--547},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010552305400547},
  doi          = {10.5220/0010552305400547},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IwamuraK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KawaS21,
  author       = {Piotr Kawa and
                  Piotr Syga},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Verify It Yourself: {A} Note on Activation Functions' Influence on
                  Fast DeepFake Detection},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {779--784},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010581707790784},
  doi          = {10.5220/0010581707790784},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KawaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KayemPML21,
  author       = {Anne V. D. M. Kayem and
                  Nikolai J. Podlesny and
                  Christoph Meinel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {704--714},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010552207040714},
  doi          = {10.5220/0010552207040714},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KayemPML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KellerM0Y21,
  author       = {Hannah Keller and
                  Helen M{\"{o}}llering and
                  Thomas Schneider and
                  Hossein Yalame},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Balancing Quality and Efficiency in Private Clustering with Affinity
                  Propagation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {173--184},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010547801730184},
  doi          = {10.5220/0010547801730184},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KellerM0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiktenkoKBF21,
  author       = {Evgeniy O. Kiktenko and
                  Mikhail A. Kudinov and
                  Andrey A. Bulychev and
                  Aleksey K. Fedorov},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Proof-of-Forgery for Hash-based Signatures},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {333--342},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010579603330342},
  doi          = {10.5220/0010579603330342},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiktenkoKBF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KoutsokostasP21,
  author       = {Vasilios Koutsokostas and
                  Constantinos Patsakis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Python and Malware: Developing Stealth and Evasive Malware without
                  Obfuscation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {125--136},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010541501250136},
  doi          = {10.5220/0010541501250136},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KoutsokostasP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KozlowskiK21,
  author       = {Mateusz Kozlowski and
                  Bogdan Ksiezopolski},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A New Method of Testing Machine Learning Models of Detection for Targeted
                  DDoS Attacks},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {728--733},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010574507280733},
  doi          = {10.5220/0010574507280733},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KozlowskiK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LeuneK21,
  author       = {Kees Leune and
                  Sung Kim},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Supporting Cyber Threat Analysis with Service-Oriented Enterprise
                  Modeling},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {385--394},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010502503850394},
  doi          = {10.5220/0010502503850394},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LeuneK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LilliBR21,
  author       = {Mario Lilli and
                  Chiara Braghin and
                  Elvinia Riccobene},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Formal Proof of a Vulnerability in Z-Wave IoT Protocol},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {198--209},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010553301980209},
  doi          = {10.5220/0010553301980209},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LilliBR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lopuhaa-Zwakenberg21,
  author       = {Milan Lopuha{\"{a}}{-}Zwakenberg and
                  Mina Alishahi and
                  Jeroen Kivits and
                  Jordi Klarenbeek and
                  Gert{-}Jan van der Velde and
                  Nicola Zannone},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Comparing Classifiers' Performance under Differential Privacy},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {50--61},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010519000500061},
  doi          = {10.5220/0010519000500061},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lopuhaa-Zwakenberg21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LouniciNEOT21,
  author       = {Sofiane Lounici and
                  Mohamed Njeh and
                  Orhan Ermis and
                  Melek {\"{O}}nen and
                  Slim Trabelsi},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Preventing Watermark Forging Attacks in a MLaaS Environment},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {295--306},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010560602950306},
  doi          = {10.5220/0010560602950306},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LouniciNEOT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MabuchiH21,
  author       = {Mitsuhiro Mabuchi and
                  Koji Hasebe},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{C2RBAC:} An Extended Capability-Role-Based Access Control with Context
                  Awareness for Dynamic Environments},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {819--826},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010601508190826},
  doi          = {10.5220/0010601508190826},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MabuchiH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MarchioroKM21,
  author       = {Thomas Marchioro and
                  Andrei Kazlouski and
                  Evangelos P. Markatos},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {User Identification from Time Series of Fitness Data},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {806--811},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010585008060811},
  doi          = {10.5220/0010585008060811},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MarchioroKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MarquesPHT21,
  author       = {Raul Casanova Marques and
                  Pavel Pascacio and
                  Jan Hajny and
                  Joaqu{\'{\i}}n Torres{-}Sospedra},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Anonymous Attribute-based Credentials in Collaborative Indoor Positioning
                  Systems},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {791--797},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010582507910797},
  doi          = {10.5220/0010582507910797},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MarquesPHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MaurelVR21,
  author       = {H{\'{e}}lo{\"{\i}}se Maurel and
                  Santiago A. Vidal and
                  Tamara Rezk},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Statically Identifying {XSS} using Deep Learning},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {99--110},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010537000990110},
  doi          = {10.5220/0010537000990110},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MaurelVR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MaurerGGS21,
  author       = {Nils M{\"{a}}urer and
                  Christoph Gentsch and
                  Thomas Gr{\"{a}}upl and
                  Corinna Schmitt},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Formal Security Verification of the Station-to-Station based Cell-attachment
                  Procedure of {LDACS}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {603--610},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010580906030610},
  doi          = {10.5220/0010580906030610},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MaurerGGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/McDonaldMBBA21,
  author       = {Jeffrey Todd McDonald and
                  Ramya Manikyam and
                  S{\'{e}}bastien Bardin and
                  Richard Bonichon and
                  Todd R. Andel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Program Protection through Software-based Hardware Abstraction},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {247--258},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010557502470258},
  doi          = {10.5220/0010557502470258},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/McDonaldMBBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MiculanV21,
  author       = {Marino Miculan and
                  Nicola Vitacolonna},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Automated Symbolic Verification of Telegram's MTProto 2.0},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {185--197},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010549601850197},
  doi          = {10.5220/0010549601850197},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MiculanV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MigdalMR21,
  author       = {Denis Migdal and
                  Ilaria Magotti and
                  Christophe Rosenberger},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Classifying Biometric Systems Users among the Doddington Zoo: Application
                  to Keystroke Dynamics},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {747--753},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010577507470753},
  doi          = {10.5220/0010577507470753},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MigdalMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MuhammadKAAK21,
  author       = {Mujahid Muhammad and
                  Paul Kearney and
                  Adel Aneiba and
                  Junaid Arshad and
                  Andreas Kunz},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{RMCCS:} RSSI-based Message Consistency Checking Scheme for {V2V}
                  Communications},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {722--727},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010561107220727},
  doi          = {10.5220/0010561107220727},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MuhammadKAAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Negre21,
  author       = {Christophe N{\`{e}}gre},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Side Channel Counter-measures based on Randomized {AMNS} Modular Multiplication},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {611--619},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010599706110619},
  doi          = {10.5220/0010599706110619},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Negre21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NorrmanSB21,
  author       = {Karl Norrman and
                  Vaishnavi Sundararajan and
                  Alessandro Bruni},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Formal Analysis of {EDHOC} Key Establishment for Constrained IoT Devices},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {210--221},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010554002100221},
  doi          = {10.5220/0010554002100221},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/NorrmanSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NugierLBMHP21,
  author       = {Cyrius Nugier and
                  Diane Leblanc{-}Albarel and
                  Agathe Blaise and
                  Simon Masson and
                  Paul Huynh and
                  Yris Brice Wandji Piugie},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {An Upcycling Tokenization Method for Credit Card Numbers},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {15--25},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010508600150025},
  doi          = {10.5220/0010508600150025},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NugierLBMHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OkadaKC21,
  author       = {Hiroki Okada and
                  Shinsaku Kiyomoto and
                  Carlos Cid},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Comparison of {GKE} Protocols based on {SIDH}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {507--514},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010547305070514},
  doi          = {10.5220/0010547305070514},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OkadaKC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PallabD21,
  author       = {Pritam Pallab and
                  Abhijit Das},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {AVX-512-based Parallelization of Block Sieving and Bucket Sieving
                  for the General Number Field Sieve Method},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {653--658},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010515206530658},
  doi          = {10.5220/0010515206530658},
  timestamp    = {Mon, 27 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PallabD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ParisotPS21,
  author       = {Mathias P. M. Parisot and
                  Bal{\'{a}}zs Pej{\'{o}} and
                  Dayana Spagnuelo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Property Inference Attacks on Convolutional Neural Networks: Influence
                  and Implications of Target Model's Complexity},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {715--721},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010555607150721},
  doi          = {10.5220/0010555607150721},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ParisotPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ParkerMD21,
  author       = {Colby Parker and
                  Jeffrey Todd McDonald and
                  Dimitrios Damopoulos},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Machine Learning Classification of Obfuscation using Image Visualization},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {854--859},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010607408540859},
  doi          = {10.5220/0010607408540859},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ParkerMD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PernprunerSR21,
  author       = {Marco Pernpruner and
                  Giada Sciarretta and
                  Silvio Ranise},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Framework for Security and Risk Analysis of Enrollment Procedures:
                  Application to Fully-remote Solutions based on eDocuments},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {222--233},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010554502220233},
  doi          = {10.5220/0010554502220233},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PernprunerSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PonsardRD21,
  author       = {Christophe Ponsard and
                  Val{\'{e}}ry Ramon and
                  Jean{-}Christophe Deprez},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Goal and Threat Modelling for Driving Automotive Cybersecurity Risk
                  Analysis Conforming to {ISO/SAE} 21434},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {833--838},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010603008330838},
  doi          = {10.5220/0010603008330838},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PonsardRD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RajdevM21,
  author       = {Sohail Rajdev and
                  Barsha Mitra},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Enforcing Cardinality Constraint in Temporal {RBAC}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {639--646},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010501506390646},
  doi          = {10.5220/0010501506390646},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RajdevM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RicciJCDMH21,
  author       = {Sara Ricci and
                  Petr Jedlicka and
                  Peter C{\'{\i}}bik and
                  Petr Dzurenda and
                  Lukas Malina and
                  Jan Hajny},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Towards CRYSTALS-Kyber {VHDL} Implementation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {760--765},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010580407600765},
  doi          = {10.5220/0010580407600765},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RicciJCDMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RoyDMMRS21,
  author       = {Sourav Roy and
                  Dipnarayan Das and
                  Anindan Mondal and
                  Mahabub Hasan Mahalat and
                  Suchismita Roy and
                  Bibhash Sen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{PUF} based Lightweight Authentication and Key Exchange Protocol for
                  IoT},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {698--703},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010550906980703},
  doi          = {10.5220/0010550906980703},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RoyDMMRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Sandhu21,
  author       = {Ravi S. Sandhu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Access Control Convergence: Challenges and Opportunities},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {9},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Sandhu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SbaiDD21,
  author       = {Anass Sbai and
                  Cyril Drocourt and
                  Gilles Dequen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A New Delegated Authentication Protocol based on {PRE}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {468--478},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010542404680478},
  doi          = {10.5220/0010542404680478},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SbaiDD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Schlegel021,
  author       = {Marius Schlegel and
                  Peter Amthor},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {The Missing Piece of the {ABAC} Puzzle: {A} Modeling Scheme for Dynamic
                  Analysis},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {234--246},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010556202340246},
  doi          = {10.5220/0010556202340246},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Schlegel021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Schlegel21,
  author       = {Marius Schlegel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Trusted Enforcement of Application-specific Security Policies},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {343--355},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010579703430355},
  doi          = {10.5220/0010579703430355},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Schlegel21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SeifermannHWR21,
  author       = {Stephan Seifermann and
                  Robert Heinrich and
                  Dominik Werle and
                  Ralf H. Reussner},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Unified Model to Detect Information Flow and Access Control Violations
                  in Software Architectures},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {26--37},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010515300260037},
  doi          = {10.5220/0010515300260037},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SeifermannHWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SenavirathneT21,
  author       = {Navoda Senavirathne and
                  Vicen{\c{c}} Torra},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving
                  Micro-data Publishing and Analysis},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {307--320},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010560703070320},
  doi          = {10.5220/0010560703070320},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SenavirathneT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SentanaIK21,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {BlockJack: Towards Improved Prevention of {IP} Prefix Hijacking Attacks
                  in Inter-domain Routing via Blockchain},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {674--679},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010521106740679},
  doi          = {10.5220/0010521106740679},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SentanaIK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SentanaIKB21,
  author       = {I Wayan Budi Sentana and
                  Muhammad Ikram and
                  Mohamed Ali K{\^{a}}afar and
                  Shlomo Berkovsky},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Empirical Security and Privacy Analysis of Mobile Symptom Checking
                  Apps on Google Play},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {665--673},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010520106650673},
  doi          = {10.5220/0010520106650673},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SentanaIKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SeyitogluYH21,
  author       = {Efe Ulas Akay Seyitoglu and
                  Attila Altay Yavuz and
                  Thang Hoang},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain
                  Proof-of-Work},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {412--419},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010519204120419},
  doi          = {10.5220/0010519204120419},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SeyitogluYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SheikhLAK21,
  author       = {Nazim Uddin Sheikh and
                  Zhigang Lu and
                  Hassan Asghar and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {283--294},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010560302830294},
  doi          = {10.5220/0010560302830294},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SheikhLAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SubbaS21,
  author       = {Basant Subba and
                  Ayushi Singh},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Novel Security Framework for Minimization of False Information Dissemination
                  in VANETs: Bayesian Game Formulation},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {452--459},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010540904520459},
  doi          = {10.5220/0010540904520459},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SubbaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Subrahmanian21,
  author       = {V. S. Subrahmanian},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{VEST:} An Early Warning System for Future Cyber-Attacks},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {7},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Subrahmanian21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SukmanaKGSM21,
  author       = {Muhammad I. H. Sukmana and
                  Kai{-}Oliver Kohlen and
                  Carl G{\"{o}}decken and
                  Pascal Schulze and
                  Christoph Meinel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Are You There, Moriarty? Feasibility Study of Internet-based Location
                  for Location-based Access Control Systems},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {111--124},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010541101110124},
  doi          = {10.5220/0010541101110124},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SukmanaKGSM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TartanWPZ21,
  author       = {Chloe Tartan and
                  Craig Wright and
                  Michaella Pettit and
                  Wei Zhang},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {A Scalable Bitcoin-based Public Key Certificate Management System},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {548--559},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010556805480559},
  doi          = {10.5220/0010556805480559},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TartanWPZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Teseleanu21,
  author       = {George Teseleanu},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Signer and Message Ambiguity from a Variety of Keys},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {395--402},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010502903950402},
  doi          = {10.5220/0010502903950402},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Teseleanu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ThaeterR21,
  author       = {Florian Thaeter and
                  R{\"{u}}diger Reischuk},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between
                  Computational Complexity and Information Loss},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {87--98},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010536600870098},
  doi          = {10.5220/0010536600870098},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ThaeterR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TipleaH21,
  author       = {Ferucio Laurentiu Tiplea and
                  Cristian Hristea},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Practically Efficient {RFID} Scheme with Constant-time Identification},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {495--506},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010544804950506},
  doi          = {10.5220/0010544804950506},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TipleaH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TrivediP21,
  author       = {Hiral S. Trivedi and
                  Sankita J. Patel},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Privacy Preserving Scalable Authentication Protocol with Partially
                  Trusted Third Party for Distributed Internet-of-Things},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {812--818},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010599508120818},
  doi          = {10.5220/0010599508120818},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TrivediP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TsantekidisP21,
  author       = {Marinos Tsantekidis and
                  Vassilis Prevelakis},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {MMU-based Access Control for Libraries},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {686--691},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010536706860691},
  doi          = {10.5220/0010536706860691},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/TsantekidisP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TunstallPP21,
  author       = {Michael Tunstall and
                  Louiza Papachristodoulou and
                  Kostas Papagiannopoulos},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Boolean Exponent Splitting},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {321--332},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010570903210332},
  doi          = {10.5220/0010570903210332},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TunstallPP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UemuraO21,
  author       = {Kaito Uemura and
                  Satoshi Obana},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Exposure Resilient Public-key Encryption with Keyword Search against
                  Keyword Guessing Attack},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {692--697},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010548006920697},
  doi          = {10.5220/0010548006920697},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/UemuraO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UriawanHBB21,
  author       = {Wisnu Uriawan and
                  Omar Hasan and
                  Youakim Badr and
                  Lionel Brunie},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Collateral-Free Trustworthiness-based Personal Lending on a Decentralized
                  Application (DApp)},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {839--844},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010605108390844},
  doi          = {10.5220/0010605108390844},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/UriawanHBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Vaidya21,
  author       = {Jaideep Vaidya},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Privacy-Preserving Analytics in the Big Data Environment},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {5},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Vaidya21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VillaranB21,
  author       = {Carlos Villar{\'{a}}n and
                  Marta Beltr{\'{a}}n},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Protecting End User's Privacy When using Social Login through {GDPR}
                  Compliance},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {428--435},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010521304280435},
  doi          = {10.5220/0010521304280435},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VillaranB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VyasS21,
  author       = {Parjanya Vyas and
                  R. K. Shyamasundar},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {SecSDN: {A} Novel Architecture for a Secure {SDN}},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {587--594},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010575505870594},
  doi          = {10.5220/0010575505870594},
  timestamp    = {Wed, 28 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VyasS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WodoSB21,
  author       = {Wojciech Wodo and
                  Damian Stygar and
                  Przemyslaw Blaskiewicz},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Security Issues of Electronic and Mobile Banking},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {631--638},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010466606310638},
  doi          = {10.5220/0010466606310638},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WodoSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2021,
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0000149500002998},
  doi          = {10.5220/0000149500002998},
  isbn         = {978-989-758-524-1},
  timestamp    = {Tue, 06 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/0001HAW17,
  author       = {Manuel Huber and
                  Julian Horsch and
                  Junaid Ali and
                  Sascha Wessel},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Freeze {\&} Crypt: Linux Kernel Support for Main Memory Encryption},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {17--30},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006378400170030},
  doi          = {10.5220/0006378400170030},
  timestamp    = {Fri, 15 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/0001HAW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlibertiPG17,
  author       = {Giulio Aliberti and
                  Roberto Di Pietro and
                  Stefano Guarino},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {{SLAP:} Secure Lightweight Authentication Protocol for Resource-constrained
                  Devices},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {163--174},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006431101630174},
  doi          = {10.5220/0006431101630174},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlibertiPG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AmaranteB17,
  author       = {Jo{\~{a}}o Amarante and
                  Jo{\~{a}}o Paulo Barros},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Exploring {USB} Connection Vulnerabilities on Android Devices - Breaches
                  using the Android Debug Bridge},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {572--577},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006475905720577},
  doi          = {10.5220/0006475905720577},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AmaranteB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Amthor17,
  author       = {Peter Amthor},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Efficient Heuristic Safety Analysis of Core-based Security Policies},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {384--392},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006477103840392},
  doi          = {10.5220/0006477103840392},
  timestamp    = {Wed, 18 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Amthor17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AonzoLM17,
  author       = {Simone Aonzo and
                  Giovanni Lagorio and
                  Alessio Merlo},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {RmPerm: {A} Tool for Android Permissions Removal},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {319--326},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006420203190326},
  doi          = {10.5220/0006420203190326},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AonzoLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AtzeniMMS17,
  author       = {Andrea S. Atzeni and
                  Andrea Marcelli and
                  Francesco Muroni and
                  Giovanni Squillero},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {{HAIT:} Heap Analyzer with Input Tracing},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {327--334},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006420803270334},
  doi          = {10.5220/0006420803270334},
  timestamp    = {Mon, 30 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AtzeniMMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AxonG17,
  author       = {Louise Axon and
                  Michael Goldsmith},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {{PB-PKI:} {A} Privacy-aware Blockchain-based {PKI}},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {311--318},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006419203110318},
  doi          = {10.5220/0006419203110318},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AxonG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BakiriCG17,
  author       = {Mohammed Bakiri and
                  Jean{-}Fran{\c{c}}ois Couchot and
                  Christophe Guyeux},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {One Random Jump and One Permutation: Sufficient Conditions to Chaotic,
                  Statistically Faultless, and Large Throughput {PRNG} for {FPGA}},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {295--302},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006418502950302},
  doi          = {10.5220/0006418502950302},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BakiriCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BarradasBD0R17,
  author       = {Diogo Barradas and
                  Tiago Brito and
                  David Duarte and
                  Nuno Santos and
                  Lu{\'{\i}}s E. T. Rodrigues},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Forensic Analysis of Communication Records of Web-based Messaging
                  Applications from Physical Memory},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {43--54},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006396100430054},
  doi          = {10.5220/0006396100430054},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BarradasBD0R17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BecerraIOS17,
  author       = {Jos{\'{e}} Becerra and
                  Vincenzo Iovino and
                  Dimiter Ostrev and
                  Marjan Skrobot},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {On the Relation Between {SIM} and IND-RoR Security Models for PAKEs},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {151--162},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006430301510162},
  doi          = {10.5220/0006430301510162},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BecerraIOS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelguithKLJA17,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Maryline Laurent and
                  Abderrazak Jemai and
                  Rabah Attia},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Constant-size Threshold Attribute based SignCryption for Cloud Applications},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {212--225},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006469202120225},
  doi          = {10.5220/0006469202120225},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelguithKLJA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BernackiKS17,
  author       = {Jaroslaw Bernacki and
                  Marek Klonowski and
                  Piotr Syga},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Some Remarks about Tracing Digital Cameras - Faster Method and Usable
                  Countermeasure},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {343--350},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006434803430350},
  doi          = {10.5220/0006434803430350},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BernackiKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Berrima0GR17,
  author       = {Mouhebeddine Berrima and
                  Pascal Lafourcade and
                  Matthieu Giraud and
                  Narjes Ben Rajeb},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Formal Analyze of a Private Access Control Protocol to a Cloud Storage},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {495--500},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006461604950500},
  doi          = {10.5220/0006461604950500},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Berrima0GR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BouazzouniCPB17,
  author       = {Mohamed Amine Bouazzouni and
                  Emmanuel Conchon and
                  Fabrice Peyrard and
                  Pierre{-}Fran{\c{c}}ois Bonnefoi},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {A Card-less TEE-based Solution for Trusted Access Control},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {456--461},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006431704560461},
  doi          = {10.5220/0006431704560461},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BouazzouniCPB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BozaM17,
  author       = {Miguel Hern{\'{a}}ndez Boza and
                  Alfonso Mu{\~{n}}oz},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {(In) Security in Graph Databases - Analysis and Data Leaks},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {303--310},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006419003030310},
  doi          = {10.5220/0006419003030310},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BozaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BreuerBP017,
  author       = {Peter T. Breuer and
                  Jonathan P. Bowen and
                  Esther Palomar and
                  Zhiming Liu},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {On Obfuscating Compilation for Encrypted Computing},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {247--254},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006394002470254},
  doi          = {10.5220/0006394002470254},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BreuerBP017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CampoCSDC17,
  author       = {David Ortega del Campo and
                  Cristina Conde and
                  {\'{A}}ngel Serrano and
                  Isaac Mart{\'{\i}}n de Diego and
                  Enrique Cabello},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Face Recognition-based Presentation Attack Detection in a Two-step
                  Segregated Automated Border Control e-Gate - Results of a Pilot Experience
                  at Adolfo Su{\'{a}}rez Madrid-Barajas Airport},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {129--138},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006426901290138},
  doi          = {10.5220/0006426901290138},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CampoCSDC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CanforaCCMMRV17,
  author       = {Gerardo Canfora and
                  Giovanni Cappabianca and
                  Pasquale Carangelo and
                  Fabio Martinelli and
                  Francesco Mercaldo and
                  Ernesto Rosario Russo and
                  Corrado Aaron Visaggio},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Mobile Silent and Continuous Authentication using Apps Sequence},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {79--91},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006424200790091},
  doi          = {10.5220/0006424200790091},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CanforaCCMMRV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CanforaPV17,
  author       = {Gerardo Canfora and
                  Antonio Pirozzi and
                  Aaron Visaggio},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {s2ipt: {A} Lightweight Network Intrusion Detection/Prevention System
                  based on IPtables},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {462--467},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006431904620467},
  doi          = {10.5220/0006431904620467},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CanforaPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DiazAR17,
  author       = {Jesus Diaz and
                  David Arroyo and
                  Francisco B. Rodr{\'{\i}}guez},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Fair and Accountable Anonymity for the Tor Network},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {560--565},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006474805600565},
  doi          = {10.5220/0006474805600565},
  timestamp    = {Sun, 27 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DiazAR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DreierPP0R17,
  author       = {Jannik Dreier and
                  Maxime Puys and
                  Marie{-}Laure Potet and
                  Pascal Lafourcade and
                  Jean{-}Louis Roch},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Formally Verifying Flow Properties in Industrial Systems},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {55--66},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006396500550066},
  doi          = {10.5220/0006396500550066},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/DreierPP0R17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Dumas0MOT17,
  author       = {Jean{-}Guillaume Dumas and
                  Pascal Lafourcade and
                  Francis Melemedjian and
                  Jean{-}Baptiste Orfila and
                  Pascal Thoniel},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {{LOCALPKI:} {A} User-Centric Formally Proven Alternative to {PKIX}},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {187--199},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006461101870199},
  doi          = {10.5220/0006461101870199},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Dumas0MOT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DwivediKMNPW17,
  author       = {Ashutosh Dhar Dwivedi and
                  Milos Kloucek and
                  Pawel Morawiecki and
                  Ivica Nikolic and
                  Josef Pieprzyk and
                  Sebastian W{\'{o}}jtowicz},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {SAT-based Cryptanalysis of Authenticated Ciphers from the {CAESAR}
                  Competition},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {237--246},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006387302370246},
  doi          = {10.5220/0006387302370246},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/DwivediKMNPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DwivediMW17,
  author       = {Ashutosh Dhar Dwivedi and
                  Pawel Morawiecki and
                  Sebastian W{\'{o}}jtowicz},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Differential and Rotational Cryptanalysis of Round-reduced {MORUS}},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {275--284},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006411502750284},
  doi          = {10.5220/0006411502750284},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DwivediMW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DwivediMW17a,
  author       = {Ashutosh Dhar Dwivedi and
