


default search action
SECRYPT 2007: Barcelona, Spain
- Javier Hernando, Eduardo Fernández-Medina, Manu Malek:

SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2007, ISBN 978-989-8111-12-8
Invited Speakers
Keynote Lectures
- Kecheng Liu:

Pragmatic Computing. SECRYPT 2007: 5 - Ivan Ivanov:

Utility Computing: Reality and Beyond. SECRYPT 2007: 7 - Tony C. Shan:

SOA Wisdom. SECRYPT 2007: 9-10 - Franco Davoli:

Cross-Layer Resource Allocation in Satellite Networks. SECRYPT 2007: 11 - Santanu Dutta:

Recent Trends in the Design of Video Signal Processing IPS and Multimedia SoCs. SECRYPT 2007: 13 - Mohammad S. Obaidat:

Future and Challenges of the Security of e-Systems and Computer Networks. SECRYPT 2007: 15-16 - Günther Pernul:

Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. SECRYPT 2007: 17
Access Control and Intrusion Detection
Full Papers
- Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain:

Reliable Process for Security Policy Deployment. SECRYPT 2007: 5-15 - Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:

A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware. SECRYPT 2007: 16-24 - Daniel Socek, Dubravko Culibrk, Vladimir Bozovic:

Practical Secure Biometrics using Set Intersection as a Similarity Measure. SECRYPT 2007: 25-32 - Pascual Ejarque, Javier Hernando:

On the Effect of Score Equalization in SVM Multimodal Biometric Systems. SECRYPT 2007: 33-38
Short Papers
- Rafael Páez, Joan Tomàs, Jordi Forné, Miguel Soriano:

MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents. SECRYPT 2007: 41-47 - Alan McCabe, Jarrod Trevathan:

Implementation and Analysis of a Handwritten Signature Verification Technique. SECRYPT 2007: 48-58 - Laurent Gomez, Ivonne Thomas:

Towards User Authentication Flexibility. SECRYPT 2007: 59-66 - Urko Zurutuza, Roberto Uribeetxeberria, Ekain Azketa, G. Gil, Jesus Lizarraga, Miguel Fernández:

Combined Data Mining Approach for Intrusion Detection. SECRYPT 2007: 67-73 - Paola Baldassarri, Anna Montesanto, Paolo Puliti:

Detecting Anomalous Traffic using Statistical Processing and Self-Organizing Maps. SECRYPT 2007: 74-79 - Christian Payne:

An Improved Model for Secure Cryptographic Integrity Verification of Local Code. SECRYPT 2007: 80-84 - Mei-Yu Wu, Duen-Ren Liu:

Role and Task Based Authorization Management for Process-View. SECRYPT 2007: 85-90
Posters
- Lih-Yang Wang, Chao-Chih Chen:

On the Improvement of Remote Authentication Scheme with Smart Cards. SECRYPT 2007: 93-97 - Lei Xia, Hao Huang, Shuying Yu:

Towards a Multi-model Views Security Framework. SECRYPT 2007: 98-101 - Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro:

An Efficient Intrusion Detection System for Networks with Centralized Routing. SECRYPT 2007: 102-106 - György Kálmán, Josef Noll:

Integrated Right Management for Home Content - A SIM based Right Management Solution for Home Networks. SECRYPT 2007: 107-111
Network Security and Protocols
Full Papers
- Noa Bar-Yosef, Avishai Wool:

Remote Algorithmic Complexity Attacks against Randomized Hash Tables. SECRYPT 2007: 117-124 - Paolo Cennamo, Antonio Fresa, Anton Luca Robustelli, Francesco Toro, Maurizio Longo, Fabio Postiglione:

A 3g IMS-based Testbed for Secure Real-Time Audio Sessions. SECRYPT 2007: 125-132 - Alberto Ferrante, Sathish Chandra, Vincenzo Piuri:

A Query Unit for The IPSec Databases. SECRYPT 2007: 133-139 - Kai Tao, Jing Li, Srinivas Sampalli:

Wise Guard - MAC Address Spoofing Detection System for Wireless LANs. SECRYPT 2007: 140-147
Short Papers
- M. Razvi Doomun, K. M. Sunjiv Soyjaudah:

Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security. SECRYPT 2007: 151-156 - Hanane Houmani, Mohamed Mejri:

Practical and Universal Interpretation Functions for Secrecy. SECRYPT 2007: 157-164
Posters
- Clare McGrath, Ghazanfar Ali Safdar, Máire McLoone:

Identity Based Public Key Exchange (IDPKE) for Wireless Ad Hoc Networks. SECRYPT 2007: 167-170 - Paulo F. Oliveira, Rui A. Costa, João Barros:

Mobile Secret Key Distribution with Network Coding. SECRYPT 2007: 171-174 - Slim Trabelsi, Yves Roudier:

Secure Service Publishing with Untrusted Registries - Securing Service Discovery. SECRYPT 2007: 175-179 - Igor V. Kotenko, Alexander Ulanov:

Investigation of Cooperative Defense against DDoS. SECRYPT 2007: 180-183
Cryptographic Techniques and Key Management
Full Papers
- Marc Joye, Michael Tunstall:

