


default search action
SECRYPT 2008: Porto, Portugal
- Eduardo Fernández-Medina, Manu Malek, Javier Hernando:

SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2008, ISBN 978-989-8111-59-3
Invited Speakers
Keynote Lectures
- David A. Marca:

e-Business Innovation - Surviving the Coming Decades. SECRYPT 2008: 5-16 - Yaakov Kogan:

Improving Reliability in Commercial IP Networks. SECRYPT 2008: 17-19 - Bart Preneel:

Cryptographic Algorithms - Successes, Failures and Challenges. SECRYPT 2008: 21-27 - Ingemar J. Cox:

Watermarking, Steganography and Content Forensics. SECRYPT 2008: 29-29 - Ueli M. Maurer:

Rethinking Digital Signatures. SECRYPT 2008: 31-33 - Nuno Borges Carvalho:

The Importance of Metrology in Wireless Communication Systems - From AM/FM to SDR Systems. SECRYPT 2008: 35-35 - Hsiao-Hwa Chen:

Next Generation CDMA Technologies for Futuristic Wireless Communications. SECRYPT 2008: 37
Access Control and Intrusion Detection
Full Paper
- Paulo Salvador, António Nogueira, Ulisses França, Rui Valadas:

Detection of Illicit Traffic using Neural Networks. SECRYPT 2008: 5-12 - Salem Benferhat, Karim Tabia:

Novel and Anomalous Behavior Detection using Bayesian Network Classifiers. SECRYPT 2008: 13-20 - Salem Benferhat, Karim Tabia:

New Schemes for Anomaly Score Aggregation and Thresholding. SECRYPT 2008: 21-28 - Kazuto Kuzuu, Yasushi Hirano, Kenji Mase, Toyohide Watanabe:

Application to a Shared Terminal of a Roaming User Profile Set Up through LDAP-Smart Card Authentication Cooperation. SECRYPT 2008: 29-34
Short Paper
- Cengiz Örencik, Thomas Brochmann Pedersen, Erkay Savas, Mehmet Keskinöz:

Improved Fuzzy Vault Scheme for Fingerprint Verification. SECRYPT 2008: 37-43 - Kikelomo Maria Apampa, Tian Zhang, Gary B. Wills, David Argles:

Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems. SECRYPT 2008: 44-49 - Salem Benferhat, Karima Sedki:

Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge. SECRYPT 2008: 50-56 - Yehia ElRakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:

Interactivity for Reactive Access Control. SECRYPT 2008: 57-64 - Ammar Boulaiche, Kamel Adi:

Honeyd Detection Via Abnormal Behaviors Generated by the ARPD Daemon. SECRYPT 2008: 65-71 - Z. Cliffe Schreuders, Christian Payne:

Functionality-based Application Confinement - Parameterised Hierarchical Application Restrictions. SECRYPT 2008: 72-77 - Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra:

Security Policy Instantiation to React to Network Attacks - An Ontology-based Approach using OWL and SWRL. SECRYPT 2008: 78-83 - Sead Muftic, Gernot Schmoelzer:

Cryptonet: Secure E-Mail System. SECRYPT 2008: 84-91
Poster
- Min-Shiang Hwang, Shiang-Feng Tzeng, Shu-Fen Chiou:

An Improvement of Strong Proxy Signature and Its Applications. SECRYPT 2008: 95-98 - Shinsuke Ohtsuka, Satoshi Kawamoto, Shigeru Takano, Kensuke Baba, Hiroto Yasuura:

A Note on Biometrics-based Authentication with Portable Device. SECRYPT 2008: 99-102 - V. Kumar Murty, Nikolajs Volkovs:

A Polynomial based Hashing Algorithm. SECRYPT 2008: 103-106 - Muhammad Awais Shibli, Sead Muftic:

Intrusion Detection and Prevention System using Secure Mobile Agents. SECRYPT 2008: 107-113
Network Security and Protocols
Full Paper
- Mohamed Abo El-Fotouh, Klaus Diepold:

A Fast Encryption Scheme for Networks Applications. SECRYPT 2008: 119-127 - Eduardo da Silva, Aldri Luiz dos Santos, Luiz Carlos Pessoa Albini, Michele Nogueira Lima:

Quantifying Misbehaviour Attacks Against the Self-Organized Public Key Management on Manets. SECRYPT 2008: 128-135 - Omer Zekvan Yilmaz, Albert Levi, Erkay Savas:

Multiphase Deployment Models for Fast Self Healing in Wireless Sensor Networks. SECRYPT 2008: 136-144 - Tarik Guelzim, Mohammad S. Obaidat:

Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold. SECRYPT 2008: 145-153 - Muhammad Yasir, Mureed Hussain, Kahina Kabri, Dominique Seret:

SAKE - Secure Authenticated Key Establishment in Sensor Networks. SECRYPT 2008: 154-160 - Atta-ur-Rahman, Mureed Hussain, Kahina Kabri, Dominique Seret:

Kerberos Implementation in Manets. SECRYPT 2008: 161-166
Short Paper
- Juan Vera del Campo, Juan Hernández-Serrano, Josep Pegueroles:

SCFS: Towards Design and Implementation of a Secure Distributed Filesystem. SECRYPT 2008: 169-176 - Andreas Neppach, Christian Pfaffel-Janser, Ilse Wimberger, Thomas Lorünser, Michael Meyenburg, Alexander Szekely, Johannes Wolkerstorfer:

Key Management of Quantum Generated Keys in IPsec. SECRYPT 2008: 177-183 - Hanane Houmani, Mohamed Mejri:

Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy. SECRYPT 2008: 184-189 - Kaiqi Xiong, David J. Thuente:

Efficient Localization Schemes in Sensor Networks with Malicious Nodes. SECRYPT 2008: 190-196 - Mukund Sundararajan, Mohammad S. Obaidat:

New Techniques to Enhance the Capabilities of the Socks Network Security Protocol. SECRYPT 2008: 197-201
Poster
- Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro:

An Efficient Methodology to Limit Path Length Guaranteeing Anonymity in Overlay Networks. SECRYPT 2008: 205-208 - Tim Good, Mohammed Benaissa:

Price to Provide RFID Security and Privacy?. SECRYPT 2008: 209-213 - Lourdes López-García, Francisco Rodríguez-Henríquez, Miguel León Chávez:

An e-Voting Protocol based on Pairing Blind Signatures. SECRYPT 2008: 214-217 - Ventzislav Nikov, Marc Vauclair:

Yet Another Secure Distance-Bounding Protocol. SECRYPT 2008: 218-221 - Qinghua Wang, Tingting Zhang:

Sec-SNMP: Policy-based Security Management for Sensor Networks. SECRYPT 2008: 222-226 - Celalettin Kilinc, Ali Gökhan Yavuz:

Applying SRP on SIP Authentication. SECRYPT 2008: 227-231
Cryptographic Techniques and Key Management
Full Paper
- Raphael Overbeck:

A Multiple Birthday Attack on NTRU. SECRYPT 2008: 237-244 - B. B. Amberker, N. R. Sunitha:

Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers. SECRYPT 2008: 245-252 - Geong Sen Poh, Keith M. Martin:

On the (In)Security of Two Buyer-Seller Watermarking Protocols. SECRYPT 2008: 253-260
Short Paper
- Marius Nagy, Selim G. Akl, Sean Kershaw:

Key Distribution based on Quantum Fourier Transform. SECRYPT 2008: 263-269 - Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:

FPGA-Targeted Hardware Implementations of K2. SECRYPT 2008: 270-277 - Nasour Bagheri, Babak Sadeghiyan, Majid Naderi:

Multi-Collisions Attack in Ring Hash Structure. SECRYPT 2008: 278-284 - Takeo Mizuno, Hiroshi Doi:

Efficient IBE-PKE Proxy Re-Encryption. SECRYPT 2008: 285-293 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:

A Fair e-Tendering Protocol. SECRYPT 2008: 294-299 - Guanhan Chew, Khoongming Khoo:

A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers. SECRYPT 2008: 300-305 - Peter Hyun-Jeen Lee, Shivaramakrishnan Narayan, Parampalli Udaya:

Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless Encryption. SECRYPT 2008: 306-311 - Mahadevan Gomathisankaran, Ka-Ming Keung, Akhilesh Tyagi:

REBEL - Reconfigurable Block Encryption Logic. SECRYPT 2008: 312-318 - Yin Li, Christophe Nègre:

An Efficient Multiplication Algorithm using Binomial Residue Representation. SECRYPT 2008: 319-324 - Shankar Joshi, Alwyn R. Pais:

A New Probabilistic Rekeying Method for Secure Dynamic Groups. SECRYPT 2008: 325-330 - Hongxia Jin:

Traitor Tracing for Anonymous Attack in Content Protection. SECRYPT 2008: 331-336 - Peng Xu, Zhiyi Fang, Hang Su, Chuyi Wei:

Experimental Research and Capability Valuation on Security of SOA-SCA based SDO. SECRYPT 2008: 337-341 - Shivaramakrishnan Narayan, Parampalli Udaya, Peter Hyun-Jeen Lee:

Identity-based Signcryption without Random Oracles. SECRYPT 2008: 342-347
Poster
- Kazuki Yoneyama:

Anonymous Message Authentication - Universally Composable Definition and Construction. SECRYPT 2008: 351-354 - Muhammed Nauman Qureshi, Muhammad Nadeem Sial, Nassar Ikram:

An Efficient Reconfigurable SOS Montgomery Multiplier in GF (P) usign FPGA DSP Slices. SECRYPT 2008: 355-358 - Volker Müller:

A Short Note on Secret Sharing using Elliptic Curves. SECRYPT 2008: 359-362 - Mohamed N. Hassan, Mohammed Benaissa:

Low Area Scalable Montgomery Inversion Over GF(2m). SECRYPT 2008: 363-367 - Loránd Szöllösi, Gábor Fehér, Tamás Marosits:

Proper Key Generation for the IzoSign Algorithm. SECRYPT 2008: 368-372 - Kwang Ho Kim, Christophe Nègre:

Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3. SECRYPT 2008: 373-376
Information Assurance
Full Paper
- Malte Diehl:

Geographic Data and Steganography - Using Google Earth and KML Files for High-Capacity Steganography. SECRYPT 2008: 381-387
Short Paper
- Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:

Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas. SECRYPT 2008: 391-398 - Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda Garnacho:

CSteg: Talking in C Code - Steganography of C Source Code in Text. SECRYPT 2008: 399-406
Security in Information Systems
Full Paper
- Satyajit Grover, Divya Naidu Kolar Sunder, Samuel O. Moffatt, Michael E. Kounavis:

An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity. SECRYPT 2008: 411-420 - Mohamed Abo El-Fotouh, Klaus Diepold:

The Substitution Cipher Chaining Mode. SECRYPT 2008: 421-429 - Sergio Pozo Hidalgo, Rafael Ceballos, Rafael Martinez Gasca:

A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets. SECRYPT 2008: 430-441 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:

Security Requirements in Software Product Lines. SECRYPT 2008: 442-449
Short Paper
- Guido Marco Bertoni, Luca Breveglieri, Roberto Farina, Francesco Regazzoni:

A 640 Mbit/S 32-Bit Pipelined Implementation of the AES Algorithm. SECRYPT 2008: 453-459 - Azzam Mourad, Dima Alhadidi, Mourad Debbabi:

Towards Language-Independent Approach for Security Concerns Weaving. SECRYPT 2008: 460-465
Poster
- Raúl Herbosa, Gabriel Díaz, Manuel Castro:

Securing the Email Services - New System for Secure Managing the Organization's Mail Service. SECRYPT 2008: 469-472 - Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Leonardo de Souza Mendes, Mario Lemes Proença Jr.:

Metrics Application in Metropolitan Broadband Access Network Security Analysis. SECRYPT 2008: 473-476 - V. Kumar Murty, Guangwu Xu:

Security and Authentication for Networked Storage. SECRYPT 2008: 477-480
Special Session On Trust In Pervasive Systems And Networks
- Juri Luca De Coi, Daniel Olmedilla:

A Review of Trust Management, Security and Privacy Policy Languages. SECRYPT 2008: 483-490 - Zheng Yan:

Autonomic Trust Management for a Pervasive System. SECRYPT 2008: 491-500 - Daniele Quercia, Licia Capra, Valentina Zanardi:

Selecting Trustworthy Content using Tags. SECRYPT 2008: 501-508 - Christian Damsgaard Jensen, Thomas Rune Korsgaard:

Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics. SECRYPT 2008: 509-517 - Gabriele Lenzini, Nabil Sahli, Henk Eertink:

Trust Model for High Quality Recommendation. SECRYPT 2008: 518-528 - André Zúquete:

Enhanced Secure Interface for a Portable e-Voting Terminal. SECRYPT 2008: 529-537 - Álvaro Enrique Arenas, Benjamin Aziz, Gheorghe Cosmin Silaghi:

Reputation Management in Grid-based Virtual Organisations. SECRYPT 2008: 538-545 - Ioanna Dionysiou, David E. Bakken, Carl H. Hauser, Deborah A. Frincke:

Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities. SECRYPT 2008: 546-553

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