                  Pawel Morawiecki and
                  Sebastian W{\'{o}}jtowicz},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Differential-linear and Impossible Differential Cryptanalysis of Round-reduced
                  Scream},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {501--506},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006461905010506},
  doi          = {10.5220/0006461905010506},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DwivediMW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DzurendaHMR17,
  author       = {Petr Dzurenda and
                  Jan Hajny and
                  Lukas Malina and
                  Sara Ricci},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Anonymous Credentials with Practical Revocation using Elliptic Curves},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {534--539},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006467705340539},
  doi          = {10.5220/0006467705340539},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DzurendaHMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FanM17,
  author       = {Guyu Fan and
                  Manoranjan Mohanty},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Privacy-preserving Disease Susceptibility Test with Shamir's Secret
                  Sharing},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {525--533},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006467105250533},
  doi          = {10.5220/0006467105250533},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FanM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FeronLL17,
  author       = {Cyrielle Feron and
                  Vianney Lapotre and
                  Lo{\"{\i}}c Lagadec},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {PAnTHErS: {A} Prototyping and Analysis Tool for Homomorphic Encryption
                  Schemes},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {359--366},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006464703590366},
  doi          = {10.5220/0006464703590366},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FeronLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GarciaMGRVJ17,
  author       = {Alberto Garc{\'{\i}}a and
                  Alberto Garcia Moro and
                  Jos{\'{e}} Javier Garc{\'{\i}}a and
                  Jorge Roncero and
                  V{\'{\i}}ctor A. Villagr{\'{a}} and
                  Helena Jalain},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Context-based Encryption Applied to Data Leakage Prevention Solutions},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {566--571},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006475205660571},
  doi          = {10.5220/0006475205660571},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GarciaMGRVJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GiraudAB017,
  author       = {Matthieu Giraud and
                  Alexandre Anzala{-}Yamajako and
                  Olivier Bernard and
                  Pascal Lafourcade},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Practical Passive Leakage-abuse Attacks Against Symmetric Searchable
                  Encryption},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {200--211},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006461202000211},
  doi          = {10.5220/0006461202000211},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GiraudAB017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GiustolisiIL17,
  author       = {Rosario Giustolisi and
                  Vincenzo Iovino and
                  Gabriele Lenzini},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Privacy-Preserving Verifiability - {A} Case for an Electronic Exam
                  Protocol},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {139--150},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006429101390150},
  doi          = {10.5220/0006429101390150},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GiustolisiIL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HadjABKE17,
  author       = {Maryem Ait El Hadj and
                  Meryeme Ayache and
                  Yahya Benkaouz and
                  Ahmed Khoumsi and
                  Mohammed Erradi},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Clustering-based Approach for Anomaly Detection in {XACML} Policies},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {548--553},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006471205480553},
  doi          = {10.5220/0006471205480553},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HadjABKE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HamdiGBY17,
  author       = {Sana Hamdi and
                  Alda Lopes Gan{\c{c}}arski and
                  Amel Bouzeghoub and
                  Sadok Ben Yahia},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Reputation Management in Online Social Networks - {A} New Clustering-based
                  Approach},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {468--473},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006433104680473},
  doi          = {10.5220/0006433104680473},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HamdiGBY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HarbJ17,
  author       = {Salah S. Harb and
                  Moath H. A. Jarrah},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Accelerating Square Root Computations Over Large {GF} (2m)},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {229--236},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006386702290236},
  doi          = {10.5220/0006386702290236},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HarbJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HarvanLMP17,
  author       = {Mat{\'{u}}s Harvan and
                  Thomas Locher and
                  Marta Mularczyk and
                  Yvonne{-}Anne Pignolet},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Privacy-preserving Regression on Partially Encrypted Data},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {255--266},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006400102550266},
  doi          = {10.5220/0006400102550266},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HarvanLMP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoweO17,
  author       = {James Howe and
                  M{\'{a}}ire O'Neill},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {{GLITCH:} {A} Discrete Gaussian Testing Suite for Lattice-based Cryptography},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {413--419},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006412604130419},
  doi          = {10.5220/0006412604130419},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoweO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ImYJ17,
  author       = {Jonghwan Im and
                  Jongwon Yoon and
                  Minsik Jin},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Interaction Platform for Improving Detection Capability of Dynamic
                  Application Security Testing},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {474--479},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006437104740479},
  doi          = {10.5220/0006437104740479},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ImYJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JaschkeGAS17,
  author       = {Angela J{\"{a}}schke and
                  Bj{\"{o}}rn Grohmann and
                  Frederik Armknecht and
                  Andreas Schaad},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Short Paper: Industrial Feasibility of Private Information Retrieval},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {395--400},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006382003950400},
  doi          = {10.5220/0006382003950400},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JaschkeGAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JauvartFG17,
  author       = {Damien Jauvart and
                  Jacques J. A. Fournier and
                  Louis Goubin},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {First Practical Side-channel Attack to Defeat Point Randomization
                  in Secure Implementations of Pairing-based Cryptography},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {104--115},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006425501040115},
  doi          = {10.5220/0006425501040115},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JauvartFG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JolfaeiK17,
  author       = {Alireza Jolfaei and
                  Krishna Kant},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {A Lightweight Integrity Protection Scheme for Fast Communications
                  in Smart Grid},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {31--42},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006394200310042},
  doi          = {10.5220/0006394200310042},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/JolfaeiK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KaanicheL17,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Attribute based Encryption for Multi-level Access Control Policies},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {67--78},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006421000670078},
  doi          = {10.5220/0006421000670078},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KaanicheL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KushwahaM17,
  author       = {Prabhat Kushwaha and
                  Ayan Mahalanobis},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {A Probabilistic Baby-step Giant-step Algorithm},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {401--406},
  publisher    = {SciTePress},
  year         = {2017},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KushwahaM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LaskarB17,
  author       = {Bekkar Laskar and
                  Merouane Bouzid},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Vector Quantization based Steganography for Secure Speech Communication
                  System},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {407--412},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006398304070412},
  doi          = {10.5220/0006398304070412},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LaskarB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MekkiHAK17,
  author       = {Neila Mekki and
                  Mohamed Hamdi and
                  Taoufik Aguili and
                  Tai{-}Hoon Kim},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring
                  System},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {554--559},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006473005540559},
  doi          = {10.5220/0006473005540559},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MekkiHAK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MenezesW17,
  author       = {Luis Menezes and
                  Roland Wism{\"{u}}ller},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {FlowSlicer - {A} Hybrid Approach to Detect and Avoid Sensitive Information
                  Leaks in Android Applications using Program Slicing and Instrumentation},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {450--455},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006428604500455},
  doi          = {10.5220/0006428604500455},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MenezesW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MjolsnesO17,
  author       = {Stig Fr. Mj{\o}lsnes and
                  Ruxandra F. Olimid},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Experimental Assessment of Private Information Disclosure in {LTE}
                  Mobile Networks},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {507--512},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006462305070512},
  doi          = {10.5220/0006462305070512},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MjolsnesO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MosharrafJR17,
  author       = {Negar Mosharraf and
                  Anura P. Jayasumana and
                  Indrakshi Ray},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Using a History-based Profile to Detect and Respond to DDoS Attacks},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {175--186},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006435801750186},
  doi          = {10.5220/0006435801750186},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MosharrafJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PareekP17,
  author       = {Gaurav Pareek and
                  B. R. Purushothama},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {On Efficient Access Control Mechanisms in Hierarchy using Unidirectional
                  and Transitive Proxy Re-encryption Schemes},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {519--524},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006466405190524},
  doi          = {10.5220/0006466405190524},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PareekP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PatilS17,
  author       = {Vishwas T. Patil and
                  R. K. Shyamasundar},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Privacy as a Currency: Un-regulated?},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {586--595},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006478705860595},
  doi          = {10.5220/0006478705860595},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PatilS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PrestridgeD17,
  author       = {Shawn A. Prestridge and
                  James G. Dunham},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Improving Throughput in {BB84} Quantum Key Distribution},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {437--443},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006422104370443},
  doi          = {10.5220/0006422104370443},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PrestridgeD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PrunsterRR17,
  author       = {Bernd Pr{\"{u}}nster and
                  Florian Reimair and
                  Andreas Reiter},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {The Net Rat - Rethinking Connected Services for Increased Security},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {375--383},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006469103750383},
  doi          = {10.5220/0006469103750383},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PrunsterRR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RegateiroPA17,
  author       = {Diogo Domingues Regateiro and
                  {\'{O}}scar Mort{\'{a}}gua Pereira and
                  Rui L. Aguiar},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {On the Application of Fuzzy Set Theory for Access Control Enforcement},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {540--547},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006469305400547},
  doi          = {10.5220/0006469305400547},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RegateiroPA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ReimairFZKZ17,
  author       = {Florian Reimair and
                  Johannes Feichtner and
                  Dominik Ziegler and
                  Sandra Kreuzhuber and
                  Thomas Zefferer},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Cryptographic Service Providers in Current Device Landscapes: An Inconvenient
                  Truth},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {367--374},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006466603670374},
  doi          = {10.5220/0006466603670374},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ReimairFZKZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RubioARL17,
  author       = {Juan Enrique Rubio and
                  Cristina Alcaraz and
                  Rodrigo Roman and
                  Javier L{\'{o}}pez},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Analysis of Intrusion Detection Systems in Industrial Ecosystems},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {116--128},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006426301160128},
  doi          = {10.5220/0006426301160128},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RubioARL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SadhyaCS17,
  author       = {Debanjan Sadhya and
                  Bodhi Chakraborty and
                  Sanjay Kumar Singh},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Capturing the Effects of Attribute based Correlation on Privacy in
                  Micro-databases},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {430--436},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006417504300436},
  doi          = {10.5220/0006417504300436},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SadhyaCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SaiaC17,
  author       = {Roberto Saia and
                  Salvatore Carta},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Evaluating Credit Card Transactions in the Frequency Domain for a
                  Proactive Fraud Detection Approach},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {335--342},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006425803350342},
  doi          = {10.5220/0006425803350342},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SaiaC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SinghS17,
  author       = {Bhupendra Singh and
                  Upasna Singh},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Program Execution Analysis using UserAssist Key in Modern Windows},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {420--429},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006416704200429},
  doi          = {10.5220/0006416704200429},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SinghS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SinigagliaCC17,
  author       = {Federico Sinigaglia and
                  Roberto Carbone and
                  Gabriele Costa},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Strong Authentication for e-Banking: {A} Survey on European Regulations
                  and Implementations},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {480--485},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006438504800485},
  doi          = {10.5220/0006438504800485},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SinigagliaCC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SondeckLF17,
  author       = {Louis Philippe Sondeck and
                  Maryline Laurent and
                  Vincent Frey},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {The Semantic Discrimination Rate Metric for Privacy Measurements which
                  Questions the Benefit of t-closeness over l-diversity},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {285--294},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006418002850294},
  doi          = {10.5220/0006418002850294},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SondeckLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SouissiAB17,
  author       = {Ilhem Souissi and
                  Nadia Ben Azzouna and
                  Tahar Berradia},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Towards a Self-adaptive Trust Management Model for VANETs},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {513--518},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006463305130518},
  doi          = {10.5220/0006463305130518},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SouissiAB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SysKS17,
  author       = {Marek S{\'{y}}s and
                  Dusan Klinec and
                  Petr Svenda},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {The Efficient Randomness Testing using Boolean Functions},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {92--103},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006425100920103},
  doi          = {10.5220/0006425100920103},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SysKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TillemEL17,
  author       = {Gamze Tillem and
                  Zekeriya Erkin and
                  Reginald L. Lagendijk},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Mining Encrypted Software Logs using Alpha Algorithm},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {267--274},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006408602670274},
  doi          = {10.5220/0006408602670274},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TillemEL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TongTLL17,
  author       = {Val{\'{e}}rie Viet Triem Tong and
                  Aur{\'{e}}lien Trulla and
                  Mourad Leslous and
                  Jean{-}Fran{\c{c}}ois Lalande},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Information Flows at {OS} Level Unmask Sophisticated Android Malware},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {578--585},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006476705780585},
  doi          = {10.5220/0006476705780585},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TongTLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WatsonLG17,
  author       = {Venesa Watson and
                  Xinxin Lou and
                  Yuan Gao},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {A Review of {PROFIBUS} Protocol Vulnerabilities - Considerations for
                  Implementing Authentication and Authorization Controls},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {444--449},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006426504440449},
  doi          = {10.5220/0006426504440449},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WatsonLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yee17,
  author       = {George O. M. Yee},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Adding Privacy Protection to Distributed Software Systems},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {351--358},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006434903510358},
  doi          = {10.5220/0006434903510358},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Yee17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZhangLG17,
  author       = {Xichen Zhang and
                  Arash Habibi Lashkari and
                  Ali A. Ghorbani},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {A Lightweight Online Advertising Classification System using Lexical-based
                  Features},
  booktitle    = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  pages        = {486--494},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006459804860494},
  doi          = {10.5220/0006459804860494},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZhangLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2017,
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat and
                  Enrique Cabello},
  title        = {Proceedings of the 14th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
                  Spain, July 24-26, 2017},
  publisher    = {SciTePress},
  year         = {2017},
  isbn         = {978-989-758-259-2},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AchenbachLMR16,
  author       = {Dirk Achenbach and
                  Bernhard L{\"{o}}we and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Jochen Rill},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {85--96},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005964300850096},
  doi          = {10.5220/0005964300850096},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AchenbachLMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AhmadvandSOP16,
  author       = {Mohsen Ahmadvand and
                  Antoine Scemama and
                  Mart{\'{\i}}n Ochoa and
                  Alexander Pretschner},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Enhancing Operation Security using Secret Sharing},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {446--451},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005992104460451},
  doi          = {10.5220/0005992104460451},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AhmadvandSOP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlcarazLC16,
  author       = {Cristina Alcaraz and
                  Javier L{\'{o}}pez and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control
                  Systems},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {19--27},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005942000190027},
  doi          = {10.5220/0005942000190027},
  timestamp    = {Mon, 07 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlcarazLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AssidiAS16,
  author       = {Hafsa Assidi and
                  Edoukou Berenger Ayebie and
                  El Mamoun Souidi},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {A Code-based Group Signature Scheme with Shorter Public Key Length},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {432--439},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005969204320439},
  doi          = {10.5220/0005969204320439},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AssidiAS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AwadL16,
  author       = {Abir Awad and
                  Brian Lee},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {A Metaphone based Chaotic Searchable Encryption Algorithm for Border
                  Management},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {397--402},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005953503970402},
  doi          = {10.5220/0005953503970402},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AwadL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BalushiMS16,
  author       = {Abdullah Al Balushi and
                  Kieran McLaughlin and
                  Sakir Sezer},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {{OSCIDS:} An Ontology based {SCADA} Intrusion Detection Framework},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {327--335},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005969803270335},
  doi          = {10.5220/0005969803270335},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BalushiMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BarakatBNG16,
  author       = {Sara Barakat and
                  Bechara al Bouna and
                  Mohamed Nassar and
                  Christophe Guyeux},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {On the Evaluation of the Privacy Breach in Disassociated Set-valued
                  Datasets},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {318--326},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005969403180326},
  doi          = {10.5220/0005969403180326},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BarakatBNG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelguithKJLA16,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Abderrazak Jemai and
                  Maryline Laurent and
                  Rabah Attia},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {PAbAC: {A} Privacy Preserving Attribute based Framework for Fine Grained
                  Access Control in Clouds},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {133--146},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005968201330146},
  doi          = {10.5220/0005968201330146},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelguithKJLA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelyaevR16,
  author       = {Kirill Belyaev and
                  Indrakshi Ray},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Towards Access Control for Isolated Applications},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {171--182},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005970001710182},
  doi          = {10.5220/0005970001710182},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelyaevR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BernardoD16,
  author       = {Vitor Bernardo and
                  Dulce Domingos},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Web-based Fingerprinting Techniques},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {271--282},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005965602710282},
  doi          = {10.5220/0005965602710282},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BernardoD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BhattacharjeeC16,
  author       = {Debjyoti Bhattacharjee and
                  Anupam Chattopadhyay},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Hardware Accelerator for Stream Cipher Spritz},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {215--222},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005951302150222},
  doi          = {10.5220/0005951302150222},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BhattacharjeeC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BlazyB016,
  author       = {Olivier Blazy and
                  Xavier Bultel and
                  Pascal Lafourcade},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Two Secure Anonymous Proxy-based Data Storages},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {251--258},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005962402510258},
  doi          = {10.5220/0005962402510258},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BlazyB016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BouderBCLL16,
  author       = {H{\'{e}}l{\`{e}}ne Le Bouder and
                  Thierno Barry and
                  Damien Courouss{\'{e}} and
                  Jean{-}Louis Lanet and
                  Ronan Lashermes},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {A Template Attack Against {VERIFY} {PIN} Algorithms},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {231--238},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005955102310238},
  doi          = {10.5220/0005955102310238},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BouderBCLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BreuerBP016,
  author       = {Peter T. Breuer and
                  Jonathan P. Bowen and
                  Esther Palomar and
                  Zhiming Liu},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {A Practical Encrypted Microprocessor},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {239--250},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005955902390250},
  doi          = {10.5220/0005955902390250},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BreuerBP016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BuccafurriSS16,
  author       = {Francesco Buccafurri and
                  Rajeev Anand Sahu and
                  Vishal Saraswat},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Efficient Proxy Signature Scheme from Pairings},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {471--476},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005999804710476},
  doi          = {10.5220/0005999804710476},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BuccafurriSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CanforaMPV16,
  author       = {Gerardo Canfora and
                  Francesco Mercaldo and
                  Antonio Pirozzi and
                  Corrado Aaron Visaggio},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {How {I} Met Your Mother? - An Empirical Study about Android Malware
                  Phylogenesis},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {310--317},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005968103100317},
  doi          = {10.5220/0005968103100317},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/CanforaMPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CanforaNMV16,
  author       = {Gerardo Canfora and
                  Paolo Di Notte and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Silent and Continuous Authentication in Mobile Environment},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {97--108},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005965500970108},
  doi          = {10.5220/0005965500970108},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CanforaNMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChatterjeePS16,
  author       = {Sumanta Chatterjee and
                  Alwyn R. Pais and
                  Sumit Saurabh},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Distributed Data Aggregation in Wireless Sensor Network - with Peer
                  Verification},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {440--445},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005991604400445},
  doi          = {10.5220/0005991604400445},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChatterjeePS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CouchotCFG16,
  author       = {Jean{-}Fran{\c{c}}ois Couchot and
                  Rapha{\"{e}}l Couturier and
                  Yousra Ahmed Fadil and
                  Christophe Guyeux},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {A Second Order Derivatives based Approach for Steganography},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {424--431},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005966804240431},
  doi          = {10.5220/0005966804240431},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CouchotCFG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CourtoisSSP16,
  author       = {Nicolas T. Courtois and
                  Pouyan Sepehrdad and
                  Guangyan Song and
                  Iason Papapanagiotakis{-}Bousy},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher
                  Simon},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {465--470},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005999504650470},
  doi          = {10.5220/0005999504650470},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CourtoisSSP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CucurullGG16,
  author       = {Jordi Cucurull and
                  Sandra Guasch and
                  David Galindo},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Transitioning to a Javascript Voting Client for Remote Online Voting},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {121--132},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005967301210132},
  doi          = {10.5220/0005967301210132},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CucurullGG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Dumas0OP16,
  author       = {Jean{-}Guillaume Dumas and
                  Pascal Lafourcade and
                  Jean{-}Baptiste Orfila and
                  Maxime Puys},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Private Multi-party Matrix Multiplication and Trust Computations},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {61--72},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005957200610072},
  doi          = {10.5220/0005957200610072},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Dumas0OP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FrieslaarI16,
  author       = {Ibraheem Frieslaar and
                  Barry Irwin},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Towards a Software Approach to Mitigate Correlation Power Analysis},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {403--410},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005955604030410},
  doi          = {10.5220/0005955604030410},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FrieslaarI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaHK16,
  author       = {Kazuhide Fukushima and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Sensor-based Wearable {PUF}},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {207--214},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005946702070214},
  doi          = {10.5220/0005946702070214},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GeltinkV16,
  author       = {Gerben Geltink and
                  Sergei Volokitin},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {{FPGA} Implementation of {HS1-SIV}},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {41--48},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005950100410048},
  doi          = {10.5220/0005950100410048},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GeltinkV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GiustolisiG16,
  author       = {Rosario Giustolisi and
                  Christian Gehrmann},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Threats to 5G Group-based Authentication},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {360--367},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005996203600367},
  doi          = {10.5220/0005996203600367},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GiustolisiG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GrozaMA16,
  author       = {Bogdan Groza and
                  Pal{-}Stefan Murvay and
                  Tudor Andreica},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Evaluating {SRAM} as Source for Fingerprints and Randomness on Automotive
                  Grade Controllers},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {109--120},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005966401090120},
  doi          = {10.5220/0005966401090120},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/GrozaMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HajnyDM16,
  author       = {Jan Hajny and
                  Petr Dzurenda and
                  Lukas Malina},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Multi-Device Authentication using Wearables and IoT},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {483--488},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0006000004830488},
  doi          = {10.5220/0006000004830488},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HajnyDM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HockKG16,
  author       = {Denis Hock and
                  Martin Kappes and
                  Bogdan V. Ghita},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {A Pre-clustering Method To Improve Anomaly Detection},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {391--396},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005953003910396},
  doi          = {10.5220/0005953003910396},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HockKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiljanVE16,
  author       = {Sven Kiljan and
                  Harald P. E. Vranken and
                  Marko C. J. D. van Eekelen},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {User-friendly Manual Transfer of Authenticated Online Banking Transaction
                  Data - {A} Case Study that Applies the What You Enter Is What You
                  Sign Transaction Authorization Information Scheme},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {259--270},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005965102590270},
  doi          = {10.5220/0005965102590270},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiljanVE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LesavoureyNP16,
  author       = {Andrea Lesavourey and
                  Christophe N{\`{e}}gre and
                  Thomas Plantard},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Efficient Randomized Regular Modular Exponentiation using Combined
                  Montgomery and Barrett Multiplications},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {368--375},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005998503680375},
  doi          = {10.5220/0005998503680375},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LesavoureyNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MilosevicMF16,
  author       = {Jelena Milosevic and
                  Miroslaw Malek and
                  Alberto Ferrante},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {A Friend or a Foe? Detecting Malware using Memory and {CPU} Features},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {73--84},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005964200730084},
  doi          = {10.5220/0005964200730084},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MilosevicMF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MimotoBK16,
  author       = {Tomoaki Mimoto and
                  Anirban Basu and
                  Shinsaku Kiyomoto},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Towards Practical k-Anonymization: Correlation-based Construction
                  of Generalization Hierarchy},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {411--418},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005963804110418},
  doi          = {10.5220/0005963804110418},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MimotoBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MohammedCG16,
  author       = {Mohammed Bakiri and
                  Jean{-}Fran{\c{c}}ois Couchot and
                  Christophe Guyeux},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {{FPGA} Implementation of F2-Linear Pseudorandom Number Generators
                  based on Zynq MPSoC: {A} Chaotic Iterations Post Processing Case Study},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {302--309},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005967903020309},
  doi          = {10.5220/0005967903020309},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MohammedCG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MohantyAR16,
  author       = {Manoranjan Mohanty and
                  Muhammad Rizwan Asghar and
                  Giovanni Russello},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting
                  of 3D Images in the Cloud},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {283--291},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005966302830291},
  doi          = {10.5220/0005966302830291},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MohantyAR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MuranakaYOF16,
  author       = {Kenta Muranaka and
                  Naoto Yanai and
                  Shingo Okamura and
                  Toru Fujiwara},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {{ISDSR:} Secure {DSR} with ID-based Sequential Aggregate Signature},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {376--387},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0006001003760387},
  doi          = {10.5220/0006001003760387},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MuranakaYOF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PatelP16,
  author       = {Asma Patel and
                  Esther Palomar},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {LP-Cache: Privacy-aware Cache Model for Location-based Apps},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {183--194},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005970101830194},
  doi          = {10.5220/0005970101830194},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PatelP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PereiraRA16,
  author       = {{\'{O}}scar Mort{\'{a}}gua Pereira and
                  Diogo Domingues Regateiro and
                  Rui L. Aguiar},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Protecting Databases from Schema Disclosure - {A} CRUD-Based Protection
                  Model},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {292--301},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005967402920301},
  doi          = {10.5220/0005967402920301},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PereiraRA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PutD16,
  author       = {Andreas Put and
                  Bart De Decker},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {PACCo: Privacy-friendly Access Control with Context},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {159--170},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005969501590170},
  doi          = {10.5220/0005969501590170},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PutD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RanathungaRKF16,
  author       = {Dinesha Ranathunga and
                  Matthew Roughan and
                  Phil Kernick and
                  Nick Falkner},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {The Mathematical Foundations for Mapping Policies to Network Devices},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {197--206},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005946201970206},
  doi          = {10.5220/0005946201970206},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RanathungaRKF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RanathungaRKFNM16,
  author       = {Dinesha Ranathunga and
                  Matthew Roughan and
                  Phil Kernick and
                  Nick Falkner and
                  Hung X. Nguyen and
                  Marian Mihailescu and