Securing OpenSSL against Micro-Architectural Attacks. SECRYPT 2007: 189-196 - Jheng-Ru Ou, Shi-Chun Tsai, Wen-Guey Tzeng:

Efficient Large-Scale Distributed Key Generation against Burst Interruption. SECRYPT 2007: 197-203 - Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:

K2: A Stream Cipher Algorithm using Dynamic Feedback Control. SECRYPT 2007: 204-213 - Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong:

A More Efficient Convertible Nominative Signature. SECRYPT 2007: 214-221 - Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hristu-Varsakelis, George Stephanides:

On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols. SECRYPT 2007: 222-228 - Pascal Giorgi, Christophe Nègre, Thomas Plantard:

Subquadratic Binary Field Multiplier in Double Polynomial System. SECRYPT 2007: 229-236
Short Papers
- Amitabh Saxena:

Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs. SECRYPT 2007: 239-244 - Volker Gruhn, Malte Hülder, Vincent Wolff-Marting:

Utilizing Social Networking Platforms to Support Public Key Infrastructures. SECRYPT 2007: 245-250 - Carlos Serrão, Miguel Sales Dias, Jaime Delgado:

Secure License Management - Management of Digital Object Licenses in a DRM Environment. SECRYPT 2007: 251-256
Posters
- Slobodan Petrovic:

Clock Control Sequence Reconstruction in the Generalized Shrinking Generator. SECRYPT 2007: 259-262 - Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy:

An Effective and Secure Watermarking Protocol for Digital Rights Protection over the Second-Hand Market. SECRYPT 2007: 263-268 - Neculai Daniel Stoleru, Victor Valeriu Patriciu:

The Polynomial Multicomposition Problem in (Z/nZ). SECRYPT 2007: 269-272 - Branislav Jovic, Charles P. Unsworth:

Improving Security in Chaotic Spread Spectrum Communication Systems with a Novel 'Bit Power Parameter Spectrum' Measure. SECRYPT 2007: 273-280 - Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura, Masaki Inamura, Toshiaki Tanaka:

Anonymous Prepaid Content Viewing System with Mobile Terminal. SECRYPT 2007: 281-288 - Bartek Gedrojc, Jan C. A. van der Lubbe, Martin van Hensbergen:

Private Computing with Beehive Organized Agents. SECRYPT 2007: 289-294 - Hongxia Jin:

A Closer Look at Broadcast Encryption and Traitor Tracing for Content Protection. SECRYPT 2007: 295-298 - Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji:

Mobile Agent Security with Efficient Oblivious Transfer. SECRYPT 2007: 299-304 - Shivaramakrishnan Narayan, Parampalli Udaya:

A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps. SECRYPT 2007: 305-308
Information Assurance
Short Papers
- Mariusz Stawowski:

Formal Analysis Methods of Network Security Design. SECRYPT 2007: 313-318 - Adrian Leung, Geong Sen Poh:

An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted Computing. SECRYPT 2007: 319-326
Posters
- Adnan Abdul-Aziz Gutub, Lahouari Ghouti, Alaaeldin A. Amin, Talal M. Alkharobi, Mohammad K. Ibrahim:

Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking. SECRYPT 2007: 329-332 - Jordi Puiggali, Victor Morales-Rocha:

Independent Voter Verifiability for Remote Electronic Voting. SECRYPT 2007: 333-336 - Emmanouel Kellinis, Konstantinos Papapanagiotou:

Using Steganography to Improve Hash Functions' Collision Resistance. SECRYPT 2007: 337-340
Security in Information Systems
Full Papers
- Sebastian Obermeier, Stefan Böttcher:

Secure Computation of Common Data among Malicious Partners. SECRYPT 2007: 345-354 - Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:

Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises. SECRYPT 2007: 355-362 - Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:

A High-Level Aspect-Oriented based Language for Software Security Hardening. SECRYPT 2007: 363-370
Short Papers
- Goran Sladic, Branko Milosavljevic, Zora Konjovic:

Extensible Access Control Model for XML Document Collections. SECRYPT 2007: 373-380 - Saeed Samet, Ali Miri, Luis Orozco-Barbosa:

Privacy Preserving k-Means Clustering in Multi-Party Environment. SECRYPT 2007: 381-385 - Annett Laube, Laurent Gomez:

Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies. SECRYPT 2007: 386-393 - Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos, Christos K. Georgiadis:

Securing Healthgrid Environments. SECRYPT 2007: 394-401 - Simone Lupetti, Gianluca Dini:

Practical Verification of Untrusted Terminals using Remote Attestation. SECRYPT 2007: 402-407 - Sharon Nachtigal:

e-Business Security Design using Process Security Requirements Septet. SECRYPT 2007: 408-413 - Guido van 't Noordende, Ádám Balogh, Rutger F. H. Hofman, Frances M. T. Brazier, Andrew S. Tanenbaum:

A Secure Jailing System for Confining Untrusted Applications. SECRYPT 2007: 414-423
Posters
- Masaki Inamura, Toshiaki Tanaka:

Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy. SECRYPT 2007: 427-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