                  Michelle McClintock},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Verifiable Policy-defined Networking for Security Management},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {344--351},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005990303440351},
  doi          = {10.5220/0005990303440351},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RanathungaRKFNM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Rao16,
  author       = {Srinivasa Rao Subramanya Rao},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Differential Addition in Edwards Coordinates Revisited and a Short
                  Note on Doubling in Twisted Edwards Form},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {336--343},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005970603360343},
  doi          = {10.5220/0005970603360343},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Rao16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Schneider16,
  author       = {Johannes Schneider},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Lean and Fast Secure Multi-party Computation: Minimizing Communication
                  and Local Computation using a Helper},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {223--230},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005954202230230},
  doi          = {10.5220/0005954202230230},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Schneider16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchneiderLLPHO16,
  author       = {Johannes Schneider and
                  Bin Lu and
                  Thomas Locher and
                  Yvonne{-}Anne Pignolet and
                  Mat{\'{u}}s Harvan and
                  Sebastian Obermeier},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Subdomain and Access Pattern Privacy - Trading off Confidentiality
                  and Performance},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {49--60},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005954100490060},
  doi          = {10.5220/0005954100490060},
  timestamp    = {Wed, 15 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchneiderLLPHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SciarrettaACR16,
  author       = {Giada Sciarretta and
                  Alessandro Armando and
                  Roberto Carbone and
                  Silvio Ranise},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Security of Mobile Single Sign-On: {A} Rational Reconstruction of
                  Facebook Login Solution},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {147--158},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005969001470158},
  doi          = {10.5220/0005969001470158},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SciarrettaACR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG16,
  author       = {George Stergiopoulos and
                  Panagiotis Katsaros and
                  Dimitris Gritzalis and
                  Theodore K. Apostolopoulos},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Combining Invariant Violation with Execution Path Classification for
                  Detecting Multiple Types of Logical Errors and Race Conditions},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {28--40},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005947200280040},
  doi          = {10.5220/0005947200280040},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/StergiopoulosKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TatarNN16,
  author       = {Ahmet Emin Tatar and
                  Marius Nagy and
                  Naya Nagy},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence
                  Classes},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {419--423},
  publisher    = {SciTePress},
  year         = {2016},
  timestamp    = {Tue, 13 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TatarNN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TrabelsiMZ16,
  author       = {Slim Trabelsi and
                  Skander Ben Mahmoud and
                  Anis Zouaoui},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Predictive Model for Exploit Kit based Attacks},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {477--482},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005999904770482},
  doi          = {10.5220/0005999904770482},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TrabelsiMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WaageHW16,
  author       = {Tim Waage and
                  Daniel Homann and
                  Lena Wiese},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Practical Application of Order-preserving Encryption in Wide Column
                  Stores},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {352--359},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005991403520359},
  doi          = {10.5220/0005991403520359},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WaageHW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WodoH16,
  author       = {Wojciech Wodo and
                  Lucjan Hanzlik},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Thermal Imaging Attacks on Keypad Security Systems},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {458--464},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005998404580464},
  doi          = {10.5220/0005998404580464},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WodoH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WodoHK16,
  author       = {Wojciech Wodo and
                  Lucjan Hanzlik and
                  Kamil Kluczniak},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Computations on Private Sets and their Application to Biometric based
                  Authentication Systems},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {452--457},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005992204520457},
  doi          = {10.5220/0005992204520457},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WodoHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2016,
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  publisher    = {SciTePress},
  year         = {2016},
  isbn         = {978-989-758-196-0},
  timestamp    = {Tue, 13 Sep 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AiashL15,
  author       = {Mahdi Aiash and
                  Jonathan Loo},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Formally Verified Access Control Mechanism for Information Centric
                  Networks},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {377--383},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005566303770383},
  doi          = {10.5220/0005566303770383},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AiashL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Amthor15,
  author       = {Peter Amthor},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Uniform Modeling Pattern for Operating Systems Access Control Policies
                  with an Application to SELinux},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {88--99},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005551000880099},
  doi          = {10.5220/0005551000880099},
  timestamp    = {Wed, 18 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Amthor15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelhaouaneGD15,
  author       = {Malek Belhaouane and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Herv{\'{e}} Debar},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Evaluating the Comprehensive Complexity of Authorization-based Access
                  Control Policies using Quantitative Metrics},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {53--64},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005544100530064},
  doi          = {10.5220/0005544100530064},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelhaouaneGD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BellizziV15,
  author       = {Jennifer Bellizzi and
                  Mark Vella},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using
                  Just-In-Time Binary Modification},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {5--15},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005502600050015},
  doi          = {10.5220/0005502600050015},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BellizziV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenmoussaKO15,
  author       = {Hajar Benmoussa and
                  Anas Abou El Kalam and
                  Abdellah Ait Ouahman},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Distributed Intrusion Detection System based on Anticipation and Prediction
                  Approach},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {343--348},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005556803430348},
  doi          = {10.5220/0005556803430348},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenmoussaKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Birjoveanu15,
  author       = {Catalin V. B{\^{\i}}rjoveanu},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products
                  Delivery},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {170--177},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005508801700177},
  doi          = {10.5220/0005508801700177},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Birjoveanu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Bottasso15,
  author       = {Luigi Maria Bottasso},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Public-Key Cryptography Tool for Personal Use - {A} Real-world Implementation
                  of {ECC} for Secure File Exchange},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {194--201},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005511801940201},
  doi          = {10.5220/0005511801940201},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Bottasso15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BuccafurriLSS15,
  author       = {Francesco Buccafurri and
                  Gianluca Lax and
                  Rajeev Anand Sahu and
                  Vishal Saraswat},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Practical and Secure Integrated {PKE+PEKS} with Keyword Privacy},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {448--453},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005577104480453},
  doi          = {10.5220/0005577104480453},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BuccafurriLSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CanforaMV15,
  author       = {Gerardo Canfora and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Mobile Malware Detection using Op-code Frequency Histograms},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {27--38},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005537800270038},
  doi          = {10.5220/0005537800270038},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CanforaMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CimatoMS15,
  author       = {Stelvio Cimato and
                  Silvia Mella and
                  Ruggero Susella},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {New Results for Partial Key Exposure on {RSA} with Exponent Blinding},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {136--147},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005571701360147},
  doi          = {10.5220/0005571701360147},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CimatoMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CincillaBHK15,
  author       = {Pierpaolo Cincilla and
                  Aymen Boudguiga and
                  Makhlouf Hadji and
                  Arnaud Kaiser},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Light Blind: Why Encrypt If You Can Share?},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {361--368},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005562203610368},
  doi          = {10.5220/0005562203610368},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CincillaBHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DreierKL15,
  author       = {Jannik Dreier and
                  Ali Kassem and
                  Pascal Lafourcade},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Formal Analysis of E-Cash Protocols},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {65--75},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005544500650075},
  doi          = {10.5220/0005544500650075},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DreierKL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FernandezY15,
  author       = {Eduardo B. Fern{\'{a}}ndez and
                  Dereje Yimam},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Towards Compliant Reference Architectures by Finding Analogies and
                  Overlaps in Compliance Regulations},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {435--440},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005575604350440},
  doi          = {10.5220/0005575604350440},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FernandezY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Garcia15,
  author       = {Johan Garcia},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Examining the Performance for Forensic Detection of Rare Videos Under
                  Time Constraints},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {419--426},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005574204190426},
  doi          = {10.5220/0005574204190426},
  timestamp    = {Mon, 28 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Garcia15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GuesmiCLB15,
  author       = {Asma Guesmi and
                  Patrice Clemente and
                  Fr{\'{e}}d{\'{e}}ric Loulergue and
                  Pascal Berthom{\'{e}}},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Cloud Resources Placement based on Functional and Non-functional Requirements},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {335--342},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005552503350342},
  doi          = {10.5220/0005552503350342},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GuesmiCLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HajilouMA15,
  author       = {Fleura Hajilou and
                  Ehsan Mazidi and
                  Shahab Ardalan},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {{DPA} Resistance Enhancement through a Self-healing {PLL} based Power
                  Mask},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {267--272},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005547302670272},
  doi          = {10.5220/0005547302670272},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HajilouMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HajnyDM15,
  author       = {Jan Hajny and
                  Petr Dzurenda and
                  Lukas Malina},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Secure Physical Access Control with Strong Cryptographic Protection},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {220--227},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005524202200227},
  doi          = {10.5220/0005524202200227},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HajnyDM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoangCN15,
  author       = {Thang Hoang and
                  Deokjai Choi and
                  Thuc Dinh Nguyen},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {On the Instability of Sensor Orientation in Gait Verification on Mobile
                  Phone},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {148--159},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005572001480159},
  doi          = {10.5220/0005572001480159},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoangCN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HuangCT15,
  author       = {Kaibin Huang and
                  Yu{-}Chi Chen and
                  Raylin Tso},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Semantic Secure Public Key Encryption with Filtered Equality Test
                  - {PKE-FET}},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {327--334},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005550303270334},
  doi          = {10.5220/0005550303270334},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HuangCT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IrshadSVBSA15,
  author       = {Hassaan Irshad and
                  Basit Shafiq and
                  Jaideep Vaidya and
                  Muhammad Ahmed Bashir and
                  Shafay Shamail and
                  Nabil R. Adam},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Preserving Privacy in Collaborative Business Process Composition},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {112--123},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005567801120123},
  doi          = {10.5220/0005567801120123},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IrshadSVBSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JaidiA15,
  author       = {Faouzi Ja{\"{\i}}di and
                  Faten Labbene Ayachi},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Risk Awareness Approach for Monitoring the Compliance of RBAC-based
                  Policies},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {454--459},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005577304540459},
  doi          = {10.5220/0005577304540459},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JaidiA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Joye15,
  author       = {Marc Joye},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Key-private Cryptosystem from the Quadratic Residuosity},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {398--404},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005569703980404},
  doi          = {10.5220/0005569703980404},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Joye15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Ka15,
  author       = {Ka Ahmad Khoureich},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {hHB: {A} Harder HB\({}^{\mbox{+}}\) Protocol},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {163--169},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005500001630169},
  doi          = {10.5220/0005500001630169},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Ka15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KenazaLBS15,
  author       = {Tayeb Kenaza and
                  Abdenour Labed and
                  Yacine Boulahia and
                  Mohcen Sebehi},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion
                  Detection},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {405--412},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005573204050412},
  doi          = {10.5220/0005573204050412},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KenazaLBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15,
  author       = {Yukou Kobayashi and
                  Naoto Yanai and
                  Kazuki Yoneyama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Kwangjo Kim and
                  Eiji Okamoto},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Gateway Threshold Password-based Authenticated Key Exchange Secure
                  against Undetectable On-line Dictionary Attack},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {39--52},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005539300390052},
  doi          = {10.5220/0005539300390052},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KobayashiYYNHKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LorenzS15,
  author       = {Claas Lorenz and
                  Bettina Schnor},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Policy Anomaly Detection for Distributed IPv6 Firewalls},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {210--219},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005517402100219},
  doi          = {10.5220/0005517402100219},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LorenzS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MalinaMHH15,
  author       = {Lukas Malina and
                  Petr Munster and
                  Jan Hajny and
                  Tom{\'{a}}s Horv{\'{a}}th},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Towards Secure Gigabit Passive Optical Networks - Signal Propagation
                  based Key Establishment},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {349--354},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005559903490354},
  doi          = {10.5220/0005559903490354},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MalinaMHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MarfiaNPC15,
  author       = {Fabio Marfia and
                  Mario Arrigoni Neri and
                  Filippo Pellegrini and
                  Marco Colombetti},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {An OWL-based {XACML} Policy Framework},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {124--135},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005570101240135},
  doi          = {10.5220/0005570101240135},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MarfiaNPC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MauroL15,
  author       = {Mario Di Mauro and
                  Maurizio Longo},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Revealing Encrypted WebRTC Traffic via Machine Learning Tools},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {259--266},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005542202590266},
  doi          = {10.5220/0005542202590266},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MauroL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MohsenP15,
  author       = {Rabih Mohsen and
                  Alexandre Miranda Pinto},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Algorithmic Information Theory for Obfuscation Security},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {76--87},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005548200760087},
  doi          = {10.5220/0005548200760087},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MohsenP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NegreR15,
  author       = {Christophe N{\`{e}}gre and
                  Jean{-}Marc Robert},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Parallel Approaches for Efficient Scalar Multiplication over Elliptic
                  Curve},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {202--209},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005512502020209},
  doi          = {10.5220/0005512502020209},
  timestamp    = {Fri, 24 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/NegreR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PandeyS15,
  author       = {Pankaj Pandey and
                  Einar Arthur Snekkenes},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Design and Performance Aspects of Information Security Prediction
                  Markets for Risk Management},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {273--284},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005547502730284},
  doi          = {10.5220/0005547502730284},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PandeyS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PavloskiGG15,
  author       = {Mihajlo Pavloski and
                  G{\"{o}}k{\c{c}}e G{\"{o}}rbil and
                  Erol Gelenbe},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Counter based Detection and Mitigation of Signalling Attacks},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {413--418},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005573504130418},
  doi          = {10.5220/0005573504130418},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PavloskiGG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Rao15,
  author       = {Srinivasa Rao Subramanya Rao},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Note on Schoenmakers Algorithm for Multi Exponentiation},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {384--391},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005566903840391},
  doi          = {10.5220/0005566903840391},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Rao15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ReevesS15,
  author       = {Jason Reeves and
                  Sean W. Smith},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Solving the Grid Defender's Dilemma: Tamper Protection for Distributed
                  Cyber-Physical Systems},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {309--316},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005549503090316},
  doi          = {10.5220/0005549503090316},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ReevesS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ReimairTKT15,
  author       = {Florian Reimair and
                  Peter Teufl and
                  Christian Kollmann and
                  Christoph Thaller},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {MoCrySIL - Carry Your Cryptographic Keys in Your Pocket},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {285--292},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005547902850292},
  doi          = {10.5220/0005547902850292},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ReimairTKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RhinowC15,
  author       = {Florian Rhinow and
                  Michael Clear},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Scargos: Towards Automatic Vulnerability Distribution},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {369--376},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005566203690376},
  doi          = {10.5220/0005566203690376},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RhinowC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RoyGCM15,
  author       = {Bholanath Roy and
                  Ravi Prakash Giri and
                  Ashokkumar C. and
                  Bernard Menezes},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Design and Implementation of an Espionage Network for Cache-based
                  Side Channel Attacks on {AES}},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {441--447},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005576804410447},
  doi          = {10.5220/0005576804410447},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RoyGCM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SalferSE15,
  author       = {Martin Salfer and
                  Claudia Eckert},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Attack Surface and Vulnerability Assessment of Automotive Electronic
                  Control Units},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {317--326},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005550003170326},
  doi          = {10.5220/0005550003170326},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SalferSE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchlegelHO15,
  author       = {Roman Schlegel and
                  Ana Hristova and
                  Sebastian Obermeier},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Framework for Incident Response in Industrial Control Systems},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {178--185},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005510001780185},
  doi          = {10.5220/0005510001780185},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchlegelHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SelisM15,
  author       = {Valerio Selis and
                  Alan Marshall},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {{MEDA:} {A} Machine Emulation Detection Algorithm},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {228--235},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005535202280235},
  doi          = {10.5220/0005535202280235},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SelisM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SerbanescuOY15,
  author       = {Alexandru Vlad Serbanescu and
                  Sebastian Obermeier and
                  Der{-}Yeuan Yu},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {A Flexible Architecture for Industrial Control System Honeypots},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {16--26},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005522500160026},
  doi          = {10.5220/0005522500160026},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SerbanescuOY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SmolyakovSKG15,
  author       = {Alexey D. Smolyakov and
                  Amir I. Sulimov and
                  Arkadij V. Karpov and
                  Aidar V. Galiev},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Experimental Extraction of Shared Secret Key from Fluctuations of
                  Multipath Channel at Moving a Mobile Transceiver in an Urban Environment},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {355--360},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005561703550360},
  doi          = {10.5220/0005561703550360},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SmolyakovSKG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosPK15,
  author       = {George Stergiopoulos and
                  Panagiotis Petsanas and
                  Panagiotis Katsaros and
                  Dimitris Gritzalis},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Automated Exploit Detection using Path Profiling - The Disposition
                  Should Matter, Not the Position},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {100--111},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005561101000111},
  doi          = {10.5220/0005561101000111},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/StergiopoulosPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SulimovK15,
  author       = {Amir I. Sulimov and
                  Arkadij V. Karpov},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Performance Evaluation of Meteor Key Distribution},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {392--397},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005568003920397},
  doi          = {10.5220/0005568003920397},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SulimovK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SytaFWSGF15,
  author       = {Ewa Syta and
                  Michael J. Fischer and
                  David Wolinsky and
                  Abraham Silberschatz and
                  Gina Gallegos{-}Garc{\'{\i}}a and
                  Bryan Ford},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Private Eyes: Secure Remote Biometric Authentication},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {243--250},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005539602430250},
  doi          = {10.5220/0005539602430250},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SytaFWSGF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TrabelsiPAAZMGA15,
  author       = {Slim Trabelsi and
                  Henrik Plate and
                  Amine Abida and
                  M. Marouane Ben Aoun and
                  Anis Zouaoui and
                  Chedy Missaoui and
                  Sofien Gharbi and
                  Alaeddine Ayari},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Monitoring Software Vulnerabilities through Social Networks Analysis},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {236--242},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005538602360242},
  doi          = {10.5220/0005538602360242},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TrabelsiPAAZMGA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TsiatsikasFPGKK15,
  author       = {Zisis Tsiatsikas and
                  Alexandros Fakis and
                  Dimitrios Papamartzivanos and
                  Dimitris Geneiatakis and
                  Georgios Kambourakis and
                  Constantinos Kolias},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Battling Against DDoS in {SIP} - Is Machine Learning-based Detection
                  an Effective Weapon?},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {301--308},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005549103010308},
  doi          = {10.5220/0005549103010308},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TsiatsikasFPGKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UtthaBR15,
  author       = {Worachet Uttha and
                  Clara Bertolissi and
                  Silvio Ranise},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Modeling Authorization Policies for Web Services in Presence of Transitive
                  Dependencies},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {293--300},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005548502930300},
  doi          = {10.5220/0005548502930300},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/UtthaBR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VermaR15,
  author       = {Rakesh M. Verma and
                  Nirmala Rai},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Phish-IDetector: Message-Id Based Automatic Phishing Detection},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {427--434},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005574304270434},
  doi          = {10.5220/0005574304270434},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VermaR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VivekB15,
  author       = {S. Sree Vivek and
                  Guhan Balasubramanian},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Controlled Proxy Re-signing - Conditional Proxy Re-Signatures},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {186--193},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005510601860193},
  doi          = {10.5220/0005510601860193},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VivekB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VivekSMR15,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  Aanchal Malhotra and
                  C. Pandu Rangan},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Practical {IBE} Secure under {CBDH} - Encrypting Without Pairing},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {251--258},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005541802510258},
  doi          = {10.5220/0005541802510258},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VivekSMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2015,
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  publisher    = {SciTePress},
  year         = {2015},
  isbn         = {978-989-758-117-5},
  timestamp    = {Thu, 06 Aug 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Aissaoui-MehrezUP14,
  author       = {Hassane Aissaoui{-}Mehrez and
                  Pascal Urien and
                  Guy Pujolle},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Framework Implementation Based on Grid of Smartcards to Authenticate
                  Users and Virtual Machines},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {285--290},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005046102850290},
  doi          = {10.5220/0005046102850290},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Aissaoui-MehrezUP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AouadMGM14,
  author       = {Lamine M. Aouad and
                  Alejandro Mosquera and
                  Slawomir Grzonkowski and
                  Dylan Morss},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{SMS} Spam - {A} Holistic View},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {221--228},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005023202210228},
  doi          = {10.5220/0005023202210228},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AouadMGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ArmknechtM14,
  author       = {Frederik Armknecht and
                  Vasily Mikhalev},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Revisiting a Recent Resource-efficient Technique for Increasing the
                  Throughput of Stream Ciphers},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {379--386},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005059803790386},
  doi          = {10.5220/0005059803790386},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ArmknechtM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AzizMP14,
  author       = {Benjamin Aziz and
                  Philippe Massonet and
                  Christophe Ponsard},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Formal Model for Forensic Storage Media Preparation Tools},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {165--170},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0004996001650170},
  doi          = {10.5220/0004996001650170},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AzizMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BadrinarayananR14,
  author       = {Saikrishna Badrinarayanan and
                  C. Pandu Rangan},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Pairing-free Single Round Certificateless and Identity Based Authenticated
                  Key Exchange Protocols},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {67--78},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005043400670078},
  doi          = {10.5220/0005043400670078},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BadrinarayananR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BarenghiP14,
  author       = {Alessandro Barenghi and
                  Gerardo Pelosi},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {On the Security of Partially Masked Software Implementations},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {492--499},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005120504920499},
  doi          = {10.5220/0005120504920499},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BarenghiP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelaaziRB14,
  author       = {Maherzia Belaazi and
                  Hanene Boussi Rahmouni and
                  Adel Bouhoula},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Towards a Legislation Driven Framework for Access Control and Privacy
                  Protection in Public Cloud},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {463--468},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7509526/},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelaaziRB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Bittl14,
  author       = {Sebastian Bittl},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Efficient Construction of Infinite Length Hash Chains with Perfect
                  Forward Secrecy Using Two Independent Hash Functions},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {213--220},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005020502130220},
  doi          = {10.5220/0005020502130220},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Bittl14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Brandic14,
  author       = {Ivona Brandic},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Democratization in Science and Technology through Cloud Computing},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {IS--7},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7509459/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Brandic14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BuccafurriL14,
  author       = {Francesco Buccafurri and
                  Gianluca Lax},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {321--328},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005050303210328},
  doi          = {10.5220/0005050303210328},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BuccafurriL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CelikkanG14,
  author       = {Ufuk Celikkan and
                  Can Gelis},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{NFC} Based Mobile Single Sign-On Solution as a Chrome Extension},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {337--343},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005056703370343},
  doi          = {10.5220/0005056703370343},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CelikkanG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChangX14,
  author       = {Jinyong Chang and
                  Rui Xue},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{KDM-CCA} Security of the Cramer-Shoup Cryptosystem, Revisited},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {299--306},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005048802990306},
  doi          = {10.5220/0005048802990306},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChangX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CorenaBNKM14,
  author       = {Juan Camilo Corena and
                  Anirban Basu and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Multiple-server Efficient Reusable Proof of Data Possesion from
                  Private Information Retrieval Techniques},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {307--314},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005049803070314},
  doi          = {10.5220/0005049803070314},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CorenaBNKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CouchotHGWB14,
  author       = {Jean{-}Fran{\c{c}}ois Couchot and
                  Pierre{-}Cyrille H{\'{e}}am and
                  Christophe Guyeux and
                  Qianxue Wang and
                  Jacques M. Bahi},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Pseudorandom Number Generators with Balanced Gray Codes},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {469--475},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7509527/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CouchotHGWB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CourousseRLBNJL14,
  author       = {Damien Courouss{\'{e}} and
                  Bruno Robisson and
                  Jean{-}Louis Lanet and
                  Thierno Barry and
                  Hassan Noura and
                  Philippe Jaillon and
                  Philippe Lalev{\'{e}}e},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{COGITO:} Code Polymorphism to Secure Devices},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {451--456},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005113704510456},
  doi          = {10.5220/0005113704510456},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CourousseRLBNJL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CourtoisEN14,
  author       = {Nicolas T. Courtois and
                  Pinar Emirdag and
                  Daniel A. Nagy},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Could Bitcoin Transactions Be 100x Faster?},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {426--431},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005102804260431},
  doi          = {10.5220/0005102804260431},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CourtoisEN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CourtoisMSSS14,
  author       = {Nicolas T. Courtois and
                  Theodosis Mourouzis and
                  Guangyan Song and
                  Pouyan Sepehrdad and
                  Petr Susil},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round
                  Simon},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {399--404},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005064903990404},
  doi          = {10.5220/0005064903990404},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CourtoisMSSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CucurullGENA14,
  author       = {Jordi Cucurull and
                  Sandra Guasch and
                  Alex Escala and
                  Guillermo Navarro{-}Arribas and
                  V{\'{\i}}ctor Ac{\'{\i}}n},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{QR} Steganography - {A} Threat to New Generation Electronic Voting
                  Systems},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {484--491},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005120404840491},
  doi          = {10.5220/0005120404840491},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CucurullGENA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DahshanE14,
  author       = {Mai Dahshan and
                  Sherif Elkassas},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Framework for Securing Data in Cloud Storage Services},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {267--274},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005043802670274},
  doi          = {10.5220/0005043802670274},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DahshanE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DaritiS14,
  author       = {Rabi{\^{\i}} Dariti and
                  El Mamoun Souidi},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Steganographic Protocol Based on Linear Error-Block Codes},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {178--183},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005014501780183},
  doi          = {10.5220/0005014501780183},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DaritiS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DazaPLS14,
  author       = {Vanesa Daza and
                  Roberto Di Pietro and
                  Flavio Lombardi and
                  Matteo Signorini},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{FORCE} - Fully Off-line secuRe CrEdits for Mobile Micro Payments},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {125--136},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005053201250136},
  doi          = {10.5220/0005053201250136},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DazaPLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Diaz-SantiagoRC14,
  author       = {Sandra Diaz{-}Santiago and
                  Lil Mar{\'{\i}}a Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Debrup Chakraborty},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Cryptographic Study of Tokenization Systems},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {393--398},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005062803930398},
  doi          = {10.5220/0005062803930398},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Diaz-SantiagoRC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DreierGKLLR14,
  author       = {Jannik Dreier and
                  Rosario Giustolisi and
                  Ali Kassem and
                  Pascal Lafourcade and
                  Gabriele Lenzini and
                  Peter Y. A. Ryan},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Formal Analysis of Electronic Exams},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {101--112},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005050901010112},
  doi          = {10.5220/0005050901010112},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DreierGKLLR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ElkhiyaouiOM14,
  author       = {Kaoutar Elkhiyaoui and
                  Melek {\"{O}}nen and
                  Refik Molva},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Privacy Preserving Delegated Word Search in the Cloud},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {137--150},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005054001370150},
  doi          = {10.5220/0005054001370150},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ElkhiyaouiOM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ElrakaibyP14,
  author       = {Yehia Elrakaiby and
                  Jun Pang},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Dynamic Analysis of Usage Control Policies},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {88--100},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005046600880100},
  doi          = {10.5220/0005046600880100},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ElrakaibyP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/EnacheS14,
  author       = {Adriana{-}Cristina Enache and
                  Valentin Sgarciu},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Enhanced Intrusion Detection System Based on Bat Algorithm-support
                  Vector Machine},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {184--189},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005015501840189},
  doi          = {10.5220/0005015501840189},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/EnacheS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FerranteKM14,
  author       = {Alberto Ferrante and
                  Igor Kaitovic and
                  Jelena Milosevic},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Modeling Requirements for Security-enhanced Design of Embedded Systems},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {315--320},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005050003150320},
  doi          = {10.5220/0005050003150320},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FerranteKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GhoshMCG14,
  author       = {Nirnay Ghosh and
                  Triparna Mondal and
                  Debangshu Chatterjee and
                  Soumya K. Ghosh},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Verifying Conformance of Security Implementation with Organizational
                  Access Policies in Community Cloud - {A} Formal Approach},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {329--336},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7509507/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GhoshMCG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Goodman14,
  author       = {Seymour E. Goodman},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Need-based Assessment for Building a National Cyber Security Workforce},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {IS--5},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7509458/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Goodman14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GuleriaD14,
  author       = {Vandana Guleria and
                  Ratna Dutta},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {43--54},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005016900430054},
  doi          = {10.5220/0005016900430054},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GuleriaD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KaanicheLB14,
  author       = {Nesrine Kaaniche and
                  Maryline Laurent and
                  Mohammed El{-}Barbori},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {CloudaSec: {A} Novel Public-key Based Framework to Handle Data Sharing
                  Security in Clouds},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {5--18},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005010600050018},
  doi          = {10.5220/0005010600050018},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KaanicheLB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KavanSK14,
  author       = {Daniel Kavan and
                  Kl{\'{a}}ra Skodov{\'{a}} and
                  Martin Kl{\'{\i}}ma},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Network-based Intrusion Prevention System Prototype with Multi-Detection
                  - {A} Position Paper},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {417--425},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005102204170425},
  doi          = {10.5220/0005102204170425},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KavanSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Kiviharju14,
  author       = {Mikko Kiviharju},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{RBAC} with {ABS} - Implementation Practicalities for {RBAC} Integrity
                  Policies},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {500--509},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005122105000509},
  doi          = {10.5220/0005122105000509},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Kiviharju14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lee14,
  author       = {Byoungcheon Lee},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Hybrid-Style Personal Key Management in Ubiquitous Computing},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {238--243},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005029102380243},
  doi          = {10.5220/0005029102380243},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lee14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Marfia14,
  author       = {Fabio Marfia},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Using Abductive and Inductive Inference to Generate Policy Explanations},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {457--462},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005116004570462},
  doi          = {10.5220/0005116004570462},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Marfia14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MellaMV14,
  author       = {Silvia Mella and
                  Filippo Melzani and
                  Andrea Visconti},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Differential Fault Attacks against {AES} Tampering with the Instruction
                  Flow},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {439--444},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005112104390444},
  doi          = {10.5220/0005112104390444},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MellaMV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MeraoumiaCB14,
  author       = {Abdallah Meraoumia and
                  Salim Chitroub and
                  Ahmed Bouridane},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Robust Multispectral Palmprint Identification System by Jointly Using
                  Contourlet Decomposition {\&} Gabor Filter Response},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {190--197},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005016101900197},
  doi          = {10.5220/0005016101900197},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MeraoumiaCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MunozM14,
  author       = {Antonio Mu{\~{n}}oz and
                  Antonio Ma{\~{n}}a},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Software and Hardware Certification Techniques in a Combined Certification
                  Model},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {405--410},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005098204050410},
  doi          = {10.5220/0005098204050410},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MunozM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NouraMA14,
  author       = {Hassan Noura and
                  Steven Martin and
                  Khaldoun Al Agha},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {An Efficient Lightweight Security Algorithm for Random Linear Network
                  Coding},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {171--177},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005002701710177},
  doi          = {10.5220/0005002701710177},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NouraMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OprisnikHT14,
  author       = {Alexander Oprisnik and
                  Daniel M. Hein and
                  Peter Teufl},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Identifying Cryptographic Functionality in Android Applications},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {151--162},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005056301510162},
  doi          = {10.5220/0005056301510162},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OprisnikHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OuedraogoKTP0SC14,
  author       = {Moussa Ouedraogo and
                  Chien{-}Ting Kuo and
                  Simon Tjoa and
                  David Preston and
                  Eric Dubois and
                  Paulo Sim{\~{o}}es and
                  Tiago Cruz},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Keeping an Eye on Your Security Through Assurance Indicators},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {476--483},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005118504760483},
  doi          = {10.5220/0005118504760483},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OuedraogoKTP0SC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PavloskiG14,
  author       = {Mihajlo Pavloski and
                  Erol Gelenbe},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Signaling Attacks in Mobile Telephony},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {206--212},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005019802060212},
  doi          = {10.5220/0005019802060212},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PavloskiG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PinoMSD14,
  author       = {Pablo Ant{\'{o}}n del Pino and
                  Antoine Monsifrot and
                  Charles Salmon{-}Legagneur and
                  Gwena{\"{e}}l J. Do{\"{e}}rr},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Secure Video Player for Mobile Devices Integrating a Watermarking-based
                  Tracing Mechanism},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {253--260},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005042502530260},
  doi          = {10.5220/0005042502530260},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PinoMSD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PoddarBM14,
  author       = {Pratik Poddar and
                  Achin Bansal and
                  Bernard Menezes},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {361--370},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005058703610370},
  doi          = {10.5220/0005058703610370},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PoddarBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PolcakF14,
  author       = {Libor Polcak and
                  Barbora Frankov{\'{a}}},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {On Reliability of Clock-skew-based Remote Computer Identification},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {291--298},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005048502910298},
  doi          = {10.5220/0005048502910298},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PolcakF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Rodriguez-HenriquezC14,
  author       = {Lil Mar{\'{\i}}a Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Debrup Chakraborty},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Using Bitmaps for Executing Range Queries in Encrypted Databases},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {432--438},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005111604320438},
  doi          = {10.5220/0005111604320438},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Rodriguez-HenriquezC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SaraswatS14,
  author       = {Vishal Saraswat and
                  Rajeev Anand Sahu},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Secure Anonymous Proxy Multi-signature Scheme},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {55--66},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005021200550066},
  doi          = {10.5220/0005021200550066},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SaraswatS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchindlerESS14,
  author       = {Sven Schindler and
                  Oliver Eggert and
                  Bettina Schnor and
                  Thomas Scheffler},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Shellcode Detection in IPv6 Networks with HoneydV6},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {198--205},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005016801980205},
  doi          = {10.5220/0005016801980205},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchindlerESS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SeiO14,
  author       = {Yuichi Sei and
                  Akihiko Ohsuga},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Randomized Addition of Sensitive Attributes for l-diversity},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {350--360},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005058203500360},
  doi          = {10.5220/0005058203500360},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SeiO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ShakarianPAJ14,
  author       = {Paulo Shakarian and
                  Damon Paulo and
                  Massimiliano Albanese and
                  Sushil Jajodia},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Keeping Intruders at Large - {A} Graph-theoretic Approach to Reducing
                  the Probability of Successful Network Intrusions},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {19--30},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005013800190030},
  doi          = {10.5220/0005013800190030},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ShakarianPAJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ShibliAKG14,
  author       = {Muhammad Awais Shibli and
                  Naveed Ahmad and
                  Ayesha Kanwal and
                  Abdul Ghafoor Abbasi},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Secure Virtual Machine Migration {(SV2M)} in Cloud Federation},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {344--349},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005057103440349},
  doi          = {10.5220/0005057103440349},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ShibliAKG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ShinR14,
  author       = {Jinse Shin and
                  Christoph Ruland},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {A Hybrid Approach for Content Based Image Authentication},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {371--378},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005059003710378},
  doi          = {10.5220/0005059003710378},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ShinR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SulimovK14,
  author       = {Amir I. Sulimov and
                  Arkadij V. Karpov},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Secure Key Distribution based on Meteor Burst Communications},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {445--450},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005113104450450},
  doi          = {10.5220/0005113104450450},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SulimovK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SulimovSKS14,
  author       = {Amir I. Sulimov and
                  Alexey D. Smolyakov and
                  Arkadij V. Karpov and
                  Oleg N. Sherstyukov},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Experimental Study of Performance and Security Constraints on Wireless
                  Key Distribution Using Random Phase of Multipath Radio Signal},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {411--416},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005101004110416},
  doi          = {10.5220/0005101004110416},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SulimovSKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SultanASN14,
  author       = {Shizra Sultan and
                  Abdul Ghafoor Abbasi and
                  Muhammad Awais Shibli and
                  Muhammad Ali Nasir},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Secure Protocol for Financial Transactions Using Smartphones - {SPFT}
                  - Formally Proved by {AVISPA}},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {387--392},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005059903870392},
  doi          = {10.5220/0005059903870392},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SultanASN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SysSUM14,
  author       = {Marek S{\'{y}}s and
                  Petr Svenda and
                  Martin Ukrop and
                  Vashek Matyas},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Constructing Empirical Tests of Randomness},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {229--237},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005023902290237},
  doi          = {10.5220/0005023902290237},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SysSUM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Vateva-GurovaLPS14,
  author       = {Tsvetoslava Vateva{-}Gurova and
                  Jesus Luna and
                  Giancarlo Pellegrino and
                  Neeraj Suri},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Towards a Framework for Assessing the Feasibility of Side-channel
                  Attacks in Virtualized Environments},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {113--124},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005052101130124},
  doi          = {10.5220/0005052101130124},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Vateva-GurovaLPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VirvilisTMG14,
  author       = {Nikos Virvilis and
                  Nikolaos Tsalis and
                  Alexios Mylonas and
                  Dimitris Gritzalis},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Mobile Devices - {A} Phisher's Paradise},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {79--87},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005045000790087},
  doi          = {10.5220/0005045000790087},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VirvilisTMG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VukovicGD14,
  author       = {Dijana Vukovic and
                  Danilo Gligoroski and
                  Zoran Djuric},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {On Privacy Protection in the Internet Surveillance Era},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {261--266},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005043002610266},
  doi          = {10.5220/0005043002610266},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VukovicGD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WagnerS14,
  author       = {Andreas Wagner and
                  Johannes Sametinger},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Using the Juliet Test Suite to Compare Static Security Scanners},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {244--252},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005032902440252},
  doi          = {10.5220/0005032902440252},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WagnerS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WeiWM14,
  author       = {Yun Wei and
                  Fushan Wei and
                  Chuangui Ma},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Certificateless Non-Interactive Key Exchange Protocol without Pairings},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {31--42},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7509472/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WeiWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Weippl14,
  author       = {Edgar R. Weippl},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Advanced Persistent Threats {\&} Social Engineering},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {IS--13},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/7509464/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Weippl14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZanganehBS14,
  author       = {Omid Zanganeh and
                  Nandita Bhattacharjee and
                  Bala Srinivasan},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Partial Fingerprint Identification Through Correlation-based Approach},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {275--284},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005045302750284},
  doi          = {10.5220/0005045302750284},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZanganehBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2014,
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7504670/proceeding},
  isbn         = {978-989-758-045-1},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlbaneseJSW13,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Lingyu Wang},
  editor       = {Pierangela Samarati},
  title        = {An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {207--218},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223168/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlbaneseJSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AliasgariB13,
  author       = {Mehrdad Aliasgari and
                  Marina Blanton},
  editor       = {Pierangela Samarati},
  title        = {Secure Computation of Hidden Markov Models},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {242--253},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223171/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AliasgariB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BahiFG13,
  author       = {Jacques M. Bahi and
                  Nicolas Friot and
                  Christophe Guyeux},
  editor       = {Pierangela Samarati},
  title        = {Topological Study and Lyapunov Exponent of a Secure Steganographic
                  Scheme},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {275--283},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223176/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BahiFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BelaidBDGR13,
  author       = {Sonia Bela{\"{\i}}d and
                  Luk Bettale and
                  Emmanuelle Dottax and
                  Laurie Genelle and
                  Franck Rondepierre},
  editor       = {Pierangela Samarati},
  title        = {Differential Power Analysis of {HMAC} {SHA-2} in the Hamming Weight
                  Model},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {230--241},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223170/},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BelaidBDGR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BongiovanniST13,
  author       = {Simone Bongiovanni and
                  Giuseppe Scotti and
                  Alessandro Trifiletti},
  editor       = {Pierangela Samarati},
  title        = {Security Evaluation and Optimization of the Delay-based Dual-rail
                  Pre-charge Logic in Presence of Early Evaluation of Data},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {183--194},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223166/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BongiovanniST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Campo-GiralteCDC13,
  author       = {Luis Campo{-}Giralte and
                  Cristina Conde and
                  Isaac Mart{\'{\i}}n de Diego and
                  Enrique Cabello},
  editor       = {Pierangela Samarati},
  title        = {InCC: Hiding Information by Mimicking Traffic In Network Flows},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {5--14},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223151/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Campo-GiralteCDC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CataneH13,
  author       = {Boaz Catane and
                  Amir Herzberg},
  editor       = {Pierangela Samarati},
  title        = {Secure Second Price Auctions with a Rational Auctioneer},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {158--169},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223164/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CataneH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CataneH13a,
  author       = {Boaz Catane and
                  Amir Herzberg},
  editor       = {Pierangela Samarati},
  title        = {Massive Group Message Authentication with Revocable Anonymity},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {331--338},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223182/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CataneH13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CazorlaMM13,
  author       = {Micka{\"{e}}l Cazorla and
                  Kevin Marquet and
                  Marine Minier},
  editor       = {Pierangela Samarati},
  title        = {Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor
                  Networks},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {543--548},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223213/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CazorlaMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChabanneCP13,
  author       = {Herv{\'{e}} Chabanne and
                  G{\'{e}}rard D. Cohen and
                  Alain Patey},
  editor       = {Pierangela Samarati},
  title        = {Public-key Cryptography from Different Assumptions - {A} Multi-bit
                  Version},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {561--567},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223216/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChabanneCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChinPBH13,
  author       = {Ji{-}Jian Chin and
                  Raphael C.{-}W. Phan and
                  Rouzbeh Behnia and
                  Swee{-}Huay Heng},
  editor       = {Pierangela Samarati},
  title        = {An Efficient and Provably Secure Certificateless Identification Scheme},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {371--378},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223187/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChinPBH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChionisCN13,
  author       = {Ioannis Chionis and
                  Maria Chroni and
                  Stavros D. Nikolopoulos},
  editor       = {Pierangela Samarati},
  title        = {A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs
                  into Software},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {74--85},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223157/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChionisCN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CiancamerlaMP13,
  author       = {Ester Ciancamerla and
                  Michele Minichino and
                  S. Palmieri},
  editor       = {Pierangela Samarati},
  title        = {Modelling {SCADA} and Corporate Network of a Medium Voltage Power
                  Grid under Cyber Attacks},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {123--134},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223161/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CiancamerlaMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ClearM13,
  author       = {Michael Clear and
                  Ciaran McGoldrick},
  editor       = {Pierangela Samarati},
  title        = {Policy-based Non-interactive Outsourcing of Computation using Multikey
                  {FHE} and {CP-ABE}},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {444--452},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223196/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ClearM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CostanteVEHPZ13,
  author       = {Elisa Costante and
                  Sokratis Vavilis and
                  Sandro Etalle and
                  Jerry den Hartog and
                  Milan Petkovic and
                  Nicola Zannone},
  editor       = {Pierangela Samarati},
  title        = {Database Anomalous Activities - Detection and Quantification},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {603--608},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223222/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CostanteVEHPZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CourtoisMM13,
  author       = {Nicolas T. Courtois and
                  Theodosis Mourouzis and
                  Michal Misztal},
  editor       = {Pierangela Samarati},
  title        = {Enhanced Truncated Differential Cryptanalysis of {GOST}},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {411--418},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223192/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CourtoisMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Domingo-Ferrer13,
  author       = {Josep Domingo{-}Ferrer},
  editor       = {Pierangela Samarati},
  title        = {On the Connection between t-Closeness and Differential Privacy for
                  Data Releases},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {478--481},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223202/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Domingo-Ferrer13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FerranteMJ13,
  author       = {Alberto Ferrante and
                  Jelena Milosevic and
                  Marija Janjusevic},
  editor       = {Pierangela Samarati},
  title        = {A Security-enhanced Design Methodology for Embedded Systems},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {39--50},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223154/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FerranteMJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FreitasN13,
  author       = {Daniel Santana de Freitas and
                  Jorge Nakahara Jr.},
  editor       = {Pierangela Samarati},
  title        = {Non-random Properties of Compression and Hash Functions using Linear
                  Cryptanalysis},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {471--477},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223201/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FreitasN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GrootSVL13,
  author       = {Joep A. de Groot and
                  Boris Skoric and
                  Niels de Vreede and
                  Jean{-}Paul M. G. Linnartz},
  editor       = {Pierangela Samarati},
  title        = {Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {506--511},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223207/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GrootSVL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HaarS13,
  author       = {Dustin van der Haar and
                  Basie von Solms},
  editor       = {Pierangela Samarati},
  title        = {Are Biometric Web Services a Reality? - {A} Best Practice Analysis
                  for Telebiometric Deployment in Open Networks},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {494--499},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223205/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HaarS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HajnyMMZ13,
  author       = {Jan Hajny and
                  Lukas Malina and
                  Zdenek Martinasek and
                  Vaclav Zeman},
  editor       = {Pierangela Samarati},
  title        = {Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc
                  Networks},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {267--274},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223175/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HajnyMMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HanserS13,
  author       = {Christian Hanser and
                  Daniel Slamanig},
  editor       = {Pierangela Samarati},
  title        = {Efficient Simultaneous Privately and Publicly Verifiable Robust Provable
                  Data Possession from Elliptic Curves},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {15--26},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223152/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HanserS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HanzlikW13,
  author       = {Lucjan Hanzlik and
                  Wojciech Wodo},
  editor       = {Pierangela Samarati},
  title        = {Identity Security in Biometric Systems based on Keystroking},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {524--530},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223210/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HanzlikW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HaynbergRAM13,
  author       = {Rolf Haynberg and
                  Jochen Rill and
                  Dirk Achenbach and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade},
  editor       = {Pierangela Samarati},
  title        = {Symmetric Searchable Encryption for Exact Pattern Matching using Directed
                  Acyclic Word Graphs},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {403--410},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223191/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HaynbergRAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HenricksenK13,
  author       = {Matt Henricksen and
                  Shinsaku Kiyomoto},
  editor       = {Pierangela Samarati},
  title        = {{AVON} - {A} Fast Hash Function for Intel {SIMD} Architectures},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {482--487},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223203/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HenricksenK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HiroseK13,
  author       = {Shoichi Hirose and
                  Hidenori Kuwakado},
  editor       = {Pierangela Samarati},
  title        = {Redactable Signature Scheme for Tree-structured Data based on Merkle
                  Tree},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {313--320},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223180/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HiroseK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HuarteGUMI13,
  author       = {Maider Huarte and
                  I{\~{n}}aki Goirizelaia and
                  Juan Jos{\'{e}} Unzilla and
                  Jon Mat{\'{\i}}as and
                  Juan J. Igarza},
  editor       = {Pierangela Samarati},
  title        = {A New Fully Auditable Proposal for an Internet Voting System with
                  Secure Individual Verification and Complaining Capabilities},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {395--402},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223190/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HuarteGUMI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Ii-YungKP13,
  author       = {Ruth Ng Ii{-}Yung and
                  Khoongming Khoo and
                  Raphael C.{-}W. Phan},
  editor       = {Pierangela Samarati},
  title        = {On the Security of the {XOR} Sandwiching Paradigm for Multiple Keyed
                  Block Ciphers},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {305--312},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223179/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Ii-YungKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IshiguroKM13,
  author       = {Tsukasa Ishiguro and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Pierangela Samarati},
  title        = {A Key-revocable Attribute-based Encryption for Mobile Cloud Environments},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {51--61},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223155/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IshiguroKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Iyengar13,
  author       = {Vinay S. Iyengar},
  editor       = {Pierangela Samarati},
  title        = {Efficient Characteristic 3 Galois Field Operations for Elliptic Curve
                  Cryptographic Applications},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {531--536},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223211/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Iyengar13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JhawarP13,
  author       = {Ravi Jhawar and
                  Vincenzo Piuri},
  editor       = {Pierangela Samarati},
  title        = {Adaptive Resource Management for Balancing Availability and Performance
                  in Cloud Computing},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {254--264},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223172/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JhawarP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Kadhem13,
  author       = {Hasan Kadhem},
  editor       = {Pierangela Samarati},
  title        = {{MINHO} - {A} Novel Authentication Scheme based on Pre-Authentication
                  Service},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {586--594},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223220/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Kadhem13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KandiasMSG13,
  author       = {Miltiadis Kandias and
                  Lilian Mitrou and
                  Vasilis Stavrou and
                  Dimitris Gritzalis},
  editor       = {Pierangela Samarati},
  title        = {Which Side Are You On? - {A} New Panopticon vs. Privacy},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {98--110},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223159/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KandiasMSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhalfaouiMG13,
  author       = {Mehdi Khalfaoui and
                  Refik Molva and
                  Laurent Gomez},
  editor       = {Pierangela Samarati},
  title        = {Secure Alert Tracking in Supply Chain},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {219--229},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223169/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KhalfaouiMG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13,
  author       = {Shinsaku Kiyomoto and
                  Andre Rein and
                  Yuto Nakano and
                  Carsten Rudolph and
                  Yutaka Miyake},
  editor       = {Pierangela Samarati},
  title        = {{LMM} - {A} Common Component for Software License Management on Cloud},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {284--295},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223177/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoRNRM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Knospe13,
  author       = {Heiko Knospe},
  editor       = {Pierangela Samarati},
  title        = {Privacy-enhanced Perceptual Hashing of Audio Data},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {549--554},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223214/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Knospe13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LacharmeCR13,
  author       = {Patrick Lacharme and
                  Estelle Cherrier and
                  Christophe Rosenberger},
  editor       = {Pierangela Samarati},
  title        = {Preimage Attack on BioHashing},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {363--370},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223186/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LacharmeCR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LangXD13,
  author       = {Bo Lang and
                  Runhua Xu and
                  Yawei Duan},
  editor       = {Pierangela Samarati},
  title        = {Extending the Ciphertext-Policy Attribute Based Encryption Scheme
                  for Supporting Flexible Access Control},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {147--157},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223163/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LangXD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LegendreDK13,
  author       = {Florian Legendre and
                  Gilles Dequen and
                  Micha{\"{e}}l Krajecki},
  editor       = {Pierangela Samarati},
  title        = {From a Logical Approach to Internal States of Hash Functions - How
                  {SAT} Problem Can Help to Understand SHA-* and MD*},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {435--443},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223195/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LegendreDK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LermanNV13,
  author       = {Liran Lerman and
                  Jorge Nakahara Jr. and
                  Nikita Veshchikov},
  editor       = {Pierangela Samarati},
  title        = {Improving Block Cipher Design by Rearranging Internal Operations},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {27--38},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223153/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LermanNV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MalinaHM13,
  author       = {Lukas Malina and
                  Jan Hajny and
                  Zdenek Martinasek},
  editor       = {Pierangela Samarati},
  title        = {Efficient Group Signatures with Verifier-local Revocation Employing
                  a Natural Expiration},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {555--560},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223215/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MalinaHM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MauriceONHF13,
  author       = {Cl{\'{e}}mentine Maurice and
                  St{\'{e}}phane Onno and
                  Christoph Neumann and
                  Olivier Heen and
                  Aur{\'{e}}lien Francillon},
  editor       = {Pierangela Samarati},
  title        = {Improving 802.11 Fingerprinting of Similar Devices by Cooperative
                  Fingerprinting},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {379--386},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223188/},
  timestamp    = {Sun, 25 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MauriceONHF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MillikenSYM13,
  author       = {Jonny Milliken and
                  Valerio Selis and
                  Kian Meng Yap and
                  Alan Marshall},
  editor       = {Pierangela Samarati},
  title        = {Development of Device Identity using WiFi Layer 2 Management Frames
                  for Combating Rogue APs},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {488--493},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223204/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MillikenSYM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NanavatiJ13,
  author       = {Nirali R. Nanavati and
                  Devesh C. Jinwala},
  editor       = {Pierangela Samarati},
  title        = {A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy
                  Preserving Distributed Data Mining},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {512--517},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223208/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NanavatiJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NeriGMMP13,
  author       = {Mario Arrigoni Neri and
                  Marco Guarnieri and
                  Eros Magri and
                  Simone Mutti and
                  Stefano Paraboschi},
  editor       = {Pierangela Samarati},
  title        = {A Model-driven Approach for Securing Software Architectures},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {595--602},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223221/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NeriGMMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NouraMA13,
  author       = {Hassan Noura and
                  Steven Martin and
                  Khaldoun Al Agha},
  editor       = {Pierangela Samarati},
  title        = {{E3SN} - Efficient Security Scheme for Sensor Networks},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {615--621},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223224/},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/NouraMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OhtakeHKEHWYKYI13,
  author       = {Go Ohtake and
                  Yuki Hironaka and
                  Kenjiro Kai and
                  Yosuke Endo and
                  Goichiro Hanaoka and
                  Hajime Watanabe and
                  Shota Yamada and
                  Kohei Kasamatsu and
                  Takashi Yamakawa and
                  Hideki Imai},
  editor       = {Pierangela Samarati},
  title        = {Partially Wildcarded Attribute-based Encryption and Its Efficient
                  Construction},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {339--346},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223183/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OhtakeHKEHWYKYI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Patsakis13,
  author       = {Constantinos Patsakis},
  editor       = {Pierangela Samarati},
  title        = {Recovering {RSA} Private Keys on Implementations with Tampered LSBs},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {453--460},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223197/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Patsakis13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Raiteri13,
  author       = {Daniele Codetta Raiteri},
  editor       = {Pierangela Samarati},
  title        = {A Preliminary Application of Generalized Fault Trees to Security},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {609--614},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223223/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Raiteri13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Rass13,
  author       = {Stefan Rass},
  editor       = {Pierangela Samarati},
  title        = {Dynamic Proofs of Retrievability from Chameleon-Hashes},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {296--304},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223178/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Rass13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RaviBV13,
  author       = {Saradha Ravi and
                  N. Balakrishnan and
                  Bharath Venkatesh},
  editor       = {Pierangela Samarati},
  title        = {Behavior-based Malware Analysis using Profile Hidden Markov Models},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {195--206},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223167/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RaviBV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ReynagaC13,
  author       = {Gerardo Reynaga and
                  Sonia Chiasson},
  editor       = {Pierangela Samarati},
  title        = {The Usability of CAPTCHAs on Smartphones},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {427--434},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223194/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ReynagaC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RostamiCT13,
  author       = {Saeed Rostami and
                  Sadegh Bamohabbat Chafjiri and
                  Seyed Amir Hossein Tabatabaei},
  editor       = {Pierangela Samarati},
  title        = {Related-key Impossible Differential Cryptanalysis of Full-round {HIGHT}},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {537--542},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223212/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RostamiCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SalvaZL13,
  author       = {S{\'{e}}bastien Salva and
                  Stassia R. Zafimiharisoa and
                  Patrice Lauren{\c{c}}ot},
  editor       = {Pierangela Samarati},
  title        = {Intent Security Testing - An Approach to Testing the Intent-based
                  Vulnerability of Android Components},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {355--362},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223185/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SalvaZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SanzSULNB13,
  author       = {Borja Sanz and
                  Igor Santos and
                  Xabier Ugarte{-}Pedrero and
                  Carlos Laorden and
                  Javier Nieves and
                  Pablo Garc{\'{\i}}a Bringas},
  editor       = {Pierangela Samarati},
  title        = {Instance-based Anomaly Method for Android Malware Detection},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {387--394},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223189/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SanzSULNB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SarwarMBK13,
  author       = {Golam Sarwar and
                  Olivier Mehani and
                  Roksana Boreli and
                  Mohamed Ali K{\^{a}}afar},
  editor       = {Pierangela Samarati},
  title        = {On the Effectiveness of Dynamic Taint Analysis for Protecting against
                  Private Information Leaks on Android-based Devices},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {461--468},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223198/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SarwarMBK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13,
  author       = {Yu Sasaki and
                  Wataru Komatsubara and
                  Yasuhide Sakai and
                  Lei Wang and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Pierangela Samarati},
  title        = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5}
                  and {HAVAL}},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {111--122},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223160/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SasakiKSWISO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchindlerSKSZ13,
  author       = {Sven Schindler and
                  Bettina Schnor and
                  Simon Kiertscher and
                  Thomas Scheffler and
                  Eldad Zack},
  editor       = {Pierangela Samarati},
  title        = {HoneydV6: {A} Low-interaction IPv6 Honeypot},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {86--97},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223158/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchindlerSKSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchreudersB13,
  author       = {Z. Cliffe Schreuders and
                  Adil M. Bhat},
  editor       = {Pierangela Samarati},
  title        = {Not All ISPs Equally Secure Home Users - An Empirical Study Comparing
                  Wi-Fi Security Provided by {UK} ISPs},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {568--573},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223217/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchreudersB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG13,
  author       = {George Stergiopoulos and
                  Miltiadis Kandias and
                  Dimitris Gritzalis},
  editor       = {Pierangela Samarati},
  title        = {Approaching Encryption through Complex Number Logarithms},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {574--579},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223218/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/StergiopoulosKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SvendaUM13,
  author       = {Petr Svenda and
                  Martin Ukrop and
                  Vashek Matyas},
  editor       = {Pierangela Samarati},
  title        = {Towards Cryptographic Function Distinguishers with Evolutionary Circuits},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {135--146},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223162/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SvendaUM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TeuflZSH13,
  author       = {Peter Teufl and
                  Thomas Zefferer and
                  Christof Stromberger and
                  Christoph Hechenblaikner},
  editor       = {Pierangela Samarati},
  title        = {iOS Encryption Systems - Deploying iOS Devices in Security-critical
                  Environments},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {170--182},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223165/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TeuflZSH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TrabelsiB13,
  author       = {Slim Trabelsi and
                  Hana Bouafif},
  editor       = {Pierangela Samarati},
  title        = {Abusing Social Networks with Abuse Reports - {A} Coalition Attack
                  for Social Networks},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {500--505},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223206/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TrabelsiB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TrojahnSO13,
  author       = {Matthias Trojahn and
                  Christian Schadewald and
                  Frank Ortmeier},
  editor       = {Pierangela Samarati},
  title        = {Keystroke Authentication with a Capacitive Display using Different
                  Mobile Devices},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {580--585},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223219/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TrojahnSO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama13,
  author       = {Kazuki Yoneyama},
  editor       = {Pierangela Samarati},
  title        = {Practical and Exposure-resilient Hierarchical ID-based Authenticated
                  Key Exchange without Random Oracles},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {518--523},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223209/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Yoneyama13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZeffererT13,
  author       = {Thomas Zefferer and
                  Peter Teufl},
  editor       = {Pierangela Samarati},
  title        = {Policy-based Security Assessment of Mobile End-user Devices - An Alternative
                  to Mobile Device Management Solutions for Android Smartphones},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {347--354},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223184/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZeffererT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZhouVH13,
  author       = {Lan Zhou and
                  Vijay Varadharajan and
                  Michael Hitchens},
  editor       = {Pierangela Samarati},
  title        = {Trust-based Secure Cloud Data Storage with Cryptographic Role-based
                  Access Control},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {62--73},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223156/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZhouVH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZolotavkinJ13,
  author       = {Yevhen Zolotavkin and
                  Martti Juhola},
  editor       = {Pierangela Samarati},
  title        = {SVD-based Digital Image Watermarking on approximated Orthogonal Matrix},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {321--330},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223181/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZolotavkinJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZwattendorferS13,
  author       = {Bernd Zwattendorfer and
                  Daniel Slamanig},
  editor       = {Pierangela Samarati},
  title        = {Privacy-preserving Realization of the {STORK} Framework in the Public
                  Cloud},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {419--426},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223193/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZwattendorferS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2013,
  editor       = {Pierangela Samarati},
  title        = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  publisher    = {SciTePress},
  year         = {2013},
  isbn         = {978-989-8565-73-0},
  timestamp    = {Tue, 05 Nov 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Al-KhazzarS12,
  author       = {Ahmed Al{-}Khazzar and
                  Nick Savage},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Biometric Identification in Virtual Worlds using Biometric Fusion
                  Techniques},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {263--269},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Al-KhazzarS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AtallahFW12,
  author       = {Mikhail J. Atallah and
                  Keith B. Frikken and
                  Shumiao Wang},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Private Outsourcing of Matrix Multiplication over Closed Semi-rings},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {136--144},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AtallahFW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AthanasiouCBMTG12,
  author       = {George Athanasiou and
                  Chara I. Chalkou and
                  D. Bardis and
                  Harris E. Michail and
                  George Theodoridis and
                  Costas E. Goutis},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {High-throughput Hardware Architectures of the {JH} Round-three {SHA-3}
                  Candidate - An {FPGA} Design and Implementation Approach},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {126--135},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AthanasiouCBMTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BarbuHD12,
  author       = {Guillaume Barbu and
                  Philippe Hoogvorst and
                  Guillaume Duc},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Tampering with Java Card Exceptions - The Exception Proves the Rule},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {55--63},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BarbuHD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BhattacharyaDCBI12,
  author       = {Anup Kumar Bhattacharya and
                  Abhijit Das and
                  Dipanwita Roy Chowdhury and
                  Bhargav Bellur and
                  Aravind Iyer},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {SIMD-based Implementations of Eta Pairing Over Finite Fields of Small
                  Characteristics},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {94--101},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Wed, 20 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BhattacharyaDCBI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BrennerPS12,
  author       = {Michael Brenner and
                  Henning Perl and
                  Matthew Smith},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Practical Applications of Homomorphic Encryption},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {5--14},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Wed, 30 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BrennerPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BringerCP12,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Alain Patey},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {An Application of a Group Signature Scheme with Backward Unlinkability
                  to Biometric Identity Management},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {421--425},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BringerCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BringerP12,
  author       = {Julien Bringer and
                  Alain Patey},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {{VLR} Group Signatures - How to Achieve Both Backward Unlinkability
                  and Efficient Revocation Checks},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {215--220},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BringerP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ButinB12,
  author       = {Denis Butin and
                  Giampaolo Bella},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Verifying Privacy by Little Interaction and No Process Equivalence},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {251--256},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ButinB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CarlosMPC12,
  author       = {Marcelo Carlomagno Carlos and
                  Jean Everson Martina and
                  Geraint Price and
                  Ricardo Felipe Cust{\'{o}}dio},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {A Proposed Framework for Analysing Security Ceremonies},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {440--445},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/CarlosMPC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChouOL12,
  author       = {Yuyu Chou and
                  Jan Oetting and
                  Olga Levina},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Building the Security Foundation to Embrace Public Software-as-a-Service
                  (SaaS) - Security Policies for SaaS Data Protection},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {227--232},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChouOL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ClementeLR12,
  author       = {Patrice Clemente and
                  Jean{-}Fran{\c{c}}ois Lalande and
                  Jonathan Rouzaud{-}Cornabas},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction
                  Honeypots},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {434--439},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ClementeLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Correia12,
  author       = {Lu{\'{\i}}s M. Correia},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {A Perspective of the Networks of the Future and Smart Cities},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 05 Mar 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Correia12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CourtoisML12,
  author       = {Nicolas T. Courtois and
                  Theodosis Mourouzis and
                  Pho V. Le},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Extension of de Weger's Attack on {RSA} with Large Public Keys},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {145--153},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/CourtoisML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DharwadkarA12,
  author       = {Nagaraj V. Dharwadkar and
                  B. B. Amberker},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Reversible Steganographic Scheme with High Embedding Capacity using
                  Dual Cover Images},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {15--24},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/DharwadkarA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Diaz-SantiagoC12,
  author       = {Sandra Diaz{-}Santiago and
                  Debrup Chakraborty},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {On Securing Communication from Profilers},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {154--162},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Diaz-SantiagoC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/EfremovP12,
  author       = {Denis Efremov and
                  Nikolay V. Pakulin},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Sevigator: Network Confinement of Malware Applications and Untrusted
                  Operating Systems},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {395--398},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/EfremovP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/EmuraR12,
  author       = {Keita Emura and
                  Mohammad Shahriar Rahman},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Constructing Secure-channel Free Searchable Encryption from Anonymous
                  {IBE} with Partitioned Ciphertext Structure},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {84--93},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/EmuraR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/EmuraS12,
  author       = {Keita Emura and
                  Takashi Sato},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Flexible Group Key Exchange with On-demand Computation of Subgroup
                  Keys Supporting Subgroup Key Randomization},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {353--357},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/EmuraS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FallahpourMN12,
  author       = {Mehdi Fallahpour and
                  David Meg{\'{\i}}as and
                  Hossein Najaf{-}Zadeh},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Adaptive Speech Watermarking in Wavelet Domain based on Logarithm},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {412--415},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FallahpourMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Fournaris12,
  author       = {Apostolos P. Fournaris},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Distributed Threshold Certificate based Encryption Scheme with No
                  Trusted Dealer},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {314--320},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Fournaris12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Fox12,
  author       = {Geoffrey Charles Fox},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Fox12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Frikken12,
  author       = {Keith B. Frikken},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Cryptographic Enforcement of Access Control while Mitigating Key Sharing},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {245--250},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Frikken12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Garcia12,
  author       = {Johan Garcia},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Quantifying the Benefits of File Size Information for Forensic Hash
                  Matching},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {333--338},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Garcia12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GarciaGVS12,
  author       = {Jesus Luna Garcia and
                  Hamza Ghani and
                  Tsvetoslava Vateva and
                  Neeraj Suri},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Quantitative Assessment of Cloud Security Level Agreements - {A} Case
                  Study},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {64--73},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/GarciaGVS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Govindaraju12,
  author       = {Venu Govindaraju},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Making Sense of All Things Handwritten - From Postal Addresses to
                  Tablet Notes},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Govindaraju12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HameedKF12,
  author       = {Sufian Hameed and
                  Tobias Kloht and
                  Xiaoming Fu},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {408--411},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Sun, 23 Oct 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HameedKF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HammamiS12,
  author       = {Ali Hammami and
                  No{\"{e}}mie Simoni},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Secure and Seamless Session Management in Mobile and Heterogeneous
                  Environment},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {282--289},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HammamiS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Henricksen12,
  author       = {Matt Henricksen},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Two Dragons - {A} Family of Fast Word-based Stream Ciphers},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {35--44},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Henricksen12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoumaniD12,
  author       = {Hanane Houmani and
                  Mourad Debbabi},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Formal Analysis of the {TLS} Handshake Protocol},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {192--205},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoumaniD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Jajodia12,
  author       = {Sushil Jajodia},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {A Mission-centric Framework for Cyber Situational Awareness},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Jajodia12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KhayatiSUO12,
  author       = {Leyli Javid Khayati and
                  Erkay Savas and
                  Berkant Ustaoglu and
                  Cengiz {\"{O}}rencik},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Privacy-preserving Targeted Advertising Scheme for {IPTV} using the
                  Cloud},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {74--83},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KhayatiSUO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KimKC12,
  author       = {Byoung{-}Koo Kim and
                  Ikkyun Kim and
                  Tai{-}Myoung Chung},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Network-based Executable File Extraction and Analysis for Malware
                  Detection},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {430--433},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KimKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Kiviharju12,
  author       = {Mikko Kiviharju},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Towards Pervasive Cryptographic Access Control Models},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {239--244},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Kiviharju12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KlonowskiSW12,
  author       = {Marek Klonowski and
                  Piotr Syga and
                  Wojciech Wodo},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving
                  Information and Simple Countermeasures},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {296--301},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KlonowskiSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KotenkoCN12,
  author       = {Igor V. Kotenko and
                  Andrey Chechulin and
                  Evgenia Novikova},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Attack Modelling and Security Evaluation for Security Information
                  and Event Management},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {391--394},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Wed, 05 Nov 2014 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KotenkoCN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KotenkoPS12,
  author       = {Igor V. Kotenko and
                  Olga Polubelova and
                  Igor Saenko},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Data Repository for Security Information and Event Management in Service
                  Infrastructures},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {308--313},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KotenkoPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LampeP12,
  author       = {Rodolphe Lampe and
                  Jacques Patarin},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Analysis of Some Natural Variants of the {PKP} Algorithm},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {209--214},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/LampeP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LegendreDK12,
  author       = {Florian Legendre and
                  Gilles Dequen and
                  Micha{\"{e}}l Krajecki},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Inverting Thanks to {SAT} Solving - An Application on Reduced-step
                  MD*},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {339--344},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/LegendreDK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LermanMN12,
  author       = {Liran Lerman and
                  Olivier Markowitch and
                  Jorge Nakahara Jr.},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Key Management as a Service},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {276--281},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/LermanMN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiZBZYH12,
  author       = {Min Li and
                  Yulong Zhang and
                  Kun Bai and
                  Wanyu Zang and
                  Meng Yu and
                  Xubin He},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Improving Cloud Survivability through Dependency based Virtual Machine
                  Placement},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {321--326},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiZBZYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Maccari12,
  author       = {Leonardo Maccari},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {A Collaborative Firewall for Wireless Ad-Hoc Social Networks},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {290--295},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Maccari12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MauroMJ12,
  author       = {Alessio Di Mauro and
                  Alessandro Mei and
                  Sushil Jajodia},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Secure File Allocation and Caching in Large-scale Distributed Systems},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {182--191},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MauroMJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MichailAGTG12,
  author       = {Harris E. Michail and
                  George Athanasiou and
                  Andreas Gregoriades and
                  George Theodoridis and
                  Costas E. Goutis},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {On the Development of Totally Self-checking Hardware Design for the
                  {SHA-1} Hash Function},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {270--275},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MichailAGTG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NanavatiJ12,
  author       = {Nirali R. Nanavati and
                  Devesh C. Jinwala},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Privacy Preserving Approaches for Global Cycle Detections for Cyclic
                  Association Rules in Distributed Databases},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {368--371},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/NanavatiJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PatsakisD12,
  author       = {Constantinos Patsakis and
                  Kleanthis Dellios},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Securing In-vehicle Communication and Redefining the Role of Automotive
                  Immobilizer},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {221--226},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PatsakisD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PohlsSMP12,
  author       = {Henrich Christopher P{\"{o}}hls and
                  Kai Samelin and
                  Hermann de Meer and
                  Joachim Posegga},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Flexible Redactable Signature Schemes for Trees - Extended Security
                  Model and Construction},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {113--125},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PohlsSMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PolychroniadouCS12,
  author       = {Antigoni Polychroniadou and
                  Konstantinos Chalkias and
                  George Stephanides},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {The Concept of Compatibility between Identity-based and Certificateless
                  Encryption Schemes},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {403--407},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PolychroniadouCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RassK12,
  author       = {Stefan Rass and
                  Michal Koza},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {On Secure Communication over Wireless Sensor Networks},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {364--367},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/RassK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RatnayakeKY12,
  author       = {Deepthi N. Ratnayake and
                  Hassan B. Kazemian and
                  Syed A. Yusuf},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Improved Detection of Probe Request Attacks - Using Neural Networks
                  and Genetic Algorithm},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {345--350},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/RatnayakeKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ReinmanW12,
  author       = {Tzachy Reinman and
                  Erez Waisbard},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {PPiTTA - Preserving Privacy in {TV} Targeted Advertising},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {327--332},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ReinmanW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RyckDPJ12,
  author       = {Philippe De Ryck and
                  Lieven Desmet and
                  Frank Piessens and
                  Wouter Joosen},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {A Security Analysis of Emerging Web Standards - {HTML5} and Friends,
                  from Specification to Implementation},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {257--262},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/RyckDPJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchiavoV12,
  author       = {Chiara Valentina Schiavo and
                  Andrea Visconti},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {302--307},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchiavoV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchickR12,
  author       = {Rainer Schick and
                  Christoph Ruland},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Non-repudiation of Forwarding - Traceability of Confidential Data
                  Via Multiple Recipients},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {387--390},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchickR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchutteFG12,
  author       = {Julian Sch{\"{u}}tte and
                  Hervais Simo Fhom and
                  Mark Gall},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Security Policies in Dynamic Service Compositions},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {233--238},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchutteFG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchutteSS12,
  author       = {Martin Sch{\"{u}}tte and
                  Thomas Scheffler and
                  Bettina Schnor},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor
                  Discovery Protocol},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {399--402},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchutteSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SojkaP12,
  author       = {Anna Sojka and
                  Krzysztof Piotrowski},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {lmRNG: {A} Lightweight Pseudorandom Number Generator for Wireless
                  Sensor Networks},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {358--363},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SojkaP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SonnenbichlerG12,
  author       = {Andreas C. Sonnenbichler and
                  Andreas Geyer{-}Schulz},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {{ADQL:} {A} Flexible Access Definition and Query Language to Define
                  Access Control Models},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {379--386},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SonnenbichlerG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SunWZ12,
  author       = {Yonglin Sun and
                  Yongjun Wang and
                  Yi Zhang},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Self-ad-MCNHA-SLOS - {A} Self-adaptive Minimum-Cost Network Hardening
                  Algorithm based on Stochastic Loose Optimize Strategy},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {372--378},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SunWZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Tunstall12,
  author       = {Michael Tunstall},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Improved "Partial Sums"-based Square Attack on {AES}},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {25--34},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Tunstall12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VetterUWS12,
  author       = {Benjamin Vetter and
                  Osman Ugus and
                  Dirk Westhoff and
                  Christoph Sorge},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {102--112},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/VetterUWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VitaliVSBM12,
  author       = {Domenico Vitali and
                  Antonio Villani and
                  Angelo Spognardi and
                  Roberto Battistoni and
                  Luigi V. Mancini},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {DDoS Detection with Information Theory Metrics and Netflows - {A}
                  Real Case},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {172--181},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/VitaliVSBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YangHS12,
  author       = {Chenguang Yang and
                  Ghaith Hammouri and
                  Berk Sunar},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Voice Passwords Revisited},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {163--171},
  publisher    = {SciTePress},
  year         = {2012},
  url          = {https://10.5220/0004060201630171},
  timestamp    = {Thu, 16 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YangHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YiTO12,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Identity-based Password-Authenticated Key Exchange for Client/Server
                  Model},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {45--54},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/YiTO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YoonOKJ12,
  author       = {Seungyong Yoon and
                  Jintae Oh and
                  Ikkyun Kim and
                  Jongsoo Jang},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Defense Against {TCP} Flooding Attack},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {416--420},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/YoonOKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YouL12,
  author       = {Lin You and
                  Jie Lu},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {A Novel Fuzzy Vault Scheme for Secret Key Exchange},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {426--429},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/YouL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2012,
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {SciTePress},
  year         = {2012},
  isbn         = {978-989-8565-24-2},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Abyaneh11,
  author       = {Mohammad Reza Sohizadeh Abyaneh},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {293--299},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Abyaneh11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlcaidePBA11,
  author       = {Almudena Alcaide and
                  Esther Palomar and
                  Israel Barroso{-}Perez and
                  Ali E. Abdallah},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Privacy-enhancing Cryptography-based Materials},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {379--382},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlcaidePBA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AokiRSS11,
  author       = {Kazumaro Aoki and
                  G{\"{u}}nther Roland and
                  Yu Sasaki and
                  Martin Schl{\"{a}}ffer},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Byte Slicing Gr{\o}stl - Optimized Intel {AES-NI} and 8-bit Implementations
                  of the {SHA-3} Finalist Gr{\o}stl},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {124--133},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AokiRSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BernabePCCPG11,
  author       = {Jorge Bernal Bernab{\'{e}} and
                  Juan Manuel Mar{\'{\i}}n P{\'{e}}rez and
                  Jos{\'{e}} M. Alcaraz Calero and
                  F{\'{e}}lix J. Garc{\'{\i}}a Clemente and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Towards an Authorization System for Cloud Infrastructure Providers},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {333--338},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BernabePCCPG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BiswasCD11,
  author       = {Praloy Kr. Biswas and
                  Dipanwita Roy Chowdhury and
                  Kankar S. Dasgupta},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Fast Selective Encryption Scheme for {MP3} Files - Using {GRAIN} Stream
                  Cipher},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {414--417},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BiswasCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BlantonA11,
  author       = {Marina Blanton and
                  Mehrdad Aliasgari},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {On the (Non-)reusability of Fuzzy Sketches and Extractors and Security
                  in the Computational Setting},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {68--77},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BlantonA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BounaCG11,
  author       = {Bechara al Bouna and
                  Richard Chbeir and
                  Alban Gabillon},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {The Image Protector - {A} Flexible Security Rule Specification Toolkit},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {345--350},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BounaCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BousquetCL11,
  author       = {Aline Bousquet and
                  Patrice Clemente and
                  Jean{-}Fran{\c{c}}ois Lalande},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {{SYNEMA:} Visual Monitoring of Network and System Security Sensors},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {375--378},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BousquetCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BrahmiYP11,
  author       = {Imen Brahmi and
                  Sadok Ben Yahia and
                  Pascal Poncelet},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Snort-based Mobile Agent for a Distributed Intrusion Detection System},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {198--207},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BrahmiYP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BrennerWVS11,
  author       = {Michael Brenner and
                  Jan Wiebelitz and
                  Gabriele von Voigt and
                  Matthew Smith},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Smart-gentry based Software System for Secret Program Execution},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {238--244},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 30 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BrennerWVS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Cabello11,
  author       = {Enrique Cabello},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Face Biometrics without Intrusion in Airport},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {09},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Cabello11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CaoO11,
  author       = {Xiaolin Cao and
                  M{\'{a}}ire O'Neill},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Forward Private Protocol based on {PRNG} and {LPN} for Low-cost
                  {RFID}},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {287--292},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CaoO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Chao11,
  author       = {Han{-}Chieh Chao},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {WiMAX? - {A} Case Study on Minimizing Construction Cost for {IEEE}
                  802.16j Multi-hop Relay Networks},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {05},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Chao11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChenV11,
  author       = {Yanling Chen and
                  A. J. Han Vinck},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Fresh Look into the Biometric Authentication - Perspective from
                  Shannon's Secrecy System and a Special Wiretap Channel},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {168--177},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChenV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CourtoisM11,
  author       = {Nicolas T. Courtois and
                  Theodosis Mourouzis},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Black-box Collision Attacks on the Compression Function of the {GOST}
                  Hash Function},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {325--332},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CourtoisM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DasVGMNN11,
  author       = {Saptarsi Das and
                  Keshavan Varadarajan and
                  Ganesh Garga and
                  Rajdeep Mondal and
                  Ranjani Narayan and
                  S. K. Nandy},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Method for Flexible Reduction over Binary Fields using a Field Multiplier},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {50--58},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DasVGMNN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FarmerA11,
  author       = {Michael E. Farmer and
                  William Arthur},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Study of the Phenomenology of {DDOS} Network Attacks in Phase Space},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {78--89},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FarmerA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FiazzaPV11,
  author       = {Maria{-}Camilla Fiazza and
                  Michele Peroli and
                  Luca Vigan{\`{o}}},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Attack Interference in Non-collaborative Scenarios for Security Protocol
                  Analysis},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {144--156},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Mon, 22 Aug 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FiazzaPV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FischerIP11,
  author       = {Michael J. Fischer and
                  Michaela Iorga and
                  Ren{\'{e}} Peralta},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Public Randomness Service},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {434--438},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/FischerIP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Fournaris11,
  author       = {Apostolos P. Fournaris},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Distributed Threshold Cryptography Certification with No Trusted Dealer},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {400--404},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Fournaris11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FriotGB11,
  author       = {Nicolas Friot and
                  Christophe Guyeux and
                  Jacques M. Bahi},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Chaotic Iterations for Steganography - Stego-security and Chaos-security},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {218--227},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FriotGB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaKMS11,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Kouichi Sakurai},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Towards Optimal Revocation and Tracing Schemes - The Power of the
                  Ternary Tree},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {37--49},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaKMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GligoroskiKAJ11,
  author       = {Danilo Gligoroski and
                  Svein Johan Knapskog and
                  J{\o}rn Amundsen and
                  Rune Erlend Jensen},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Internationally Standardized Efficient Cryptographic Hash Function},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {426--433},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GligoroskiKAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Gomi11,
  author       = {Hidehito Gomi},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Data and Access Management using Access Tokens for Delegating Authority
                  to Persons and Software},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {457--463},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Gomi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GrozaM11,
  author       = {Bogdan Groza and
                  Pal{-}Stefan Murvay},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Higher Layer Authentication for Broadcast in Controller Area Networks},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {188--197},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GrozaM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HajnyMZ11,
  author       = {Jan Hajny and
                  Lukas Malina and
                  Vaclav Zeman},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Practical Anonymous Authentication - Designing Anonymous Authentication
                  for Everyday Use},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {405--408},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HajnyMZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Hernandez-CastroRC11,
  author       = {Carlos Javier Hern{\'{a}}ndez{-}Castro and
                  Arturo Ribagorda and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {On the Strength of Egglue and Other Logic CAPTCHAs},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {157--167},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Hernandez-CastroRC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/InamuraIWNT11,
  author       = {Masaki Inamura and
                  Keiichi Iwamura and
                  Ryu Watanabe and
                  Makoto Nishikawa and
                  Toshiaki Tanaka},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A New Tree-structure-specified Multisignature Scheme for a Document
                  Circulation System},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {362--369},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/InamuraIWNT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ItaniKC11,
  author       = {Wassim Itani and
                  Ayman I. Kayssi and
                  Ali Chehab},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Policy-based Security Channels for Protecting Network Communication
                  in Mobile Cloud Computing},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {450--456},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ItaniKC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Jeske11,
  author       = {Tobias Jeske},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Privacy-preserving Smart Metering without a Trusted-third-party},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {114--123},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Jeske11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JiagueFGKLMS11,
  author       = {Michel Embe Jiague and
                  Marc Frappier and
                  Fr{\'{e}}d{\'{e}}ric Gervais and
                  Pierre Konopacki and
                  R{\'{e}}gine Laleau and
                  J{\'{e}}r{\'{e}}my Milhau and
                  Richard St{-}Denis},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Four-concern-oriented Secure {IS} Development Approach},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {464--471},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JiagueFGKLMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JouhariS11,
  author       = {Houda Jouhari and
                  El Mamoun Souidi},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A New Steganographic Scheme based on First Order Reed Muller Codes
                  - {A} New Steganographic Scheme},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {351--356},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JouhariS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Kasten11,
  author       = {Andreas Kasten},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Towards an Information Control Policy Model - Achieving More Transparency
                  in Internet Filtering Approaches},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {409--413},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Kasten11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KlonowskiKK11,
  author       = {Marek Klonowski and
                  Michal Koza and
                  Miroslaw Kutylowski},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {How to Transmit Messages via {WSN} in a Hostile Environment},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {387--390},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KlonowskiKK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lackner11,
  author       = {G{\"{u}}nther Lackner},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {On the Security of Location Determination and Verification Methods
                  for Wireless Networks},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {263--268},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lackner11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lamersdorf11,
  author       = {Winfried Lamersdorf},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Paradigms of Distributed Software Systems - Services, Processes, and
                  Self-organization},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {011},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lamersdorf11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiuXJL11,
  author       = {Zongbin Liu and
                  Luning Xia and
                  Jiwu Jing and
                  Peng Liu},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {105--113},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Tue, 09 Jul 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiuXJL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LunaGGS11,
  author       = {Jesus Luna Garcia and
                  Hamza Ghani and
                  Daniel Germanus and
                  Neeraj Suri},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Security Metrics Framework for the Cloud},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {245--250},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 05 Sep 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LunaGGS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MaieroM11,
  author       = {Carlo Maiero and
                  Marino Miculan},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Unobservable Intrusion Detection based on Call Traces in Paravirtualized
                  Systems},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {300--306},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MaieroM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ModicaT11,
  author       = {Giuseppe Di Modica and
                  Orazio Tomarchio},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Semantic Annotations for Security Policy Matching in WS-policy},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {443--449},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ModicaT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MylonasDTG11,
  author       = {Alexios Mylonas and
                  Stelios Dritsas and
                  Bill Tsoumas and
                  Dimitris Gritzalis},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Smartphone Security Evaluation - The Malware Attack Case},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {25--36},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MylonasDTG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NakanishiBI11,
  author       = {Isao Nakanishi and
                  Sadanao Baba and
                  Masahiro Inoue},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Driver Authentication using Brain Waves While Route Tracing as a Mental
                  Task},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {90--96},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 24 Jun 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NakanishiBI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PiuriS11,
  author       = {Vincenzo Piuri and
                  Fabio Scotti},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Biometrics Privacy - Technologies and Applications},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {07},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PiuriS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PivaD11,
  author       = {Fabio Piva and
                  Ricardo Dahab},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {E-Commerce and Fair Exchange - The Problem of Item Validation},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {317--324},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PivaD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PopoveniucKL11,
  author       = {Stefan Popoveniuc and
                  John Kelsey and
                  Eugen Leontie},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {On the Privacy Threats of Electronic Poll Books},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {281--286},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PopoveniucKL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PrietoMMI11,
  author       = {Iria Prieto and
                  Eduardo Maga{\~{n}}a and
                  Daniel Morat{\'{o}} and
                  Mikel Izal},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Botnet Detection based on {DNS} Records and Active Probing},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {307--316},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PrietoMMI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RassS11,
  author       = {Stefan Rass and
                  Peter Schartner},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Information-leakage in Hybrid Randomized Protocols},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {134--143},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RassS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RavariF11,
  author       = {Ali Noorollahi Ravari and
                  Mehran S. Fallah},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Logical View of Nonmonotonicity in Access Control},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {472--481},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RavariF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Redouane11,
  author       = {Abdesselam Redouane},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Towards a Calculus for Non Repudiation Protocols},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {383--386},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Redouane11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Rodriguez-GomezMG11,
  author       = {Rafael Rodr{\'{\i}}guez{-}G{\'{o}}mez and
                  Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
                  Pedro Garcia{-}Teodoro},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Analysis of Botnets through Life-cycle},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {257--262},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Sat, 04 Feb 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Rodriguez-GomezMG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SalehaniY11,
  author       = {Yaser Esmaeili Salehani and
                  Amr M. Youssef},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Differential Fault Analysis of Hummingbird},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {357--361},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SalehaniY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SantosLB11,
  author       = {Igor Santos and
                  Carlos Laorden and
                  Pablo Garc{\'{\i}}a Bringas},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Collective Classification for Unknown Malware Detection},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {251--256},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 28 Jul 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SantosLB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SantosLUSB11,
  author       = {Igor Santos and
                  Carlos Laorden and
                  Xabier Ugarte{-}Pedrero and
                  Borja Sanz and
                  Pablo Garc{\'{\i}}a Bringas},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Anomaly-based Spam Filtering},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {5--14},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SantosLUSB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Schutte11,
  author       = {Julian Sch{\"{u}}tte},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Apollon: Towards a Semantically Extensible Policy Framework},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {391--395},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Schutte11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Solis11,
  author       = {John Solis},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Private Searching for Sensitive File Signatures},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {341--344},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Solis11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Stelte11,
  author       = {Bj{\"{o}}rn Stelte},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Byzantine Decisions for Inferring Trust in Sensor Networks},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {396--399},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Stelte11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Suarez-TangilPPR11,
  author       = {Guillermo Suarez{-}Tangil and
                  Esther Palomar and
                  Sergio Pastrana and
                  Arturo Ribagorda},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Artificial Immunity-based Correlation System},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {422--425},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Suarez-TangilPPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TaddeoMF11,
  author       = {Antonio Vincenzo Taddeo and
                  Luis Germ{\'{a}}n Garc{\'{\i}}a Morales and
                  Alberto Ferrante},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Framework for Security and Workload Gradual Adaptation},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {178--187},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TaddeoMF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Varela-VacaGP11,
  author       = {Angel Jesus Varela{-}Vaca and
                  Rafael M. Gasca and
                  Sergio Pozo},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {{OPBUS:} Risk-aware Framework for the Conformance of Security-quality
                  Requirements in Business Processes},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {370--374},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Varela-VacaGP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Vaudenay11,
  author       = {Serge Vaudenay},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Related-key Attack against Triple Encryption based on Fixed Points},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {59--67},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Vaudenay11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VivekSR11,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {{CCA} Secure Certificateless Encryption Schemes based on {RSA}},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {208--217},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VivekSR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VrakasGL11,
  author       = {Nikos Vrakas and
                  Dimitris Geneiatakis and
                  Costas Lambrinoudakis},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {{IS} {IP} Multimedia Subsystem Affected by `Malformed Message' Attacks?
                  - An Evaluation of OpenIMS},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {275--280},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VrakasGL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/XieLLZL11,
  author       = {Xin Xie and
                  Fenlin Liu and
                  Bin Lu and
                  Tao Zhao and
                  Hanning Li},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Static Software Birthmark based on Use-define Chains for Detecting
                  the Theft of Java Programs},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {231--237},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/XieLLZL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/XuZF11,
  author       = {Jing Xu and
                  Wen Tao Zhu and
                  Dengguo Feng},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {A Smart Card based Generic Construction for Anonymous Authentication
                  in Mobile Networks},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {269--274},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/XuZF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YangZLL11,
  author       = {Chunfang Yang and
                  Tao Zhao and
                  Hanning Li and
                  Fenlin Liu},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Embedding Ratio Estimation based on Weighted Stego Image for Embedding
                  in 2LSB},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {97--104},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YangZLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YiTO11,
  author       = {Xun Yi and
                  Raylin Tso and
                  Eiji Okamoto},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Three-party Password-authenticated Key Exchange without Random Oracles},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {15--24},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YiTO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YuB11,
  author       = {Jinying Yu and
                  Philipp Brune},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {No Security by Obscurity - Why Two Factor Authentication Should Be
                  based on an Open Design},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {418--421},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YuB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2011,
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  publisher    = {SciTePress},
  year         = {2011},
  isbn         = {978-989-8425-71-3},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Akyildiz10,
  author       = {Ian F. Akyildiz},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Nanonetworks - {A} New Frontier in Communications},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {5},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Akyildiz10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Al-KhazzarS10,
  author       = {Ahmed Al{-}Khazzar and
                  Nick Savage},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Graphical Authentication based on user Behaviour},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {86--89},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Al-KhazzarS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Alvarez-CuberoZ10,
  author       = {Jos{\'{e}} Antonio {\'{A}}lvarez{-}Cubero and
                  Pedro J. Zufiria},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {A {C++} Class for Analysing Vector Boolean Functions from a Cryptographic
                  Perspective},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {512--520},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Alvarez-CuberoZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AndukuriC10,
  author       = {Murthy S. Andukuri and
                  C. Edward Chow},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Efficient Asymmetric IPSec for Secure iSCSI},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {314--317},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AndukuriC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AzizAJACR10,
  author       = {Benjamin Aziz and
                  Alvaro Arenas and
                  Ian Johnson and
                  Matej Artac and
                  Ales Cernivec and
                  Philip Robinson},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Management of Security Policies in Virtual Organisations},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {467--477},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/AzizAJACR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BakerC10,
  author       = {Bradley Baker and
                  C. Edward Chow},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {{HTEE:} An {HMAC} based Tamper Evident Encryption},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {196--205},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BakerC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BhatSSVP10,
  author       = {Veena H. Bhat and
                  S. Krishna and
                  P. Deepa Shenoy and
                  K. R. Venugopal and
                  Lalit M. Patnaik},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {{HUBFIRE} - {A} Multi-class {SVM} based {JPEG} Steganalysis using
                  {HBCL} Statistics and {FR} Index},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {447--452},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 23 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BhatSSVP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BiryukovPZ10,
  author       = {Alex Biryukov and
                  Deike Priemuth{-}Schmid and
                  Bin Zhang},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Analysis of {SNOW} 3G{\(\oplus\)} Resynchronization Mechanism},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {327--333},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Sat, 22 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BiryukovPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Bourbakis10,
  author       = {Nikolaos G. Bourbakis},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Information Security: The {SCAN} - Secure Processor with Crypto-Biometrics
                  Capabilities},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {11},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 02 Oct 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Bourbakis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CabidduCV10,
  author       = {Giovanni Cabiddu and
                  Emanuele Cesena and
                  Davide Vernizzi},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous
                  Networks},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {221--225},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/CabidduCV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChatzipoulidisM10,
  author       = {Aristeidis Chatzipoulidis and
                  Ioannis Mavridis},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {An {ICT} Security Management Framework},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {459--462},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChatzipoulidisM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ClarkTMCAIS10,
  author       = {John A. Clark and
                  Juan E. Tapiador and
                  John A. McDermid and
                  Pau{-}Chen Cheng and
                  Dakshi Agrawal and
                  Natalie Ivanic and
                  Dave Slogget},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Risk based Access Control with Uncertain and Time-dependent Sensitivity},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {5--13},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ClarkTMCAIS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DarapureddiMP10,
  author       = {Avinash Darapureddi and
                  Radhesh Mohandas and
                  Alwyn Roshan Pais},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Throttling DDoS Attacks using Discrete Logarithm Problem},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {263--269},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/DarapureddiMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DasguptaSN10,
  author       = {Dipankar Dasgupta and
                  Sudip Saha and
                  Aregahegn Negatu},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Techniques for Validation and Controlled Execution of Processes, Codes
                  and Data - {A} Survey},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {77--85},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/DasguptaSN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Djuric10,
  author       = {Petar M. Djuric},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {From Nature to Methods and Back to Nature},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {7},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Djuric10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DorflingerVKF10,
  author       = {Tim D{\"{o}}rflinger and
                  Anna Voth and
                  Juliane Kr{\"{a}}mer and
                  Ronald Fromm},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {"My Smartphone is a Safe!" - The User's Point of View Regarding Novel
                  Authentication Methods and Gradual Security Levels on Smartphones},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {155--164},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/DorflingerVKF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FardW10,
  author       = {Amin Milani Fard and
                  Ke Wang},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {An Effective Clustering Approach to Web Query Log Anonymization},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {109--119},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FardW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FischerK10,
  author       = {Anja Fischer and
                  Winfried E. K{\"{u}}hnhauser},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Efficient Algorithmic Safety Analysis of {HRU} Security Models},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {49--58},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/FischerK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FrikkenZ10,
  author       = {Keith B. Frikken and
                  Yihua Zhang},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Confidentiality and Integrity for {SUM} Aggregation in Sensor Networks},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {231--240},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/FrikkenZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GibsonCM10,
  author       = {Marcia Gibson and
                  Marc Conrad and
                  Carsten Maple},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Infinite Alphabet Passwords - {A} Unified Model for a Class of Authentication
                  Systems},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {94--99},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/GibsonCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GmelchP10,
  author       = {Oliver Gmelch and
                  G{\"{u}}nther Pernul},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Preventing Malicious Portlets from Communicating and Intercepting
                  in Collaboration Portals},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {177--182},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/GmelchP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GuyeuxB10,
  author       = {Christophe Guyeux and
                  Jacques M. Bahi},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {A New Chaos-based Watermarking Algorithm},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {455--458},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/GuyeuxB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HajnyPZ10,
  author       = {Jan Hajny and
                  Tomas Pelka and
                  Vaclav Zeman},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Privacy Protection for user Authentication},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {90--93},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HajnyPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Hernandez-CastroRS10,
  author       = {Carlos Javier Hern{\'{a}}ndez{-}Castro and
                  Arturo Ribagorda and
                  Yago S{\'{a}}ez},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Side-channel Attack on the HumanAuth {CAPTCHA}},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {59--65},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Thu, 27 Oct 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Hernandez-CastroRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IbraimiAP10,
  author       = {Luan Ibraimi and
                  Muhammad Asim and
                  Milan Petkovic},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {An Encryption Scheme for a Secure Policy Updating},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {399--408},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IbraimiAP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IonRC10,
  author       = {Mihaela Ion and
                  Giovanni Russello and
                  Bruno Crispo},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Providing Confidentiality in Content-based Publish/subscribe Systems},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {287--292},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/IonRC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KarimiC10,
  author       = {Vahid R. Karimi and
                  Donald D. Cowan},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Access Control Models for Business Processes},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {489--498},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KarimiC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Kartalopoulos10,
  author       = {Stamatios V. Kartalopoulos},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Chaotic Quantum Cryptography - The Ultimate for Network Security},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {9},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Kartalopoulos10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Kumar10,
  author       = {Sandeep S. Kumar},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Anonymous Social Stamps - Authenticating Anonymous Statements to Friends
                  with Privacy},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {183--188},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Kumar10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KumarAVLR10,
  author       = {Swarun Kumar and
                  Shivank Agrawal and
                  Ramarathnam Venkatesan and
                  Satyanarayana V. Lokam and
                  C. Pandu Rangan},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Forcing Out a Confession - Threshold Discernible Ring Signatures},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {379--388},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KumarAVLR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lang10,
  author       = {Bo Lang},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Trust Degree based Access Control for Social Networks},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {43--48},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LangarMA10,
  author       = {Mahjoub Langar and
                  Mohamed Mejri and
                  Kamel Adi},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Rewriting-based Security Enforcement of Concurrent Systems - {A} Formal
                  Approach},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {66--74},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/LangarMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MallikM10,
  author       = {Dibyendu Mallik and
                  Debdeep Mukhopadhyay},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {New Pseudo Near Collision Attack on Tiger},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {427--430},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MallikM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MannesSLS10,
  author       = {Elisa Mannes and
                  Eduardo da Silva and
                  Michele Nogueira Lima and
                  Aldri Luiz dos Santos},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Implications of Misbehaving Attacks on Probabilistic Quorum System
                  for MANETs},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {189--195},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Tue, 11 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MannesSLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MappALP10,
  author       = {Glenford E. Mapp and
                  Mahdi Aiash and
                  Aboubaker Lasebae and
                  Raphael Chung{-}Wei Phan},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Security Models for Heterogeneous Networking},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {318--321},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 14 Feb 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MappALP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MichailAKGGP10,
  author       = {Harris E. Michail and
                  George Athanasiou and
                  Angeliki Kritikakou and
                  Costas E. Goutis and
                  Andreas Gregoriades and
                  Vicky G. Papadopoulou},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Ultra High Speed {SHA-256} Hashing Cryptographic Module for IPSec
                  Hardware/Software Codesign},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {309--313},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MichailAKGGP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MichalopoulosM10,
  author       = {Dimitrios Michalopoulos and
                  Ioannis Mavridis},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Towards Risk based Prevention of Grooming Attacks},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {217--220},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MichalopoulosM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MillikenM10,
  author       = {Jonny Milliken and
                  Alan Marshall},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {The Threat-Victim Table - {A} Security Prioritisation Framework For
                  Diverse {WLAN} Network Topographies},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {37--42},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 08 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MillikenM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MunillaOP10,
  author       = {Jorge Munilla and
                  Andr{\'{e}}s Ortiz and
                  Alberto Peinado},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {What can {RFID} do for Vanets? - {A} Cryptographic Point of View},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {295--298},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Thu, 28 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MunillaOP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MunozGA10,
  author       = {Alfonso Mu{\~{n}}oz Mu{\~{n}}oz and
                  Justo Carracedo Gallardo and
                  Irina Arguelles {\'{A}}lvarez},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Improving N-Gram Linguistic Steganography based on Templates},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {209--212},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MunozGA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NakanoKKT10,
  author       = {Yuto Nakano and
                  Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {On a Construction of Stream-cipher-based Hash Functions},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {334--343},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/NakanoKKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NeupaneS10,
  author       = {Kashi Neupane and
                  Rainer Steinwandt},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Server-assisted Long-term Secure 3-party Key Establishment},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {372--378},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/NeupaneS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OttavianiZR10,
  author       = {Vittorio Ottaviani and
                  Alberto Zanoni and
                  Massimo Regoli},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Conjugation as Public Key Agreement Protocol in Mobile Cryptography},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {411--416},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/OttavianiZR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PanosXS10,
  author       = {Christoforos Panos and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {A Novel Intrusion Detection System for MANETs},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {25--34},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PanosXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PapanikolaouCGMP10,
  author       = {Nick Papanikolaou and
                  Sadie Creese and
                  Michael Goldsmith and
                  Marco Casassa Mont and
                  Siani Pearson},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {EnCoRe: Towards a Holistic Approach to Privacy},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {171--176},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Wed, 03 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PapanikolaouCGMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PatelMP10,
  author       = {Vipul Patel and
                  Radhesh Mohandas and
                  Alwyn R. Pais},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Attacks on Web Services and Mitigation Schemes},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {499--504},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PatelMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PengB10,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Vulnerability of a Non-membership Proof Scheme},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {419--422},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PengB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PopoveniucL10,
  author       = {Stefan Popoveniuc and
                  Eugen Leontie},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Safe {RPC} - Auditing Mixnets Safely using Randomized Partial Checking},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {165--170},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PopoveniucL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PuraPB10,
  author       = {Mihai{-}Lica Pura and
                  Victor Valeriu Patriciu and
                  Ion Bica},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Formal Verification of {G-PAKE} Using Casper/FDR2 - Securing a Group
                  {PAKE} Protocol Using Casper/FDR2},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {299--303},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/PuraPB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SelviVAR10,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Sakhi S. Anand and
                  C. Pandu Rangan},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {An Identity based Ring Signcryption Scheme with Public Verifiability},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {362--371},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SelviVAR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SharT10,
  author       = {Lwin Khin Shar and
                  Hee Beng Kuan Tan},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Auditing the Defense Against Cross Site Scripting in Web Applications},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {505--511},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SharT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SlamanigR10,
  author       = {Daniel Slamanig and
                  Stefan Rass},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Anonymous but Authorized Transactions Supporting Selective Traceability},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {132--141},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SlamanigR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SojkaPL10,
  author       = {Anna Sojka and
                  Krzysztof Piotrowski and
                  Peter Langend{\"{o}}rfer},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Short {ECC} - {A} Lightweight Security Approach for Wireless Sensor
                  Networks},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {304--308},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/SojkaPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/StavrouPHH10,
  author       = {Eliana Stavrou and
                  Andreas Pitsillides and
                  George C. Hadjichristofi and
                  Christoforos N. Hadjicostis},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Security in Future Mobile Sensor Networks - Issues and Challenges},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {278--286},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/StavrouPHH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TabiaL10,
  author       = {Karim Tabia and
                  Philippe Leray},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Handling IDS' Reliability in Alert Correlation - {A} Bayesian Network-based
                  Model for Handling IDS's Reliability and Controlling Prediction/False
                  Alarm Rate Tradeoffs},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {14--24},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Tue, 30 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/TabiaL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/TaddeoMF10,
  author       = {Antonio Vincenzo Taddeo and
                  Marcello Mura and
                  Alberto Ferrante},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {QoS and Security in Energy-harvesting Wireless Sensor Networks},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {241--250},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/TaddeoMF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UshidaOKY10,
  author       = {Mebae Ushida and
                  Kazuo Ohta and
                  Yutaka Kawai and
                  Kazuki Yoneyama},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Proxiable Designated Verifier Signature},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {344--353},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/UshidaOKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VascoHV10,
  author       = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and
                  Somayeh Heidarvand and
                  Jorge L. Villar},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Anonymous Subscription Schemes - {A} Flexible Construction for On-line
                  Services Access},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {120--131},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 31 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/VascoHV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Vaya10,
  author       = {Shailesh Vaya},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Realizing Secure Multiparty Computation on Incomplete Networks},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {270--277},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Vaya10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WahidR10,
  author       = {Khan Ferdous Wahid and
                  Javier Rubio{-}Loyola},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Secure Bridging in Large Scale Deployment of Ethernet},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {251--260},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/WahidR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Wang10,
  author       = {Alex Hai Wang},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Don't Follow Me - Spam Detection in Twitter},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {142--151},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Wang10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WilliamsTH10,
  author       = {David M. Williams and
                  Helen Treharne and
                  Anthony T. S. Ho},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {On the Importance of One-time Key Pairs in Buyer-seller Watermarking
                  Protocols},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {441--446},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/WilliamsTH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WuWL10,
  author       = {Xiaoyu Wu and
                  Duncan S. Wong and
                  Qing Li},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Extended Visual Cryptography Scheme for Color Images with no Pixel
                  Expansion},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {423--426},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/WuWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YeeXM10,
  author       = {George Yee and
                  Xingli Xie and
                  Shikharesh Majumdar},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Automated Threat Identification for {UML}},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {521--527},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/YeeXM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YuWZL10,
  author       = {Meng Yu and
                  Alex Hai Wang and
                  Wanyu Zang and
                  Peng Liu},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Evaluating Survivability and Costs of Three Virtual Machine based
                  Server Architectures},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {478--485},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YuWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZaidiAK10,
  author       = {Abdelhalim Zaidi and
                  Nazim Agoulmine and
                  Tayeb Kenaza},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Piecewise Classification of Attack Patterns for Efficient Network
                  Intrusion Detection},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {100--104},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZaidiAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZannonePE10,
  author       = {Nicola Zannone and
                  Milan Petkovic and
                  Sandro Etalle},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Towards Data Protection Compliance},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {213--216},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZannonePE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZhouMDZPZ10,
  author       = {Xiaoyi Zhou and
                  Jixin Ma and
                  Wencai Du and
                  Bo Zhao and
                  Miltos Petridis and
                  Yongzhe Zhao},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {{BMQE} System - {A} {MQ} Equations System based on Ergodic Matrix},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {431--435},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZhouMDZPZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZhuANS10,
  author       = {Huafei Zhu and
                  Tadashi Araragi and
                  Takashi Nishide and
                  Kouichi Sakurai},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Adaptive and Composable Non-interactive String-commitment Protocols},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {354--361},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZhuANS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZhuANS10a,
  author       = {Huafei Zhu and
                  Tadashi Araragi and
                  Takashi Nishide and
                  Kouichi Sakurai},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Universally Composable Non-committing Encryptions in the Presence
                  of Adaptive Adversaries},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {389--398},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZhuANS10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2010,
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {SciTePress},
  year         = {2010},
  isbn         = {978-989-8425-18-8},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AzerEE09,
  author       = {Marianne Azer and
                  Sherif El{-}Kassas and
                  Magdy S. El{-}Soudani},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based
                  Schemes},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {69--74},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Wed, 22 Jun 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AzerEE09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BaileyBRP09,
  author       = {Daniel V. Bailey and
                  John G. Brainard and
                  Sebastian Rohde and
                  Christof Paar},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {One-touch Financial Transaction Authentication},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {5--12},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BaileyBRP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BarisonMM09,
  author       = {Dherik Barison and
                  Rodrigo Sanches Miani and
                  Leonardo de Souza Mendes},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Evaluation of Quality and Security of a VoIP Network based on Asterisk
                  and OpenVPN},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {144--147},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 11 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BarisonMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenferhatBD09,
  author       = {Salem Benferhat and
                  Abdelhamid Boudjelida and
                  Habiba Drias},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Adding Expert Knowledge to TAN-based Intrusion Detection Systems},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {61--64},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 20 Jan 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenferhatBD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BhaumikC09,
  author       = {Jaydeb Bhaumik and
                  Dipanwita Roy Chowdhury},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Nmix: An Ideal Candidate for Key Mixing},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {285--288},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BhaumikC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BourgeoisH09,
  author       = {Julien Bourgeois and
                  Syed Raheel Hassan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Managing Security of Grid Architecture with a Grid Security Operation
                  Center},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {403--408},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BourgeoisH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChenJ09,
  author       = {Shiwei Chen and
                  Chenhui Jin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation
                  for Hash Functions},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {245--248},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChenJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChengGH09,
  author       = {Jingde Cheng and
                  Yuichi Goto and
                  Daisuke Horie},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{ISEE:} An Information Security Engineering Environment},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {395--400},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChengGH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChewZK09,
  author       = {Guanhan Chew and
                  Aileen Zhang and
                  Khoongming Khoo},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland
                  Functions},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {159--162},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChewZK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChoiLKK09,
  author       = {Jaeun Choi and
                  Myungjong Lee and
                  Gisung Kim and
                  Sehun Kim},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Monitoring Node Selection Algorithm for Intrusion Detection in Congested
                  Sensor Network},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {117--120},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChoiLKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Corral-GarciaGSG09,
  author       = {Javier Corral{-}Garc{\'{\i}}a and
                  Carlos{-}Jorge del Arco Gonz{\'{a}}lez and
                  Jos{\'{e}} Luis Gonz{\'{a}}lez S{\'{a}}nchez and
                  Jos{\'{e}} Luis Redondo Garc{\'{\i}}a},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Free Security Suite 2 - Easy, Intuitive and Complete Free Security
                  Suite with Web Browser Integration},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {341--344},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Mon, 18 May 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Corral-GarciaGSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Courtois09,
  author       = {Nicolas T. Courtois},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {The Dark Side of Security by Obscurity - and Cloning MiFare Classic
                  Rail and Building Passes, Anywhere, Anytime},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {331--338},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Courtois09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CretTSG09,
  author       = {Octavian Cret and
                  Radu Tudoran and
                  Alin Suciu and
                  Tamas Gy{\"{o}}rfi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Implementing True Random Number Generators in FPGAs by Chip Filling},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {167--174},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CretTSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Dagorn09,
  author       = {Nathalie Dagorn},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Identifying Security Elements for Cooperative Information Systems},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {319--324},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Dagorn09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Dragan09,
  author       = {Constantin Catalin Dragan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Interactive Secret Share Management},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {266--269},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Dragan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Gallego-NicasioMMS09,
  author       = {Beatriz Gallego{-}Nicasio and
                  Antonio Mu{\~{n}}oz and
                  Antonio Ma{\~{n}}a and
                  Daniel Serrano},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Security Patterns, Towards a Further Level},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {349--356},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Gallego-NicasioMMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GujjunooriSJDMP09,
  author       = {Saraiah Gujjunoori and
                  Taqi Ali Syed and
                  Madhu Babu J. and
                  Avinash Darapureddi and
                  Radhesh Mohandas and
                  Alwyn R. Pais},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Throttling DDoS Attacks},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {121--126},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/GujjunooriSJDMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HajnyPL09,
  author       = {Jan Hajny and
                  Tomas Pelka and
                  Petra Lambertova},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Universal Authentication Framework - Requirements and Phase Design},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {57--60},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HajnyPL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HamadK09,
  author       = {A. M. Hamad and
                  Walid I. Khedr},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Ad-hoc on Demand Authentication Chain Protocol - An Authentication
                  Protocol for Ad-Hoc Networks},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {274--284},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Tue, 12 Jan 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/HamadK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HegazyED09,
  author       = {Ola M. Hegazy and
                  Ayman M. Bahaa Eldin and
                  Yasser H. Dakroury},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Quantum Secure Direct Communication using Entanglement and Super Dense
                  Coding},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {175--181},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HegazyED09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HeoOJ09,
  author       = {Young{-}Jun Heo and
                  Jintae Oh and
                  Jongsoo Jang},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Behavior-based Clustering for Discrimination between Flash Crowds
                  and DDoS Attacks},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {140--143},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HeoOJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Hernandez-ArdietaFRR09,
  author       = {Jorge L. Hernandez{-}Ardieta and
                  Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and
                  Benjam{\'{\i}}n Ramos and
                  Arturo Ribagorda},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {On the Need to Divide the Signature Creation Environment},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {375--380},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Hernandez-ArdietaFRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Hutter09,
  author       = {Michael Hutter},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{RFID} Authentication Protocols based on Elliptic Curves - {A} Top-Down
                  Evaluation Survey},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {101--110},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Hutter09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IatrouVS09,
  author       = {Michael G. Iatrou and
                  Artemios G. Voyiatzis and
                  Dimitrios N. Serpanos},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Network Stack Optimization for Improved IPsec Performance on Linux},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {83--91},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IatrouVS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JakubowskiSV09,
  author       = {Mariusz H. Jakubowski and
                  Chit Wei Saw and
                  Ramarathnam Venkatesan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Iterated Transformations and Quantitative Metrics for Software Protection},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {359--368},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 11 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JakubowskiSV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Jin09,
  author       = {Hongxia Jin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Efficient Traitor Tracing for Content Protection},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {270--273},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Jin09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoFM09,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Keith M. Martin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Offline Peer-to-peer Broadcasting Scheme with Anonymity},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {75--82},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoFM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KosterKNBBO09,
  author       = {Friedrich K{\"{o}}ster and
                  Michael Klaas and
                  Hanh Quyen Nguyen and
                  Walter Brenner and
                  Markus Br{\"{a}}ndle and
                  Sebastian Obermeier},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Collaborative Security Assessments in Embedded Systems Development
                  - The {ESSAF} Framework for Structured Qualitative Analysis},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {305--312},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KosterKNBBO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Leymann09,
  author       = {Frank Leymann},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Cloud Computing - Fundamental Architecture {\&} Future Applications},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {31--31},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 11 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Leymann09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LinHY09,
  author       = {Changlu Lin and
                  Lein Harn and
                  Dingfeng Ye},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Information-theoretically Secure Strong Verifiable Secret Sharing},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {233--238},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LinHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Marca09,
  author       = {David A. Marca},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {e-Business Design - {A} Shift to Adaptability},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {21--29},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Marca09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MianiPM09,
  author       = {Rodrigo Sanches Miani and
                  Felipe Marques Pires and
                  Leonardo de Souza Mendes},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Alternative Approach for Formula Modelling in Security Metrics},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {381--386},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MianiPM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Mihai-LicaPB09,
  author       = {Mihai{-}Lica Pura and
                  Victor Valeriu Patriciu and
                  Ion Bica},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {135--139},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 07 Jan 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Mihai-LicaPB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MisraOBBG09,
  author       = {Sudip Misra and
                  Mohammad S. Obaidat and
                  Atig Bagchi and
                  Ravindara Bhatt and
                  Soumalya Ghosh},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Attack Graph Generation with Infused Fuzzy Clustering},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {92--98},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MisraOBBG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NguyenKKBOB09,
  author       = {Hanh Quyen Nguyen and
                  Friedrich K{\"{o}}ster and
                  Michael Klaas and
                  Walter Brenner and
                  Sebastian Obermeier and
                  Markus Br{\"{a}}ndle},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Tool Support for Achieving Qualitative Security Assessments of Critical
                  Infrastructures - The {ESSAF} Framework for Structured Qualitative
                  Analysis},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {297--304},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NguyenKKBOB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW09,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Certified Pseudonyms Colligated with Master Secret Key},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {190--197},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PozoVGC09,
  author       = {Sergio Pozo and
                  Angel Jesus Varela{-}Vaca and
                  Rafael M. Gasca and
                  Rafael Ceballos},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Efficient Algorithms and Abstract Data Types for Local Inconsistency
                  Isolation in Firewall ACLs},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {42--53},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Wed, 15 Jun 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PozoVGC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RahmaniSK09,
  author       = {Hamza Rahmani and
                  Nabil Sahli and
                  Farouk Kamoun},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Traffic Coherence Analysis Model for DDoS Attack Detection},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {148--154},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Mon, 18 Jun 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RahmaniSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Reistad09,
  author       = {Tord Ingolf Reistad},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Multiparty Comparison - An Improved Multiparty Protocol for Comparison
                  of Secret-shared Values},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {325--330},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Reistad09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RetamosaV09,
  author       = {Germ{\'{a}}n Retamosa and
                  Jorge E. L{\'{o}}pez de Vergara},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Assessment of Mobile Security Platforms},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {127--132},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RetamosaV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RibeiroR09,
  author       = {Leonardo Ribeiro and
                  Guerra Ruy},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Safe Reverse Auctions Protocol - Adding Treatment Against Collusive
                  Shill Bidding and Sniping Attacks},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {239--244},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RibeiroR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RomanovO09,
  author       = {Anton Romanov and
                  Eiji Okamoto},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Approach for Designing of Enterprise {IT} Landscapes to Perform
                  Quantitave Information Security Risk Assessment},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {313--318},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RomanovO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Saeb09,
  author       = {Magdy Saeb},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {The Chameleon Cipher-192 {(CC-192)} - {A} Polymorphic Cipher},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {198--209},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Saeb09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SahaC09,
  author       = {Mounita Saha and
                  Dipanwita Roy Chowdhury},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Efficient Group Key Agreement Protocol for Heterogeneous Environment},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {182--189},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SahaC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Samarati09,
  author       = {Pierangela Samarati},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Protecting Information Privacy in the Electronic Society},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {19--19},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Samarati09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Sato09,
  author       = {Hideo Sato},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Finger Vein Verification Technology for Mobile Apparatus},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {37--41},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Sato09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SengaD09,
  author       = {Wataru Senga and
                  Hiroshi Doi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {On the Security of Adding Confirmers into Designated Confirmer Signatures},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {249--256},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SengaD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Sheikholeslam09,
  author       = {S. Arash Sheikholeslam},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Chaos based Encryption Method using Dynamical Systems with Strange
                  Attractors},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {259--265},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Sheikholeslam09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Shishkov09,
  author       = {Blagovest Shishkov},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Adaptive Antennas in Wireless Communication Networks},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {5--17},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Shishkov09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SichaniM09,
  author       = {Mohsen Hajsalehi Sichani and
                  Ali Movaghar},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A New Analysis of {RC4} - {A} Data Mining Approach {(J48)}},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {213--218},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Wed, 12 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SichaniM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SilvaSA09,
  author       = {Renan Fischer e Silva and
                  Eduardo da Silva and
                  Luiz Carlos Pessoa Albini},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Resisting Impersonation Attacks in Chaining-based Public-Key Management
                  on Manets - The Virtual Public-key Management},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {155--158},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SilvaSA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SlamanigSS09,
  author       = {Daniel Slamanig and
                  Peter Schartner and
                  Christian Stingl},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Practical Traceable Anonymous Identification},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {225--232},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SlamanigSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Torrano-GimenezPA09,
  author       = {Carmen Torrano{-}Gimenez and
                  Alejandro P{\'{e}}rez{-}Villegas and
                  Gonzalo {\'{A}}lvarez},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Anomaly-based Web Application Firewall},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {23--28},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Fri, 03 Jun 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Torrano-GimenezPA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Tout09,
  author       = {Hicham Tout},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Phishpin: An Integrated, Identity-based Anti-phishing Approach},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {369--374},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Tout09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VarshneyC09,
  author       = {Mayank Varshney and
                  Dipanwita Roy Chowdhury},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A New Image Encryption Algorithm using Cellular Automata},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {289--292},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VarshneyC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VerslypeD09,
  author       = {Kristof Verslype and
                  Bart De Decker},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Service and Timeframe Dependent Unlinkable One-time Pseudonyms},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {13--20},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VerslypeD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VivekSR09,
  author       = {S. Sree Vivek and
                  S. Sharmila Deva Selvi and
                  C. Pandu Rangan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {On the Security of Two Ring Signcryption Schemes},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {219--224},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VivekSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Vossen09,
  author       = {Gottfried Vossen},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Web 2.0: {A} Buzzword, a Serious Development, just Fun, or What?},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {33--40},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Vossen09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WiesauerS09,
  author       = {Andreas Wiesauer and
                  Johannes Sametinger},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Security Design Pattern Taxonomy based on Attack Patterns - Findings
                  of a Systematic Literature Review},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {387--394},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/WiesauerS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YangMY09,
  author       = {Peng Yang and
                  Yuanchen Ma and
                  Satoshi Yoshizawa},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Fast Re-estabilishment of IKEv2 Security Associations for Recovery
                  of IPsec Gateways in Mobile Network},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {111--116},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YangMY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ZadicN09,
  author       = {Mirad Zadic and
                  Andrea Nowak},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Visual Programming Language for Security Requirements in Business
                  Processes as Model-driven Software Development},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {29--36},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ZadicN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2009,
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  isbn         = {978-989-674-005-4},
  timestamp    = {Thu, 10 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlisCEG08,
  author       = {Jorge Blasco Al{\'{\i}}s and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Arturo Ribagorda Garnacho},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {CSteg: Talking in {C} Code - Steganography of {C} Source Code in Text},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {399--406},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlisCEG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AmberkerS08,
  author       = {B. B. Amberker and
                  N. R. Sunitha},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer
                  with Multiple Original Signers},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {245--252},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AmberkerS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ApampaZWA08,
  author       = {Kikelomo Maria Apampa and
                  Tian Zhang and
                  Gary B. Wills and
                  David Argles},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Ensuring Privacy of Biometric Factors in Multi-Factor Authentication
                  Systems},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {44--49},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ApampaZWA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ArenasAS08,
  author       = {{\'{A}}lvaro Enrique Arenas and
                  Benjamin Aziz and
                  Gheorghe Cosmin Silaghi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Reputation Management in Grid-based Virtual Organisations},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {538--545},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ArenasAS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Atta-ur-RahmanHKS08,
  author       = {Atta{-}ur{-}Rahman and
                  Mureed Hussain and
                  Kahina Kabri and
                  Dominique Seret},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Kerberos Implementation in Manets},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {161--166},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Atta-ur-RahmanHKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BagheriSN08,
  author       = {Nasour Bagheri and
                  Babak Sadeghiyan and
                  Majid Naderi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Multi-Collisions Attack in Ring Hash Structure},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {278--284},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 03 Dec 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/BagheriSN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenferhatS08,
  author       = {Salem Benferhat and
                  Karima Sedki},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Alert Correlation based on a Logical Handling of Administrator Preferences
                  and Knowledge},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {50--56},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenferhatS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenferhatT08,
  author       = {Salem Benferhat and
                  Karim Tabia},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Novel and Anomalous Behavior Detection using Bayesian Network Classifiers},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {13--20},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenferhatT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BenferhatT08a,
  author       = {Salem Benferhat and
                  Karim Tabia},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {New Schemes for Anomaly Score Aggregation and Thresholding},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {21--28},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BenferhatT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BertoniBFR08,
  author       = {Guido Marco Bertoni and
                  Luca Breveglieri and
                  Roberto Farina and
                  Francesco Regazzoni},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A 640 Mbit/S 32-Bit Pipelined Implementation of the {AES} Algorithm},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {453--459},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BertoniBFR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BoulaicheA08,
  author       = {Ammar Boulaiche and
                  Kamel Adi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Honeyd Detection Via Abnormal Behaviors Generated by the {ARPD} Daemon},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {65--71},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 17 Aug 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BoulaicheA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CampoHP08,
  author       = {Juan Vera del Campo and
                  Juan Hern{\'{a}}ndez{-}Serrano and
                  Josep Pegueroles},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{SCFS:} Towards Design and Implementation of a Secure Distributed
                  Filesystem},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {169--176},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CampoHP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Carvalho08,
  author       = {Nuno Borges Carvalho},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {The Importance of Metrology in Wireless Communication Systems - From
                  {AM/FM} to {SDR} Systems},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {35--35},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Carvalho08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Chen08,
  author       = {Hsiao{-}Hwa Chen},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Next Generation {CDMA} Technologies for Futuristic Wireless Communications},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {37},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Chen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChewK08,
  author       = {Guanhan Chew and
                  Khoongming Khoo},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off
                  Attacks on Stream Ciphers},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {300--305},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChewK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CoiO08,
  author       = {Juri Luca De Coi and
                  Daniel Olmedilla},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Review of Trust Management, Security and Privacy Policy Languages},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {483--490},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CoiO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Cox08,
  author       = {Ingemar J. Cox},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Watermarking, Steganography and Content Forensics},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {29--29},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Cox08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Diehl08,
  author       = {Malte Diehl},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Geographic Data and Steganography - Using Google Earth and {KML} Files
                  for High-Capacity Steganography},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {381--387},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Diehl08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DionysiouBHF08,
  author       = {Ioanna Dionysiou and
                  David E. Bakken and
                  Carl H. Hauser and
                  Deborah A. Frincke},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Formalizing End-to-End Context-Aware Trust Relationships in Collaborative
                  Activities},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {546--553},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DionysiouBHF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/El-FotouhD08,
  author       = {Mohamed Abo El{-}Fotouh and
                  Klaus Diepold},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Fast Encryption Scheme for Networks Applications},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {119--127},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/El-FotouhD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/El-FotouhD08a,
  author       = {Mohamed Abo El{-}Fotouh and
                  Klaus Diepold},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {The Substitution Cipher Chaining Mode},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {421--429},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/El-FotouhD08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ElrakaibyCC08,
  author       = {Yehia ElRakaiby and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Interactivity for Reactive Access Control},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {57--64},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Sat, 15 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ElrakaibyCC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GomathisankaranKT08,
  author       = {Mahadevan Gomathisankaran and
                  Ka{-}Ming Keung and
                  Akhilesh Tyagi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{REBEL} - Reconfigurable Block Encryption Logic},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {312--318},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GomathisankaranKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GoodB08,
  author       = {Tim Good and
                  Mohammed Benaissa},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Price to Provide {RFID} Security and Privacy?},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {209--213},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GoodB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GroverSMK08,
  author       = {Satyajit Grover and
                  Divya Naidu Kolar Sunder and
                  Samuel O. Moffatt and
                  Michael E. Kounavis},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {411--420},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GroverSMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GuelzimO08,
  author       = {Tarik Guelzim and
                  Mohammad S. Obaidat},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Novel Neurocomputing-based Scheme to Authenticate {WLAN} Users Employing
                  Distance Proximity Threshold},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {145--153},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GuelzimO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HassanB08,
  author       = {Mohamed N. Hassan and
                  Mohammed Benaissa},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Low Area Scalable Montgomery Inversion Over GF(2m)},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {363--367},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HassanB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HerbosaDC08,
  author       = {Ra{\'{u}}l Herbosa and
                  Gabriel D{\'{\i}}az and
                  Manuel Castro},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Securing the Email Services - New System for Secure Managing the Organization's
                  Mail Service},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {469--472},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HerbosaDC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HidalgoCG08,
  author       = {Sergio Pozo Hidalgo and
                  Rafael Ceballos and
                  Rafael Martinez Gasca},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis
                  in Firewall Rule Sets},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {430--441},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HidalgoCG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoumaniM08,
  author       = {Hanane Houmani and
                  Mohamed Mejri},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Ensuring the Correctness of Cryptographic Protocols with Respect to
                  Secrecy},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {184--189},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoumaniM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HwangTC08,
  author       = {Min{-}Shiang Hwang and
                  Shiang{-}Feng Tzeng and
                  Shu{-}Fen Chiou},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Improvement of Strong Proxy Signature and Its Applications},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {95--98},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HwangTC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JensenK08,
  author       = {Christian Damsgaard Jensen and
                  Thomas Rune Korsgaard},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Dynamics of Trust Evolution - Auto-configuration of Dispositional
                  Trust Dynamics},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {509--517},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JensenK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Jin08,
  author       = {Hongxia Jin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Traitor Tracing for Anonymous Attack in Content Protection},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {331--336},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Jin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JoshiP08,
  author       = {Shankar Joshi and
                  Alwyn R. Pais},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A New Probabilistic Rekeying Method for Secure Dynamic Groups},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {325--330},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JoshiP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KilincY08,
  author       = {Celalettin Kilinc and
                  Ali G{\"{o}}khan Yavuz},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Applying {SRP} on {SIP} Authentication},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {227--231},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 02 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KilincY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KimN08,
  author       = {Kwang Ho Kim and
                  Christophe N{\`{e}}gre},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Point Multiplication on Supersingular Elliptic Curves Defined over
                  Fields of Characteristic 2 and 3},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {373--376},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KimN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoTS08,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {FPGA-Targeted Hardware Implementations of {K2}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {270--277},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Kogan08,
  author       = {Yaakov Kogan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Improving Reliability in Commercial {IP} Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {17--19},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Kogan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KuzuuHMW08,
  author       = {Kazuto Kuzuu and
                  Yasushi Hirano and
                  Kenji Mase and
                  Toyohide Watanabe},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Application to a Shared Terminal of a Roaming User Profile Set Up
                  through LDAP-Smart Card Authentication Cooperation},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {29--34},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KuzuuHMW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LeeNU08,
  author       = {Peter Hyun{-}Jeen Lee and
                  Shivaramakrishnan Narayan and
                  Parampalli Udaya},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless
                  Encryption},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {306--311},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LeeNU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LenziniSE08,
  author       = {Gabriele Lenzini and
                  Nabil Sahli and
                  Henk Eertink},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Trust Model for High Quality Recommendation},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {518--528},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 02 Nov 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/LenziniSE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiN08,
  author       = {Yin Li and
                  Christophe N{\`{e}}gre},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Efficient Multiplication Algorithm using Binomial Residue Representation},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {319--324},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 21 Jun 2010 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Lopez-GarciaRC08,
  author       = {Lourdes L{\'{o}}pez{-}Garc{\'{\i}}a and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Miguel Le{\'{o}}n Ch{\'{a}}vez},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An e-Voting Protocol based on Pairing Blind Signatures},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {214--217},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 22 Jun 2015 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Lopez-GarciaRC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Marca08,
  author       = {David A. Marca},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {e-Business Innovation - Surviving the Coming Decades},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {5--16},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Marca08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Maurer08,
  author       = {Ueli M. Maurer},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Rethinking Digital Signatures},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {31--33},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 07 Oct 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Maurer08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MelladoFP08,
  author       = {Daniel Mellado and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Mario Piattini},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Security Requirements in Software Product Lines},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {442--449},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MelladoFP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MianiZMP08,
  author       = {Rodrigo Sanches Miani and
                  Bruno Bogaz Zarpel{\~{a}}o and
                  Leonardo de Souza Mendes and
                  Mario Lemes Proen{\c{c}}a Jr.},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Metrics Application in Metropolitan Broadband Access Network Security
                  Analysis},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {473--476},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 11 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MianiZMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MizunoD08,
  author       = {Takeo Mizuno and
                  Hiroshi Doi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Efficient {IBE-PKE} Proxy Re-Encryption},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {285--293},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MizunoD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MouradAD08,
  author       = {Azzam Mourad and
                  Dima Alhadidi and
                  Mourad Debbabi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Towards Language-Independent Approach for Security Concerns Weaving},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {460--465},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MouradAD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MufticS08,
  author       = {Sead Muftic and
                  Gernot Schmoelzer},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Cryptonet: Secure E-Mail System},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {84--91},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MufticS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Muller08,
  author       = {Volker M{\"{u}}ller},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Short Note on Secret Sharing using Elliptic Curves},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {359--362},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Thu, 31 Mar 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Muller08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Munoz-GeaMMSG08,
  author       = {Juan Pedro Mu{\~{n}}oz{-}Gea and
                  Josemaria Malgosa{-}Sanahuja and
                  Pilar Manzanares{-}Lopez and
                  Juan Carlos S{\'{a}}nchez{-}Aarnoutse and
                  Joan Garc{\'{\i}}a{-}Haro},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Efficient Methodology to Limit Path Length Guaranteeing Anonymity
                  in Overlay Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {205--208},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Tue, 15 Nov 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Munoz-GeaMMSG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MurtyV08,
  author       = {V. Kumar Murty and
                  Nikolajs Volkovs},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Polynomial based Hashing Algorithm},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {103--106},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MurtyV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MurtyX08,
  author       = {V. Kumar Murty and
                  Guangwu Xu},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Security and Authentication for Networked Storage},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {477--480},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MurtyX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NagyAK08,
  author       = {Marius Nagy and
                  Selim G. Akl and
                  Sean Kershaw},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Key Distribution based on Quantum Fourier Transform},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {263--269},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NagyAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NarayanUL08,
  author       = {Shivaramakrishnan Narayan and
                  Parampalli Udaya and
                  Peter Hyun{-}Jeen Lee},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Identity-based Signcryption without Random Oracles},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {342--347},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NarayanUL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NeppachPWLMSW08,
  author       = {Andreas Neppach and
                  Christian Pfaffel{-}Janser and
                  Ilse Wimberger and
                  Thomas Lor{\"{u}}nser and
                  Michael Meyenburg and
                  Alexander Szekely and
                  Johannes Wolkerstorfer},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Key Management of Quantum Generated Keys in IPsec},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {177--183},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NeppachPWLMSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NikovV08,
  author       = {Ventzislav Nikov and
                  Marc Vauclair},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Yet Another Secure Distance-Bounding Protocol},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {218--221},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NikovV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OhtsukaKTBY08,
  author       = {Shinsuke Ohtsuka and
                  Satoshi Kawamoto and
                  Shigeru Takano and
                  Kensuke Baba and
                  Hiroto Yasuura},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Note on Biometrics-based Authentication with Portable Device},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {99--102},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OhtsukaKTBY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OrencikPSK08,
  author       = {Cengiz {\"{O}}rencik and
                  Thomas Brochmann Pedersen and
                  Erkay Savas and
                  Mehmet Keskin{\"{o}}z},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Improved Fuzzy Vault Scheme for Fingerprint Verification},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {37--43},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/OrencikPSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Overbeck08,
  author       = {Raphael Overbeck},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Multiple Birthday Attack on {NTRU}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {237--244},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Overbeck08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW08,
  author       = {Vijayakrishnan Pasupathinathan and
                  Josef Pieprzyk and
                  Huaxiong Wang},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {A Fair e-Tendering Protocol},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {294--299},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PohM08,
  author       = {Geong Sen Poh and
                  Keith M. Martin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {On the (In)Security of Two Buyer-Seller Watermarking Protocols},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {253--260},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PohM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Preneel08,
  author       = {Bart Preneel},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Cryptographic Algorithms - Successes, Failures and Challenges},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {21--27},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Preneel08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/QuerciaCZ08,
  author       = {Daniele Quercia and
                  Licia Capra and
                  Valentina Zanardi},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Selecting Trustworthy Content using Tags},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {501--508},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/QuerciaCZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/QureshiSI08,
  author       = {Muhammed Nauman Qureshi and
                  Muhammad Nadeem Sial and
                  Nassar Ikram},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Efficient Reconfigurable {SOS} Montgomery Multiplier in {GF} {(P)}
                  usign {FPGA} {DSP} Slices},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {355--358},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/QureshiSI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SalvadorNFV08,
  author       = {Paulo Salvador and
                  Ant{\'{o}}nio Nogueira and
                  Ulisses Fran{\c{c}}a and
                  Rui Valadas},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Detection of Illicit Traffic using Neural Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {5--12},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SalvadorNFV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SanchezVFP08,
  author       = {Luis Enrique S{\'{a}}nchez and
                  Daniel Villafranca and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Mario Piattini},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Practical Application of a Security Management Maturity Model for
                  SMEs based on Predefined Schemas},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {391--398},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SanchezVFP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SchreudersP08,
  author       = {Z. Cliffe Schreuders and
                  Christian Payne},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Functionality-based Application Confinement - Parameterised Hierarchical
                  Application Restrictions},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {72--77},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SchreudersP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ShibliM08,
  author       = {Muhammad Awais Shibli and
                  Sead Muftic},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Intrusion Detection and Prevention System using Secure Mobile Agents},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {107--113},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ShibliM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SilvaSAL08,
  author       = {Eduardo da Silva and
                  Aldri Luiz dos Santos and
                  Luiz Carlos Pessoa Albini and
                  Michele Nogueira Lima},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Quantifying Misbehaviour Attacks Against the Self-Organized Public
                  Key Management on Manets},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {128--135},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 15 Sep 2010 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SilvaSAL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SundararajanO08,
  author       = {Mukund Sundararajan and
                  Mohammad S. Obaidat},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {New Techniques to Enhance the Capabilities of the Socks Network Security
                  Protocol},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {197--201},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SundararajanO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SzollosiFM08,
  author       = {Lor{\'{a}}nd Sz{\"{o}}ll{\"{o}}si and
                  G{\'{a}}bor Feh{\'{e}}r and
                  Tam{\'{a}}s Marosits},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Proper Key Generation for the IzoSign Algorithm},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {368--372},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SzollosiFM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/VergaraVG08,
  author       = {Jorge E. L{\'{o}}pez de Vergara and
                  Enrique V{\'{a}}zquez and
                  Javier Guerra},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Security Policy Instantiation to React to Network Attacks - An Ontology-based
                  Approach using {OWL} and {SWRL}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {78--83},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/VergaraVG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/WangZ08,
  author       = {Qinghua Wang and
                  Tingting Zhang},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Sec-SNMP: Policy-based Security Management for Sensor Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {222--226},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/WangZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/XiongT08,
  author       = {Kaiqi Xiong and
                  David J. Thuente},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Efficient Localization Schemes in Sensor Networks with Malicious Nodes},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {190--196},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/XiongT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/XuFSW08,
  author       = {Peng Xu and
                  Zhiyi Fang and
                  Hang Su and
                  Chuyi Wei},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Experimental Research and Capability Valuation on Security of {SOA-SCA}
                  based {SDO}},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {337--341},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/XuFSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yan08,
  author       = {Zheng Yan},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Autonomic Trust Management for a Pervasive System},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {491--500},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Tue, 08 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Yan08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YasirHKS08,
  author       = {Muhammad Yasir and
                  Mureed Hussain and
                  Kahina Kabri and
                  Dominique Seret},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{SAKE} - Secure Authenticated Key Establishment in Sensor Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {154--160},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YasirHKS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YilmazLS08,
  author       = {Omer Zekvan Yilmaz and
                  Albert Levi and
                  Erkay Savas},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Multiphase Deployment Models for Fast Self Healing in Wireless Sensor
                  Networks},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {136--144},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YilmazLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama08,
  author       = {Kazuki Yoneyama},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Anonymous Message Authentication - Universally Composable Definition
                  and Construction},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {351--354},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Yoneyama08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Zuquete08,
  author       = {Andr{\'{e}} Z{\'{u}}quete},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Enhanced Secure Interface for a Portable e-Voting Terminal},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {529--537},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Zuquete08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/secrypt/2008,
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  isbn         = {978-989-8111-59-3},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AndradeSR07,
  author       = {Paulo F. Andrade and
                  Fernando Mira da Silva and
                  Carlos Ribeiro},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {An Efficient Intrusion Detection System for Networks with Centralized
                  Routing},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {102--106},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AndradeSR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/BaldassarriMP07,
  author       = {Paola Baldassarri and
                  Anna Montesanto and
                  Paolo Puliti},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Detecting Anomalous Traffic using Statistical Processing and Self-Organizing
                  Maps},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {74--79},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/BaldassarriMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Bar-YosefW07,
  author       = {Noa Bar{-}Yosef and
                  Avishai Wool},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Remote Algorithmic Complexity Attacks against Randomized Hash Tables},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {117--124},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Bar-YosefW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/CennamoFRTLP07,
  author       = {Paolo Cennamo and
                  Antonio Fresa and
                  Anton Luca Robustelli and
                  Francesco Toro and
                  Maurizio Longo and
                  Fabio Postiglione},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A 3g IMS-based Testbed for Secure Real-Time Audio Sessions},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {125--132},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/CennamoFRTLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ChalkiasMHS07,
  author       = {Konstantinos Chalkias and
                  F. Mpaldimtsi and
                  Dimitris Hristu{-}Varsakelis and
                  George Stephanides},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {On the Key-Compromise Impersonation Vulnerability of One-Pass Key
                  Establishment Protocols},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {222--228},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ChalkiasMHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Davoli07,
  author       = {Franco Davoli},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Cross-Layer Resource Allocation in Satellite Networks},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {11},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Davoli07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/DoomunS07,
  author       = {M. Razvi Doomun and
                  K. M. Sunjiv Soyjaudah},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Modified Temporal Key Integrity Protocol for Efficient Wireless Network
                  Security},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {151--156},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/DoomunS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Dutta07,
  author       = {Santanu Dutta},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Recent Trends in the Design of Video Signal Processing {IPS} and Multimedia
                  SoCs},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {13},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Dutta07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/EjarqueH07,
  author       = {Pascual Ejarque and
                  Javier Hernando},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {On the Effect of Score Equalization in {SVM} Multimodal Biometric
                  Systems},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {33--38},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/EjarqueH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FerranteCP07,
  author       = {Alberto Ferrante and
                  Sathish Chandra and
                  Vincenzo Piuri},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A Query Unit for The IPSec Databases},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {133--139},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FerranteCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FujisawaOKIT07,
  author       = {Toshiyuki Fujisawa and
                  Kazuto Ogawa and
                  Takeshi Kimura and
                  Masaki Inamura and
                  Toshiaki Tanaka},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Anonymous Prepaid Content Viewing System with Mobile Terminal},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {281--288},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FujisawaOKIT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GedrojcLH07,
  author       = {Bartek Gedrojc and
                  Jan C. A. van der Lubbe and
                  Martin van Hensbergen},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Private Computing with Beehive Organized Agents},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {289--294},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GedrojcLH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GiorgiNP07,
  author       = {Pascal Giorgi and
                  Christophe N{\`{e}}gre and
                  Thomas Plantard},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Subquadratic Binary Field Multiplier in Double Polynomial System},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {229--236},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GiorgiNP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GomezT07,
  author       = {Laurent Gomez and
                  Ivonne Thomas},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Towards User Authentication Flexibility},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {59--66},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GomezT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GruhnHW07,
  author       = {Volker Gruhn and
                  Malte H{\"{u}}lder and
                  Vincent Wolff{-}Marting},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Utilizing Social Networking Platforms to Support Public Key Infrastructures},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {245--250},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GruhnHW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/GutubGAAI07,
  author       = {Adnan Abdul{-}Aziz Gutub and
                  Lahouari Ghouti and
                  Alaaeldin A. Amin and
                  Talal M. Alkharobi and
                  Mohammad K. Ibrahim},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic
                  Text Digital Watermarking},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {329--332},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/GutubGAAI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HasegawaSM07,
  author       = {Wataru Hasegawa and
                  Masakazu Soshi and
                  Atsuko Miyaji},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Mobile Agent Security with Efficient Oblivious Transfer},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {299--304},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HasegawaSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HoumaniM07,
  author       = {Hanane Houmani and
                  Mohamed Mejri},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Practical and Universal Interpretation Functions for Secrecy},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {157--164},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HoumaniM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IbrahimEH07,
  author       = {Ibrahim Mostafa Ibrahim and
                  Sherif Hazem Nour El{-}Din and
                  Abdel Fatah A. Hegazy},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {An Effective and Secure Watermarking Protocol for Digital Rights Protection
                  over the Second-Hand Market},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {263--268},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IbrahimEH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/IlioudisBPG07,
  author       = {Christos Ilioudis and
                  Dimitrios A. Baltatzis and
                  George Pangalos and
                  Christos K. Georgiadis},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Securing Healthgrid Environments},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {394--401},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/IlioudisBPG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/InamuraT07,
  author       = {Masaki Inamura and
                  Toshiaki Tanaka},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Implementation and Evaluation of New Illegal Copy Protection - Protection
                  Against Making a Illegal Copy of a Copy},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {427--432},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/InamuraT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Ivanov07,
  author       = {Ivan Ivanov},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Utility Computing: Reality and Beyond},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {7},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Ivanov07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Jin07,
  author       = {Hongxia Jin},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A Closer Look at Broadcast Encryption and Traitor Tracing for Content
                  Protection},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {295--298},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Jin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JovicU07,
  author       = {Branislav Jovic and
                  Charles P. Unsworth},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Improving Security in Chaotic Spread Spectrum Communication Systems
                  with a Novel 'Bit Power Parameter Spectrum' Measure},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {273--280},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Tue, 29 Nov 2011 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/JovicU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/JoyeT07,
  author       = {Marc Joye and
                  Michael Tunstall},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Securing OpenSSL against Micro-Architectural Attacks},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {189--196},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/JoyeT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KalmanN07,
  author       = {Gy{\"{o}}rgy K{\'{a}}lm{\'{a}}n and
                  Josef Noll},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Integrated Right Management for Home Content - {A} {SIM} based Right
                  Management Solution for Home Networks},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {107--111},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KalmanN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KellinisP07,
  author       = {Emmanouel Kellinis and
                  Konstantinos Papapanagiotou},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Using Steganography to Improve Hash Functions' Collision Resistance},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {337--340},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KellinisP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoTS07,
  author       = {Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {{K2:} {A} Stream Cipher Algorithm using Dynamic Feedback Control},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {204--213},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KotenkoU07,
  author       = {Igor V. Kotenko and
                  Alexander Ulanov},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Investigation of Cooperative Defense against DDoS},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {180--183},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KotenkoU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LaubeG07,
  author       = {Annett Laube and
                  Laurent Gomez},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Dynamic Context-Aware Access Control - Use of Resource Hierarchies
                  to Define Fine-grained, Adaptable Authorization Policies},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {386--393},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LaubeG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LeungP07,
  author       = {Adrian Leung and
                  Geong Sen Poh},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {An Anonymous waterMarking Scheme for Content Distribution Protection
                  using Trusted Computing},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {319--326},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LeungP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Liu07,
  author       = {Kecheng Liu},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Pragmatic Computing},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {5},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Liu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiuCW07,
  author       = {Dennis Y. W. Liu and
                  Shuang Chang and
                  Duncan S. Wong},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A More Efficient Convertible Nominative Signature},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {214--221},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiuCW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LupettiD07,
  author       = {Simone Lupetti and
                  Gianluca Dini},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Practical Verification of Untrusted Terminals using Remote Attestation},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {402--407},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LupettiD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/McCabeT07,
  author       = {Alan McCabe and
                  Jarrod Trevathan},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Implementation and Analysis of a Handwritten Signature Verification
                  Technique},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {48--58},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/McCabeT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/McGrathSM07,
  author       = {Clare McGrath and
                  Ghazanfar Ali Safdar and
                  M{\'{a}}ire McLoone},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Identity Based Public Key Exchange {(IDPKE)} for Wireless Ad Hoc Networks},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {167--170},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/McGrathSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MouradLD07,
  author       = {Azzam Mourad and
                  Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
                  Mourad Debbabi},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A High-Level Aspect-Oriented based Language for Software Security
                  Hardening},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {363--370},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/MouradLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Nachtigal07,
  author       = {Sharon Nachtigal},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {e-Business Security Design using Process Security Requirements Septet},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {408--413},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Nachtigal07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NarayanU07,
  author       = {Shivaramakrishnan Narayan and
                  Parampalli Udaya},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A Provably Secure Multi-Receiver Identity-based Signcryption using
                  Bilinear Maps},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {305--308},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NarayanU07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/NoordendeBHBT07,
  author       = {Guido van 't Noordende and
                  {\'{A}}d{\'{a}}m Balogh and
                  Rutger F. H. Hofman and
                  Frances M. T. Brazier and
                  Andrew S. Tanenbaum},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A Secure Jailing System for Confining Untrusted Applications},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {414--423},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/NoordendeBHBT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Obaidat07,
  author       = {Mohammad S. Obaidat},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Future and Challenges of the Security of e-Systems and Computer Networks},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {15--16},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Obaidat07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ObermeierB07,
  author       = {Sebastian Obermeier and
                  Stefan B{\"{o}}ttcher},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Secure Computation of Common Data among Malicious Partners},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {345--354},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ObermeierB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OliveiraCB07,
  author       = {Paulo F. Oliveira and
                  Rui A. Costa and
                  Jo{\~{a}}o Barros},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Mobile Secret Key Distribution with Network Coding},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {171--174},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OliveiraCB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OmoteST07,
  author       = {Kazumasa Omote and
                  Takeshi Shimoyama and
                  Satoru Torii},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {A Combinatorics Proliferation Model to Determine the Timing for Blocking
                  Scanning Malware},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {16--24},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OmoteST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/OuTT07,
  author       = {Jheng{-}Ru Ou and
                  Shi{-}Chun Tsai and
                  Wen{-}Guey Tzeng},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Efficient Large-Scale Distributed Key Generation against Burst Interruption},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {197--203},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/OuTT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PaezTFS07,
  author       = {Rafael P{\'{a}}ez and
                  Joan Tom{\`{a}}s and
                  Jordi Forn{\'{e}} and
                  Miguel Soriano},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {{MAIS:} Mobile Agent Integrity System - {A} Security System to {IDS}
                  based on Autonomous Agents},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {41--47},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PaezTFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Payne07,
  author       = {Christian Payne},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {An Improved Model for Secure Cryptographic Integrity Verification
                  of Local Code},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {80--84},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Payne07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Pernul07,
  author       = {G{\"{u}}nther Pernul},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Infrastructures for Authentication, Authorization and Privilege Management
                  Scope, Evaluation and use in the Access-eGov Project},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {17},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Pernul07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Petrovic07,
  author       = {Slobodan Petrovic},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Clock Control Sequence Reconstruction in the Generalized Shrinking
                  Generator},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {259--262},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Petrovic07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PredaCCGT07,
  author       = {Stere Preda and
                  Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Laurent Toutain},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Reliable Process for Security Policy Deployment},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {5--15},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PredaCCGT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/PuiggaliaM07,
  author       = {Jordi Puiggali and
                  Victor Morales{-}Rocha},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Independent Voter Verifiability for Remote Electronic Voting},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {333--336},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/PuiggaliaM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SametMO07,
  author       = {Saeed Samet and
                  Ali Miri and
                  Luis Orozco{-}Barbosa},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Privacy Preserving k-Means Clustering in Multi-Party Environment},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {381--385},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SametMO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SanchezVFP07,
  author       = {Luis Enrique S{\'{a}}nchez and
                  Daniel Villafranca and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Mario Piattini},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Developing a Model and a Tool to Manage the Information Security in
                  Small and Medium Enterprises},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {355--362},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SanchezVFP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics