default search action
Search dblp for Publications
export results for "stream:conf/secrypt:"
more than 1000 matches, exporting first 1000 hits only!
@inproceedings{DBLP:conf/secrypt/0001AHK24, author = {Aya Mohamed and Dagmar Auer and Daniel Hofer and Josef K{\"{u}}ng}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Comparison of Access Control Approaches for Graph-Structured Data}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {576--583}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012861500003767}, doi = {10.5220/0012861500003767}, timestamp = {Thu, 05 Sep 2024 14:21:37 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0001AHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/0001G24, author = {Peter Amthor and Ren{\'{e}} Gorges}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular Networks}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {78--90}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012758900003767}, doi = {10.5220/0012758900003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0001G24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/0001TTL24, author = {Sebastian Obermeier and Giorgio Tresoldi and Bernhard Tellenbach and Vincent Lenders}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {HydroLab: {A} Versatile Hydroelectric Power Lab for Security Research and Education}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {622--627}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012713800003767}, doi = {10.5220/0012713800003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0001TTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AissaouiDGP24, author = {Ridwane Aissaoui and Jean{-}Christophe Deneuville and Christophe Guerber and Alain Pirovano}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Performant Quantum-Resistant {KEM} for Constrained Hardware: Optimized {HQC}}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {668--673}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012757800003767}, doi = {10.5220/0012757800003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AissaouiDGP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AkilMH24, author = {Mahdi Akil and Leonardo A. Martucci and Jaap{-}Henk Hoepman}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {114--127}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012759600003767}, doi = {10.5220/0012759600003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AkilMH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Al-Juaid0S24, author = {Nouf Al{-}Juaid and Alexei Lisitsa and Sven Schewe}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Secure Multi-Party Traversal Queries over Federated Graph Databases}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {716--721}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012768000003767}, doi = {10.5220/0012768000003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Al-Juaid0S24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlbaneseAO24, author = {Massimiliano Albanese and Olutola Adebiyi and Frank Onovae}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{CVE2CWE:} Automated Mapping of Software Vulnerabilities to Weaknesses Based on {CVE} Descriptions}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {500--507}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012770400003767}, doi = {10.5220/0012770400003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlbaneseAO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlonsoA24, author = {Luc{\'{\i}}a Alonso and Mina Alishahi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Autoencoder for Detecting Malicious Updates in Differentially Private Federated Learning}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {467--474}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012766700003767}, doi = {10.5220/0012766700003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlonsoA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AminTSR24, author = {Md. Al Amin and Hemanth Tummala and Rushabh Shah and Indrajit Ray}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information {(PHI)} Sharing}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {211--223}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012767400003767}, doi = {10.5220/0012767400003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AminTSR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Anagnostopoulou24, author = {Argiro Anagnostopoulou and Thomas Papaloukas and George Stergiopoulos and Dimitris Gritzalis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control Systems}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {13--25}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012710700003767}, doi = {10.5220/0012710700003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Anagnostopoulou24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AntonBT24, author = {Alba Martinez Anton and Clara Bertolissi and Jean{-}Marc Talbot}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Solving Access Control Conflicts in Multi-User Systems}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {492--499}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012768500003767}, doi = {10.5220/0012768500003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AntonBT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AreiaS024, author = {Jos{\'{e}} Areia and Bruno Santos and M{\'{a}}rio Antunes}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Dvorak: {A} Browser Credential Dumping Malware}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {434--441}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012731300003767}, doi = {10.5220/0012731300003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AreiaS024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ArenasLRRSZ24, author = {M{\'{o}}nica P. Arenas and Gabriele Lenzini and Mohammadamin Rakeei and Peter Y. A. Ryan and Marjan Skrobot and Maria Zhekova}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Verifying Artifact Authenticity with Unclonable Optical Tags}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {64--77}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012746500003767}, doi = {10.5220/0012746500003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ArenasLRRSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Armknecht024, author = {Frederik Armknecht and Christian M{\"{u}}ller}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards a Cryptographic Model for Wireless Communication}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {249--261}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012809300003767}, doi = {10.5220/0012809300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Armknecht024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AzizMB24, author = {Benjamin Aziz and Estabraq Makiyah and Aysha Bukhelli}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph Resizing}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {389--396}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012716600003767}, doi = {10.5220/0012716600003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AzizMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BadruddojaDDSU24, author = {Syed Badruddoja and Ram Dantu and Mark Dockendorf and Abiola Salau and Kritagya Upadhyay}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous Agreement}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {786--791}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012813400003767}, doi = {10.5220/0012813400003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BadruddojaDDSU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BaiardiBBBD24, author = {Fabrizio Baiardi and Filippo Boni and Giovanni Braccini and Emanuele Briganti and Luca Deri}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Kex-Filtering: {A} Proactive Approach to Filtering}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {528--535}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012788700003767}, doi = {10.5220/0012788700003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BaiardiBBBD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BassAZ24, author = {Elijah Bass and Massimiliano Albanese and Marcos Zampieri}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{DISC:} {A} Dataset for Information Security Classification}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {175--185}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012763400003767}, doi = {10.5220/0012763400003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BassAZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BernackiS24, author = {Jaroslaw Bernacki and Rafal Scherer}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Compact Representation of Digital Camera's Fingerprint with Convolutional Autoencoder}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {792--797}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012821300003767}, doi = {10.5220/0012821300003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BernackiS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BinosiMSCGLZPCM24, author = {Lorenzo Binosi and Pietro Mazzini and Alessandro Sanna and Michele Carminati and Giorgio Giacinto and Riccardo Lazzeretti and Stefano Zanero and Mario Polino and Emilio Coppa and Davide Maiorca}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Do You Trust Your Device? Open Challenges in IoT Security Analysis}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {568--575}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012856200003767}, doi = {10.5220/0012856200003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BinosiMSCGLZPCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Blumbergs24, author = {Bernhards Blumbergs}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Black Sheep Wall: Towards Multiple Vantage Point-Based Information Space Situational Awareness}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {605--614}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012709600003767}, doi = {10.5220/0012709600003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Blumbergs24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BonaventuraEB24, author = {Davide Bonaventura and Sergio Esposito and Giampaolo Bella}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {The IoT Breaches Your Household Again}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {475--482}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012767700003767}, doi = {10.5220/0012767700003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BonaventuraEB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BouhaddiA24, author = {Myria Bouhaddi and Kamel Adi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Enhancing Privacy in Machine Learning: {A} Robust Approach for Preventing Attribute Inference Attacks}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {224--236}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012768700003767}, doi = {10.5220/0012768700003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BouhaddiA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BracamonteOFMI24, author = {Vanessa Bracamonte and Yohko Orito and Yasunori Fukuta and Kiyoshi Murata and Takamasa Isohara}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Perception of Privacy Tools for Social Media: {A} Qualitative Analysis Among Japanese}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {151--162}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012762000003767}, doi = {10.5220/0012762000003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BracamonteOFMI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BradatschHK24, author = {Leonard Bradatsch and Artur Hermann and Frank Kargl}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Attribute Threat Analysis and Risk Assessment for {ABAC} and {TBAC} Systems}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {26--39}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012715300003767}, doi = {10.5220/0012715300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BradatschHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BraghinRV24, author = {Chiara Braghin and Elvinia Riccobene and Simone Valentini}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An ASM-Based Approach for Security Assessment of Ethereum Smart Contracts}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {334--344}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012858000003767}, doi = {10.5220/0012858000003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BraghinRV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BrammOSKMTC24, author = {Georg Bramm and Melek {\"{O}}nen and Martin Schanzenbach and Ilya Komarov and Frank Morgner and Christian Tiebel and Juan Cadavid}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{UPCARE:} User Privacy-Preserving Cancer Research Platform}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {52--63}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012718100003767}, doi = {10.5220/0012718100003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BrammOSKMTC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BruderA24, author = {Lisa Bruder and Mina Alishahi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Local Differential Privacy for Data Clustering}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {820--825}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012838800003767}, doi = {10.5220/0012838800003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BruderA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChakirHE24, author = {El Mostapha Chakir and Marouane Hachimi and Mohammed Erradi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards a Secure and Intelligent Access Control Policy Adapter for Big Data Environment}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {345--356}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012860800003767}, doi = {10.5220/0012860800003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChakirHE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChanHTT24, author = {Koon{-}Ming Chan and Swee{-}Huay Heng and Syh{-}Yuan Tan and Shing Chiang Tan}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {K-Resilient Public Key Authenticated Encryption with Keyword Search}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {381--388}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012716100003767}, doi = {10.5220/0012716100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChanHTT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CorbucciMP24, author = {Luca Corbucci and Anna Monreale and Roberto Pellungrini}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Enhancing Privacy and Utility in Federated Learning: {A} Hybrid {P2P} and Server-Based Approach with Differential Privacy Protection}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {592--602}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012863600003767}, doi = {10.5220/0012863600003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CorbucciMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CurtoGPI24, author = {Claudio Curto and Daniela Giordano and Simone Palazzo and Daniel Gustav Indelicato}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {MultiVD: {A} Transformer-based Multitask Approach for Software Vulnerability Detection}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {416--423}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012719400003767}, doi = {10.5220/0012719400003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CurtoGPI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CuzzocreaB24, author = {Alfredo Cuzzocrea and Islam Belmerabet}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards Privacy-Preserving Multi-Cloud Identity Management Using {SOLID}}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {649--654}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012719900003767}, doi = {10.5220/0012719900003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CuzzocreaB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DennisDMLL24, author = {Kevin Dennis and Bianca Dehaan and Parisa Momeni and Gabriel Laverghetta and Jay Ligatti}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of {SQL} Concatenations}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {286--297}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012835200003767}, doi = {10.5220/0012835200003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DennisDMLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DmonteZLAC24, author = {Alphaeus Dmonte and Marcos Zampieri and Kevin Lybarger and Massimiliano Albanese and Genya Coulter}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Classifying Human-Generated and AI-Generated Election Claims in Social Media}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {237--248}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012797900003767}, doi = {10.5220/0012797900003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DmonteZLAC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/EedenPM24, author = {Roberto van Eeden and Matteo Paier and Marino Miculan}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Formal Analysis of {CIE} Level 2 Multi-Factor Authentication via {SMS} {OTP}}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {483--491}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012768300003767}, doi = {10.5220/0012768300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/EedenPM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ElzingaRCTLMH24, author = {Derkjan Elzinga and Stan Ruessink and Giuseppe Cascavilla and Damian A. Tamburri and Francesco Leotta and Massimo Mecella and Willem{-}Jan van den Heuvel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Violence Detection: {A} Serious-Gaming Approach}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {163--174}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012762300003767}, doi = {10.5220/0012762300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ElzingaRCTLMH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FiliolF24, author = {Eric Filiol and Pierre Filiol}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift Registers}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {832--837}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012839300003767}, doi = {10.5220/0012839300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FiliolF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GaneshAM24, author = {Buvana Ganesh and Mosabbah Mushir Ahmed and Alieeldin Mady}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Higher Order Leakage Assessment and Neural Network-based Attack on CRYSTALS-Kyber}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {373--380}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012715700003767}, doi = {10.5220/0012715700003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GaneshAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Gelderie24, author = {Marcus Gelderie}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Privacy Afforded by Opaque Identifiers in Traffic Monitoring}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {798--803}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012833200003767}, doi = {10.5220/0012833200003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Gelderie24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GermeniaMRS0R24, author = {Riccardo Germenia and Salvatore Manfredi and Matteo Rizzi and Giada Sciarretta and Alessandro Tomasi and Silvio Ranise}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Automating Compliance for Improving {TLS} Security Postures: An Assessment of Public Administration Endpoints}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {450--458}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012764700003767}, doi = {10.5220/0012764700003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GermeniaMRS0R24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GhoshAMA24, author = {Arka Ghosh and Massimiliano Albanese and Preetam Mukherjee and Amir Alipour{-}Fanid}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSs}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {536--543}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012814500003767}, doi = {10.5220/0012814500003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GhoshAMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GrittiRS24, author = {Cl{\'{e}}mentine Gritti and Emanuel Regnath and Sebastian Steinhorst}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {MATRaCAE: Time-Based Revocable Access Control in the IoT}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {274--285}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012825700003767}, doi = {10.5220/0012825700003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GrittiRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HarbAS24, author = {Salah S. Harb and M. Omair Ahmad and M. N. S. Swamy}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {High-Speed Pipelined {FPGA} Implementation of a Robust Steganographic Scheme for Secure Data Communication Systems}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {397--406}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012716700003767}, doi = {10.5220/0012716700003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HarbAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HaroldoDMB24, author = {Calvo Mayaud{\'{o}}n Haroldo and Nakojah Chris David and Mahdi Madani and El{-}Bay Bourennane}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{FPGA} Implementation of AES-Based on Optimized Dynamic s-Box}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {730--737}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012780300003767}, doi = {10.5220/0012780300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HaroldoDMB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HattakMMS24, author = {Amine Hattak and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network Data}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {722--729}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012768400003767}, doi = {10.5220/0012768400003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HattakMMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HeidaripourKRH024, author = {Mahdieh Heidaripour and Ladan Kian and Maryam Rezapour and Mark Holcomb and Benjamin Fuller and Gagan Agrawal and Hoda Maleki}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {459--466}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012765600003767}, doi = {10.5220/0012765600003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HeidaripourKRH024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HelpaHBWOM24, author = {Calebe Helpa and Tiago Heinrich and Marcus Botacin and Newton Carlos Will and Rafael R. Obelheiro and Carlos Alberto Maziero}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {The Use of the {DWARF} Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly Binaries}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {442--449}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012754500003767}, doi = {10.5220/0012754500003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HelpaHBWOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IslamA24, author = {Md. Morshedul Islam and Md. Khairul Anam}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Enhancing Adversarial Defense in Behavioral Authentication Systems Through Random Projections}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {758--763}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012792800003767}, doi = {10.5220/0012792800003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IslamA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JoshiPNSRDM24, author = {Abhishek Joshi and Divyateja Pasupuleti and P. Nischith and Sarvesh Sutaone and Soumil Ray and Soumyadeep Dey and Barsha Mitra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Malware Analysis Using Transformer Based Models: An Empirical Study}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {858--865}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012855100003767}, doi = {10.5220/0012855100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JoshiPNSRDM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaratiCL24, author = {Arijit Karati and Ting{-}Yu Chen and Kai{-}Yao Lin}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information Networks}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {298--309}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012845600003767}, doi = {10.5220/0012845600003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaratiCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KuppaNL24, author = {Aditya Kuppa and Jack Nicholls and Nhien{-}An Le{-}Khac}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Manipulating Prompts and Retrieval-Augmented Generation for {LLM} Service Providers}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {777--785}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012803100003767}, doi = {10.5220/0012803100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KuppaNL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KwatraMN24, author = {Saloni Kwatra and Anna Monreale and Francesca Naretto}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Balancing Act: Navigating the Privacy-Utility Spectrum in Principal Component Analysis}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {850--857}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012855000003767}, doi = {10.5220/0012855000003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KwatraMN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LansariBKTBC24, author = {Mohammed Lansari and Reda Bellafqira and Katarzyna Kapusta and Vincent Thouvenot and Olivier Bettan and Gouenou Coatrieux}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A White-Box Watermarking Modulation for Encrypted {DNN} in Homomorphic Federated Learning}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {186--197}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012764300003767}, doi = {10.5220/0012764300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LansariBKTBC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LesaignouxC24, author = {Doryan Lesaignoux and Mikael Carmona}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Implementation of a Lattice-Based {DAA} for Vanet System}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {642--648}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012717900003767}, doi = {10.5220/0012717900003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LesaignouxC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LindnerHS24, author = {Tymoteusz Lindner and Tomasz Hawro and Piotr Syga}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Imperceptible {QR} Watermarks in High-Resolution Videos}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {310--322}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012849300003767}, doi = {10.5220/0012849300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LindnerHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LongoS24, author = {Riccardo Longo and Chiara Spadafora}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Amun: Securing E-Voting Against Over-the-Shoulder Coercion}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {508--517}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012786800003767}, doi = {10.5220/0012786800003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LongoS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MaillardHLC24, author = {Julien Maillard and Thomas Hiscock and Maxime Lecomte and Christophe Clavier}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Cache Side-Channel Attacks Through Electromagnetic Emanations of {DRAM} Accesses}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {262--273}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012813200003767}, doi = {10.5220/0012813200003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MaillardHLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MaillardHLC24a, author = {Julien Maillard and Thomas Hiscock and Maxime Lecomte and Christophe Clavier}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Simulating {SASCA} on Keccak: Security Implications for Post-Quantum Cryptographic Schemes}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {518--527}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012787200003767}, doi = {10.5220/0012787200003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MaillardHLC24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MajbourBB24, author = {Sara Majbour and Morgan Barbier and Jean{-}Marie Le Bars}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Fuzzy Vault Security Enhancement Avoid Statistical Biases}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {40--51}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012715500003767}, doi = {10.5220/0012715500003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MajbourBB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MarekW24, author = {Bartlomiej Marek and Wojciech Wodo}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Spellchecker Analysis for Behavioural Biometric of Typing Errors Scenario}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {748--757}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012789000003767}, doi = {10.5220/0012789000003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MarekW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MasroorGG24, author = {Farha Masroor and Adarsh Gopalakrishnan and Neena Goveas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Securing Patient Data in IoT Devices: {A} Blockchain-NFT Approach for Privacy, Security, and Authentication}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {704--709}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012764800003767}, doi = {10.5220/0012764800003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MasroorGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MassiddaPMG24, author = {Emmanuele Massidda and Lorenzo Pisu and Davide Maiorca and Giorgio Giacinto}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Bringing Binary Exploitation at Port 80: Understanding {C} Vulnerabilities in WebAssembly}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {552--559}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012852400003767}, doi = {10.5220/0012852400003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MassiddaPMG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MimotoGKIKT24, author = {Tomoaki Mimoto and Yuta Gempei and Kentaro Kita and Takamasa Isohara and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Linkage Between {CVE} and ATT{\&}CK with Public Information}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {655--660}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012722600003767}, doi = {10.5220/0012722600003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MimotoGKIKT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MirandaXT24, author = {Gabriela Mendes Corr{\^{e}}a de Miranda and Jos{\'{e}} Ant{\^{o}}nio Moreira Xex{\'{e}}o and Renato Hidaka Torres}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Lightweight Cryptographic Algorithms: {A} Position Paper}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {764--770}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012792900003767}, doi = {10.5220/0012792900003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MirandaXT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MoghtadaieeFA24, author = {Vahideh Moghtadaiee and Amir Fathalizadeh and Mina Alishahi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Membership Inference Attacks Against Indoor Location Models}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {584--591}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012863100003767}, doi = {10.5220/0012863100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MoghtadaieeFA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MouicheS24, author = {Inoussa Mouiche and Sherif Saad}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {TI-NERmerger: Semi-Automated Framework for Integrating {NER} Datasets in Cybersecurity}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {357--370}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012867900003767}, doi = {10.5220/0012867900003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MouicheS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Msahli0M24, author = {Mounira Msahli and Pascal Lafourcade and Dhekra Mahmoud}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Formal Analysis of {C-ITS} {PKI} Protocols}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {198--210}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012766100003767}, doi = {10.5220/0012766100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Msahli0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NegreN24, author = {Christophe N{\`{e}}gre and Mbaye Ngom}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Virtually Free Randomisations of {NTT} in {RLWE} Cryptosystem to Counteract Side Channel Attack Based on Belief Propagation}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {866--875}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NegreN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NikulaLH24, author = {Sara Nikula and Anssi Lintulampi and Kimmo Halunen}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Security Analysis for {BB84} Key Distillation}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {407--415}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012717500003767}, doi = {10.5220/0012717500003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NikulaLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OrsiniH24, author = {Helene Orsini and Yufei Han}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{DYNAMO:} Towards Network Attack Campaign Attribution via Density-Aware Active Learning}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {91--102}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012759100003767}, doi = {10.5220/0012759100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OrsiniH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OuechtatiA24, author = {Hamdi Ouechtati and Nadia Ben Azzouna}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards an Adaptive Trust Management Model Based on {ANFIS} in the SIoT}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {710--715}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OuechtatiA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PalaniswamyK24, author = {Basker Palaniswamy and Arijit Karati}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{QPTA:} Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight Devices}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {804--811}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012835100003767}, doi = {10.5220/0012835100003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PalaniswamyK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Piuri24, author = {Vincenzo Piuri}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Artificial Intelligence for Biometrics}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Piuri24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PriscoSF24, author = {Roberto De Prisco and Sergiy Shevchenko and Pompeo Faruolo}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Enhancing OpenID Connect for Verifiable Credentials with DIDComm}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {844--849}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012850800003767}, doi = {10.5220/0012850800003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PriscoSF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Puskaric24, author = {Miroslav Puskaric}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Framework for Federated Analysis of Health Data Using Multiparty Homomorphic Encryption}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {661--667}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012753900003767}, doi = {10.5220/0012753900003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Puskaric24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RashidM24, author = {Fatema Rashid and Ali Miri}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data Generation}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {738--747}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012787100003767}, doi = {10.5220/0012787100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RashidM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RaubitzekSLMEW24, author = {Sebastian Raubitzek and Sebastian Schrittwieser and Caroline Lawitschka and Kevin Mallinger and Andreas Ekelhart and Edgar R. Weippl}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image Representations}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {323--333}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012856600003767}, doi = {10.5220/0012856600003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RaubitzekSLMEW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ReddyMC24, author = {B. Pradeep Kumar Reddy and Ruchika Meel and Ayantika Chatterjee}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Encrypted {KNN} Implementation on Distributed Edge Device Network}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {680--685}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012761100003767}, doi = {10.5220/0012761100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ReddyMC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SahaMA24, author = {Pierre Fobougong Saha and Mohamed Mejri and Kamel Adi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Toward the Foundation of Digital Identity Theory}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {812--819}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012838100003767}, doi = {10.5220/0012838100003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SahaMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchrittwieserES24, author = {Sebastian Schrittwieser and Andreas Ekelhart and Esther Seidl and Edgar R. Weippl}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online Shopping}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {560--567}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012852600003767}, doi = {10.5220/0012852600003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchrittwieserES24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SeahKHN24, author = {Ryan Seah and Daren Khu and Alexander Hoover and Ruth Ng}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{LAMA:} Leakage Abuse Attacks Against Microsoft Always Encrypted}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {628--633}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012714800003767}, doi = {10.5220/0012714800003767}, timestamp = {Thu, 19 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SeahKHN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ShelkeGN24, author = {Poonam Namdeo Shelke and Saurav Gupta and Sukumar Nandi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {BlueDoS: {A} Novel Approach to Perform and Analyse DoS Attacks on Bluetooth Devices}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {838--843}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012845700003767}, doi = {10.5220/0012845700003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ShelkeGN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Shyamasundar24, author = {Rudrapatna K. Shyamasundar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Characterization of Consensus Correctness in Ripple {(XRP)} Networks}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {103--113}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012759300003767}, doi = {10.5220/0012759300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Shyamasundar24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SinghLY24, author = {Harpreet Singh and Habib Louafi and Yiyu Yao}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS Detection}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {771--776}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012794400003767}, doi = {10.5220/0012794400003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SinghLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SofferW24, author = {Nir Soffer and Erez Waisbard}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An Efficient Hash Function Construction for Sparse Data}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {698--703}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012764500003767}, doi = {10.5220/0012764500003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SofferW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StergiopoulosDL24, author = {George Stergiopoulos and Michalis Detsis and Sozon Leventopoulos and Dimitris Gritzalis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical Infrastructures}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {544--551}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012837300003767}, doi = {10.5220/0012837300003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/StergiopoulosDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StockLRF24, author = {Joshua Stock and Lucas Lange and Erhard Rahm and Hannes Federrath}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Property Inference as a Regression Problem: Attacks and Defense}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {876--885}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012863800003767}, doi = {10.5220/0012863800003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/StockLRF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TalonTGHL24, author = {Natan Talon and Val{\'{e}}rie Viet Triem Tong and Gilles Guette and Yufei Han and Youssef Laarouchi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{SCWAD:} Automated Pentesting of Web Applications}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {424--433}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012721000003767}, doi = {10.5220/0012721000003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TalonTGHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Tiplea24, author = {Ferucio Laurentiu Tiplea}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On Privacy of RFID-Based Authentication Protocols}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {128--139}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012760500003767}, doi = {10.5220/0012760500003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Tiplea24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ToluchuriUNLG24, author = {Shyamili Toluchuri and Aishwarya Upadhyay and Smita Naval and Vijay Laxmi and Manoj Singh Gaur}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {GAN-based Seed Generation for Efficient Fuzzing}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {686--691}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ToluchuriUNLG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Torra24, author = {Vicen{\c{c}} Torra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Explainability and Privacy-Preserving Data-Driven Models}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2024}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Torra24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TrivediKBT24, author = {Devharsh Trivedi and Nesrine Kaaniche and Aymen Boudguiga and Nikos Triandopoulos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {chiku: Efficient Probabilistic Polynomial Approximations Library}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {634--641}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012716000003767}, doi = {10.5220/0012716000003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TrivediKBT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TumaHMHMDW24, author = {Petr Tuma and Jan Hajny and Petr Muzikant and Jan Havlin and Lukas Malina and Patrik Dobias and Jan Willemson}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Open-Source Post-Quantum Encryptor: Design, Implementation and Deployment}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {826--831}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012839200003767}, doi = {10.5220/0012839200003767}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TumaHMHMDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VerdejoMEA24, author = {Jes{\'{u}}s E. D{\'{\i}}az Verdejo and Javier Mu{\~{n}}oz{-}Calle and Rafael M. Estepa{-}Alonso and Antonio Estepa Alonso}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {InspectorLog: {A} New Tool for Offline Attack Detection over Web Log Trace Files}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {692--697}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012764000003767}, doi = {10.5220/0012764000003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VerdejoMEA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YuasaSKBTK24, author = {Junki Yuasa and Taisho Sasada and Christophe Kiennert and Gregory Blanc and Yuzo Taenaka and Youki Kadobayashi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{OIPM:} Access Control Method to Prevent ID/Session Token Abuse on OpenID Connect}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {674--679}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012757900003767}, doi = {10.5220/0012757900003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YuasaSKBTK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YudinRVI24, author = {Matthew Yudin and Achyut Reddy and Sridhar Venkatesan and Rauf Izmailov}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Backdoor Attacks During Retraining of Machine Learning Models: {A} Mitigation Approach}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {140--150}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012761600003767}, doi = {10.5220/0012761600003767}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YudinRVI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Zimmermann024, author = {Philip Zimmermann and Sebastian Obermeier}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Evaluating Digital Forensic Readiness: {A} Honeypot Approach}, booktitle = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, pages = {615--621}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012713600003767}, doi = {10.5220/0012713600003767}, timestamp = {Mon, 16 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Zimmermann024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2024, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Proceedings of the 21st International Conference on Security and Cryptography, {SECRYPT} 2024, Dijon, France, July 8-10, 2024}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0000178800003767}, doi = {10.5220/0000178800003767}, isbn = {978-989-758-709-2}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/0001F23, author = {Hiroki Okada and Kazuhide Fukushima}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {SoK: Towards {CCA} Secure Fully Homomorphic Encryption}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {793--798}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012129800003555}, doi = {10.5220/0012129800003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0001F23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/0003YY23, author = {Thomas Schneider and Hossein Yalame and Michael Yonli}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Griffin: Towards Mixed Multi-Key Homomorphic Encryption}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {147--158}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012090200003555}, doi = {10.5220/0012090200003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0003YY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AbbasiMS23, author = {Wisam Abbasi and Paolo Mori and Andrea Saracino}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {The Explainability-Privacy-Utility Trade-Off for Machine Learning-Based Tabular Data Analysis}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {511--519}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012137800003555}, doi = {10.5220/0012137800003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AbbasiMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AdebiyiA23, author = {Olutola Adebiyi and Massimiliano Albanese}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards Usable Scoring of Common Weaknesses}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {183--191}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012090900003555}, doi = {10.5220/0012090900003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AdebiyiA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AdewoleT23, author = {Kayode S. Adewole and Vicen{\c{c}} Torra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Privacy Protection of Synthetic Smart Grid Data Simulated via Generative Adversarial Networks}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {279--286}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011956800003555}, doi = {10.5220/0011956800003555}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AdewoleT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AgostinelloGP23, author = {Davide Agostinello and Angelo Genovese and Vincenzo Piuri}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Anomaly-Based Intrusion Detection System for DDoS Attack with Deep Learning Techniques}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {267--275}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012146100003555}, doi = {10.5220/0012146100003555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AgostinelloGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AhmadR23, author = {Shahzad Ahmad and Stefan Rass}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {How to Plausibly Deny Steganographic Secrets}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {731--737}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012120100003555}, doi = {10.5220/0012120100003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AhmadR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlalmaieNH23, author = {Abeer Z. Alalmaie and Priyadarsi Nanda and Xiangjian He}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{ZT-NIDS:} Zero Trust, Network Intrusion Detection System}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {99--110}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012080000003555}, doi = {10.5220/0012080000003555}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlalmaieNH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlmashaqbehC23, author = {Ghada Almashaqbeh and Rohit Chatterjee}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Unclonable Cryptography: {A} Tale of Two No-Cloning Paradigms}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {469--477}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012118600003555}, doi = {10.5220/0012118600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlmashaqbehC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AminAR23, author = {Md. Al Amin and Amani Altarawneh and Indrajit Ray}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Informed Consent as Patient Driven Policy for Clinical Diagnosis and Treatment: {A} Smart Contract Based Approach}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {159--170}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012090600003555}, doi = {10.5220/0012090600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AminAR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Anagnostopoulou23, author = {Argiro Anagnostopoulou and Ioannis Mavridis and Dimitris Gritzalis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Risk-Based Illegal Information Flow Detection in the IIoT}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {377--384}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012079800003555}, doi = {10.5220/0012079800003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Anagnostopoulou23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AzzazKKKT23, author = {Mohamed Salah Azzaz and Redouane Kaibou and Hamdane Kamelia and Abdenour Kifouche and Djamel Teguig}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Design of a New Hardware {IP-HLS} for Real-Time Image Chaos-Based Encryption}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {478--485}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012119400003555}, doi = {10.5220/0012119400003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AzzazKKKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BachaKL23, author = {Amani Bacha and Farah Barika Ktata and Faten Louati}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Improving Intrusion Detection Systems with Multi-Agent Deep Reinforcement Learning: Enhanced Centralized and Decentralized Approaches}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {772--777}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012124600003555}, doi = {10.5220/0012124600003555}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BachaKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenssalahD23, author = {Mustapha Benssalah and Karim Drouiche}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Security of the Novel Authentication Scheme for UAV-Ground Station and {UAV-UAV} Communication}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {361--368}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012077400003555}, doi = {10.5220/0012077400003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BenssalahD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BernackiS23, author = {Jaroslaw Bernacki and Rafal Scherer}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{IMAGINE} Dataset: Digital Camera Identification Image Benchmarking Dataset}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {799--804}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012130300003555}, doi = {10.5220/0012130300003555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BernackiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BirjoveanuB23, author = {Catalin V. B{\^{\i}}rjoveanu and Mirela B{\^{\i}}rjoveanu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Secure E-Commerce Protocol with Complex Trading Capabilities of Intermediaries}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {495--502}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012127100003555}, doi = {10.5220/0012127100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BirjoveanuB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BoiS023, author = {Biagio Boi and Marco De Santis and Christian Esposito}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Self-Sovereign Identity {(SSI)} Attribute-Based Web Authentication}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {758--763}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012121400003555}, doi = {10.5220/0012121400003555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BoiS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BonaventuraEB23, author = {Davide Bonaventura and Sergio Esposito and Giampaolo Bella}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Smart Bulbs Can Be Hacked to Hack into Your Household}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {218--229}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012092900003555}, doi = {10.5220/0012092900003555}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BonaventuraEB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BouhaddiA23, author = {Myria Bouhaddi and Kamel Adi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Multi-Environment Training Against Reward Poisoning Attacks on Deep Reinforcement Learning}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {870--875}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012139900003555}, doi = {10.5220/0012139900003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BouhaddiA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BuccafurriAL23, author = {Francesco Buccafurri and Vincenzo De Angelis and Sara Lazzaro}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Adapting {P2P} Mixnets to Provide Anonymity for Uplink-Intensive Applications}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {73--84}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012077100003555}, doi = {10.5220/0012077100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BuccafurriAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CarmonaLL23, author = {Mikael Carmona and Doryan Lesaignoux and Antoine Loiseau}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Implementation of a Lattice-Based Revocable Hierarchical Ibe}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {617--623}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012047800003555}, doi = {10.5220/0012047800003555}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CarmonaLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CascavillaCCMT23, author = {Giuseppe Cascavilla and Gemma Catolino and Mauro Conti and D. Mellios and Damian A. Tamburri}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {When the Few Outweigh the Many: Illicit Content Recognition with Few-Shot Learning}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {324--334}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012049400003555}, doi = {10.5220/0012049400003555}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CascavillaCCMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CastellanoPF23, author = {Dario Castellano and Roberto De Prisco and Pompeo Faruolo}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {752--757}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012121100003555}, doi = {10.5220/0012121100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CastellanoPF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChakrabortyMM23, author = {Trisha Chakraborty and Shaswata Mitra and Sudip Mittal}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {CAPoW: Context-Aware AI-Assisted Proof of Work Based DDoS Defense}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {62--72}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012069000003555}, doi = {10.5220/0012069000003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChakrabortyMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChecriBSB23, author = {Marina Checri and Jean{-}Paul Bultel and Renaud Sirdey and Aymen Boudguiga}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Lightweight FHE-based Protocols Achieving Results Consistency for Data Encrypted Under Different Keys}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {704--709}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012085200003555}, doi = {10.5220/0012085200003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChecriBSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChiapputoDM23, author = {Nicolas Chiapputo and Yvo Desmedt and Kirill Morozov}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Using Untrusted and Unreliable Cloud Providers to Obtain Private Email}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {171--182}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012090700003555}, doi = {10.5220/0012090700003555}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ChiapputoDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChuangHL23, author = {ChihYun Chuang and IHung Hsu and TingFang Lee}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Two-Party Hierarchical Deterministic Wallets in Practice}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {850--856}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012138700003555}, doi = {10.5220/0012138700003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChuangHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CzernyKPPZ23, author = {Roland Czerny and Christian Kollmann and Blaz Podgorelec and Bernd Pr{\"{u}}nster and Thomas Zefferer}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Smoothing the Ride: Providing a Seamless Upgrade Path from Established Cross-Border eID Workflows Towards eID Wallet Systems}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {460--468}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012091900003555}, doi = {10.5220/0012091900003555}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CzernyKPPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DobiasRDMS23, author = {Patrik Dobias and Sara Ricci and Petr Dzurenda and Lukas Malina and Nikita Snetkov}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Lattice-Based Threshold Signature Implementation for Constrained Devices}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {724--730}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012112700003555}, doi = {10.5220/0012112700003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DobiasRDMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DockendorfD23, author = {Mark Dockendorf and Ram Dantu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Heterogeneous Graph Storage and Leakage Prevention for Data Cooperatives}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {192--205}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012091300003555}, doi = {10.5220/0012091300003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DockendorfD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DockendorfD23a, author = {Mark Dockendorf and Ram Dantu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Privacy-Preserving Algorithms for Data Cooperatives with Directed Graphs}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {876--884}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012140200003555}, doi = {10.5220/0012140200003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DockendorfD23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Evang23, author = {Jan Marius Evang}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A 10-Layer Model for Service Availability Risk Management}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {716--723}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012092600003555}, doi = {10.5220/0012092600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Evang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FlaminiRSSS023, author = {Andrea Flamini and Silvio Ranise and Giada Sciarretta and Mario Scuro and Amir Sharif and Alessandro Tomasi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A First Appraisal of Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {123--134}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012084000003555}, doi = {10.5220/0012084000003555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/FlaminiRSSS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GagnonGC23, author = {Guillaume Gagnon and S{\'{e}}bastien Gambs and Mathieu Cunche}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {RSSI-Based Fingerprinting of Bluetooth Low Energy Devices}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {242--253}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012139600003555}, doi = {10.5220/0012139600003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GagnonGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GargT23, author = {Sonakshi Garg and Vicen{\c{c}} Torra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {K-Anonymous Privacy Preserving Manifold Learning}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {37--48}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012053400003555}, doi = {10.5220/0012053400003555}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GargT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Giron23, author = {Alexandre Augusto Giron}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Migrating Applications to Post-Quantum Cryptography: Beyond Algorithm Replacement}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {857--862}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012138800003555}, doi = {10.5220/0012138800003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Giron23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GomezCD23, author = {Laurent Gomez and Francesco Capano and Patrick Duverger}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Security for Next-Gen Analytics for Cross-Organisation Collaboration}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {604--609}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012044900003555}, doi = {10.5220/0012044900003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GomezCD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GomezYD23, author = {Laurent Gomez and Tianchi Yu and Patrick Duverger}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Security for Distributed Machine Learning}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {838--843}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012137700003555}, doi = {10.5220/0012137700003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GomezYD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GrittiH023, author = {Cl{\'{e}}mentine Gritti and Fr{\'{e}}d{\'{e}}ric A. Hayek and Pascal Lafourcade}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Generic Blockchain on Generic Human Behavior}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {206--217}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012091700003555}, doi = {10.5220/0012091700003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GrittiH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HattakIMMS23, author = {Amine Hattak and Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Method for Robust and Explainable Image-Based Network Traffic Classification with Deep Learning}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {385--393}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012083200003555}, doi = {10.5220/0012083200003555}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HattakIMMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HondaK23, author = {Motonari Honda and Yuichi Kaji}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Improvement of Winternitz {OTS} with a Novel Fingerprinting Function}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {303--311}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012049100003555}, doi = {10.5220/0012049100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HondaK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Ionita23, author = {Alexandru Ionita}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {230--241}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012139000003555}, doi = {10.5220/0012139000003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Ionita23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JajuAPBAMD23, author = {Chirag Jaju and Dhairya Agrawal and Rishi Poddar and Shubh Badjate and Sidharth Anand and Barsha Mitra and Soumyadeep Dey}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Analyzing Image Based Strategies for Android Malware Detection and Classification: An Empirical Exploration}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {863--869}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012139100003555}, doi = {10.5220/0012139100003555}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JajuAPBAMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaiKKMSYT23, author = {Satoshi Kai and Takao Kondo and Naghmeh Karimi and Konstantinos Mersinas and Marc Sel and Roberto Yus and Satoru Tezuka}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {International Mutual Recognition: {A} Description of Trust Services in US, UK, {EU} and {JP} and the Testbed "Hakoniwa"}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {764--771}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012124200003555}, doi = {10.5220/0012124200003555}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaiKKMSYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaratiCC23, author = {Arijit Karati and Yu{-}Sheng Chang and Ting{-}Yu Chen}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Robust Three-Factor Lightweight Authentication Based on Extended Chaotic Maps for Portable Resource-Constrained Devices}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {673--682}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012077600003555}, doi = {10.5220/0012077600003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaratiCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KayaG23, author = {Zeynep Sila Kaya and Mehmet Emre Gursoy}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Effectiveness of Re-Identification Attacks and Local Differential Privacy-Based Solutions for Smart Meter Data}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {111--122}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012083300003555}, doi = {10.5220/0012083300003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KayaG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KhanRCP23, author = {Muhammad Nauman Khan and Asha Rao and Seyit Camtepe and Josef Pieprzyk}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Classical to Post-Quantum Secure {ABE-IBE} Proxy Re-Encryption Scheme}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {85--98}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012078200003555}, doi = {10.5220/0012078200003555}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KhanRCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KhannaR23, author = {Shabnam Khanna and Ciara Rafferty}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Approximate Homomorphic Pre-Processing for CNNs}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {710--715}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012085400003555}, doi = {10.5220/0012085400003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KhannaR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KhodjaevaC23, author = {Matluba Khodjaeva and Giovanni Di Crescenzo}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On Single-Server Delegation Without Precomputation}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {540--547}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012140100003555}, doi = {10.5220/0012140100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KhodjaevaC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KochbergerGSLW23, author = {Patrick Kochberger and Maximilian Gramberger and Sebastian Schrittwieser and Caroline Lawitschka and Edgar R. Weippl}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Large Language Models for Code Obfuscation Evaluation of the Obfuscation Capabilities of OpenAI's {GPT-3.5} on {C} Source Code}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {7--19}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012167000003555}, doi = {10.5220/0012167000003555}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KochbergerGSLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KozakJ23, author = {Matous Koz{\'{a}}k and Martin Jurecek}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Combining Generators of Adversarial Malware Examples to Increase Evasion Rate}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {778--786}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012127700003555}, doi = {10.5220/0012127700003555}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KozakJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KrawieckaBEM23, author = {Klaudia Krawiecka and Simon Birnbach and Simon Eberz and Ivan Martinovic}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {BeeHIVE: Behavioral Biometric System Based on Object Interactions in Smart Environments}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {135--146}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012088900003555}, doi = {10.5220/0012088900003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KrawieckaBEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LangeSCR23, author = {Lucas Lange and Maja Schneider and Peter Christen and Erhard Rahm}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Privacy in Practice: Private {COVID-19} Detection in X-Ray Images}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {624--633}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012048100003555}, doi = {10.5220/0012048100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LangeSCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LeNTTT23, author = {Cong{-}Binh Le and Bao{-}Thi Nguyen{-}Le and Phuoc{-}Loc Truong and Minh{-}Triet Tran and Anh{-}Duy Tran}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {ArmorDroid: {A} Rule-Set Customizable Plugin for Secure Android Application Development}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {634--641}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012049500003555}, doi = {10.5220/0012049500003555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/LeNTTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Lewandowski23, author = {Brian Lewandowski}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Guidelines and a Framework to Improve the Delivery of Network Intrusion Detection Datasets}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {649--658}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012052300003555}, doi = {10.5220/0012052300003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Lewandowski23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiHWAN23, author = {Wenhao Li and Yongqing He and Zhimin Wang and Saleh Mansor Alqahtani and Priyadarsi Nanda}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {813--821}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012135600003555}, doi = {10.5220/0012135600003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiHWAN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MahmoodAA23, author = {Aimen Mahmood and Haider Abbas and M. Faisal Amjad}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{CNN-HMM} Model for Real Time {DGA} Categorization}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {822--829}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012136800003555}, doi = {10.5220/0012136800003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MahmoodAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MarottaM23, author = {Angelica Marotta and Stuart E. Madnick}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Regulating Cyber Incidents: {A} Review of Recent Reporting Requirements}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {410--416}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012086000003555}, doi = {10.5220/0012086000003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MarottaM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MatsuzakiSH23, author = {Kazutaka Matsuzaki and Kenji Sawada and Shinichi Honiden}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Remote Security Assessment for Cyber-Physical Systems: Adapting Design Patterns for Enhanced Diagnosis}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {805--812}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012132600003555}, doi = {10.5220/0012132600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MatsuzakiSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MekkiHAK23, author = {Neila Mekki and Mohamed Hamdi and Taoufik Aguili and Tai{-}Hoon Kim}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Secure Emergency Framework in an IoT Based Patient Monitoring System}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {844--849}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012138400003555}, doi = {10.5220/0012138400003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MekkiHAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MerchaCE23, author = {El Mahdi Mercha and El Mostapha Chakir and Mohammed Erradi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Trans-IDS: {A} Transformer-Based Intrusion Detection System}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {402--409}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012085800003555}, doi = {10.5220/0012085800003555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MerchaCE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MeunierT23, author = {Quentin L. Meunier and Abdul Rahman Taleb}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {VerifMSI: Practical Verification of Hardware and Software Masking Schemes Implementations}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {520--527}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012138600003555}, doi = {10.5220/0012138600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MeunierT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MohamedAHK23, author = {Aya Mohamed and Dagmar Auer and Daniel Hofer and Josef K{\"{u}}ng}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{XACML} Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {442--449}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012090000003555}, doi = {10.5220/0012090000003555}, timestamp = {Thu, 05 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MohamedAHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MohammadianL023, author = {Hesamodin Mohammadian and Arash Habibi Lashkari and Ali A. Ghorbani}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Evaluating Label Flipping Attack in Deep Learning-Based {NIDS}}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {597--603}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012038100003555}, doi = {10.5220/0012038100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MohammadianL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MuhleAM23, author = {Alexander M{\"{u}}hle and Katja Assaf and Christoph Meinel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {One to Bind Them: Binding Verifiable Credentials to User Attributes}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {345--352}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012057900003555}, doi = {10.5220/0012057900003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MuhleAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NandikotkurT023, author = {Achyuth Nandikotkur and Issa Traor{\'{e}} and Mohammad Mamun}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Detecting BrakTooth Attacks}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {787--792}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012128000003555}, doi = {10.5220/0012128000003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NandikotkurT023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NikulaKLL23, author = {Sara Nikula and Pekka Koskela and Outi{-}Marja Latvala and Sami Lehtonen}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Light Quantum Key Distribution Network Security Estimation Tool}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {587--596}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012022100003555}, doi = {10.5220/0012022100003555}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NikulaKLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NygardK23, author = {Arne Roar Nyg{\aa}rd and Sokratis K. Katsikas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Leveraging Hardware Reverse Engineering to Improve the Cyber Security and Resilience of the Smart Grid}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {610--616}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012046000003555}, doi = {10.5220/0012046000003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NygardK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Palfinger23, author = {Gerald Palfinger}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {OCScraper: Automated Analysis of the Fingerprintability of the iOS {API}}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {433--441}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012089600003555}, doi = {10.5220/0012089600003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Palfinger23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PaulT23, author = {Sudipta Paul and Vicen{\c{c}} Torra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{\(\Delta\)} {SFL:} (Decoupled Server Federated Learning) to Utilize {DLG} Attacks in Federated Learning by Decoupling the Server}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {577--584}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012150700003555}, doi = {10.5220/0012150700003555}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PaulT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PejoK23, author = {Bal{\'{a}}zs Pej{\'{o}} and Nikolett Kapui}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {SQLi Detection with {ML:} {A} Data-Source Perspective}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {642--648}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012050100003555}, doi = {10.5220/0012050100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PejoK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PolcakJ23, author = {Libor Polc{\'{a}}k and Kamil Jer{\'{a}}bek}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Data Protection and Security Issues with Network Error Logging}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {683--690}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012078100003555}, doi = {10.5220/0012078100003555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PolcakJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PolcakSMHM23, author = {Libor Polc{\'{a}}k and Marek Salon and Giorgio Maone and Radek Hranick{\'{y}} and Michael McMahon}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {JShelter: Give Me My Browser Back}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {287--294}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011965600003555}, doi = {10.5220/0011965600003555}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PolcakSMHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PrasadBSM23, author = {Arjun Prasad and Kevin Kanichery Biju and Soumya Somani and Barsha Mitra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Context-Aware Behavioral Fingerprinting of IoT Devices via Network Traffic Analysis}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {335--344}, publisher = {{SCITEPRESS}}, year = {2023}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PrasadBSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PriscoSF23, author = {Roberto De Prisco and Sergiy Shevchenko and Pompeo Faruolo}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Blockchain Data Replication}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {746--751}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012121000003555}, doi = {10.5220/0012121000003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PriscoSF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RahmanNMS23, author = {Hasina Rahman and Priyadarsi Nanda and Manoranjan Mohanty and Nazim Uddin Sheikh}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Anomaly Detection in Smart Grid Networks Using Power Consumption Data}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {830--837}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012137600003555}, doi = {10.5220/0012137600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RahmanNMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RajJS23, author = {Shubham Raj and Snehil Joshi and Kannan Srinathan}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{PIUDI:} Private Information Update for Distributed Infrastructure}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {425--432}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012087900003555}, doi = {10.5220/0012087900003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RajJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RaulinGHT23, author = {Vincent Raulin and Pierre{-}Fran{\c{c}}ois Gimenez and Yufei Han and Val{\'{e}}rie Viet Triem Tong}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{BAGUETTE:} Hunting for Evidence of Malicious Behavior in Dynamic Analysis Reports}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {417--424}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012086400003555}, doi = {10.5220/0012086400003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RaulinGHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RousselotCB23, author = {Axel Rousselot and Nora Cuppens and Samra Bouakkaz}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{AIS} Authentication Using Certificateless Cryptography}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {49--61}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012054600003555}, doi = {10.5220/0012054600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RousselotCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RoyS23, author = {Sangita Roy and Rudrapatna K. Shyamasundar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Rand Index-Based Analysis of Consensus Protocols}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {567--576}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012148200003555}, doi = {10.5220/0012148200003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RoyS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RusS023, author = {Catalin Rus and Dipti Kapoor Sarmah and Mohammed El{-}Hajj}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Defeating MageCart Attacks in a {NAISS} Way}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {691--697}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012079300003555}, doi = {10.5220/0012079300003555}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RusS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Sardar023, author = {Laltu Sardar and Subhra Mazumdar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Fidelis: Verifiable Keyword Search with No Trust Assumption}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {698--703}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012082700003555}, doi = {10.5220/0012082700003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Sardar023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchatzAKRS23, author = {David Schatz and Friedrich Altheide and Hedwig Koerfgen and Michael Rossberg and Guenter Schaefer}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Virtual Private Networks in the Quantum Era: {A} Security in Depth Approach}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {486--494}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012121800003555}, doi = {10.5220/0012121800003555}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchatzAKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchrammelSGLDUN23, author = {David Schrammel and Salmin Sultana and Karanvir Grewal and Michael LeMay and David M. Durham and Martin Unterguggenberger and Pascal Nasahl and Stefan Mangard}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{MEMES:} Memory Encryption-Based Memory Safety on Commodity Hardware}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {25--36}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012050300003555}, doi = {10.5220/0012050300003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchrammelSGLDUN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SenanayakeKAP023, author = {Janaka Senanayake and Harsha K. Kalutarage and M. Omar Al{-}Kadri and Luca Piras and Andrei Petrovski}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Labelled Vulnerability Dataset on Android Source Code (LVDAndro) to Develop AI-Based Code Vulnerability Detection Models}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {659--666}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012060400003555}, doi = {10.5220/0012060400003555}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SenanayakeKAP023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Shafeeq023, author = {Sehrish Shafeeq and Mathias Fischer}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{SEBDA:} {A} Secure and Efficient Blockchain Based Data Aggregation Scheme}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {369--376}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012077900003555}, doi = {10.5220/0012077900003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Shafeeq023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SheikhiGS23, author = {Maryam Sheikhi and Rosario Giustolisi and Carsten Sch{\"{u}}rmann}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Receipt-Free Electronic Voting from zk-SNARK}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {254--266}, publisher = {{SCITEPRESS}}, year = {2023}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SheikhiGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ShiS23, author = {Kevin Shi and Sherif Saad}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Automated Feature Engineering for AutoML Using Genetic Algorithms}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {450--459}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012090400003555}, doi = {10.5220/0012090400003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ShiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Shyamasundar23, author = {Rudrapatna K. Shyamasundar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{ERC20:} Correctness via Linearizability and Interference Freedom of the Underlying Smart Contract}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {557--566}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012145800003555}, doi = {10.5220/0012145800003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Shyamasundar23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SivaramanN23, author = {Navya Sivaraman and Simin Nadjm{-}Tehrani}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {5G Handover: When Forward Security Breaks}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {503--510}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012128400003555}, doi = {10.5220/0012128400003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SivaramanN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StockWDF23, author = {Joshua Stock and Jens Wettlaufer and Daniel Demmler and Hannes Federrath}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Lessons Learned: Defending Against Property Inference Attacks}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {312--323}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012049200003555}, doi = {10.5220/0012049200003555}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/StockWDF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Teseleanu23, author = {George Teseleanu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Threshold Cryptosystems Based on 2k-th Power Residue Symbols}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {295--302}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012007600003555}, doi = {10.5220/0012007600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Teseleanu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Teseleanu23a, author = {George Teseleanu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Note on a CBC-Type Mode of Operation}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {353--360}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012059100003555}, doi = {10.5220/0012059100003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Teseleanu23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UllahOP23, author = {Syed Sajid Ullah and Vladimir A. Oleshchuk and Harsha S. Gardiyawasam Pussewalage}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Lightweight Access Control Scheme with Attribute Policy for Blockchain-Enabled Internet of Things}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {528--539}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012138900003555}, doi = {10.5220/0012138900003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/UllahOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WaqdanLM23, author = {Mofareh Waqdan and Habib Louafi and Malek Mouhoub}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Comprehensive Risk Assessment Framework for IoT-Enabled Healthcare Environment}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {667--672}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012060900003555}, doi = {10.5220/0012060900003555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WaqdanLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Wenning23, author = {Rigo Wenning}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {The Certification Panacea}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2023}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Wenning23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WichmannAF023, author = {Pascal Wichmann and Sam Ansari and Hannes Federrath and Jens Lindemann}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {WebAppAuth: An Architecture to Protect from Compromised First-Party Web Servers}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {548--556}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012141700003555}, doi = {10.5220/0012141700003555}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WichmannAF023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YaqubMS23, author = {Waheeb Yaqub and Manoranjan Mohanty and Basem Suleiman}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Proctoring Online Exam Using Eye Tracking}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {738--745}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012120600003555}, doi = {10.5220/0012120600003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YaqubMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZaccagninoCGLMZ23, author = {Rocco Zaccagnino and Antonio Cirillo and Alfonso Guarino and Nicola Lettieri and Delfina Malandrino and Gianluca Zaccagnino}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards a Geometric Deep Learning-Based Cyber Security: Network System Intrusion Detection Using Graph Neural Networks}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {394--401}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012085700003555}, doi = {10.5220/0012085700003555}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZaccagninoCGLMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icsbt/2022s, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45137-9}, doi = {10.1007/978-3-031-45137-9}, isbn = {978-3-031-45136-2}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/2022s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2023, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0000167900003555}, doi = {10.5220/0000167900003555}, isbn = {978-989-758-666-8}, timestamp = {Mon, 31 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/Chaitou0LP22, author = {Hassan Chaitou and Thomas Robert and Jean Leneutre and Laurent Pautet}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {Intrinsic Weaknesses of IDSs to Malicious Adversarial Attacks and Their Mitigation}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {122--155}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_6}, doi = {10.1007/978-3-031-45137-9\_6}, timestamp = {Wed, 31 Jan 2024 07:42:55 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/Chaitou0LP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/Cuzzocrea22a, author = {Alfredo Cuzzocrea}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {Compressing Big {OLAP} Data Cubes in Big Data Analytics Systems: New Paradigms, a Reference Architecture, and Future Research Perspectives}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {156--175}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_7}, doi = {10.1007/978-3-031-45137-9\_7}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/Cuzzocrea22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/GiarettaMMG22, author = {Lodovico Giaretta and Thomas Marchioro and Evangelos P. Markatos and Sarunas Girdzijauskas}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {Towards a Realistic Decentralized Naive Bayes with Differential Privacy}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {98--121}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_5}, doi = {10.1007/978-3-031-45137-9\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/GiarettaMMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/HoangHKKO22, author = {Anh{-}Tuan Hoang and Neil Hanley and Ayesha Khalid and Dur{-}e{-}Shahwar Kundi and M{\'{a}}ire O'Neill}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {Stacked Ensemble Models Evaluation on {DL} Based {SCA}}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {43--68}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_3}, doi = {10.1007/978-3-031-45137-9\_3}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/HoangHKKO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/JanovskyMMMG22, author = {Adam Janovsky and Davide Maiorca and Dominik Macko and Vashek Matyas and Giorgio Giacinto}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {Explaining the Use of Cryptographic {API} in Android Malware}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {69--97}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_4}, doi = {10.1007/978-3-031-45137-9\_4}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/JanovskyMMMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/MaillardMSCB022, author = {Julien Maillard and Awaleh Houssein Meraneh and Modou Sarry and Christophe Clavier and H{\'{e}}l{\`{e}}ne Le Bouder and Ga{\"{e}}l Thomas}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {Blind Side Channel Analysis on the Elephant {LFSR} Extended Version}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {20--42}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_2}, doi = {10.1007/978-3-031-45137-9\_2}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/MaillardMSCB022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsbt/MasmoudiLK22, author = {Souha Masmoudi and Maryline Laurent and Nesrine Kaaniche}, editor = {Marten van Sinderen and Fons Wijnhoven and Slimane Hammoudi and Pierangela Samarati and Sabrina De Capitani di Vimercati}, title = {{SPOT+:} Secure and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over Multiple Contact Information}, booktitle = {E-Business and Telecommunications - 19th International Conference, {ICSBT} 2022, Lisbon, Portugal, July 14-16, 2022, and 19th International Conference, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1849}, pages = {1--19}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-45137-9\_1}, doi = {10.1007/978-3-031-45137-9\_1}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsbt/MasmoudiLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/000122, author = {Luca Vigan{\`{o}}}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Don't Tell Me The Cybersecurity Moon Is Shining... (Cybersecurity Show and Tell)}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2022}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/000122.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Al-AhmadiA22, author = {Saad Al{-}Ahmadi and Saud Al{-}Eyead}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {GAN-based Approach to Crafting Adversarial Malware Examples against a Heterogeneous Ensemble Classifier}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {451--460}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011338800003283}, doi = {10.5220/0011338800003283}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Al-AhmadiA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AnastasiadiAM22, author = {Eva Anastasiadi and Elias Athanasopoulos and Evangelos P. Markatos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {The Weakest Link: On Breaking the Association between Usernames and Passwords in Authentication Systems}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {560--567}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011276900003283}, doi = {10.5220/0011276900003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AnastasiadiAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AudranAHAFHGV22, author = {David Holm Audran and Marcus Braunschweig Andersen and Mark H{\o}jer Hansen and Mikkel M{\o}ller Andersen and Thomas B. Frederiksen and Kasper H. Hansen and Dimitrios Georgoulias and Emmanouil Vasilomanolakis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Tick Tock Break the Clock: Breaking CAPTCHAs on the Darkweb}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {357--365}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011273300003283}, doi = {10.5220/0011273300003283}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AudranAHAFHGV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AzizBKM22, author = {Benjamin Aziz and Aysha Bukhelli and Rinat Khusainov and Alaa Mohasseb}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Novel Method for Embedding and Extracting Secret Messages in Textual Documents based on Paragraph Resizing}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {714--719}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011384200003283}, doi = {10.5220/0011384200003283}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AzizBKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BagR022, author = {Samiran Bag and Indranil Ghosh Ray and Feng Hao}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A New Leakage Resilient Symmetric Searchable Encryption Scheme for Phrase Search}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {366--373}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011273600003283}, doi = {10.5220/0011273600003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BagR022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BahramiETDGK22, author = {Javad Bahrami and Mohammad Ebrahimabadi and Sofiane Takarabt and Jean{-}Luc Danger and Sylvain Guilley and Naghmeh Karimi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Practicality of Relying on Simulations in Different Abstraction Levels for Pre-silicon Side-Channel Analysis}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {661--668}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011307600003283}, doi = {10.5220/0011307600003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BahramiETDGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BaiardiMP22, author = {Fabrizio Baiardi and Daria Maggi and Mauro Passacantando}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Discovering How to Attack a System}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {548--553}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011270000003283}, doi = {10.5220/0011270000003283}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BaiardiMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BaigE22, author = {Ahmed Fraz Baig and Sigurd Eskeland}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {491--498}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011141400003283}, doi = {10.5220/0011141400003283}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BaigE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BarlettaDGLS22, author = {Vita Santa Barletta and Giuseppe Desolda and Domenico Gigante and Rosa Lanzilotti and Marco Saltarella}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {From {GDPR} to Privacy Design Patterns: The {MATERIALIST} Framework}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {642--648}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011305900003283}, doi = {10.5220/0011305900003283}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BarlettaDGLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BeetsNS22, author = {Christopher van der Beets and Raine Nieminen and Thomas Schneider}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{FAPRIL:} Towards Faster Privacy-preserving Fingerprint-based Localization}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {108--120}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011263500003283}, doi = {10.5220/0011263500003283}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BeetsNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelelDM22, author = {Anushree Belel and Ratna Dutta and Sourav Mukhopadhyay}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Key Encapsulation Mechanism in Ciphertext-policy Attribute based Setting Featuring Revocation and Key-homomorphic Property}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {349--356}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011271600003283}, doi = {10.5220/0011271600003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelelDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BielikJJL22, author = {Marek Bielik and Martin Jurecek and Olha Jureckov{\'{a}} and R{\'{o}}bert L{\'{o}}rencz}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Yet Another Algebraic Cryptanalysis of Small Scale Variants of {AES}}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {415--427}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011327900003283}, doi = {10.5220/0011327900003283}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BielikJJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BilotGH22, author = {Tristan Bilot and Gr{\'{e}}goire Geis and Badis Hammi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {PhishGNN: {A} Phishing Website Detection Framework using Graph Neural Networks}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {428--435}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328600003283}, doi = {10.5220/0011328600003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BilotGH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BoranJS22, author = {Nirmal Kumar Boran and Pranil Joshi and Virendra Singh}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{PASS-P:} Performance and Security Sensitive Dynamic Cache Partitioning}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {443--450}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011336900003283}, doi = {10.5220/0011336900003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BoranJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BrodschelmG22, author = {Lukas Brodschelm and Marcus Gelderie}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Application Sandboxing for Linux Desktops: {A} User-friendly Approach}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {317--324}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011145800003283}, doi = {10.5220/0011145800003283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BrodschelmG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CalvoB22, author = {Miguel Calvo and Marta Beltr{\'{a}}n}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An Adaptive Web Application Firewall}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {96--107}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011146900003283}, doi = {10.5220/0011146900003283}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/CalvoB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CascavillaCS22, author = {Giuseppe Cascavilla and Gemma Catolino and Mirella Sangiovanni}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Illicit Darkweb Classification via Natural-language Processing: Classifying Illicit Content of Webpages based on Textual Information}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {620--626}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011298600003283}, doi = {10.5220/0011298600003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CascavillaCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Chaitou0LP22, author = {Hassan Chaitou and Thomas Robert and Jean Leneutre and Laurent Pautet}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Threats to Adversarial Training for IDSs and Mitigation}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {226--236}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011277600003283}, doi = {10.5220/0011277600003283}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Chaitou0LP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChandranHHS22, author = {Gowri R. Chandran and Carmit Hazay and Robin Hundt and Thomas Schneider}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Comparison-based {MPC} in Star Topology}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {69--82}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011144100003283}, doi = {10.5220/0011144100003283}, timestamp = {Tue, 04 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChandranHHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CrincoliFIRMMS22, author = {Giuseppe Crincoli and Fabiana Fierro and Giacomo Iadarola and Piera Elena La Rocca and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Method for Road Accident Prevention in Smart Cities based on Deep Reinforcement Learning}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {513--518}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011146500003283}, doi = {10.5220/0011146500003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CrincoliFIRMMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DedousisRSG22, author = {Panagiotis Dedousis and Melina Raptaki and George Stergiopoulos and Dimitris Gritzalis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards an Automated Business Process Model Risk Assessment: {A} Process Mining Approach}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {35--46}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011135600003283}, doi = {10.5220/0011135600003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DedousisRSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Desmedt22, author = {Yvo Desmedt}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Are Clouds making Our Research Irrelevant and Who Is at Fault? (Position Paper)}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {436--442}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328800003283}, doi = {10.5220/0011328800003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Desmedt22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DeyD22, author = {Jayashree Dey and Ratna Dutta}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Code-based Key Encapsulation Mechanism Preserving Short Ciphertext and Secret Key}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {374--381}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011273900003283}, doi = {10.5220/0011273900003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DeyD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DiegoLRAM22, author = {Santiago de Diego and Oscar Lage and Cristina Regueiro and Sergio Anguita and Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Bypassing Current Limitations for Implementing a Credential Delegation for the Industry 4.0}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {485--490}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011136600003283}, doi = {10.5220/0011136600003283}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DiegoLRAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DockendorfDL22, author = {Mark Dockendorf and Ram Dantu and John Long}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Graph Algorithms over Homomorphic Encryption for Data Cooperatives}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {205--214}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011277000003283}, doi = {10.5220/0011277000003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DockendorfDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DowsleyFLNV22, author = {Rafael Dowsley and Myl{\`{e}}ne C. Q. Farias and Mario Larangeira and Anderson Nascimento and Jot Virdee}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Spendable Cold Wallet from {QR} Video}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {283--290}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011138300003283}, doi = {10.5220/0011138300003283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DowsleyFLNV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DufkaSS22, author = {Antonin Dufka and Vladimir Sedlacek and Petr Svenda}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{SHINE:} Resilience via Practical Interoperability of Multi-party Schnorr Signature Schemes}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {305--316}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011145600003283}, doi = {10.5220/0011145600003283}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DufkaSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DurbetG0MT22, author = {Axel Durbet and Paul{-}Marie Grollemund and Pascal Lafourcade and Denis Migdal and Kevin Thiry{-}Atighehchi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Authentication Attacks on Projection-based Cancelable Biometric Schemes}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {568--573}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011277100003283}, doi = {10.5220/0011277100003283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DurbetG0MT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DurbetG0T22, author = {Axel Durbet and Paul{-}Marie Grollemund and Pascal Lafourcade and Kevin Thiry{-}Atighehchi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Near-collisions and Their Impact on Biometric Security}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {382--389}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011279200003283}, doi = {10.5220/0011279200003283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DurbetG0T22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Eskeland22, author = {Sigurd Eskeland}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Collusion-resistant Broadcast Encryption based on Hidden {RSA} Subgroups}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {291--298}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011140000003283}, doi = {10.5220/0011140000003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Eskeland22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/EskelandB22, author = {Sigurd Eskeland and Ahmed Fraz Baig}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Cryptanalysis of a Privacy-preserving Behavior-oriented Authentication Scheme}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {299--304}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011140300003283}, doi = {10.5220/0011140300003283}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/EskelandB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaOTKHKS22, author = {Kazuhide Fukushima and Hiroki Okada and Sofiane Takarabt and Amina Korchi and Meziane Hamoud and Khaled Karray and Youssef Souissy and Sylvain Guilley}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {701--706}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328400003283}, doi = {10.5220/0011328400003283}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaOTKHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GelderieBLB22, author = {Marcus Gelderie and Valentin Barth and Maximilian Luff and Julian Birami}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Seccomp Filters from Fuzzing}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {507--512}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011145100003283}, doi = {10.5220/0011145100003283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GelderieBLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GummaMDPSDV22, author = {Varun Gumma and Barsha Mitra and Soumyadeep Dey and Pratik Shashikantbhai Patel and Sourabh Suman and Saptarshi Das and Jaideep Vaidya}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{PAMMELA:} Policy Administration Methodology using Machine Learning}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {147--157}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011272400003283}, doi = {10.5220/0011272400003283}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GummaMDPSDV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GunawardhanaA22, author = {Rahul Sankalana Gunawardhana and Kavinga Yapa Abeywardana}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Irreversible Applications for Windows {NT} Systems}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {479--484}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011051700003283}, doi = {10.5220/0011051700003283}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GunawardhanaA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Harth-KitzerowC22, author = {Christopher Harth{-}Kitzerow and Georg Carle and Fan Fei and Andr{\'{e}} Luckow and Johannes Klepsch}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{CRGC:} {A} Practical Framework for Constructing Reusable Garbled Circuits}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {83--95}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011145300003283}, doi = {10.5220/0011145300003283}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Harth-KitzerowC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoangHKKO22, author = {Anh{-}Tuan Hoang and Neil Hanley and Ayesha Khalid and Dur{-}e{-}Shahwar Kundi and M{\'{a}}ire O'Neill}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Stacked Ensemble Model for Enhancing the {DL} based {SCA}}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {59--68}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011139700003283}, doi = {10.5220/0011139700003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HoangHKKO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IganiboATCM22, author = {Ibifubara Iganibo and Massimiliano Albanese and Kaan Turkmen and Thomas R. Campbell and Marc Mosko}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Mason Vulnerability Scoring Framework: {A} Customizable Framework for Scoring Common Vulnerabilities and Weaknesses}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {215--225}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011277400003283}, doi = {10.5220/0011277400003283}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/IganiboATCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Ionita22, author = {Alexandru Ionita}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Weighted Attribute-based Encryption with Parallelized Decryption}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {574--579}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011278400003283}, doi = {10.5220/0011278400003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Ionita22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JanovskyMMMG22, author = {Adam Janovsky and Davide Maiorca and Dominik Macko and Vashek Matyas and Giorgio Giacinto}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Longitudinal Study of Cryptographic {API:} {A} Decade of Android Malware}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {121--133}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011265300003283}, doi = {10.5220/0011265300003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JanovskyMMMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JavedMBG22, author = {Saqib Javed and Muhammad Asim Mukhtar and Muhammad Khurram Bhatti and Guy Gogniat}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Novel Design for IE-Cache to Mitigate Conflict-based Cache-side Channel Attacks with Reduced Energy Consumption}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {675--680}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011326700003283}, doi = {10.5220/0011326700003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JavedMBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JeyamohanCA0O22, author = {Jeyamohan Neera and Xiaomin Chen and Nauman Aslam and Biju Issac and Eve O'Brien}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Local Differential Privacy based Hybrid Recommendation Model with {BERT} and Matrix Factorization}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {325--332}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011266800003283}, doi = {10.5220/0011266800003283}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/JeyamohanCA0O22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaanicheBG22, author = {Nesrine Kaaniche and Aymen Boudguiga and Gustavo {Gonzalez Granadillo}}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Efficient Hybrid Model for Intrusion Detection Systems}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {694--700}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328300003283}, doi = {10.5220/0011328300003283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaanicheBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KapustaM22, author = {Katarzyna Kapusta and G{\'{e}}rard Memmi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{PE-AONT:} Partial Encryption All or Nothing Transform}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {636--641}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011300600003283}, doi = {10.5220/0011300600003283}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KapustaM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KarNBS22, author = {Animesh Kar and Andrei Natadze and Enrico Branca and Natalia Stakhanova}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {HTTPFuzz: Web Server Fingerprinting with {HTTP} Request Fuzzing}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {261--271}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328900003283}, doi = {10.5220/0011328900003283}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KarNBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Katsikas22, author = {Sokratis K. Katsikas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Cyber Security When {IT} Meets {OT}}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2022}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Katsikas22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KazlouskiMM22, author = {Andrei Kazlouski and Thomas Marchioro and Evangelos P. Markatos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {What your Fitbit Says about You: De-anonymizing Users in Lifelogging Datasets}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {341--348}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011268600003283}, doi = {10.5220/0011268600003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KazlouskiMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KlinecSKSM22, author = {Dusan Klinec and Marek S{\'{y}}s and Karel Kubicek and Petr Svenda and Vashek Maty{\'{a}}s}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {134--146}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011267600003283}, doi = {10.5220/0011267600003283}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KlinecSKSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LagoFMS22, author = {Loris Dal Lago and Fabio Federici and Davide Martintoni and Valerio Senni}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Risk-driven Model-based Architecture Design for Secure Information Flows in Manufacturing Infrastructures}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {499--506}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011144700003283}, doi = {10.5220/0011144700003283}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/LagoFMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LavaurL22, author = {Thomas Lavaur and J{\'{e}}r{\^{o}}me Lacan}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {zkBeacon: Proven Randomness Beacon based on Zero-knowledge Verifiable Computation}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {406--414}, publisher = {{SCITEPRESS}}, year = {2022}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LavaurL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiT22, author = {Zelong Li and Akhilesh Tyagi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Transient State Signaling for Spectre/Meltdown Transient Cache Side-channel Prevention}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {655--660}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011307500003283}, doi = {10.5220/0011307500003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MalinaRDJHC22, author = {Lukas Malina and Sara Ricci and Patrik Dobias and Petr Jedlicka and Jan Hajny and Kim{-}Kwang Raymond Choo}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on {FPGA} Platforms}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {605--613}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011294200003283}, doi = {10.5220/0011294200003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MalinaRDJHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MarchioroGMG22, author = {Thomas Marchioro and Lodovico Giaretta and Evangelos P. Markatos and Sarunas Girdzijauskas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Federated Naive Bayes under Differential Privacy}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {170--180}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011275300003283}, doi = {10.5220/0011275300003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MarchioroGMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MasmoudiLK22, author = {Souha Masmoudi and Maryline Laurent and Nesrine Kaaniche}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{SEVIL:} Secure and Efficient VerifIcation over Massive Proofs of KnowLedge}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {13--24}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011125800003283}, doi = {10.5220/0011125800003283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MasmoudiLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/McDonaldPAR22, author = {Jeffrey Todd McDonald and Jennifer Parnell and Todd R. Andel and Samuel H. Russ}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Effectiveness of Adversarial Component Recovery in Protected Netlist Circuit Designs}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {181--192}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011275400003283}, doi = {10.5220/0011275400003283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/McDonaldPAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MeranehCBM022, author = {Awaleh Houssein Meraneh and Christophe Clavier and H{\'{e}}l{\`{e}}ne Le Bouder and Julien Maillard and Ga{\"{e}}l Thomas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Blind Side Channel on the Elephant {LFSR}}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {25--34}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011135300003283}, doi = {10.5220/0011135300003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MeranehCBM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MercaldoCCIMRS22, author = {Francesco Mercaldo and Rosangela Casolare and Giovanni Ciaramella and Giacomo Iadarola and Fabio Martinelli and Francesco Ranieri and Antonella Santone}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Real-time Method for {CAN} Bus Intrusion Detection by Means of Supervised Machine Learning}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {534--539}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011267500003283}, doi = {10.5220/0011267500003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MercaldoCCIMRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MoralesA022, author = {Daniel Morales Escalera and Isaac Agudo and Javier L{\'{o}}pez}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Real-time Crowd Counting based on Wearable Ephemeral IDs}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {249--260}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011327200003283}, doi = {10.5220/0011327200003283}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MoralesA022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MoreHW22, author = {Stefan More and Jakob Heher and Clemens Walluschek}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Offline-verifiable Data from Distributed Ledger-based Registries}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {687--693}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011327600003283}, doi = {10.5220/0011327600003283}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MoreHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NygardSK22, author = {Arne Roar Nyg{\aa}rd and Arvind Sharma and Sokratis K. Katsikas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Reverse Engineering for Thwarting Digital Supply Chain Attacks in Critical Infrastructures: Ethical Considerations}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {461--468}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011384300003283}, doi = {10.5220/0011384300003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NygardSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OleynikovPS22, author = {Ivan Oleynikov and Elena Pagnin and Andrei Sabelfeld}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {CatNap: Leveraging Generic {MPC} for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {237--248}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011279500003283}, doi = {10.5220/0011279500003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OleynikovPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OseiLMZ22, author = {Richmond Osei and Habib Louafi and Malek Mouhoub and Zhongwen Zhu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Efficient IoT Device Fingerprinting Approach using Machine Learning}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {525--533}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011260500003283}, doi = {10.5220/0011260500003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OseiLMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PolcakM22, author = {Libor Polc{\'{a}}k and Petr Matousek}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Metering Homes: Do Energy Efficiency and Privacy Need to Be in Conflict?}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {47--58}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011139000003283}, doi = {10.5220/0011139000003283}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PolcakM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PrazeresCSR22, author = {Nuno Prazeres and Rog{\'{e}}rio Lu{\'{\i}}s C. Costa and Leonel Santos and Carlos Rabad{\~{a}}o}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Evaluation of AI-based Malware Detection in IoT Network Traffic}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {580--585}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011279600003283}, doi = {10.5220/0011279600003283}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PrazeresCSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RabasLB22, author = {Tom{\'{a}}s Rabas and R{\'{o}}bert L{\'{o}}rencz and Jir{\'{\i}} Bucek}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Verification of PUF-based IoT Protocols with {AVISPA} and Scyther}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {627--635}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011299000003283}, doi = {10.5220/0011299000003283}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/RabasLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RizomiliotisDTK22, author = {Panagiotis Rizomiliotis and Christos Diou and Aikaterini Triakosia and Ilias Kyrannas and Konstantinos Tserpes}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Partially Oblivious Neural Network Inference}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {158--169}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011272500003283}, doi = {10.5220/0011272500003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RizomiliotisDTK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RodriguezCA22, author = {David Rodr{\'{\i}}guez Torrado and Miguel Cozar and Jos{\'{e}} M. del {\'{A}}lamo}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Identifying Organizations Receiving Personal Data in Android Apps}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {592--596}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011290100003283}, doi = {10.5220/0011290100003283}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RodriguezCA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Roy0C22, author = {Rahul Roy and Abhijit Das and Dipanwita Roy Chowdhury}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Parallel and Distributed Implementations of the Wiedemann and the Block-Wiedemann Methods over {GF(2)}}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {540--547}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011267700003283}, doi = {10.5220/0011267700003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Roy0C22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RudavskyyM22, author = {Kyrylo Rudavskyy and Ali Miri}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Resilience of GANs against Adversarial Attacks}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {390--397}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011307200003283}, doi = {10.5220/0011307200003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RudavskyyM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SaiaCFP22, author = {Roberto Saia and Salvatore Carta and Gianni Fenu and Livio Pompianu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Region-based Training Data Segmentation Strategy to Credit Scoring}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {275--282}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011137400003283}, doi = {10.5220/0011137400003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SaiaCFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SaiaCFP22a, author = {Roberto Saia and Salvatore Carta and Gianni Fenu and Livio Pompianu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Brain Waves and Evoked Potentials as Biometric User Identification Strategy: An Affordable Low-cost Approach}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {614--619}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011297600003283}, doi = {10.5220/0011297600003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SaiaCFP22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SalauDMUB22, author = {Abiola Salau and Ram Dantu and Kirill Morozov and Kritagya Upadhyay and Syed Badruddoja}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards a Threat Model and Security Analysis for Data Cooperatives}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {707--713}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328700003283}, doi = {10.5220/0011328700003283}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SalauDMUB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SegoviaRCG22, author = {Mariana Segovia and Jose Rubio{-}Hernan and Ana R. Cavalli and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Switched-based Control Testbed to Assure Cyber-physical Resilience by Design}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {681--686}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011327300003283}, doi = {10.5220/0011327300003283}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SegoviaRCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SengGL22, author = {S. Seng and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Y. Laarouci}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Implementation of a Stateful Network Protocol Intrusion Detection Systems}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {398--405}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011327400003283}, doi = {10.5220/0011327400003283}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SengGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ShehuPC22, author = {Abubakar{-}Sadiq Shehu and Ant{\'{o}}nio Pinto and Manuel Eduardo Correia}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Decentralised Real Estate Transfer Verification based on Self-Sovereign Identity and Smart Contracts}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {469--476}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011384700003283}, doi = {10.5220/0011384700003283}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ShehuPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SinhaS22, author = {Amisha Sinha and Debanjan Sadhya}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {554--559}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011273000003283}, doi = {10.5220/0011273000003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SinhaS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StanTBKZS22, author = {Oana Stan and Vincent Thouvenot and Aymen Boudguiga and Katarzyna Kapusta and Martin Zuber and Renaud Sirdey}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Secure Federated Learning: Analysis of Different Cryptographic Tools}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {669--674}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011322700003283}, doi = {10.5220/0011322700003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/StanTBKZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SvendaKND22, author = {Petr Svenda and Rudolf Kvasnovsk{\'{y}} and Imrich Nagy and Antonin Dufka}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {JCAlgTest: Robust Identification Metadata for Certified Smartcards}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {597--604}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011294000003283}, doi = {10.5220/0011294000003283}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SvendaKND22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UfukS22, author = {Berkan Ufuk and Mehmet Tahir Sandikkaya}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Moving Target Defense Router: MaTaDoR}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {649--654}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011306500003283}, doi = {10.5220/0011306500003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/UfukS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UriawanBHB22, author = {Wisnu Uriawan and Youakim Badr and Omar Hasan and Lionel Brunie}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {TrustLend: Using Borrower Trustworthiness for Lending on Ethereum}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {519--524}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011151900003283}, doi = {10.5220/0011151900003283}, timestamp = {Thu, 04 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/UriawanBHB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ViescinskiHWM22, author = {Amanda B. Viescinski and Tiago Heinrich and Newton Carlos Will and Carlos Maziero}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Behavior Modeling of a Distributed Application for Anomaly Detection}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {333--340}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011267200003283}, doi = {10.5220/0011267200003283}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ViescinskiHWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VoyezAACFS22, author = {Antonin Voyez and Tristan Allard and Gildas Avoine and Pierre Cauchois and {\'{E}}lisa Fromont and Matthieu Simonin}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Membership Inference Attacks on Aggregated Time Series with Linear Programming}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {193--204}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011276100003283}, doi = {10.5220/0011276100003283}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/VoyezAACFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WagnerB22, author = {Paul Georg Wagner and J{\"{u}}rgen Beyerer}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards Heterogeneous Remote Attestation Protocols}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {586--591}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011289000003283}, doi = {10.5220/0011289000003283}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WagnerB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2022, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0000163500003283}, doi = {10.5220/0000163500003283}, isbn = {978-989-758-590-6}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/0001RS21, author = {Pascal Lafourcade and L{\'{e}}o Robert and Demba Sow}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Fast Cramer-Shoup Cryptosystem}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {766--771}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010580607660771}, doi = {10.5220/0010580607660771}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0001RS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AbrahamSM21, author = {Andreas Abraham and Christopher Schinnerl and Stefan More}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{SSI} Strong Authentication using a Mobile-phone based Identity Wallet Reaching a High Level of Assurance}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {137--148}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010542801370148}, doi = {10.5220/0010542801370148}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AbrahamSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Andreea21, author = {Ionita Andreea}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Private Set Intersection: Past, Present and Future}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {680--685}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010525806800685}, doi = {10.5220/0010525806800685}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Andreea21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BailluetBL21, author = {Nicolas Bailluet and H{\'{e}}l{\`{e}}ne Le Bouder and David Lubicz}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Ransomware Detection using Markov Chain Models over File Headers}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {403--411}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010513104030411}, doi = {10.5220/0010513104030411}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BailluetBL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BayEAV21, author = {Asl{\'{\i}} Bay and Zeki Erkin and Mina Alishahi and Jelle Vos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Multi-Party Private Set Intersection Protocols for Practical Applications}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {515--522}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010547605150522}, doi = {10.5220/0010547605150522}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BayEAV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BellizziV0H21, author = {Jennifer Bellizzi and Mark Vella and Christian Colombo and Julio C. Hernandez{-}Castro}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics {(JIT-MF)} for Android}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {356--369}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010603603560369}, doi = {10.5220/0010603603560369}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BellizziV0H21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BerlatoCR21, author = {Stefano Berlato and Roberto Carbone and Silvio Ranise}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Cryptographic Enforcement of Access Control Policies in the Cloud: Implementation and Experimental Assessment}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {370--381}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010608003700381}, doi = {10.5220/0010608003700381}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BerlatoCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BlinowskiPW21, author = {Grzegorz J. Blinowski and Pawel Piotrowski and Michal Wisniewski}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Comparing Support Vector Machine and Neural Network Classifiers of {CVE} Vulnerabilities}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {734--740}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010574807340740}, doi = {10.5220/0010574807340740}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BlinowskiPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BouamamaHE21, author = {Jaouhara Bouamama and Mustapha Hedabou and Mohammed Erradi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Cloud Key Management using Trusted Execution Environment}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {560--567}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010558905600567}, doi = {10.5220/0010558905600567}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BouamamaHE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CasolareIMMS21, author = {Rosangela Casolare and Giacomo Iadarola and Fabio Martinelli and Francesco Mercaldo and Antonella Santone}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Mobile Family Detection through Audio Signals Classification}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {479--486}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010543504790486}, doi = {10.5220/0010543504790486}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CasolareIMMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CermakS21, author = {Milan Cerm{\'{a}}k and Denisa Sramkova}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{GRANEF:} Utilization of a Graph Database for Network Forensics}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {785--790}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010581807850790}, doi = {10.5220/0010581807850790}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/CermakS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CichonMK21, author = {Jacek Cichon and Krzysztof Majcher and Miroslaw Kutylowski}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Fair Mutual Authentication}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {754--759}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010579507540759}, doi = {10.5220/0010579507540759}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CichonMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DashtiOKDR21, author = {Salimeh Dashti and Anderson Santana de Oliveira and Caelin Kaplan and Manuel Dalcastagn{\'{e}} and Silvio Ranise}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Can Data Subject Perception of Privacy Risks Be Useful in a Data Protection Impact Assessment?}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {827--832}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010602608270832}, doi = {10.5220/0010602608270832}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DashtiOKDR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DedousisSAG21, author = {Panagiotis Dedousis and George Stergiopoulos and George Arampatzis and Dimitris Gritzalis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards Integrating Security in Industrial Engineering Design Practices}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {161--172}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010544001610172}, doi = {10.5220/0010544001610172}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DedousisSAG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Demmler00SW21, author = {Daniel Demmler and Stefan Katzenbeisser and Thomas Schneider and Tom Schuster and Christian Weinert}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Improved Circuit Compilation for Hybrid {MPC} via Compiler Intermediate Representation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {444--451}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010540504440451}, doi = {10.5220/0010540504440451}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Demmler00SW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DockendorfDMB21, author = {Mark Dockendorf and Ram Dantu and Kirill Morozov and Sanjukta Bhowmick}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Investing Data with Untrusted Parties using {HE}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {845--853}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010606908450853}, doi = {10.5220/0010606908450853}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DockendorfDMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DuttaDB21, author = {Ratna Dutta and Sumit Kumar Debnath and Chinmoy Biswas}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Storage Friendly Provably Secure Multivariate Identity-Based Signature from Isomorphism of Polynomials Problem}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {595--602}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010580505950602}, doi = {10.5220/0010580505950602}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DuttaDB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/EllingsenRST21, author = {P{\aa}l Ellingsen and Constanza Riera and Pantelimon Stanica and Anton Tkachenko}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An Extension of the Avalanche Criterion in the Context of c-Differentials}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {460--467}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010541304600467}, doi = {10.5220/0010541304600467}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/EllingsenRST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FirsovLLT21, author = {Denis Firsov and Henri Lakk and Sven Laur and Ahto Truu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{BLT+L:} Efficient Signatures from Timestamping and Endorsements}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {75--86}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010530000750086}, doi = {10.5220/0010530000750086}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FirsovLLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ForestiL21, author = {Sara Foresti and Giovanni Livraga}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Selective Owner-side Encryption in Digital Data Markets: Strategies for Key Derivation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {620--627}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010603506200627}, doi = {10.5220/0010603506200627}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ForestiL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FournierTG21, author = {Beno{\^{\i}}t Fournier and Val{\'{e}}rie Viet Triem Tong and Gilles Guette}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Accurate Measurement of the Energy Consumption of Security Functions}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {487--494}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010544604870494}, doi = {10.5220/0010544604870494}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FournierTG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FraijiATHS21, author = {Yosra Fraiji and Lamia Ben Azzouz and Wassim Trojet and Ghaleb Hoblos and Le{\"{\i}}la Azouz Sa{\"{\i}}dane}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{RICAV:} RIsk based Context-Aware Security Solution for the Intra-Electric Vehicle Network}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {772--778}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010581407720778}, doi = {10.5220/0010581407720778}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FraijiATHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FrempongSASS21, author = {Yaw Frempong and Yates Snyder and Erfan Al{-}Hossami and Meera Sridhar and Samira Shaikh}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {HIJaX: Human Intent JavaScript {XSS} Generator}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {798--805}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010583807980805}, doi = {10.5220/0010583807980805}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FrempongSASS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GranadilloBD21, author = {Gustavo {Gonzalez Granadillo} and Alejandro G. Bedoya and Rodrigo Diaz}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An Improved Live Anomaly Detection System {(I-LADS)} based on Deep Learning Algorithms}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {568--575}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010573705680575}, doi = {10.5220/0010573705680575}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GranadilloBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GregorczykM21, author = {Marcin Gregorczyk and Wojciech Mazurczyk}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Inferring Flow Table State through Active Fingerprinting in {SDN} Environments: {A} Practical Approach}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {576--586}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010573905760586}, doi = {10.5220/0010573905760586}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GregorczykM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Gross21, author = {Thomas Gro{\ss}}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Hashing to Prime in Zero-Knowledge}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {62--74}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010525400620074}, doi = {10.5220/0010525400620074}, timestamp = {Fri, 06 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Gross21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GuigaSR21, author = {Takoua Guiga and Jean{-}Jacques Schwartzmann and Christophe Rosenberger}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Privacy Aura for Transparent Authentication on Multiple Smart Devices}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {741--746}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010576407410746}, doi = {10.5220/0010576407410746}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GuigaSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HagbergHR21, author = {Rasmus Hagberg and Martin Hell and Christoph Reichenbach}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Using Program Analysis to Identify the Use of Vulnerable Functions}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {523--530}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010548205230530}, doi = {10.5220/0010548205230530}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HagbergHR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HagemanKHP21, author = {Kaspar Hageman and Egon Kidmose and Ren{\'{e}} Rydhof Hansen and Jens Myrup Pedersen}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Can a {TLS} Certificate Be Phishy?}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {38--49}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010516600380049}, doi = {10.5220/0010516600380049}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HagemanKHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HekkalaNLH21, author = {Julius Hekkala and Sara Nikula and Outi{-}Marja Latvala and Kimmo Halunen}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Involving Humans in the Cryptographic Loop: Introduction and Threat Analysis of {EEVEHAC}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {659--664}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010517806590664}, doi = {10.5220/0010517806590664}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HekkalaNLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HerbautMV21, author = {Fabien Herbaut and Nicolas M{\'{e}}loni and Pascal V{\'{e}}ron}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Compact Variable-base {ECC} Scalar Multiplication using Euclidean Addition Chains}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {531--539}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010551705310539}, doi = {10.5220/0010551705310539}, timestamp = {Thu, 06 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HerbautMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HocineB21, author = {Nadia Hocine and Ismail Bokhari}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Dynamic Access Control Framework for Enterprise Content Management Systems}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {647--652}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010514806470652}, doi = {10.5220/0010514806470652}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HocineB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoogerwerfTBE21, author = {Erwin Hoogerwerf and Daphne van Tetering and Asl{\'{\i}} Bay and Zekeriya Erkin}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Efficient Joint Random Number Generation for Secure Multi-party Computation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {436--443}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010534804360443}, doi = {10.5220/0010534804360443}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HoogerwerfTBE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HorandnerP21, author = {Felix H{\"{o}}randner and Bernd Pr{\"{u}}nster}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Armored Twins: Flexible Privacy Protection for Digital Twins through Conditional Proxy Re-Encryption and Multi-Party Computation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {149--160}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010543301490160}, doi = {10.5220/0010543301490160}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HorandnerP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IganiboAMBB21, author = {Ibifubara Iganibo and Massimiliano Albanese and Marc Mosko and Eric Bier and Alejandro E. Brito}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Vulnerability Metrics for Graph-based Configuration Security}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {259--270}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010559402590270}, doi = {10.5220/0010559402590270}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IganiboAMBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IlterS21, author = {Murat Burhan Ilter and Ali Aydin Sel{\c{c}}uk}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A New {MILP} Model for Matrix Multiplications with Applications to {KLEIN} and {PRINCE}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {420--427}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010519504200427}, doi = {10.5220/0010519504200427}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IlterS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IslamS21, author = {Md. Morshedul Islam and Reihaneh Safavi{-}Naini}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Model Inversion for Impersonation in Behavioral Authentication Systems}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {271--282}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010559802710282}, doi = {10.5220/0010559802710282}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IslamS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IwamuraK21, author = {Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Secure Computation by Secret Sharing using Input Encrypted with Random Number}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {540--547}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010552305400547}, doi = {10.5220/0010552305400547}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IwamuraK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KawaS21, author = {Piotr Kawa and Piotr Syga}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Verify It Yourself: {A} Note on Activation Functions' Influence on Fast DeepFake Detection}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {779--784}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010581707790784}, doi = {10.5220/0010581707790784}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KawaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KayemPML21, author = {Anne V. D. M. Kayem and Nikolai J. Podlesny and Christoph Meinel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {On Chameleon Pseudonymisation and Attribute Compartmentation-as-a-Service}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {704--714}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010552207040714}, doi = {10.5220/0010552207040714}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KayemPML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KellerM0Y21, author = {Hannah Keller and Helen M{\"{o}}llering and Thomas Schneider and Hossein Yalame}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Balancing Quality and Efficiency in Private Clustering with Affinity Propagation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {173--184}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010547801730184}, doi = {10.5220/0010547801730184}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KellerM0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiktenkoKBF21, author = {Evgeniy O. Kiktenko and Mikhail A. Kudinov and Andrey A. Bulychev and Aleksey K. Fedorov}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Proof-of-Forgery for Hash-based Signatures}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {333--342}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010579603330342}, doi = {10.5220/0010579603330342}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiktenkoKBF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KoutsokostasP21, author = {Vasilios Koutsokostas and Constantinos Patsakis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Python and Malware: Developing Stealth and Evasive Malware without Obfuscation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {125--136}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010541501250136}, doi = {10.5220/0010541501250136}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KoutsokostasP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KozlowskiK21, author = {Mateusz Kozlowski and Bogdan Ksiezopolski}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A New Method of Testing Machine Learning Models of Detection for Targeted DDoS Attacks}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {728--733}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010574507280733}, doi = {10.5220/0010574507280733}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KozlowskiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LeuneK21, author = {Kees Leune and Sung Kim}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Supporting Cyber Threat Analysis with Service-Oriented Enterprise Modeling}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {385--394}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010502503850394}, doi = {10.5220/0010502503850394}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LeuneK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LilliBR21, author = {Mario Lilli and Chiara Braghin and Elvinia Riccobene}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Formal Proof of a Vulnerability in Z-Wave IoT Protocol}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {198--209}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010553301980209}, doi = {10.5220/0010553301980209}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LilliBR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Lopuhaa-Zwakenberg21, author = {Milan Lopuha{\"{a}}{-}Zwakenberg and Mina Alishahi and Jeroen Kivits and Jordi Klarenbeek and Gert{-}Jan van der Velde and Nicola Zannone}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Comparing Classifiers' Performance under Differential Privacy}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {50--61}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010519000500061}, doi = {10.5220/0010519000500061}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Lopuhaa-Zwakenberg21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LouniciNEOT21, author = {Sofiane Lounici and Mohamed Njeh and Orhan Ermis and Melek {\"{O}}nen and Slim Trabelsi}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Preventing Watermark Forging Attacks in a MLaaS Environment}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {295--306}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010560602950306}, doi = {10.5220/0010560602950306}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LouniciNEOT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MabuchiH21, author = {Mitsuhiro Mabuchi and Koji Hasebe}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{C2RBAC:} An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {819--826}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010601508190826}, doi = {10.5220/0010601508190826}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MabuchiH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MarchioroKM21, author = {Thomas Marchioro and Andrei Kazlouski and Evangelos P. Markatos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {User Identification from Time Series of Fitness Data}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {806--811}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010585008060811}, doi = {10.5220/0010585008060811}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MarchioroKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MarquesPHT21, author = {Raul Casanova Marques and Pavel Pascacio and Jan Hajny and Joaqu{\'{\i}}n Torres{-}Sospedra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Anonymous Attribute-based Credentials in Collaborative Indoor Positioning Systems}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {791--797}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010582507910797}, doi = {10.5220/0010582507910797}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MarquesPHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MaurelVR21, author = {H{\'{e}}lo{\"{\i}}se Maurel and Santiago A. Vidal and Tamara Rezk}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Statically Identifying {XSS} using Deep Learning}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {99--110}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010537000990110}, doi = {10.5220/0010537000990110}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MaurelVR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MaurerGGS21, author = {Nils M{\"{a}}urer and Christoph Gentsch and Thomas Gr{\"{a}}upl and Corinna Schmitt}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Formal Security Verification of the Station-to-Station based Cell-attachment Procedure of {LDACS}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {603--610}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010580906030610}, doi = {10.5220/0010580906030610}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MaurerGGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/McDonaldMBBA21, author = {Jeffrey Todd McDonald and Ramya Manikyam and S{\'{e}}bastien Bardin and Richard Bonichon and Todd R. Andel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Program Protection through Software-based Hardware Abstraction}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {247--258}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010557502470258}, doi = {10.5220/0010557502470258}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/McDonaldMBBA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MiculanV21, author = {Marino Miculan and Nicola Vitacolonna}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Automated Symbolic Verification of Telegram's MTProto 2.0}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {185--197}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010549601850197}, doi = {10.5220/0010549601850197}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MiculanV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MigdalMR21, author = {Denis Migdal and Ilaria Magotti and Christophe Rosenberger}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Classifying Biometric Systems Users among the Doddington Zoo: Application to Keystroke Dynamics}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {747--753}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010577507470753}, doi = {10.5220/0010577507470753}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MigdalMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MuhammadKAAK21, author = {Mujahid Muhammad and Paul Kearney and Adel Aneiba and Junaid Arshad and Andreas Kunz}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{RMCCS:} RSSI-based Message Consistency Checking Scheme for {V2V} Communications}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {722--727}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010561107220727}, doi = {10.5220/0010561107220727}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MuhammadKAAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Negre21, author = {Christophe N{\`{e}}gre}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Side Channel Counter-measures based on Randomized {AMNS} Modular Multiplication}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {611--619}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010599706110619}, doi = {10.5220/0010599706110619}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Negre21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NorrmanSB21, author = {Karl Norrman and Vaishnavi Sundararajan and Alessandro Bruni}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Formal Analysis of {EDHOC} Key Establishment for Constrained IoT Devices}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {210--221}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010554002100221}, doi = {10.5220/0010554002100221}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/NorrmanSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NugierLBMHP21, author = {Cyrius Nugier and Diane Leblanc{-}Albarel and Agathe Blaise and Simon Masson and Paul Huynh and Yris Brice Wandji Piugie}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {An Upcycling Tokenization Method for Credit Card Numbers}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {15--25}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010508600150025}, doi = {10.5220/0010508600150025}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NugierLBMHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OkadaKC21, author = {Hiroki Okada and Shinsaku Kiyomoto and Carlos Cid}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Comparison of {GKE} Protocols based on {SIDH}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {507--514}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010547305070514}, doi = {10.5220/0010547305070514}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OkadaKC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PallabD21, author = {Pritam Pallab and Abhijit Das}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {AVX-512-based Parallelization of Block Sieving and Bucket Sieving for the General Number Field Sieve Method}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {653--658}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010515206530658}, doi = {10.5220/0010515206530658}, timestamp = {Mon, 27 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PallabD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ParisotPS21, author = {Mathias P. M. Parisot and Bal{\'{a}}zs Pej{\'{o}} and Dayana Spagnuelo}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model's Complexity}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {715--721}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010555607150721}, doi = {10.5220/0010555607150721}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ParisotPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ParkerMD21, author = {Colby Parker and Jeffrey Todd McDonald and Dimitrios Damopoulos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Machine Learning Classification of Obfuscation using Image Visualization}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {854--859}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010607408540859}, doi = {10.5220/0010607408540859}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ParkerMD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PernprunerSR21, author = {Marco Pernpruner and Giada Sciarretta and Silvio Ranise}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {222--233}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010554502220233}, doi = {10.5220/0010554502220233}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PernprunerSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PonsardRD21, author = {Christophe Ponsard and Val{\'{e}}ry Ramon and Jean{-}Christophe Deprez}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Goal and Threat Modelling for Driving Automotive Cybersecurity Risk Analysis Conforming to {ISO/SAE} 21434}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {833--838}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010603008330838}, doi = {10.5220/0010603008330838}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PonsardRD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RajdevM21, author = {Sohail Rajdev and Barsha Mitra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Enforcing Cardinality Constraint in Temporal {RBAC}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {639--646}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010501506390646}, doi = {10.5220/0010501506390646}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RajdevM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RicciJCDMH21, author = {Sara Ricci and Petr Jedlicka and Peter C{\'{\i}}bik and Petr Dzurenda and Lukas Malina and Jan Hajny}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Towards CRYSTALS-Kyber {VHDL} Implementation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {760--765}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010580407600765}, doi = {10.5220/0010580407600765}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RicciJCDMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RoyDMMRS21, author = {Sourav Roy and Dipnarayan Das and Anindan Mondal and Mahabub Hasan Mahalat and Suchismita Roy and Bibhash Sen}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{PUF} based Lightweight Authentication and Key Exchange Protocol for IoT}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {698--703}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010550906980703}, doi = {10.5220/0010550906980703}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RoyDMMRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Sandhu21, author = {Ravi S. Sandhu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Access Control Convergence: Challenges and Opportunities}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {9}, publisher = {{SCITEPRESS}}, year = {2021}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Sandhu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SbaiDD21, author = {Anass Sbai and Cyril Drocourt and Gilles Dequen}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A New Delegated Authentication Protocol based on {PRE}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {468--478}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010542404680478}, doi = {10.5220/0010542404680478}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SbaiDD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Schlegel021, author = {Marius Schlegel and Peter Amthor}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {The Missing Piece of the {ABAC} Puzzle: {A} Modeling Scheme for Dynamic Analysis}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {234--246}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010556202340246}, doi = {10.5220/0010556202340246}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Schlegel021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Schlegel21, author = {Marius Schlegel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Trusted Enforcement of Application-specific Security Policies}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {343--355}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010579703430355}, doi = {10.5220/0010579703430355}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Schlegel21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SeifermannHWR21, author = {Stephan Seifermann and Robert Heinrich and Dominik Werle and Ralf H. Reussner}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {26--37}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010515300260037}, doi = {10.5220/0010515300260037}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SeifermannHWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SenavirathneT21, author = {Navoda Senavirathne and Vicen{\c{c}} Torra}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Systematic Evaluation of Probabilistic k-Anonymity for Privacy Preserving Micro-data Publishing and Analysis}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {307--320}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010560703070320}, doi = {10.5220/0010560703070320}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SenavirathneT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SentanaIK21, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {BlockJack: Towards Improved Prevention of {IP} Prefix Hijacking Attacks in Inter-domain Routing via Blockchain}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {674--679}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010521106740679}, doi = {10.5220/0010521106740679}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SentanaIK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SentanaIKB21, author = {I Wayan Budi Sentana and Muhammad Ikram and Mohamed Ali K{\^{a}}afar and Shlomo Berkovsky}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Empirical Security and Privacy Analysis of Mobile Symptom Checking Apps on Google Play}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {665--673}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010520106650673}, doi = {10.5220/0010520106650673}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SentanaIKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SeyitogluYH21, author = {Efe Ulas Akay Seyitoglu and Attila Altay Yavuz and Thang Hoang}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Proof-of-Useful-Randomness: Mitigating the Energy Waste in Blockchain Proof-of-Work}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {412--419}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010519204120419}, doi = {10.5220/0010519204120419}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SeyitogluYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SheikhLAK21, author = {Nazim Uddin Sheikh and Zhigang Lu and Hassan Asghar and Mohamed Ali K{\^{a}}afar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Trace Recovery: Inferring Fine-grained Trace of Energy Data from Aggregates}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {283--294}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010560302830294}, doi = {10.5220/0010560302830294}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SheikhLAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SubbaS21, author = {Basant Subba and Ayushi Singh}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Novel Security Framework for Minimization of False Information Dissemination in VANETs: Bayesian Game Formulation}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {452--459}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010540904520459}, doi = {10.5220/0010540904520459}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SubbaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Subrahmanian21, author = {V. S. Subrahmanian}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {{VEST:} An Early Warning System for Future Cyber-Attacks}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {7}, publisher = {{SCITEPRESS}}, year = {2021}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Subrahmanian21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SukmanaKGSM21, author = {Muhammad I. H. Sukmana and Kai{-}Oliver Kohlen and Carl G{\"{o}}decken and Pascal Schulze and Christoph Meinel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Are You There, Moriarty? Feasibility Study of Internet-based Location for Location-based Access Control Systems}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {111--124}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010541101110124}, doi = {10.5220/0010541101110124}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SukmanaKGSM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TartanWPZ21, author = {Chloe Tartan and Craig Wright and Michaella Pettit and Wei Zhang}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {A Scalable Bitcoin-based Public Key Certificate Management System}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {548--559}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010556805480559}, doi = {10.5220/0010556805480559}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TartanWPZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Teseleanu21, author = {George Teseleanu}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Signer and Message Ambiguity from a Variety of Keys}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {395--402}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010502903950402}, doi = {10.5220/0010502903950402}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Teseleanu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ThaeterR21, author = {Florian Thaeter and R{\"{u}}diger Reischuk}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Scalable k-anonymous Microaggregation: Exploiting the Tradeoff between Computational Complexity and Information Loss}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {87--98}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010536600870098}, doi = {10.5220/0010536600870098}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ThaeterR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TipleaH21, author = {Ferucio Laurentiu Tiplea and Cristian Hristea}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Practically Efficient {RFID} Scheme with Constant-time Identification}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {495--506}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010544804950506}, doi = {10.5220/0010544804950506}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TipleaH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TrivediP21, author = {Hiral S. Trivedi and Sankita J. Patel}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Privacy Preserving Scalable Authentication Protocol with Partially Trusted Third Party for Distributed Internet-of-Things}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {812--818}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010599508120818}, doi = {10.5220/0010599508120818}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TrivediP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TsantekidisP21, author = {Marinos Tsantekidis and Vassilis Prevelakis}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {MMU-based Access Control for Libraries}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {686--691}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010536706860691}, doi = {10.5220/0010536706860691}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/TsantekidisP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TunstallPP21, author = {Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Boolean Exponent Splitting}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {321--332}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010570903210332}, doi = {10.5220/0010570903210332}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TunstallPP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UemuraO21, author = {Kaito Uemura and Satoshi Obana}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {692--697}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010548006920697}, doi = {10.5220/0010548006920697}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/UemuraO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UriawanHBB21, author = {Wisnu Uriawan and Omar Hasan and Youakim Badr and Lionel Brunie}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Collateral-Free Trustworthiness-based Personal Lending on a Decentralized Application (DApp)}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {839--844}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010605108390844}, doi = {10.5220/0010605108390844}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/UriawanHBB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Vaidya21, author = {Jaideep Vaidya}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Privacy-Preserving Analytics in the Big Data Environment}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {5}, publisher = {{SCITEPRESS}}, year = {2021}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Vaidya21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VillaranB21, author = {Carlos Villar{\'{a}}n and Marta Beltr{\'{a}}n}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Protecting End User's Privacy When using Social Login through {GDPR} Compliance}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {428--435}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010521304280435}, doi = {10.5220/0010521304280435}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VillaranB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VyasS21, author = {Parjanya Vyas and R. K. Shyamasundar}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {SecSDN: {A} Novel Architecture for a Secure {SDN}}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {587--594}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010575505870594}, doi = {10.5220/0010575505870594}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VyasS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WodoSB21, author = {Wojciech Wodo and Damian Stygar and Przemyslaw Blaskiewicz}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Security Issues of Electronic and Mobile Banking}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {631--638}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010466606310638}, doi = {10.5220/0010466606310638}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WodoSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2021, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0000149500002998}, doi = {10.5220/0000149500002998}, isbn = {978-989-758-524-1}, timestamp = {Tue, 06 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/0001HAW17, author = {Manuel Huber and Julian Horsch and Junaid Ali and Sascha Wessel}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Freeze {\&} Crypt: Linux Kernel Support for Main Memory Encryption}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {17--30}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006378400170030}, doi = {10.5220/0006378400170030}, timestamp = {Fri, 15 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/0001HAW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlibertiPG17, author = {Giulio Aliberti and Roberto Di Pietro and Stefano Guarino}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {{SLAP:} Secure Lightweight Authentication Protocol for Resource-constrained Devices}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {163--174}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006431101630174}, doi = {10.5220/0006431101630174}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlibertiPG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AmaranteB17, author = {Jo{\~{a}}o Amarante and Jo{\~{a}}o Paulo Barros}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Exploring {USB} Connection Vulnerabilities on Android Devices - Breaches using the Android Debug Bridge}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {572--577}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006475905720577}, doi = {10.5220/0006475905720577}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AmaranteB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Amthor17, author = {Peter Amthor}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Efficient Heuristic Safety Analysis of Core-based Security Policies}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {384--392}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006477103840392}, doi = {10.5220/0006477103840392}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Amthor17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AonzoLM17, author = {Simone Aonzo and Giovanni Lagorio and Alessio Merlo}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {RmPerm: {A} Tool for Android Permissions Removal}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {319--326}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006420203190326}, doi = {10.5220/0006420203190326}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AonzoLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AtzeniMMS17, author = {Andrea S. Atzeni and Andrea Marcelli and Francesco Muroni and Giovanni Squillero}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {{HAIT:} Heap Analyzer with Input Tracing}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {327--334}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006420803270334}, doi = {10.5220/0006420803270334}, timestamp = {Mon, 30 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AtzeniMMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AxonG17, author = {Louise Axon and Michael Goldsmith}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {{PB-PKI:} {A} Privacy-aware Blockchain-based {PKI}}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {311--318}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006419203110318}, doi = {10.5220/0006419203110318}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AxonG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BakiriCG17, author = {Mohammed Bakiri and Jean{-}Fran{\c{c}}ois Couchot and Christophe Guyeux}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {One Random Jump and One Permutation: Sufficient Conditions to Chaotic, Statistically Faultless, and Large Throughput {PRNG} for {FPGA}}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {295--302}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006418502950302}, doi = {10.5220/0006418502950302}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BakiriCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BarradasBD0R17, author = {Diogo Barradas and Tiago Brito and David Duarte and Nuno Santos and Lu{\'{\i}}s E. T. Rodrigues}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Forensic Analysis of Communication Records of Web-based Messaging Applications from Physical Memory}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {43--54}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006396100430054}, doi = {10.5220/0006396100430054}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BarradasBD0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BecerraIOS17, author = {Jos{\'{e}} Becerra and Vincenzo Iovino and Dimiter Ostrev and Marjan Skrobot}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {On the Relation Between {SIM} and IND-RoR Security Models for PAKEs}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {151--162}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006430301510162}, doi = {10.5220/0006430301510162}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BecerraIOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelguithKLJA17, author = {Sana Belguith and Nesrine Kaaniche and Maryline Laurent and Abderrazak Jemai and Rabah Attia}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Constant-size Threshold Attribute based SignCryption for Cloud Applications}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {212--225}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006469202120225}, doi = {10.5220/0006469202120225}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelguithKLJA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BernackiKS17, author = {Jaroslaw Bernacki and Marek Klonowski and Piotr Syga}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Some Remarks about Tracing Digital Cameras - Faster Method and Usable Countermeasure}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {343--350}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006434803430350}, doi = {10.5220/0006434803430350}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BernackiKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Berrima0GR17, author = {Mouhebeddine Berrima and Pascal Lafourcade and Matthieu Giraud and Narjes Ben Rajeb}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Formal Analyze of a Private Access Control Protocol to a Cloud Storage}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {495--500}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006461604950500}, doi = {10.5220/0006461604950500}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Berrima0GR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BouazzouniCPB17, author = {Mohamed Amine Bouazzouni and Emmanuel Conchon and Fabrice Peyrard and Pierre{-}Fran{\c{c}}ois Bonnefoi}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {A Card-less TEE-based Solution for Trusted Access Control}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {456--461}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006431704560461}, doi = {10.5220/0006431704560461}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BouazzouniCPB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BozaM17, author = {Miguel Hern{\'{a}}ndez Boza and Alfonso Mu{\~{n}}oz}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {(In) Security in Graph Databases - Analysis and Data Leaks}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {303--310}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006419003030310}, doi = {10.5220/0006419003030310}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BozaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BreuerBP017, author = {Peter T. Breuer and Jonathan P. Bowen and Esther Palomar and Zhiming Liu}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {On Obfuscating Compilation for Encrypted Computing}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {247--254}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006394002470254}, doi = {10.5220/0006394002470254}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BreuerBP017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CampoCSDC17, author = {David Ortega del Campo and Cristina Conde and {\'{A}}ngel Serrano and Isaac Mart{\'{\i}}n de Diego and Enrique Cabello}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Face Recognition-based Presentation Attack Detection in a Two-step Segregated Automated Border Control e-Gate - Results of a Pilot Experience at Adolfo Su{\'{a}}rez Madrid-Barajas Airport}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {129--138}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006426901290138}, doi = {10.5220/0006426901290138}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CampoCSDC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CanforaCCMMRV17, author = {Gerardo Canfora and Giovanni Cappabianca and Pasquale Carangelo and Fabio Martinelli and Francesco Mercaldo and Ernesto Rosario Russo and Corrado Aaron Visaggio}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Mobile Silent and Continuous Authentication using Apps Sequence}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {79--91}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006424200790091}, doi = {10.5220/0006424200790091}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CanforaCCMMRV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CanforaPV17, author = {Gerardo Canfora and Antonio Pirozzi and Aaron Visaggio}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {s2ipt: {A} Lightweight Network Intrusion Detection/Prevention System based on IPtables}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {462--467}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006431904620467}, doi = {10.5220/0006431904620467}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CanforaPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DiazAR17, author = {Jesus Diaz and David Arroyo and Francisco B. Rodr{\'{\i}}guez}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Fair and Accountable Anonymity for the Tor Network}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {560--565}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006474805600565}, doi = {10.5220/0006474805600565}, timestamp = {Sun, 27 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DiazAR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DreierPP0R17, author = {Jannik Dreier and Maxime Puys and Marie{-}Laure Potet and Pascal Lafourcade and Jean{-}Louis Roch}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Formally Verifying Flow Properties in Industrial Systems}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {55--66}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006396500550066}, doi = {10.5220/0006396500550066}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DreierPP0R17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Dumas0MOT17, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Francis Melemedjian and Jean{-}Baptiste Orfila and Pascal Thoniel}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {{LOCALPKI:} {A} User-Centric Formally Proven Alternative to {PKIX}}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {187--199}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006461101870199}, doi = {10.5220/0006461101870199}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Dumas0MOT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DwivediKMNPW17, author = {Ashutosh Dhar Dwivedi and Milos Kloucek and Pawel Morawiecki and Ivica Nikolic and Josef Pieprzyk and Sebastian W{\'{o}}jtowicz}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {SAT-based Cryptanalysis of Authenticated Ciphers from the {CAESAR} Competition}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {237--246}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006387302370246}, doi = {10.5220/0006387302370246}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DwivediKMNPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DwivediMW17, author = {Ashutosh Dhar Dwivedi and Pawel Morawiecki and Sebastian W{\'{o}}jtowicz}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Differential and Rotational Cryptanalysis of Round-reduced {MORUS}}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {275--284}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006411502750284}, doi = {10.5220/0006411502750284}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DwivediMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DwivediMW17a, author = {Ashutosh Dhar Dwivedi and Pawel Morawiecki and Sebastian W{\'{o}}jtowicz}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {501--506}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006461905010506}, doi = {10.5220/0006461905010506}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DwivediMW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DzurendaHMR17, author = {Petr Dzurenda and Jan Hajny and Lukas Malina and Sara Ricci}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Anonymous Credentials with Practical Revocation using Elliptic Curves}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {534--539}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006467705340539}, doi = {10.5220/0006467705340539}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DzurendaHMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FanM17, author = {Guyu Fan and Manoranjan Mohanty}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Privacy-preserving Disease Susceptibility Test with Shamir's Secret Sharing}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {525--533}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006467105250533}, doi = {10.5220/0006467105250533}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FanM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FeronLL17, author = {Cyrielle Feron and Vianney Lapotre and Lo{\"{\i}}c Lagadec}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {PAnTHErS: {A} Prototyping and Analysis Tool for Homomorphic Encryption Schemes}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {359--366}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006464703590366}, doi = {10.5220/0006464703590366}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FeronLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GarciaMGRVJ17, author = {Alberto Garc{\'{\i}}a and Alberto Garcia Moro and Jos{\'{e}} Javier Garc{\'{\i}}a and Jorge Roncero and V{\'{\i}}ctor A. Villagr{\'{a}} and Helena Jalain}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Context-based Encryption Applied to Data Leakage Prevention Solutions}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {566--571}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006475205660571}, doi = {10.5220/0006475205660571}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GarciaMGRVJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GiraudAB017, author = {Matthieu Giraud and Alexandre Anzala{-}Yamajako and Olivier Bernard and Pascal Lafourcade}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {200--211}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006461202000211}, doi = {10.5220/0006461202000211}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GiraudAB017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GiustolisiIL17, author = {Rosario Giustolisi and Vincenzo Iovino and Gabriele Lenzini}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Privacy-Preserving Verifiability - {A} Case for an Electronic Exam Protocol}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {139--150}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006429101390150}, doi = {10.5220/0006429101390150}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GiustolisiIL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HadjABKE17, author = {Maryem Ait El Hadj and Meryeme Ayache and Yahya Benkaouz and Ahmed Khoumsi and Mohammed Erradi}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Clustering-based Approach for Anomaly Detection in {XACML} Policies}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {548--553}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006471205480553}, doi = {10.5220/0006471205480553}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HadjABKE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HamdiGBY17, author = {Sana Hamdi and Alda Lopes Gan{\c{c}}arski and Amel Bouzeghoub and Sadok Ben Yahia}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Reputation Management in Online Social Networks - {A} New Clustering-based Approach}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {468--473}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006433104680473}, doi = {10.5220/0006433104680473}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HamdiGBY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HarbJ17, author = {Salah S. Harb and Moath H. A. Jarrah}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Accelerating Square Root Computations Over Large {GF} (2m)}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {229--236}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006386702290236}, doi = {10.5220/0006386702290236}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HarbJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HarvanLMP17, author = {Mat{\'{u}}s Harvan and Thomas Locher and Marta Mularczyk and Yvonne{-}Anne Pignolet}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Privacy-preserving Regression on Partially Encrypted Data}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {255--266}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006400102550266}, doi = {10.5220/0006400102550266}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HarvanLMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoweO17, author = {James Howe and M{\'{a}}ire O'Neill}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {{GLITCH:} {A} Discrete Gaussian Testing Suite for Lattice-based Cryptography}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {413--419}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006412604130419}, doi = {10.5220/0006412604130419}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HoweO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ImYJ17, author = {Jonghwan Im and Jongwon Yoon and Minsik Jin}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Interaction Platform for Improving Detection Capability of Dynamic Application Security Testing}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {474--479}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006437104740479}, doi = {10.5220/0006437104740479}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ImYJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JaschkeGAS17, author = {Angela J{\"{a}}schke and Bj{\"{o}}rn Grohmann and Frederik Armknecht and Andreas Schaad}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Short Paper: Industrial Feasibility of Private Information Retrieval}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {395--400}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006382003950400}, doi = {10.5220/0006382003950400}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JaschkeGAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JauvartFG17, author = {Damien Jauvart and Jacques J. A. Fournier and Louis Goubin}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {First Practical Side-channel Attack to Defeat Point Randomization in Secure Implementations of Pairing-based Cryptography}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {104--115}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006425501040115}, doi = {10.5220/0006425501040115}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JauvartFG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JolfaeiK17, author = {Alireza Jolfaei and Krishna Kant}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {A Lightweight Integrity Protection Scheme for Fast Communications in Smart Grid}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {31--42}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006394200310042}, doi = {10.5220/0006394200310042}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/JolfaeiK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaanicheL17, author = {Nesrine Kaaniche and Maryline Laurent}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Attribute based Encryption for Multi-level Access Control Policies}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {67--78}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006421000670078}, doi = {10.5220/0006421000670078}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaanicheL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KushwahaM17, author = {Prabhat Kushwaha and Ayan Mahalanobis}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {A Probabilistic Baby-step Giant-step Algorithm}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {401--406}, publisher = {SciTePress}, year = {2017}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KushwahaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LaskarB17, author = {Bekkar Laskar and Merouane Bouzid}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Vector Quantization based Steganography for Secure Speech Communication System}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {407--412}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006398304070412}, doi = {10.5220/0006398304070412}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LaskarB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MekkiHAK17, author = {Neila Mekki and Mohamed Hamdi and Taoufik Aguili and Tai{-}Hoon Kim}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring System}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {554--559}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006473005540559}, doi = {10.5220/0006473005540559}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MekkiHAK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MenezesW17, author = {Luis Menezes and Roland Wism{\"{u}}ller}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {FlowSlicer - {A} Hybrid Approach to Detect and Avoid Sensitive Information Leaks in Android Applications using Program Slicing and Instrumentation}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {450--455}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006428604500455}, doi = {10.5220/0006428604500455}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MenezesW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MjolsnesO17, author = {Stig Fr. Mj{\o}lsnes and Ruxandra F. Olimid}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Experimental Assessment of Private Information Disclosure in {LTE} Mobile Networks}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {507--512}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006462305070512}, doi = {10.5220/0006462305070512}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MjolsnesO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MosharrafJR17, author = {Negar Mosharraf and Anura P. Jayasumana and Indrakshi Ray}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Using a History-based Profile to Detect and Respond to DDoS Attacks}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {175--186}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006435801750186}, doi = {10.5220/0006435801750186}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MosharrafJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PareekP17, author = {Gaurav Pareek and B. R. Purushothama}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {On Efficient Access Control Mechanisms in Hierarchy using Unidirectional and Transitive Proxy Re-encryption Schemes}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {519--524}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006466405190524}, doi = {10.5220/0006466405190524}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PareekP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PatilS17, author = {Vishwas T. Patil and R. K. Shyamasundar}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Privacy as a Currency: Un-regulated?}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {586--595}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006478705860595}, doi = {10.5220/0006478705860595}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PatilS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PrestridgeD17, author = {Shawn A. Prestridge and James G. Dunham}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Improving Throughput in {BB84} Quantum Key Distribution}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {437--443}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006422104370443}, doi = {10.5220/0006422104370443}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PrestridgeD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PrunsterRR17, author = {Bernd Pr{\"{u}}nster and Florian Reimair and Andreas Reiter}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {The Net Rat - Rethinking Connected Services for Increased Security}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {375--383}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006469103750383}, doi = {10.5220/0006469103750383}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PrunsterRR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RegateiroPA17, author = {Diogo Domingues Regateiro and {\'{O}}scar Mort{\'{a}}gua Pereira and Rui L. Aguiar}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {On the Application of Fuzzy Set Theory for Access Control Enforcement}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {540--547}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006469305400547}, doi = {10.5220/0006469305400547}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RegateiroPA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ReimairFZKZ17, author = {Florian Reimair and Johannes Feichtner and Dominik Ziegler and Sandra Kreuzhuber and Thomas Zefferer}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Cryptographic Service Providers in Current Device Landscapes: An Inconvenient Truth}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {367--374}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006466603670374}, doi = {10.5220/0006466603670374}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ReimairFZKZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RubioARL17, author = {Juan Enrique Rubio and Cristina Alcaraz and Rodrigo Roman and Javier L{\'{o}}pez}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Analysis of Intrusion Detection Systems in Industrial Ecosystems}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {116--128}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006426301160128}, doi = {10.5220/0006426301160128}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RubioARL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SadhyaCS17, author = {Debanjan Sadhya and Bodhi Chakraborty and Sanjay Kumar Singh}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {430--436}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006417504300436}, doi = {10.5220/0006417504300436}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SadhyaCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SaiaC17, author = {Roberto Saia and Salvatore Carta}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Evaluating Credit Card Transactions in the Frequency Domain for a Proactive Fraud Detection Approach}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {335--342}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006425803350342}, doi = {10.5220/0006425803350342}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SaiaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SinghS17, author = {Bhupendra Singh and Upasna Singh}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Program Execution Analysis using UserAssist Key in Modern Windows}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {420--429}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006416704200429}, doi = {10.5220/0006416704200429}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SinghS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SinigagliaCC17, author = {Federico Sinigaglia and Roberto Carbone and Gabriele Costa}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Strong Authentication for e-Banking: {A} Survey on European Regulations and Implementations}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {480--485}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006438504800485}, doi = {10.5220/0006438504800485}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SinigagliaCC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SondeckLF17, author = {Louis Philippe Sondeck and Maryline Laurent and Vincent Frey}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {The Semantic Discrimination Rate Metric for Privacy Measurements which Questions the Benefit of t-closeness over l-diversity}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {285--294}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006418002850294}, doi = {10.5220/0006418002850294}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SondeckLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SouissiAB17, author = {Ilhem Souissi and Nadia Ben Azzouna and Tahar Berradia}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Towards a Self-adaptive Trust Management Model for VANETs}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {513--518}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006463305130518}, doi = {10.5220/0006463305130518}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SouissiAB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SysKS17, author = {Marek S{\'{y}}s and Dusan Klinec and Petr Svenda}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {The Efficient Randomness Testing using Boolean Functions}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {92--103}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006425100920103}, doi = {10.5220/0006425100920103}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SysKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TillemEL17, author = {Gamze Tillem and Zekeriya Erkin and Reginald L. Lagendijk}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Mining Encrypted Software Logs using Alpha Algorithm}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {267--274}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006408602670274}, doi = {10.5220/0006408602670274}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TillemEL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TongTLL17, author = {Val{\'{e}}rie Viet Triem Tong and Aur{\'{e}}lien Trulla and Mourad Leslous and Jean{-}Fran{\c{c}}ois Lalande}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Information Flows at {OS} Level Unmask Sophisticated Android Malware}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {578--585}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006476705780585}, doi = {10.5220/0006476705780585}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TongTLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WatsonLG17, author = {Venesa Watson and Xinxin Lou and Yuan Gao}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {A Review of {PROFIBUS} Protocol Vulnerabilities - Considerations for Implementing Authentication and Authorization Controls}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {444--449}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006426504440449}, doi = {10.5220/0006426504440449}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WatsonLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Yee17, author = {George O. M. Yee}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Adding Privacy Protection to Distributed Software Systems}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {351--358}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006434903510358}, doi = {10.5220/0006434903510358}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Yee17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZhangLG17, author = {Xichen Zhang and Arash Habibi Lashkari and Ali A. Ghorbani}, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {A Lightweight Online Advertising Classification System using Lexical-based Features}, booktitle = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, pages = {486--494}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006459804860494}, doi = {10.5220/0006459804860494}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZhangLG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2017, editor = {Pierangela Samarati and Mohammad S. Obaidat and Enrique Cabello}, title = {Proceedings of the 14th International Joint Conference on e-Business and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid, Spain, July 24-26, 2017}, publisher = {SciTePress}, year = {2017}, isbn = {978-989-758-259-2}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AchenbachLMR16, author = {Dirk Achenbach and Bernhard L{\"{o}}we and J{\"{o}}rn M{\"{u}}ller{-}Quade and Jochen Rill}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {85--96}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005964300850096}, doi = {10.5220/0005964300850096}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AchenbachLMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AhmadvandSOP16, author = {Mohsen Ahmadvand and Antoine Scemama and Mart{\'{\i}}n Ochoa and Alexander Pretschner}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Enhancing Operation Security using Secret Sharing}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {446--451}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005992104460451}, doi = {10.5220/0005992104460451}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AhmadvandSOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlcarazLC16, author = {Cristina Alcaraz and Javier L{\'{o}}pez and Kim{-}Kwang Raymond Choo}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {19--27}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005942000190027}, doi = {10.5220/0005942000190027}, timestamp = {Mon, 07 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlcarazLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AssidiAS16, author = {Hafsa Assidi and Edoukou Berenger Ayebie and El Mamoun Souidi}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {A Code-based Group Signature Scheme with Shorter Public Key Length}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {432--439}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005969204320439}, doi = {10.5220/0005969204320439}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AssidiAS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AwadL16, author = {Abir Awad and Brian Lee}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {A Metaphone based Chaotic Searchable Encryption Algorithm for Border Management}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {397--402}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005953503970402}, doi = {10.5220/0005953503970402}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AwadL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BalushiMS16, author = {Abdullah Al Balushi and Kieran McLaughlin and Sakir Sezer}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {{OSCIDS:} An Ontology based {SCADA} Intrusion Detection Framework}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {327--335}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005969803270335}, doi = {10.5220/0005969803270335}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BalushiMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BarakatBNG16, author = {Sara Barakat and Bechara al Bouna and Mohamed Nassar and Christophe Guyeux}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {On the Evaluation of the Privacy Breach in Disassociated Set-valued Datasets}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {318--326}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005969403180326}, doi = {10.5220/0005969403180326}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BarakatBNG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelguithKJLA16, author = {Sana Belguith and Nesrine Kaaniche and Abderrazak Jemai and Maryline Laurent and Rabah Attia}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {PAbAC: {A} Privacy Preserving Attribute based Framework for Fine Grained Access Control in Clouds}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {133--146}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005968201330146}, doi = {10.5220/0005968201330146}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelguithKJLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelyaevR16, author = {Kirill Belyaev and Indrakshi Ray}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Towards Access Control for Isolated Applications}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {171--182}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005970001710182}, doi = {10.5220/0005970001710182}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelyaevR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BernardoD16, author = {Vitor Bernardo and Dulce Domingos}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Web-based Fingerprinting Techniques}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {271--282}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005965602710282}, doi = {10.5220/0005965602710282}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BernardoD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BhattacharjeeC16, author = {Debjyoti Bhattacharjee and Anupam Chattopadhyay}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Hardware Accelerator for Stream Cipher Spritz}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {215--222}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005951302150222}, doi = {10.5220/0005951302150222}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BhattacharjeeC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BlazyB016, author = {Olivier Blazy and Xavier Bultel and Pascal Lafourcade}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Two Secure Anonymous Proxy-based Data Storages}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {251--258}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005962402510258}, doi = {10.5220/0005962402510258}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BlazyB016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BouderBCLL16, author = {H{\'{e}}l{\`{e}}ne Le Bouder and Thierno Barry and Damien Courouss{\'{e}} and Jean{-}Louis Lanet and Ronan Lashermes}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {A Template Attack Against {VERIFY} {PIN} Algorithms}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {231--238}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005955102310238}, doi = {10.5220/0005955102310238}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BouderBCLL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BreuerBP016, author = {Peter T. Breuer and Jonathan P. Bowen and Esther Palomar and Zhiming Liu}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {A Practical Encrypted Microprocessor}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {239--250}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005955902390250}, doi = {10.5220/0005955902390250}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BreuerBP016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BuccafurriSS16, author = {Francesco Buccafurri and Rajeev Anand Sahu and Vishal Saraswat}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Efficient Proxy Signature Scheme from Pairings}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {471--476}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005999804710476}, doi = {10.5220/0005999804710476}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BuccafurriSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CanforaMPV16, author = {Gerardo Canfora and Francesco Mercaldo and Antonio Pirozzi and Corrado Aaron Visaggio}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {How {I} Met Your Mother? - An Empirical Study about Android Malware Phylogenesis}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {310--317}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005968103100317}, doi = {10.5220/0005968103100317}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/CanforaMPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CanforaNMV16, author = {Gerardo Canfora and Paolo Di Notte and Francesco Mercaldo and Corrado Aaron Visaggio}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Silent and Continuous Authentication in Mobile Environment}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {97--108}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005965500970108}, doi = {10.5220/0005965500970108}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CanforaNMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChatterjeePS16, author = {Sumanta Chatterjee and Alwyn R. Pais and Sumit Saurabh}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {440--445}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005991604400445}, doi = {10.5220/0005991604400445}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChatterjeePS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CouchotCFG16, author = {Jean{-}Fran{\c{c}}ois Couchot and Rapha{\"{e}}l Couturier and Yousra Ahmed Fadil and Christophe Guyeux}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {A Second Order Derivatives based Approach for Steganography}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {424--431}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005966804240431}, doi = {10.5220/0005966804240431}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CouchotCFG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CourtoisSSP16, author = {Nicolas T. Courtois and Pouyan Sepehrdad and Guangyan Song and Iason Papapanagiotakis{-}Bousy}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher Simon}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {465--470}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005999504650470}, doi = {10.5220/0005999504650470}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CourtoisSSP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CucurullGG16, author = {Jordi Cucurull and Sandra Guasch and David Galindo}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Transitioning to a Javascript Voting Client for Remote Online Voting}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {121--132}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005967301210132}, doi = {10.5220/0005967301210132}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CucurullGG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Dumas0OP16, author = {Jean{-}Guillaume Dumas and Pascal Lafourcade and Jean{-}Baptiste Orfila and Maxime Puys}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Private Multi-party Matrix Multiplication and Trust Computations}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {61--72}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005957200610072}, doi = {10.5220/0005957200610072}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Dumas0OP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FrieslaarI16, author = {Ibraheem Frieslaar and Barry Irwin}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Towards a Software Approach to Mitigate Correlation Power Analysis}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {403--410}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005955604030410}, doi = {10.5220/0005955604030410}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FrieslaarI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaHK16, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Sensor-based Wearable {PUF}}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {207--214}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005946702070214}, doi = {10.5220/0005946702070214}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GeltinkV16, author = {Gerben Geltink and Sergei Volokitin}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {{FPGA} Implementation of {HS1-SIV}}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {41--48}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005950100410048}, doi = {10.5220/0005950100410048}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GeltinkV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GiustolisiG16, author = {Rosario Giustolisi and Christian Gehrmann}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Threats to 5G Group-based Authentication}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {360--367}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005996203600367}, doi = {10.5220/0005996203600367}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GiustolisiG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GrozaMA16, author = {Bogdan Groza and Pal{-}Stefan Murvay and Tudor Andreica}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Evaluating {SRAM} as Source for Fingerprints and Randomness on Automotive Grade Controllers}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {109--120}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005966401090120}, doi = {10.5220/0005966401090120}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/GrozaMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HajnyDM16, author = {Jan Hajny and Petr Dzurenda and Lukas Malina}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Multi-Device Authentication using Wearables and IoT}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {483--488}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0006000004830488}, doi = {10.5220/0006000004830488}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HajnyDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HockKG16, author = {Denis Hock and Martin Kappes and Bogdan V. Ghita}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {A Pre-clustering Method To Improve Anomaly Detection}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {391--396}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005953003910396}, doi = {10.5220/0005953003910396}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HockKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiljanVE16, author = {Sven Kiljan and Harald P. E. Vranken and Marko C. J. D. van Eekelen}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {User-friendly Manual Transfer of Authenticated Online Banking Transaction Data - {A} Case Study that Applies the What You Enter Is What You Sign Transaction Authorization Information Scheme}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {259--270}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005965102590270}, doi = {10.5220/0005965102590270}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiljanVE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LesavoureyNP16, author = {Andrea Lesavourey and Christophe N{\`{e}}gre and Thomas Plantard}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Efficient Randomized Regular Modular Exponentiation using Combined Montgomery and Barrett Multiplications}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {368--375}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005998503680375}, doi = {10.5220/0005998503680375}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LesavoureyNP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MilosevicMF16, author = {Jelena Milosevic and Miroslaw Malek and Alberto Ferrante}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {A Friend or a Foe? Detecting Malware using Memory and {CPU} Features}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {73--84}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005964200730084}, doi = {10.5220/0005964200730084}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MilosevicMF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MimotoBK16, author = {Tomoaki Mimoto and Anirban Basu and Shinsaku Kiyomoto}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {411--418}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005963804110418}, doi = {10.5220/0005963804110418}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MimotoBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MohammedCG16, author = {Mohammed Bakiri and Jean{-}Fran{\c{c}}ois Couchot and Christophe Guyeux}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {{FPGA} Implementation of F2-Linear Pseudorandom Number Generators based on Zynq MPSoC: {A} Chaotic Iterations Post Processing Case Study}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {302--309}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005967903020309}, doi = {10.5220/0005967903020309}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MohammedCG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MohantyAR16, author = {Manoranjan Mohanty and Muhammad Rizwan Asghar and Giovanni Russello}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting of 3D Images in the Cloud}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {283--291}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005966302830291}, doi = {10.5220/0005966302830291}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MohantyAR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MuranakaYOF16, author = {Kenta Muranaka and Naoto Yanai and Shingo Okamura and Toru Fujiwara}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {{ISDSR:} Secure {DSR} with ID-based Sequential Aggregate Signature}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {376--387}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0006001003760387}, doi = {10.5220/0006001003760387}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MuranakaYOF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PatelP16, author = {Asma Patel and Esther Palomar}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {LP-Cache: Privacy-aware Cache Model for Location-based Apps}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {183--194}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005970101830194}, doi = {10.5220/0005970101830194}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PatelP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PereiraRA16, author = {{\'{O}}scar Mort{\'{a}}gua Pereira and Diogo Domingues Regateiro and Rui L. Aguiar}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Protecting Databases from Schema Disclosure - {A} CRUD-Based Protection Model}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {292--301}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005967402920301}, doi = {10.5220/0005967402920301}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PereiraRA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PutD16, author = {Andreas Put and Bart De Decker}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {PACCo: Privacy-friendly Access Control with Context}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {159--170}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005969501590170}, doi = {10.5220/0005969501590170}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PutD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RanathungaRKF16, author = {Dinesha Ranathunga and Matthew Roughan and Phil Kernick and Nick Falkner}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {The Mathematical Foundations for Mapping Policies to Network Devices}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {197--206}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005946201970206}, doi = {10.5220/0005946201970206}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RanathungaRKF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RanathungaRKFNM16, author = {Dinesha Ranathunga and Matthew Roughan and Phil Kernick and Nick Falkner and Hung X. Nguyen and Marian Mihailescu and Michelle McClintock}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Verifiable Policy-defined Networking for Security Management}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {344--351}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005990303440351}, doi = {10.5220/0005990303440351}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RanathungaRKFNM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Rao16, author = {Srinivasa Rao Subramanya Rao}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Differential Addition in Edwards Coordinates Revisited and a Short Note on Doubling in Twisted Edwards Form}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {336--343}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005970603360343}, doi = {10.5220/0005970603360343}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Rao16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Schneider16, author = {Johannes Schneider}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Lean and Fast Secure Multi-party Computation: Minimizing Communication and Local Computation using a Helper}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {223--230}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005954202230230}, doi = {10.5220/0005954202230230}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Schneider16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchneiderLLPHO16, author = {Johannes Schneider and Bin Lu and Thomas Locher and Yvonne{-}Anne Pignolet and Mat{\'{u}}s Harvan and Sebastian Obermeier}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Subdomain and Access Pattern Privacy - Trading off Confidentiality and Performance}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {49--60}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005954100490060}, doi = {10.5220/0005954100490060}, timestamp = {Wed, 15 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SchneiderLLPHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SciarrettaACR16, author = {Giada Sciarretta and Alessandro Armando and Roberto Carbone and Silvio Ranise}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Security of Mobile Single Sign-On: {A} Rational Reconstruction of Facebook Login Solution}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {147--158}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005969001470158}, doi = {10.5220/0005969001470158}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SciarrettaACR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG16, author = {George Stergiopoulos and Panagiotis Katsaros and Dimitris Gritzalis and Theodore K. Apostolopoulos}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {28--40}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005947200280040}, doi = {10.5220/0005947200280040}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/StergiopoulosKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TatarNN16, author = {Ahmet Emin Tatar and Marius Nagy and Naya Nagy}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence Classes}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {419--423}, publisher = {SciTePress}, year = {2016}, timestamp = {Tue, 13 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TatarNN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TrabelsiMZ16, author = {Slim Trabelsi and Skander Ben Mahmoud and Anis Zouaoui}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Predictive Model for Exploit Kit based Attacks}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {477--482}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005999904770482}, doi = {10.5220/0005999904770482}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TrabelsiMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WaageHW16, author = {Tim Waage and Daniel Homann and Lena Wiese}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Practical Application of Order-preserving Encryption in Wide Column Stores}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {352--359}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005991403520359}, doi = {10.5220/0005991403520359}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WaageHW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WodoH16, author = {Wojciech Wodo and Lucjan Hanzlik}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Thermal Imaging Attacks on Keypad Security Systems}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {458--464}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005998404580464}, doi = {10.5220/0005998404580464}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WodoH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WodoHK16, author = {Wojciech Wodo and Lucjan Hanzlik and Kamil Kluczniak}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Computations on Private Sets and their Application to Biometric based Authentication Systems}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {452--457}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005992204520457}, doi = {10.5220/0005992204520457}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WodoHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2016, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, publisher = {SciTePress}, year = {2016}, isbn = {978-989-758-196-0}, timestamp = {Tue, 13 Sep 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AiashL15, author = {Mahdi Aiash and Jonathan Loo}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Formally Verified Access Control Mechanism for Information Centric Networks}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {377--383}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005566303770383}, doi = {10.5220/0005566303770383}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AiashL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Amthor15, author = {Peter Amthor}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {88--99}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005551000880099}, doi = {10.5220/0005551000880099}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Amthor15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelhaouaneGD15, author = {Malek Belhaouane and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Herv{\'{e}} Debar}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Evaluating the Comprehensive Complexity of Authorization-based Access Control Policies using Quantitative Metrics}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {53--64}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005544100530064}, doi = {10.5220/0005544100530064}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelhaouaneGD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BellizziV15, author = {Jennifer Bellizzi and Mark Vella}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using Just-In-Time Binary Modification}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {5--15}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005502600050015}, doi = {10.5220/0005502600050015}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BellizziV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenmoussaKO15, author = {Hajar Benmoussa and Anas Abou El Kalam and Abdellah Ait Ouahman}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Distributed Intrusion Detection System based on Anticipation and Prediction Approach}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {343--348}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005556803430348}, doi = {10.5220/0005556803430348}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BenmoussaKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Birjoveanu15, author = {Catalin V. B{\^{\i}}rjoveanu}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products Delivery}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {170--177}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005508801700177}, doi = {10.5220/0005508801700177}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Birjoveanu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Bottasso15, author = {Luigi Maria Bottasso}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Public-Key Cryptography Tool for Personal Use - {A} Real-world Implementation of {ECC} for Secure File Exchange}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {194--201}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005511801940201}, doi = {10.5220/0005511801940201}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Bottasso15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BuccafurriLSS15, author = {Francesco Buccafurri and Gianluca Lax and Rajeev Anand Sahu and Vishal Saraswat}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Practical and Secure Integrated {PKE+PEKS} with Keyword Privacy}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {448--453}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005577104480453}, doi = {10.5220/0005577104480453}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BuccafurriLSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CanforaMV15, author = {Gerardo Canfora and Francesco Mercaldo and Corrado Aaron Visaggio}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Mobile Malware Detection using Op-code Frequency Histograms}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {27--38}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005537800270038}, doi = {10.5220/0005537800270038}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CanforaMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CimatoMS15, author = {Stelvio Cimato and Silvia Mella and Ruggero Susella}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {New Results for Partial Key Exposure on {RSA} with Exponent Blinding}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {136--147}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005571701360147}, doi = {10.5220/0005571701360147}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CimatoMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CincillaBHK15, author = {Pierpaolo Cincilla and Aymen Boudguiga and Makhlouf Hadji and Arnaud Kaiser}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Light Blind: Why Encrypt If You Can Share?}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {361--368}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005562203610368}, doi = {10.5220/0005562203610368}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CincillaBHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DreierKL15, author = {Jannik Dreier and Ali Kassem and Pascal Lafourcade}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Formal Analysis of E-Cash Protocols}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {65--75}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005544500650075}, doi = {10.5220/0005544500650075}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DreierKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FernandezY15, author = {Eduardo B. Fern{\'{a}}ndez and Dereje Yimam}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Towards Compliant Reference Architectures by Finding Analogies and Overlaps in Compliance Regulations}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {435--440}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005575604350440}, doi = {10.5220/0005575604350440}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FernandezY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Garcia15, author = {Johan Garcia}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Examining the Performance for Forensic Detection of Rare Videos Under Time Constraints}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {419--426}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005574204190426}, doi = {10.5220/0005574204190426}, timestamp = {Mon, 28 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Garcia15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GuesmiCLB15, author = {Asma Guesmi and Patrice Clemente and Fr{\'{e}}d{\'{e}}ric Loulergue and Pascal Berthom{\'{e}}}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Cloud Resources Placement based on Functional and Non-functional Requirements}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {335--342}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005552503350342}, doi = {10.5220/0005552503350342}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GuesmiCLB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HajilouMA15, author = {Fleura Hajilou and Ehsan Mazidi and Shahab Ardalan}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {{DPA} Resistance Enhancement through a Self-healing {PLL} based Power Mask}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {267--272}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005547302670272}, doi = {10.5220/0005547302670272}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HajilouMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HajnyDM15, author = {Jan Hajny and Petr Dzurenda and Lukas Malina}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Secure Physical Access Control with Strong Cryptographic Protection}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {220--227}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005524202200227}, doi = {10.5220/0005524202200227}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HajnyDM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoangCN15, author = {Thang Hoang and Deokjai Choi and Thuc Dinh Nguyen}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {On the Instability of Sensor Orientation in Gait Verification on Mobile Phone}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {148--159}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005572001480159}, doi = {10.5220/0005572001480159}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HoangCN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HuangCT15, author = {Kaibin Huang and Yu{-}Chi Chen and Raylin Tso}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Semantic Secure Public Key Encryption with Filtered Equality Test - {PKE-FET}}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {327--334}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005550303270334}, doi = {10.5220/0005550303270334}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HuangCT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IrshadSVBSA15, author = {Hassaan Irshad and Basit Shafiq and Jaideep Vaidya and Muhammad Ahmed Bashir and Shafay Shamail and Nabil R. Adam}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Preserving Privacy in Collaborative Business Process Composition}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {112--123}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005567801120123}, doi = {10.5220/0005567801120123}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IrshadSVBSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JaidiA15, author = {Faouzi Ja{\"{\i}}di and Faten Labbene Ayachi}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {454--459}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005577304540459}, doi = {10.5220/0005577304540459}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JaidiA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Joye15, author = {Marc Joye}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Key-private Cryptosystem from the Quadratic Residuosity}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {398--404}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005569703980404}, doi = {10.5220/0005569703980404}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Joye15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Ka15, author = {Ka Ahmad Khoureich}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {hHB: {A} Harder HB\({}^{\mbox{+}}\) Protocol}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {163--169}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005500001630169}, doi = {10.5220/0005500001630169}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Ka15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KenazaLBS15, author = {Tayeb Kenaza and Abdenour Labed and Yacine Boulahia and Mohcen Sebehi}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion Detection}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {405--412}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005573204050412}, doi = {10.5220/0005573204050412}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KenazaLBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15, author = {Yukou Kobayashi and Naoto Yanai and Kazuki Yoneyama and Takashi Nishide and Goichiro Hanaoka and Kwangjo Kim and Eiji Okamoto}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {39--52}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005539300390052}, doi = {10.5220/0005539300390052}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KobayashiYYNHKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LorenzS15, author = {Claas Lorenz and Bettina Schnor}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Policy Anomaly Detection for Distributed IPv6 Firewalls}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {210--219}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005517402100219}, doi = {10.5220/0005517402100219}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LorenzS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MalinaMHH15, author = {Lukas Malina and Petr Munster and Jan Hajny and Tom{\'{a}}s Horv{\'{a}}th}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Towards Secure Gigabit Passive Optical Networks - Signal Propagation based Key Establishment}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {349--354}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005559903490354}, doi = {10.5220/0005559903490354}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MalinaMHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MarfiaNPC15, author = {Fabio Marfia and Mario Arrigoni Neri and Filippo Pellegrini and Marco Colombetti}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {An OWL-based {XACML} Policy Framework}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {124--135}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005570101240135}, doi = {10.5220/0005570101240135}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MarfiaNPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MauroL15, author = {Mario Di Mauro and Maurizio Longo}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Revealing Encrypted WebRTC Traffic via Machine Learning Tools}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {259--266}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005542202590266}, doi = {10.5220/0005542202590266}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MauroL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MohsenP15, author = {Rabih Mohsen and Alexandre Miranda Pinto}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Algorithmic Information Theory for Obfuscation Security}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {76--87}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005548200760087}, doi = {10.5220/0005548200760087}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MohsenP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NegreR15, author = {Christophe N{\`{e}}gre and Jean{-}Marc Robert}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Parallel Approaches for Efficient Scalar Multiplication over Elliptic Curve}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {202--209}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005512502020209}, doi = {10.5220/0005512502020209}, timestamp = {Fri, 24 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/NegreR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PandeyS15, author = {Pankaj Pandey and Einar Arthur Snekkenes}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Design and Performance Aspects of Information Security Prediction Markets for Risk Management}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {273--284}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005547502730284}, doi = {10.5220/0005547502730284}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PandeyS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PavloskiGG15, author = {Mihajlo Pavloski and G{\"{o}}k{\c{c}}e G{\"{o}}rbil and Erol Gelenbe}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Counter based Detection and Mitigation of Signalling Attacks}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {413--418}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005573504130418}, doi = {10.5220/0005573504130418}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PavloskiGG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Rao15, author = {Srinivasa Rao Subramanya Rao}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Note on Schoenmakers Algorithm for Multi Exponentiation}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {384--391}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005566903840391}, doi = {10.5220/0005566903840391}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Rao15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ReevesS15, author = {Jason Reeves and Sean W. Smith}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Solving the Grid Defender's Dilemma: Tamper Protection for Distributed Cyber-Physical Systems}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {309--316}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005549503090316}, doi = {10.5220/0005549503090316}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ReevesS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ReimairTKT15, author = {Florian Reimair and Peter Teufl and Christian Kollmann and Christoph Thaller}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {MoCrySIL - Carry Your Cryptographic Keys in Your Pocket}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {285--292}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005547902850292}, doi = {10.5220/0005547902850292}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ReimairTKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RhinowC15, author = {Florian Rhinow and Michael Clear}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Scargos: Towards Automatic Vulnerability Distribution}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {369--376}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005566203690376}, doi = {10.5220/0005566203690376}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RhinowC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RoyGCM15, author = {Bholanath Roy and Ravi Prakash Giri and Ashokkumar C. and Bernard Menezes}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Design and Implementation of an Espionage Network for Cache-based Side Channel Attacks on {AES}}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {441--447}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005576804410447}, doi = {10.5220/0005576804410447}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RoyGCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SalferSE15, author = {Martin Salfer and Claudia Eckert}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Attack Surface and Vulnerability Assessment of Automotive Electronic Control Units}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {317--326}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005550003170326}, doi = {10.5220/0005550003170326}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SalferSE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchlegelHO15, author = {Roman Schlegel and Ana Hristova and Sebastian Obermeier}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Framework for Incident Response in Industrial Control Systems}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {178--185}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005510001780185}, doi = {10.5220/0005510001780185}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchlegelHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SelisM15, author = {Valerio Selis and Alan Marshall}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {{MEDA:} {A} Machine Emulation Detection Algorithm}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {228--235}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005535202280235}, doi = {10.5220/0005535202280235}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SelisM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SerbanescuOY15, author = {Alexandru Vlad Serbanescu and Sebastian Obermeier and Der{-}Yeuan Yu}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {A Flexible Architecture for Industrial Control System Honeypots}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {16--26}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005522500160026}, doi = {10.5220/0005522500160026}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SerbanescuOY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SmolyakovSKG15, author = {Alexey D. Smolyakov and Amir I. Sulimov and Arkadij V. Karpov and Aidar V. Galiev}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Experimental Extraction of Shared Secret Key from Fluctuations of Multipath Channel at Moving a Mobile Transceiver in an Urban Environment}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {355--360}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005561703550360}, doi = {10.5220/0005561703550360}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SmolyakovSKG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StergiopoulosPK15, author = {George Stergiopoulos and Panagiotis Petsanas and Panagiotis Katsaros and Dimitris Gritzalis}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Automated Exploit Detection using Path Profiling - The Disposition Should Matter, Not the Position}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {100--111}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005561101000111}, doi = {10.5220/0005561101000111}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/StergiopoulosPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SulimovK15, author = {Amir I. Sulimov and Arkadij V. Karpov}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Performance Evaluation of Meteor Key Distribution}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {392--397}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005568003920397}, doi = {10.5220/0005568003920397}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SulimovK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SytaFWSGF15, author = {Ewa Syta and Michael J. Fischer and David Wolinsky and Abraham Silberschatz and Gina Gallegos{-}Garc{\'{\i}}a and Bryan Ford}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Private Eyes: Secure Remote Biometric Authentication}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {243--250}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005539602430250}, doi = {10.5220/0005539602430250}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SytaFWSGF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TrabelsiPAAZMGA15, author = {Slim Trabelsi and Henrik Plate and Amine Abida and M. Marouane Ben Aoun and Anis Zouaoui and Chedy Missaoui and Sofien Gharbi and Alaeddine Ayari}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Monitoring Software Vulnerabilities through Social Networks Analysis}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {236--242}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005538602360242}, doi = {10.5220/0005538602360242}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TrabelsiPAAZMGA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TsiatsikasFPGKK15, author = {Zisis Tsiatsikas and Alexandros Fakis and Dimitrios Papamartzivanos and Dimitris Geneiatakis and Georgios Kambourakis and Constantinos Kolias}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Battling Against DDoS in {SIP} - Is Machine Learning-based Detection an Effective Weapon?}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {301--308}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005549103010308}, doi = {10.5220/0005549103010308}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TsiatsikasFPGKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UtthaBR15, author = {Worachet Uttha and Clara Bertolissi and Silvio Ranise}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Modeling Authorization Policies for Web Services in Presence of Transitive Dependencies}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {293--300}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005548502930300}, doi = {10.5220/0005548502930300}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/UtthaBR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VermaR15, author = {Rakesh M. Verma and Nirmala Rai}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Phish-IDetector: Message-Id Based Automatic Phishing Detection}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {427--434}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005574304270434}, doi = {10.5220/0005574304270434}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VermaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VivekB15, author = {S. Sree Vivek and Guhan Balasubramanian}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Controlled Proxy Re-signing - Conditional Proxy Re-Signatures}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {186--193}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005510601860193}, doi = {10.5220/0005510601860193}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VivekB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VivekSMR15, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Aanchal Malhotra and C. Pandu Rangan}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Practical {IBE} Secure under {CBDH} - Encrypting Without Pairing}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {251--258}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005541802510258}, doi = {10.5220/0005541802510258}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VivekSMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2015, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, publisher = {SciTePress}, year = {2015}, isbn = {978-989-758-117-5}, timestamp = {Thu, 06 Aug 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Aissaoui-MehrezUP14, author = {Hassane Aissaoui{-}Mehrez and Pascal Urien and Guy Pujolle}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Framework Implementation Based on Grid of Smartcards to Authenticate Users and Virtual Machines}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {285--290}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005046102850290}, doi = {10.5220/0005046102850290}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Aissaoui-MehrezUP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AouadMGM14, author = {Lamine M. Aouad and Alejandro Mosquera and Slawomir Grzonkowski and Dylan Morss}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{SMS} Spam - {A} Holistic View}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {221--228}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005023202210228}, doi = {10.5220/0005023202210228}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AouadMGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ArmknechtM14, author = {Frederik Armknecht and Vasily Mikhalev}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Revisiting a Recent Resource-efficient Technique for Increasing the Throughput of Stream Ciphers}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {379--386}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005059803790386}, doi = {10.5220/0005059803790386}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ArmknechtM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AzizMP14, author = {Benjamin Aziz and Philippe Massonet and Christophe Ponsard}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Formal Model for Forensic Storage Media Preparation Tools}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {165--170}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0004996001650170}, doi = {10.5220/0004996001650170}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AzizMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BadrinarayananR14, author = {Saikrishna Badrinarayanan and C. Pandu Rangan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {67--78}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005043400670078}, doi = {10.5220/0005043400670078}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BadrinarayananR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BarenghiP14, author = {Alessandro Barenghi and Gerardo Pelosi}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {On the Security of Partially Masked Software Implementations}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {492--499}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005120504920499}, doi = {10.5220/0005120504920499}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BarenghiP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelaaziRB14, author = {Maherzia Belaazi and Hanene Boussi Rahmouni and Adel Bouhoula}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Towards a Legislation Driven Framework for Access Control and Privacy Protection in Public Cloud}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {463--468}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7509526/}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelaaziRB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Bittl14, author = {Sebastian Bittl}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Efficient Construction of Infinite Length Hash Chains with Perfect Forward Secrecy Using Two Independent Hash Functions}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {213--220}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005020502130220}, doi = {10.5220/0005020502130220}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Bittl14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Brandic14, author = {Ivona Brandic}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Democratization in Science and Technology through Cloud Computing}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {IS--7}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7509459/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Brandic14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BuccafurriL14, author = {Francesco Buccafurri and Gianluca Lax}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {321--328}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005050303210328}, doi = {10.5220/0005050303210328}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BuccafurriL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CelikkanG14, author = {Ufuk Celikkan and Can Gelis}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{NFC} Based Mobile Single Sign-On Solution as a Chrome Extension}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {337--343}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005056703370343}, doi = {10.5220/0005056703370343}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CelikkanG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChangX14, author = {Jinyong Chang and Rui Xue}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{KDM-CCA} Security of the Cramer-Shoup Cryptosystem, Revisited}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {299--306}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005048802990306}, doi = {10.5220/0005048802990306}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChangX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CorenaBNKM14, author = {Juan Camilo Corena and Anirban Basu and Yuto Nakano and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {307--314}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005049803070314}, doi = {10.5220/0005049803070314}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CorenaBNKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CouchotHGWB14, author = {Jean{-}Fran{\c{c}}ois Couchot and Pierre{-}Cyrille H{\'{e}}am and Christophe Guyeux and Qianxue Wang and Jacques M. Bahi}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Pseudorandom Number Generators with Balanced Gray Codes}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {469--475}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7509527/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CouchotHGWB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CourousseRLBNJL14, author = {Damien Courouss{\'{e}} and Bruno Robisson and Jean{-}Louis Lanet and Thierno Barry and Hassan Noura and Philippe Jaillon and Philippe Lalev{\'{e}}e}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{COGITO:} Code Polymorphism to Secure Devices}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {451--456}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005113704510456}, doi = {10.5220/0005113704510456}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CourousseRLBNJL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CourtoisEN14, author = {Nicolas T. Courtois and Pinar Emirdag and Daniel A. Nagy}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Could Bitcoin Transactions Be 100x Faster?}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {426--431}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005102804260431}, doi = {10.5220/0005102804260431}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CourtoisEN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CourtoisMSSS14, author = {Nicolas T. Courtois and Theodosis Mourouzis and Guangyan Song and Pouyan Sepehrdad and Petr Susil}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round Simon}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {399--404}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005064903990404}, doi = {10.5220/0005064903990404}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CourtoisMSSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CucurullGENA14, author = {Jordi Cucurull and Sandra Guasch and Alex Escala and Guillermo Navarro{-}Arribas and V{\'{\i}}ctor Ac{\'{\i}}n}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{QR} Steganography - {A} Threat to New Generation Electronic Voting Systems}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {484--491}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005120404840491}, doi = {10.5220/0005120404840491}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CucurullGENA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DahshanE14, author = {Mai Dahshan and Sherif Elkassas}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Framework for Securing Data in Cloud Storage Services}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {267--274}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005043802670274}, doi = {10.5220/0005043802670274}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DahshanE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DaritiS14, author = {Rabi{\^{\i}} Dariti and El Mamoun Souidi}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Steganographic Protocol Based on Linear Error-Block Codes}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {178--183}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005014501780183}, doi = {10.5220/0005014501780183}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DaritiS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DazaPLS14, author = {Vanesa Daza and Roberto Di Pietro and Flavio Lombardi and Matteo Signorini}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{FORCE} - Fully Off-line secuRe CrEdits for Mobile Micro Payments}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {125--136}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005053201250136}, doi = {10.5220/0005053201250136}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DazaPLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Diaz-SantiagoRC14, author = {Sandra Diaz{-}Santiago and Lil Mar{\'{\i}}a Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Debrup Chakraborty}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Cryptographic Study of Tokenization Systems}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {393--398}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005062803930398}, doi = {10.5220/0005062803930398}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Diaz-SantiagoRC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DreierGKLLR14, author = {Jannik Dreier and Rosario Giustolisi and Ali Kassem and Pascal Lafourcade and Gabriele Lenzini and Peter Y. A. Ryan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Formal Analysis of Electronic Exams}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {101--112}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005050901010112}, doi = {10.5220/0005050901010112}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DreierGKLLR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ElkhiyaouiOM14, author = {Kaoutar Elkhiyaoui and Melek {\"{O}}nen and Refik Molva}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Privacy Preserving Delegated Word Search in the Cloud}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {137--150}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005054001370150}, doi = {10.5220/0005054001370150}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ElkhiyaouiOM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ElrakaibyP14, author = {Yehia Elrakaiby and Jun Pang}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Dynamic Analysis of Usage Control Policies}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {88--100}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005046600880100}, doi = {10.5220/0005046600880100}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ElrakaibyP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/EnacheS14, author = {Adriana{-}Cristina Enache and Valentin Sgarciu}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Enhanced Intrusion Detection System Based on Bat Algorithm-support Vector Machine}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {184--189}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005015501840189}, doi = {10.5220/0005015501840189}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/EnacheS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FerranteKM14, author = {Alberto Ferrante and Igor Kaitovic and Jelena Milosevic}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Modeling Requirements for Security-enhanced Design of Embedded Systems}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {315--320}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005050003150320}, doi = {10.5220/0005050003150320}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FerranteKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GhoshMCG14, author = {Nirnay Ghosh and Triparna Mondal and Debangshu Chatterjee and Soumya K. Ghosh}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Verifying Conformance of Security Implementation with Organizational Access Policies in Community Cloud - {A} Formal Approach}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {329--336}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7509507/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GhoshMCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Goodman14, author = {Seymour E. Goodman}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Need-based Assessment for Building a National Cyber Security Workforce}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {IS--5}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7509458/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Goodman14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GuleriaD14, author = {Vandana Guleria and Ratna Dutta}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {43--54}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005016900430054}, doi = {10.5220/0005016900430054}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GuleriaD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KaanicheLB14, author = {Nesrine Kaaniche and Maryline Laurent and Mohammed El{-}Barbori}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {CloudaSec: {A} Novel Public-key Based Framework to Handle Data Sharing Security in Clouds}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {5--18}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005010600050018}, doi = {10.5220/0005010600050018}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KaanicheLB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KavanSK14, author = {Daniel Kavan and Kl{\'{a}}ra Skodov{\'{a}} and Martin Kl{\'{\i}}ma}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Network-based Intrusion Prevention System Prototype with Multi-Detection - {A} Position Paper}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {417--425}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005102204170425}, doi = {10.5220/0005102204170425}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KavanSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Kiviharju14, author = {Mikko Kiviharju}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{RBAC} with {ABS} - Implementation Practicalities for {RBAC} Integrity Policies}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {500--509}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005122105000509}, doi = {10.5220/0005122105000509}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Kiviharju14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Lee14, author = {Byoungcheon Lee}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Hybrid-Style Personal Key Management in Ubiquitous Computing}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {238--243}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005029102380243}, doi = {10.5220/0005029102380243}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Lee14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Marfia14, author = {Fabio Marfia}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Using Abductive and Inductive Inference to Generate Policy Explanations}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {457--462}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005116004570462}, doi = {10.5220/0005116004570462}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Marfia14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MellaMV14, author = {Silvia Mella and Filippo Melzani and Andrea Visconti}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Differential Fault Attacks against {AES} Tampering with the Instruction Flow}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {439--444}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005112104390444}, doi = {10.5220/0005112104390444}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MellaMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MeraoumiaCB14, author = {Abdallah Meraoumia and Salim Chitroub and Ahmed Bouridane}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Robust Multispectral Palmprint Identification System by Jointly Using Contourlet Decomposition {\&} Gabor Filter Response}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {190--197}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005016101900197}, doi = {10.5220/0005016101900197}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MeraoumiaCB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MunozM14, author = {Antonio Mu{\~{n}}oz and Antonio Ma{\~{n}}a}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Software and Hardware Certification Techniques in a Combined Certification Model}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {405--410}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005098204050410}, doi = {10.5220/0005098204050410}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MunozM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NouraMA14, author = {Hassan Noura and Steven Martin and Khaldoun Al Agha}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {An Efficient Lightweight Security Algorithm for Random Linear Network Coding}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {171--177}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005002701710177}, doi = {10.5220/0005002701710177}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NouraMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OprisnikHT14, author = {Alexander Oprisnik and Daniel M. Hein and Peter Teufl}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Identifying Cryptographic Functionality in Android Applications}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {151--162}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005056301510162}, doi = {10.5220/0005056301510162}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OprisnikHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OuedraogoKTP0SC14, author = {Moussa Ouedraogo and Chien{-}Ting Kuo and Simon Tjoa and David Preston and Eric Dubois and Paulo Sim{\~{o}}es and Tiago Cruz}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Keeping an Eye on Your Security Through Assurance Indicators}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {476--483}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005118504760483}, doi = {10.5220/0005118504760483}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OuedraogoKTP0SC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PavloskiG14, author = {Mihajlo Pavloski and Erol Gelenbe}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Signaling Attacks in Mobile Telephony}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {206--212}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005019802060212}, doi = {10.5220/0005019802060212}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PavloskiG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PinoMSD14, author = {Pablo Ant{\'{o}}n del Pino and Antoine Monsifrot and Charles Salmon{-}Legagneur and Gwena{\"{e}}l J. Do{\"{e}}rr}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Secure Video Player for Mobile Devices Integrating a Watermarking-based Tracing Mechanism}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {253--260}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005042502530260}, doi = {10.5220/0005042502530260}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PinoMSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PoddarBM14, author = {Pratik Poddar and Achin Bansal and Bernard Menezes}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {361--370}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005058703610370}, doi = {10.5220/0005058703610370}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PoddarBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PolcakF14, author = {Libor Polcak and Barbora Frankov{\'{a}}}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {On Reliability of Clock-skew-based Remote Computer Identification}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {291--298}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005048502910298}, doi = {10.5220/0005048502910298}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PolcakF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Rodriguez-HenriquezC14, author = {Lil Mar{\'{\i}}a Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Debrup Chakraborty}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Using Bitmaps for Executing Range Queries in Encrypted Databases}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {432--438}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005111604320438}, doi = {10.5220/0005111604320438}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Rodriguez-HenriquezC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SaraswatS14, author = {Vishal Saraswat and Rajeev Anand Sahu}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Secure Anonymous Proxy Multi-signature Scheme}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {55--66}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005021200550066}, doi = {10.5220/0005021200550066}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SaraswatS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchindlerESS14, author = {Sven Schindler and Oliver Eggert and Bettina Schnor and Thomas Scheffler}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Shellcode Detection in IPv6 Networks with HoneydV6}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {198--205}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005016801980205}, doi = {10.5220/0005016801980205}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchindlerESS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SeiO14, author = {Yuichi Sei and Akihiko Ohsuga}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Randomized Addition of Sensitive Attributes for l-diversity}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {350--360}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005058203500360}, doi = {10.5220/0005058203500360}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SeiO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ShakarianPAJ14, author = {Paulo Shakarian and Damon Paulo and Massimiliano Albanese and Sushil Jajodia}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Keeping Intruders at Large - {A} Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {19--30}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005013800190030}, doi = {10.5220/0005013800190030}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ShakarianPAJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ShibliAKG14, author = {Muhammad Awais Shibli and Naveed Ahmad and Ayesha Kanwal and Abdul Ghafoor Abbasi}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Secure Virtual Machine Migration {(SV2M)} in Cloud Federation}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {344--349}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005057103440349}, doi = {10.5220/0005057103440349}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ShibliAKG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ShinR14, author = {Jinse Shin and Christoph Ruland}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {A Hybrid Approach for Content Based Image Authentication}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {371--378}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005059003710378}, doi = {10.5220/0005059003710378}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ShinR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SulimovK14, author = {Amir I. Sulimov and Arkadij V. Karpov}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Secure Key Distribution based on Meteor Burst Communications}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {445--450}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005113104450450}, doi = {10.5220/0005113104450450}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SulimovK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SulimovSKS14, author = {Amir I. Sulimov and Alexey D. Smolyakov and Arkadij V. Karpov and Oleg N. Sherstyukov}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Experimental Study of Performance and Security Constraints on Wireless Key Distribution Using Random Phase of Multipath Radio Signal}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {411--416}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005101004110416}, doi = {10.5220/0005101004110416}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SulimovSKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SultanASN14, author = {Shizra Sultan and Abdul Ghafoor Abbasi and Muhammad Awais Shibli and Muhammad Ali Nasir}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Secure Protocol for Financial Transactions Using Smartphones - {SPFT} - Formally Proved by {AVISPA}}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {387--392}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005059903870392}, doi = {10.5220/0005059903870392}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SultanASN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SysSUM14, author = {Marek S{\'{y}}s and Petr Svenda and Martin Ukrop and Vashek Matyas}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Constructing Empirical Tests of Randomness}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {229--237}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005023902290237}, doi = {10.5220/0005023902290237}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SysSUM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Vateva-GurovaLPS14, author = {Tsvetoslava Vateva{-}Gurova and Jesus Luna and Giancarlo Pellegrino and Neeraj Suri}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {113--124}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005052101130124}, doi = {10.5220/0005052101130124}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Vateva-GurovaLPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VirvilisTMG14, author = {Nikos Virvilis and Nikolaos Tsalis and Alexios Mylonas and Dimitris Gritzalis}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Mobile Devices - {A} Phisher's Paradise}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {79--87}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005045000790087}, doi = {10.5220/0005045000790087}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VirvilisTMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VukovicGD14, author = {Dijana Vukovic and Danilo Gligoroski and Zoran Djuric}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {On Privacy Protection in the Internet Surveillance Era}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {261--266}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005043002610266}, doi = {10.5220/0005043002610266}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VukovicGD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WagnerS14, author = {Andreas Wagner and Johannes Sametinger}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Using the Juliet Test Suite to Compare Static Security Scanners}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {244--252}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005032902440252}, doi = {10.5220/0005032902440252}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WagnerS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WeiWM14, author = {Yun Wei and Fushan Wei and Chuangui Ma}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Certificateless Non-Interactive Key Exchange Protocol without Pairings}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {31--42}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7509472/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WeiWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Weippl14, author = {Edgar R. Weippl}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Advanced Persistent Threats {\&} Social Engineering}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {IS--13}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/document/7509464/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Weippl14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZanganehBS14, author = {Omid Zanganeh and Nandita Bhattacharjee and Bala Srinivasan}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Partial Fingerprint Identification Through Correlation-based Approach}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {275--284}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005045302750284}, doi = {10.5220/0005045302750284}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZanganehBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2014, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, publisher = {SciTePress}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/7504670/proceeding}, isbn = {978-989-758-045-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlbaneseJSW13, author = {Massimiliano Albanese and Sushil Jajodia and Anoop Singhal and Lingyu Wang}, editor = {Pierangela Samarati}, title = {An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {207--218}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223168/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlbaneseJSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AliasgariB13, author = {Mehrdad Aliasgari and Marina Blanton}, editor = {Pierangela Samarati}, title = {Secure Computation of Hidden Markov Models}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {242--253}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223171/}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AliasgariB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BahiFG13, author = {Jacques M. Bahi and Nicolas Friot and Christophe Guyeux}, editor = {Pierangela Samarati}, title = {Topological Study and Lyapunov Exponent of a Secure Steganographic Scheme}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {275--283}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223176/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BahiFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BelaidBDGR13, author = {Sonia Bela{\"{\i}}d and Luk Bettale and Emmanuelle Dottax and Laurie Genelle and Franck Rondepierre}, editor = {Pierangela Samarati}, title = {Differential Power Analysis of {HMAC} {SHA-2} in the Hamming Weight Model}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {230--241}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223170/}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BelaidBDGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BongiovanniST13, author = {Simone Bongiovanni and Giuseppe Scotti and Alessandro Trifiletti}, editor = {Pierangela Samarati}, title = {Security Evaluation and Optimization of the Delay-based Dual-rail Pre-charge Logic in Presence of Early Evaluation of Data}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {183--194}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223166/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BongiovanniST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Campo-GiralteCDC13, author = {Luis Campo{-}Giralte and Cristina Conde and Isaac Mart{\'{\i}}n de Diego and Enrique Cabello}, editor = {Pierangela Samarati}, title = {InCC: Hiding Information by Mimicking Traffic In Network Flows}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {5--14}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223151/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Campo-GiralteCDC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CataneH13, author = {Boaz Catane and Amir Herzberg}, editor = {Pierangela Samarati}, title = {Secure Second Price Auctions with a Rational Auctioneer}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {158--169}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223164/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CataneH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CataneH13a, author = {Boaz Catane and Amir Herzberg}, editor = {Pierangela Samarati}, title = {Massive Group Message Authentication with Revocable Anonymity}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {331--338}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223182/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CataneH13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CazorlaMM13, author = {Micka{\"{e}}l Cazorla and Kevin Marquet and Marine Minier}, editor = {Pierangela Samarati}, title = {Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {543--548}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223213/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CazorlaMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChabanneCP13, author = {Herv{\'{e}} Chabanne and G{\'{e}}rard D. Cohen and Alain Patey}, editor = {Pierangela Samarati}, title = {Public-key Cryptography from Different Assumptions - {A} Multi-bit Version}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {561--567}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223216/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChabanneCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChinPBH13, author = {Ji{-}Jian Chin and Raphael C.{-}W. Phan and Rouzbeh Behnia and Swee{-}Huay Heng}, editor = {Pierangela Samarati}, title = {An Efficient and Provably Secure Certificateless Identification Scheme}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {371--378}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223187/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChinPBH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChionisCN13, author = {Ioannis Chionis and Maria Chroni and Stavros D. Nikolopoulos}, editor = {Pierangela Samarati}, title = {A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs into Software}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {74--85}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223157/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChionisCN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CiancamerlaMP13, author = {Ester Ciancamerla and Michele Minichino and S. Palmieri}, editor = {Pierangela Samarati}, title = {Modelling {SCADA} and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {123--134}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223161/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CiancamerlaMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ClearM13, author = {Michael Clear and Ciaran McGoldrick}, editor = {Pierangela Samarati}, title = {Policy-based Non-interactive Outsourcing of Computation using Multikey {FHE} and {CP-ABE}}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {444--452}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223196/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ClearM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CostanteVEHPZ13, author = {Elisa Costante and Sokratis Vavilis and Sandro Etalle and Jerry den Hartog and Milan Petkovic and Nicola Zannone}, editor = {Pierangela Samarati}, title = {Database Anomalous Activities - Detection and Quantification}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {603--608}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223222/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CostanteVEHPZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CourtoisMM13, author = {Nicolas T. Courtois and Theodosis Mourouzis and Michal Misztal}, editor = {Pierangela Samarati}, title = {Enhanced Truncated Differential Cryptanalysis of {GOST}}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {411--418}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223192/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CourtoisMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Domingo-Ferrer13, author = {Josep Domingo{-}Ferrer}, editor = {Pierangela Samarati}, title = {On the Connection between t-Closeness and Differential Privacy for Data Releases}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {478--481}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223202/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Domingo-Ferrer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FerranteMJ13, author = {Alberto Ferrante and Jelena Milosevic and Marija Janjusevic}, editor = {Pierangela Samarati}, title = {A Security-enhanced Design Methodology for Embedded Systems}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {39--50}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223154/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FerranteMJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FreitasN13, author = {Daniel Santana de Freitas and Jorge Nakahara Jr.}, editor = {Pierangela Samarati}, title = {Non-random Properties of Compression and Hash Functions using Linear Cryptanalysis}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {471--477}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223201/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FreitasN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GrootSVL13, author = {Joep A. de Groot and Boris Skoric and Niels de Vreede and Jean{-}Paul M. G. Linnartz}, editor = {Pierangela Samarati}, title = {Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {506--511}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223207/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GrootSVL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HaarS13, author = {Dustin van der Haar and Basie von Solms}, editor = {Pierangela Samarati}, title = {Are Biometric Web Services a Reality? - {A} Best Practice Analysis for Telebiometric Deployment in Open Networks}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {494--499}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223205/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HaarS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HajnyMMZ13, author = {Jan Hajny and Lukas Malina and Zdenek Martinasek and Vaclav Zeman}, editor = {Pierangela Samarati}, title = {Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc Networks}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {267--274}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223175/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HajnyMMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HanserS13, author = {Christian Hanser and Daniel Slamanig}, editor = {Pierangela Samarati}, title = {Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {15--26}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223152/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HanserS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HanzlikW13, author = {Lucjan Hanzlik and Wojciech Wodo}, editor = {Pierangela Samarati}, title = {Identity Security in Biometric Systems based on Keystroking}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {524--530}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223210/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HanzlikW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HaynbergRAM13, author = {Rolf Haynberg and Jochen Rill and Dirk Achenbach and J{\"{o}}rn M{\"{u}}ller{-}Quade}, editor = {Pierangela Samarati}, title = {Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {403--410}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223191/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HaynbergRAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HenricksenK13, author = {Matt Henricksen and Shinsaku Kiyomoto}, editor = {Pierangela Samarati}, title = {{AVON} - {A} Fast Hash Function for Intel {SIMD} Architectures}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {482--487}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223203/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HenricksenK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HiroseK13, author = {Shoichi Hirose and Hidenori Kuwakado}, editor = {Pierangela Samarati}, title = {Redactable Signature Scheme for Tree-structured Data based on Merkle Tree}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {313--320}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223180/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HiroseK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HuarteGUMI13, author = {Maider Huarte and I{\~{n}}aki Goirizelaia and Juan Jos{\'{e}} Unzilla and Jon Mat{\'{\i}}as and Juan J. Igarza}, editor = {Pierangela Samarati}, title = {A New Fully Auditable Proposal for an Internet Voting System with Secure Individual Verification and Complaining Capabilities}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {395--402}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223190/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HuarteGUMI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Ii-YungKP13, author = {Ruth Ng Ii{-}Yung and Khoongming Khoo and Raphael C.{-}W. Phan}, editor = {Pierangela Samarati}, title = {On the Security of the {XOR} Sandwiching Paradigm for Multiple Keyed Block Ciphers}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {305--312}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223179/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Ii-YungKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IshiguroKM13, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Pierangela Samarati}, title = {A Key-revocable Attribute-based Encryption for Mobile Cloud Environments}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {51--61}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223155/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IshiguroKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Iyengar13, author = {Vinay S. Iyengar}, editor = {Pierangela Samarati}, title = {Efficient Characteristic 3 Galois Field Operations for Elliptic Curve Cryptographic Applications}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {531--536}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223211/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Iyengar13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JhawarP13, author = {Ravi Jhawar and Vincenzo Piuri}, editor = {Pierangela Samarati}, title = {Adaptive Resource Management for Balancing Availability and Performance in Cloud Computing}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {254--264}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223172/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JhawarP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Kadhem13, author = {Hasan Kadhem}, editor = {Pierangela Samarati}, title = {{MINHO} - {A} Novel Authentication Scheme based on Pre-Authentication Service}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {586--594}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223220/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Kadhem13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KandiasMSG13, author = {Miltiadis Kandias and Lilian Mitrou and Vasilis Stavrou and Dimitris Gritzalis}, editor = {Pierangela Samarati}, title = {Which Side Are You On? - {A} New Panopticon vs. Privacy}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {98--110}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223159/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KandiasMSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KhalfaouiMG13, author = {Mehdi Khalfaoui and Refik Molva and Laurent Gomez}, editor = {Pierangela Samarati}, title = {Secure Alert Tracking in Supply Chain}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {219--229}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223169/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KhalfaouiMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13, author = {Shinsaku Kiyomoto and Andre Rein and Yuto Nakano and Carsten Rudolph and Yutaka Miyake}, editor = {Pierangela Samarati}, title = {{LMM} - {A} Common Component for Software License Management on Cloud}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {284--295}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223177/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoRNRM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Knospe13, author = {Heiko Knospe}, editor = {Pierangela Samarati}, title = {Privacy-enhanced Perceptual Hashing of Audio Data}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {549--554}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223214/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Knospe13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LacharmeCR13, author = {Patrick Lacharme and Estelle Cherrier and Christophe Rosenberger}, editor = {Pierangela Samarati}, title = {Preimage Attack on BioHashing}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {363--370}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223186/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LacharmeCR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LangXD13, author = {Bo Lang and Runhua Xu and Yawei Duan}, editor = {Pierangela Samarati}, title = {Extending the Ciphertext-Policy Attribute Based Encryption Scheme for Supporting Flexible Access Control}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {147--157}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223163/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LangXD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LegendreDK13, author = {Florian Legendre and Gilles Dequen and Micha{\"{e}}l Krajecki}, editor = {Pierangela Samarati}, title = {From a Logical Approach to Internal States of Hash Functions - How {SAT} Problem Can Help to Understand SHA-* and MD*}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {435--443}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223195/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LegendreDK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LermanNV13, author = {Liran Lerman and Jorge Nakahara Jr. and Nikita Veshchikov}, editor = {Pierangela Samarati}, title = {Improving Block Cipher Design by Rearranging Internal Operations}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {27--38}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223153/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LermanNV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MalinaHM13, author = {Lukas Malina and Jan Hajny and Zdenek Martinasek}, editor = {Pierangela Samarati}, title = {Efficient Group Signatures with Verifier-local Revocation Employing a Natural Expiration}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {555--560}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223215/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MalinaHM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MauriceONHF13, author = {Cl{\'{e}}mentine Maurice and St{\'{e}}phane Onno and Christoph Neumann and Olivier Heen and Aur{\'{e}}lien Francillon}, editor = {Pierangela Samarati}, title = {Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {379--386}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223188/}, timestamp = {Sun, 25 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MauriceONHF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MillikenSYM13, author = {Jonny Milliken and Valerio Selis and Kian Meng Yap and Alan Marshall}, editor = {Pierangela Samarati}, title = {Development of Device Identity using WiFi Layer 2 Management Frames for Combating Rogue APs}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {488--493}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223204/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MillikenSYM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NanavatiJ13, author = {Nirali R. Nanavati and Devesh C. Jinwala}, editor = {Pierangela Samarati}, title = {A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy Preserving Distributed Data Mining}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {512--517}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223208/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NanavatiJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NeriGMMP13, author = {Mario Arrigoni Neri and Marco Guarnieri and Eros Magri and Simone Mutti and Stefano Paraboschi}, editor = {Pierangela Samarati}, title = {A Model-driven Approach for Securing Software Architectures}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {595--602}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223221/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NeriGMMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NouraMA13, author = {Hassan Noura and Steven Martin and Khaldoun Al Agha}, editor = {Pierangela Samarati}, title = {{E3SN} - Efficient Security Scheme for Sensor Networks}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {615--621}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223224/}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/NouraMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OhtakeHKEHWYKYI13, author = {Go Ohtake and Yuki Hironaka and Kenjiro Kai and Yosuke Endo and Goichiro Hanaoka and Hajime Watanabe and Shota Yamada and Kohei Kasamatsu and Takashi Yamakawa and Hideki Imai}, editor = {Pierangela Samarati}, title = {Partially Wildcarded Attribute-based Encryption and Its Efficient Construction}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {339--346}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223183/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/OhtakeHKEHWYKYI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Patsakis13, author = {Constantinos Patsakis}, editor = {Pierangela Samarati}, title = {Recovering {RSA} Private Keys on Implementations with Tampered LSBs}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {453--460}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223197/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Patsakis13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Raiteri13, author = {Daniele Codetta Raiteri}, editor = {Pierangela Samarati}, title = {A Preliminary Application of Generalized Fault Trees to Security}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {609--614}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223223/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Raiteri13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Rass13, author = {Stefan Rass}, editor = {Pierangela Samarati}, title = {Dynamic Proofs of Retrievability from Chameleon-Hashes}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {296--304}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223178/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Rass13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RaviBV13, author = {Saradha Ravi and N. Balakrishnan and Bharath Venkatesh}, editor = {Pierangela Samarati}, title = {Behavior-based Malware Analysis using Profile Hidden Markov Models}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {195--206}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223167/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RaviBV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ReynagaC13, author = {Gerardo Reynaga and Sonia Chiasson}, editor = {Pierangela Samarati}, title = {The Usability of CAPTCHAs on Smartphones}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {427--434}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223194/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ReynagaC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RostamiCT13, author = {Saeed Rostami and Sadegh Bamohabbat Chafjiri and Seyed Amir Hossein Tabatabaei}, editor = {Pierangela Samarati}, title = {Related-key Impossible Differential Cryptanalysis of Full-round {HIGHT}}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {537--542}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223212/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RostamiCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SalvaZL13, author = {S{\'{e}}bastien Salva and Stassia R. Zafimiharisoa and Patrice Lauren{\c{c}}ot}, editor = {Pierangela Samarati}, title = {Intent Security Testing - An Approach to Testing the Intent-based Vulnerability of Android Components}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {355--362}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223185/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SalvaZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SanzSULNB13, author = {Borja Sanz and Igor Santos and Xabier Ugarte{-}Pedrero and Carlos Laorden and Javier Nieves and Pablo Garc{\'{\i}}a Bringas}, editor = {Pierangela Samarati}, title = {Instance-based Anomaly Method for Android Malware Detection}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {387--394}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223189/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SanzSULNB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SarwarMBK13, author = {Golam Sarwar and Olivier Mehani and Roksana Boreli and Mohamed Ali K{\^{a}}afar}, editor = {Pierangela Samarati}, title = {On the Effectiveness of Dynamic Taint Analysis for Protecting against Private Information Leaks on Android-based Devices}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {461--468}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223198/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SarwarMBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13, author = {Yu Sasaki and Wataru Komatsubara and Yasuhide Sakai and Lei Wang and Mitsugu Iwamoto and Kazuo Sakiyama and Kazuo Ohta}, editor = {Pierangela Samarati}, title = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5} and {HAVAL}}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {111--122}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223160/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SasakiKSWISO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchindlerSKSZ13, author = {Sven Schindler and Bettina Schnor and Simon Kiertscher and Thomas Scheffler and Eldad Zack}, editor = {Pierangela Samarati}, title = {HoneydV6: {A} Low-interaction IPv6 Honeypot}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {86--97}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223158/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchindlerSKSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchreudersB13, author = {Z. Cliffe Schreuders and Adil M. Bhat}, editor = {Pierangela Samarati}, title = {Not All ISPs Equally Secure Home Users - An Empirical Study Comparing Wi-Fi Security Provided by {UK} ISPs}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {568--573}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223217/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SchreudersB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG13, author = {George Stergiopoulos and Miltiadis Kandias and Dimitris Gritzalis}, editor = {Pierangela Samarati}, title = {Approaching Encryption through Complex Number Logarithms}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {574--579}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223218/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/StergiopoulosKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SvendaUM13, author = {Petr Svenda and Martin Ukrop and Vashek Matyas}, editor = {Pierangela Samarati}, title = {Towards Cryptographic Function Distinguishers with Evolutionary Circuits}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {135--146}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223162/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SvendaUM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TeuflZSH13, author = {Peter Teufl and Thomas Zefferer and Christof Stromberger and Christoph Hechenblaikner}, editor = {Pierangela Samarati}, title = {iOS Encryption Systems - Deploying iOS Devices in Security-critical Environments}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {170--182}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223165/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TeuflZSH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TrabelsiB13, author = {Slim Trabelsi and Hana Bouafif}, editor = {Pierangela Samarati}, title = {Abusing Social Networks with Abuse Reports - {A} Coalition Attack for Social Networks}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {500--505}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223206/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TrabelsiB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TrojahnSO13, author = {Matthias Trojahn and Christian Schadewald and Frank Ortmeier}, editor = {Pierangela Samarati}, title = {Keystroke Authentication with a Capacitive Display using Different Mobile Devices}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {580--585}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223219/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TrojahnSO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Yoneyama13, author = {Kazuki Yoneyama}, editor = {Pierangela Samarati}, title = {Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {518--523}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223209/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Yoneyama13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZeffererT13, author = {Thomas Zefferer and Peter Teufl}, editor = {Pierangela Samarati}, title = {Policy-based Security Assessment of Mobile End-user Devices - An Alternative to Mobile Device Management Solutions for Android Smartphones}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {347--354}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223184/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZeffererT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZhouVH13, author = {Lan Zhou and Vijay Varadharajan and Michael Hitchens}, editor = {Pierangela Samarati}, title = {Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {62--73}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223156/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZhouVH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZolotavkinJ13, author = {Yevhen Zolotavkin and Martti Juhola}, editor = {Pierangela Samarati}, title = {SVD-based Digital Image Watermarking on approximated Orthogonal Matrix}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {321--330}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223181/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZolotavkinJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZwattendorferS13, author = {Bernd Zwattendorfer and Daniel Slamanig}, editor = {Pierangela Samarati}, title = {Privacy-preserving Realization of the {STORK} Framework in the Public Cloud}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {419--426}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223193/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZwattendorferS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2013, editor = {Pierangela Samarati}, title = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, publisher = {SciTePress}, year = {2013}, isbn = {978-989-8565-73-0}, timestamp = {Tue, 05 Nov 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Al-KhazzarS12, author = {Ahmed Al{-}Khazzar and Nick Savage}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Biometric Identification in Virtual Worlds using Biometric Fusion Techniques}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {263--269}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Al-KhazzarS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AtallahFW12, author = {Mikhail J. Atallah and Keith B. Frikken and Shumiao Wang}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Private Outsourcing of Matrix Multiplication over Closed Semi-rings}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {136--144}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AtallahFW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AthanasiouCBMTG12, author = {George Athanasiou and Chara I. Chalkou and D. Bardis and Harris E. Michail and George Theodoridis and Costas E. Goutis}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {High-throughput Hardware Architectures of the {JH} Round-three {SHA-3} Candidate - An {FPGA} Design and Implementation Approach}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {126--135}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AthanasiouCBMTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BarbuHD12, author = {Guillaume Barbu and Philippe Hoogvorst and Guillaume Duc}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Tampering with Java Card Exceptions - The Exception Proves the Rule}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {55--63}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BarbuHD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BhattacharyaDCBI12, author = {Anup Kumar Bhattacharya and Abhijit Das and Dipanwita Roy Chowdhury and Bhargav Bellur and Aravind Iyer}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {SIMD-based Implementations of Eta Pairing Over Finite Fields of Small Characteristics}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {94--101}, publisher = {SciTePress}, year = {2012}, timestamp = {Wed, 20 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BhattacharyaDCBI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BrennerPS12, author = {Michael Brenner and Henning Perl and Matthew Smith}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Practical Applications of Homomorphic Encryption}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--14}, publisher = {SciTePress}, year = {2012}, timestamp = {Wed, 30 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BrennerPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BringerCP12, author = {Julien Bringer and Herv{\'{e}} Chabanne and Alain Patey}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {An Application of a Group Signature Scheme with Backward Unlinkability to Biometric Identity Management}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {421--425}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BringerCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BringerP12, author = {Julien Bringer and Alain Patey}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {{VLR} Group Signatures - How to Achieve Both Backward Unlinkability and Efficient Revocation Checks}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {215--220}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BringerP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ButinB12, author = {Denis Butin and Giampaolo Bella}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Verifying Privacy by Little Interaction and No Process Equivalence}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {251--256}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ButinB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CarlosMPC12, author = {Marcelo Carlomagno Carlos and Jean Everson Martina and Geraint Price and Ricardo Felipe Cust{\'{o}}dio}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {A Proposed Framework for Analysing Security Ceremonies}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {440--445}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/CarlosMPC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChouOL12, author = {Yuyu Chou and Jan Oetting and Olga Levina}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Building the Security Foundation to Embrace Public Software-as-a-Service (SaaS) - Security Policies for SaaS Data Protection}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {227--232}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ChouOL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ClementeLR12, author = {Patrice Clemente and Jean{-}Fran{\c{c}}ois Lalande and Jonathan Rouzaud{-}Cornabas}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction Honeypots}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {434--439}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ClementeLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Correia12, author = {Lu{\'{\i}}s M. Correia}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {A Perspective of the Networks of the Future and Smart Cities}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 05 Mar 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Correia12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CourtoisML12, author = {Nicolas T. Courtois and Theodosis Mourouzis and Pho V. Le}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Extension of de Weger's Attack on {RSA} with Large Public Keys}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {145--153}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/CourtoisML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DharwadkarA12, author = {Nagaraj V. Dharwadkar and B. B. Amberker}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Reversible Steganographic Scheme with High Embedding Capacity using Dual Cover Images}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {15--24}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DharwadkarA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Diaz-SantiagoC12, author = {Sandra Diaz{-}Santiago and Debrup Chakraborty}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {On Securing Communication from Profilers}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {154--162}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Diaz-SantiagoC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/EfremovP12, author = {Denis Efremov and Nikolay V. Pakulin}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Sevigator: Network Confinement of Malware Applications and Untrusted Operating Systems}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {395--398}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/EfremovP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/EmuraR12, author = {Keita Emura and Mohammad Shahriar Rahman}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Constructing Secure-channel Free Searchable Encryption from Anonymous {IBE} with Partitioned Ciphertext Structure}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {84--93}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/EmuraR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/EmuraS12, author = {Keita Emura and Takashi Sato}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {353--357}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/EmuraS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FallahpourMN12, author = {Mehdi Fallahpour and David Meg{\'{\i}}as and Hossein Najaf{-}Zadeh}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Adaptive Speech Watermarking in Wavelet Domain based on Logarithm}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {412--415}, publisher = {SciTePress}, year = {2012}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FallahpourMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Fournaris12, author = {Apostolos P. Fournaris}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Distributed Threshold Certificate based Encryption Scheme with No Trusted Dealer}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {314--320}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Fournaris12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Fox12, author = {Geoffrey Charles Fox}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Fox12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Frikken12, author = {Keith B. Frikken}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Cryptographic Enforcement of Access Control while Mitigating Key Sharing}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {245--250}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Frikken12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Garcia12, author = {Johan Garcia}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Quantifying the Benefits of File Size Information for Forensic Hash Matching}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {333--338}, publisher = {SciTePress}, year = {2012}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Garcia12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GarciaGVS12, author = {Jesus Luna Garcia and Hamza Ghani and Tsvetoslava Vateva and Neeraj Suri}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Quantitative Assessment of Cloud Security Level Agreements - {A} Case Study}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {64--73}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/GarciaGVS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Govindaraju12, author = {Venu Govindaraju}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Making Sense of All Things Handwritten - From Postal Addresses to Tablet Notes}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Govindaraju12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HameedKF12, author = {Sufian Hameed and Tobias Kloht and Xiaoming Fu}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {408--411}, publisher = {SciTePress}, year = {2012}, timestamp = {Sun, 23 Oct 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HameedKF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HammamiS12, author = {Ali Hammami and No{\"{e}}mie Simoni}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Secure and Seamless Session Management in Mobile and Heterogeneous Environment}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {282--289}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HammamiS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Henricksen12, author = {Matt Henricksen}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Two Dragons - {A} Family of Fast Word-based Stream Ciphers}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {35--44}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Henricksen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoumaniD12, author = {Hanane Houmani and Mourad Debbabi}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Formal Analysis of the {TLS} Handshake Protocol}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {192--205}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HoumaniD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Jajodia12, author = {Sushil Jajodia}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {A Mission-centric Framework for Cyber Situational Awareness}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Jajodia12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KhayatiSUO12, author = {Leyli Javid Khayati and Erkay Savas and Berkant Ustaoglu and Cengiz {\"{O}}rencik}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Privacy-preserving Targeted Advertising Scheme for {IPTV} using the Cloud}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {74--83}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KhayatiSUO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KimKC12, author = {Byoung{-}Koo Kim and Ikkyun Kim and Tai{-}Myoung Chung}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Network-based Executable File Extraction and Analysis for Malware Detection}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {430--433}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KimKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Kiviharju12, author = {Mikko Kiviharju}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Towards Pervasive Cryptographic Access Control Models}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {239--244}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Kiviharju12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KlonowskiSW12, author = {Marek Klonowski and Piotr Syga and Wojciech Wodo}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving Information and Simple Countermeasures}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {296--301}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KlonowskiSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KotenkoCN12, author = {Igor V. Kotenko and Andrey Chechulin and Evgenia Novikova}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Attack Modelling and Security Evaluation for Security Information and Event Management}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {391--394}, publisher = {SciTePress}, year = {2012}, timestamp = {Wed, 05 Nov 2014 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KotenkoCN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KotenkoPS12, author = {Igor V. Kotenko and Olga Polubelova and Igor Saenko}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Data Repository for Security Information and Event Management in Service Infrastructures}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {308--313}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KotenkoPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LampeP12, author = {Rodolphe Lampe and Jacques Patarin}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Analysis of Some Natural Variants of the {PKP} Algorithm}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {209--214}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/LampeP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LegendreDK12, author = {Florian Legendre and Gilles Dequen and Micha{\"{e}}l Krajecki}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Inverting Thanks to {SAT} Solving - An Application on Reduced-step MD*}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {339--344}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/LegendreDK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LermanMN12, author = {Liran Lerman and Olivier Markowitch and Jorge Nakahara Jr.}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Key Management as a Service}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {276--281}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/LermanMN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiZBZYH12, author = {Min Li and Yulong Zhang and Kun Bai and Wanyu Zang and Meng Yu and Xubin He}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Improving Cloud Survivability through Dependency based Virtual Machine Placement}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {321--326}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiZBZYH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Maccari12, author = {Leonardo Maccari}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {A Collaborative Firewall for Wireless Ad-Hoc Social Networks}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {290--295}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Maccari12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MauroMJ12, author = {Alessio Di Mauro and Alessandro Mei and Sushil Jajodia}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Secure File Allocation and Caching in Large-scale Distributed Systems}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {182--191}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MauroMJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MichailAGTG12, author = {Harris E. Michail and George Athanasiou and Andreas Gregoriades and George Theodoridis and Costas E. Goutis}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {On the Development of Totally Self-checking Hardware Design for the {SHA-1} Hash Function}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {270--275}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MichailAGTG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NanavatiJ12, author = {Nirali R. Nanavati and Devesh C. Jinwala}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Privacy Preserving Approaches for Global Cycle Detections for Cyclic Association Rules in Distributed Databases}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {368--371}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/NanavatiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PatsakisD12, author = {Constantinos Patsakis and Kleanthis Dellios}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {221--226}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PatsakisD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PohlsSMP12, author = {Henrich Christopher P{\"{o}}hls and Kai Samelin and Hermann de Meer and Joachim Posegga}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {113--125}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PohlsSMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PolychroniadouCS12, author = {Antigoni Polychroniadou and Konstantinos Chalkias and George Stephanides}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {The Concept of Compatibility between Identity-based and Certificateless Encryption Schemes}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {403--407}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PolychroniadouCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RassK12, author = {Stefan Rass and Michal Koza}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {On Secure Communication over Wireless Sensor Networks}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {364--367}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/RassK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RatnayakeKY12, author = {Deepthi N. Ratnayake and Hassan B. Kazemian and Syed A. Yusuf}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Improved Detection of Probe Request Attacks - Using Neural Networks and Genetic Algorithm}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {345--350}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/RatnayakeKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ReinmanW12, author = {Tzachy Reinman and Erez Waisbard}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {PPiTTA - Preserving Privacy in {TV} Targeted Advertising}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {327--332}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ReinmanW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RyckDPJ12, author = {Philippe De Ryck and Lieven Desmet and Frank Piessens and Wouter Joosen}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {A Security Analysis of Emerging Web Standards - {HTML5} and Friends, from Specification to Implementation}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {257--262}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/RyckDPJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchiavoV12, author = {Chiara Valentina Schiavo and Andrea Visconti}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {302--307}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SchiavoV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchickR12, author = {Rainer Schick and Christoph Ruland}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Non-repudiation of Forwarding - Traceability of Confidential Data Via Multiple Recipients}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {387--390}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SchickR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchutteFG12, author = {Julian Sch{\"{u}}tte and Hervais Simo Fhom and Mark Gall}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Security Policies in Dynamic Service Compositions}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {233--238}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SchutteFG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SchutteSS12, author = {Martin Sch{\"{u}}tte and Thomas Scheffler and Bettina Schnor}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor Discovery Protocol}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {399--402}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SchutteSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SojkaP12, author = {Anna Sojka and Krzysztof Piotrowski}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {lmRNG: {A} Lightweight Pseudorandom Number Generator for Wireless Sensor Networks}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {358--363}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SojkaP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SonnenbichlerG12, author = {Andreas C. Sonnenbichler and Andreas Geyer{-}Schulz}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {{ADQL:} {A} Flexible Access Definition and Query Language to Define Access Control Models}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {379--386}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SonnenbichlerG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SunWZ12, author = {Yonglin Sun and Yongjun Wang and Yi Zhang}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Self-ad-MCNHA-SLOS - {A} Self-adaptive Minimum-Cost Network Hardening Algorithm based on Stochastic Loose Optimize Strategy}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {372--378}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SunWZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Tunstall12, author = {Michael Tunstall}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Improved "Partial Sums"-based Square Attack on {AES}}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {25--34}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Tunstall12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VetterUWS12, author = {Benjamin Vetter and Osman Ugus and Dirk Westhoff and Christoph Sorge}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {102--112}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/VetterUWS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VitaliVSBM12, author = {Domenico Vitali and Antonio Villani and Angelo Spognardi and Roberto Battistoni and Luigi V. Mancini}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {DDoS Detection with Information Theory Metrics and Netflows - {A} Real Case}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {172--181}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/VitaliVSBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YangHS12, author = {Chenguang Yang and Ghaith Hammouri and Berk Sunar}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Voice Passwords Revisited}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {163--171}, publisher = {SciTePress}, year = {2012}, url = {https://10.5220/0004060201630171}, timestamp = {Thu, 16 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YangHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YiTO12, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Identity-based Password-Authenticated Key Exchange for Client/Server Model}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {45--54}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/YiTO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YoonOKJ12, author = {Seungyong Yoon and Jintae Oh and Ikkyun Kim and Jongsoo Jang}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Defense Against {TCP} Flooding Attack}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {416--420}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/YoonOKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YouL12, author = {Lin You and Jie Lu}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {A Novel Fuzzy Vault Scheme for Secret Key Exchange}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {426--429}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/YouL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2012, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2012}, isbn = {978-989-8565-24-2}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Abyaneh11, author = {Mohammad Reza Sohizadeh Abyaneh}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {293--299}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Abyaneh11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlcaidePBA11, author = {Almudena Alcaide and Esther Palomar and Israel Barroso{-}Perez and Ali E. Abdallah}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Privacy-enhancing Cryptography-based Materials}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {379--382}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlcaidePBA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AokiRSS11, author = {Kazumaro Aoki and G{\"{u}}nther Roland and Yu Sasaki and Martin Schl{\"{a}}ffer}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Byte Slicing Gr{\o}stl - Optimized Intel {AES-NI} and 8-bit Implementations of the {SHA-3} Finalist Gr{\o}stl}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {124--133}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AokiRSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BernabePCCPG11, author = {Jorge Bernal Bernab{\'{e}} and Juan Manuel Mar{\'{\i}}n P{\'{e}}rez and Jos{\'{e}} M. Alcaraz Calero and F{\'{e}}lix J. Garc{\'{\i}}a Clemente and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Towards an Authorization System for Cloud Infrastructure Providers}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {333--338}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BernabePCCPG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BiswasCD11, author = {Praloy Kr. Biswas and Dipanwita Roy Chowdhury and Kankar S. Dasgupta}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Fast Selective Encryption Scheme for {MP3} Files - Using {GRAIN} Stream Cipher}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {414--417}, publisher = {SciTePress}, year = {2011}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BiswasCD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BlantonA11, author = {Marina Blanton and Mehrdad Aliasgari}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {On the (Non-)reusability of Fuzzy Sketches and Extractors and Security in the Computational Setting}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {68--77}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BlantonA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BounaCG11, author = {Bechara al Bouna and Richard Chbeir and Alban Gabillon}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {The Image Protector - {A} Flexible Security Rule Specification Toolkit}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {345--350}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BounaCG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BousquetCL11, author = {Aline Bousquet and Patrice Clemente and Jean{-}Fran{\c{c}}ois Lalande}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {{SYNEMA:} Visual Monitoring of Network and System Security Sensors}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {375--378}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BousquetCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BrahmiYP11, author = {Imen Brahmi and Sadok Ben Yahia and Pascal Poncelet}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Snort-based Mobile Agent for a Distributed Intrusion Detection System}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {198--207}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BrahmiYP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BrennerWVS11, author = {Michael Brenner and Jan Wiebelitz and Gabriele von Voigt and Matthew Smith}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Smart-gentry based Software System for Secret Program Execution}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {238--244}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 30 May 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BrennerWVS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Cabello11, author = {Enrique Cabello}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Face Biometrics without Intrusion in Airport}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {09}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Cabello11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CaoO11, author = {Xiaolin Cao and M{\'{a}}ire O'Neill}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Forward Private Protocol based on {PRNG} and {LPN} for Low-cost {RFID}}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {287--292}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CaoO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Chao11, author = {Han{-}Chieh Chao}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {WiMAX? - {A} Case Study on Minimizing Construction Cost for {IEEE} 802.16j Multi-hop Relay Networks}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {05}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Chao11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChenV11, author = {Yanling Chen and A. J. Han Vinck}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Fresh Look into the Biometric Authentication - Perspective from Shannon's Secrecy System and a Special Wiretap Channel}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {168--177}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChenV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CourtoisM11, author = {Nicolas T. Courtois and Theodosis Mourouzis}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Black-box Collision Attacks on the Compression Function of the {GOST} Hash Function}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {325--332}, publisher = {SciTePress}, year = {2011}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CourtoisM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DasVGMNN11, author = {Saptarsi Das and Keshavan Varadarajan and Ganesh Garga and Rajdeep Mondal and Ranjani Narayan and S. K. Nandy}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Method for Flexible Reduction over Binary Fields using a Field Multiplier}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {50--58}, publisher = {SciTePress}, year = {2011}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DasVGMNN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FarmerA11, author = {Michael E. Farmer and William Arthur}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Study of the Phenomenology of {DDOS} Network Attacks in Phase Space}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {78--89}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FarmerA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FiazzaPV11, author = {Maria{-}Camilla Fiazza and Michele Peroli and Luca Vigan{\`{o}}}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Attack Interference in Non-collaborative Scenarios for Security Protocol Analysis}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {144--156}, publisher = {SciTePress}, year = {2011}, timestamp = {Mon, 22 Aug 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FiazzaPV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FischerIP11, author = {Michael J. Fischer and Michaela Iorga and Ren{\'{e}} Peralta}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Public Randomness Service}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {434--438}, publisher = {SciTePress}, year = {2011}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/FischerIP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Fournaris11, author = {Apostolos P. Fournaris}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Distributed Threshold Cryptography Certification with No Trusted Dealer}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {400--404}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Fournaris11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FriotGB11, author = {Nicolas Friot and Christophe Guyeux and Jacques M. Bahi}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Chaotic Iterations for Steganography - Stego-security and Chaos-security}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {218--227}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FriotGB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaKMS11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--49}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GligoroskiKAJ11, author = {Danilo Gligoroski and Svein Johan Knapskog and J{\o}rn Amundsen and Rune Erlend Jensen}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Internationally Standardized Efficient Cryptographic Hash Function}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {426--433}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GligoroskiKAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Gomi11, author = {Hidehito Gomi}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Data and Access Management using Access Tokens for Delegating Authority to Persons and Software}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {457--463}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Gomi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GrozaM11, author = {Bogdan Groza and Pal{-}Stefan Murvay}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Higher Layer Authentication for Broadcast in Controller Area Networks}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {188--197}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GrozaM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HajnyMZ11, author = {Jan Hajny and Lukas Malina and Vaclav Zeman}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Practical Anonymous Authentication - Designing Anonymous Authentication for Everyday Use}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {405--408}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HajnyMZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Hernandez-CastroRC11, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and Arturo Ribagorda and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {On the Strength of Egglue and Other Logic CAPTCHAs}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {157--167}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Hernandez-CastroRC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/InamuraIWNT11, author = {Masaki Inamura and Keiichi Iwamura and Ryu Watanabe and Makoto Nishikawa and Toshiaki Tanaka}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A New Tree-structure-specified Multisignature Scheme for a Document Circulation System}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {362--369}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/InamuraIWNT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ItaniKC11, author = {Wassim Itani and Ayman I. Kayssi and Ali Chehab}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Policy-based Security Channels for Protecting Network Communication in Mobile Cloud Computing}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {450--456}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ItaniKC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Jeske11, author = {Tobias Jeske}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Privacy-preserving Smart Metering without a Trusted-third-party}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {114--123}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Jeske11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JiagueFGKLMS11, author = {Michel Embe Jiague and Marc Frappier and Fr{\'{e}}d{\'{e}}ric Gervais and Pierre Konopacki and R{\'{e}}gine Laleau and J{\'{e}}r{\'{e}}my Milhau and Richard St{-}Denis}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Four-concern-oriented Secure {IS} Development Approach}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {464--471}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 30 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JiagueFGKLMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JouhariS11, author = {Houda Jouhari and El Mamoun Souidi}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A New Steganographic Scheme based on First Order Reed Muller Codes - {A} New Steganographic Scheme}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {351--356}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JouhariS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Kasten11, author = {Andreas Kasten}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Towards an Information Control Policy Model - Achieving More Transparency in Internet Filtering Approaches}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {409--413}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Kasten11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KlonowskiKK11, author = {Marek Klonowski and Michal Koza and Miroslaw Kutylowski}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {How to Transmit Messages via {WSN} in a Hostile Environment}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {387--390}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KlonowskiKK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Lackner11, author = {G{\"{u}}nther Lackner}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {On the Security of Location Determination and Verification Methods for Wireless Networks}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {263--268}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Lackner11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Lamersdorf11, author = {Winfried Lamersdorf}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Paradigms of Distributed Software Systems - Services, Processes, and Self-organization}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {011}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Lamersdorf11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LiuXJL11, author = {Zongbin Liu and Luning Xia and Jiwu Jing and Peng Liu}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {105--113}, publisher = {SciTePress}, year = {2011}, timestamp = {Tue, 09 Jul 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LiuXJL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LunaGGS11, author = {Jesus Luna Garcia and Hamza Ghani and Daniel Germanus and Neeraj Suri}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Security Metrics Framework for the Cloud}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {245--250}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 05 Sep 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LunaGGS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MaieroM11, author = {Carlo Maiero and Marino Miculan}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Unobservable Intrusion Detection based on Call Traces in Paravirtualized Systems}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {300--306}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MaieroM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ModicaT11, author = {Giuseppe Di Modica and Orazio Tomarchio}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Semantic Annotations for Security Policy Matching in WS-policy}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {443--449}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ModicaT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MylonasDTG11, author = {Alexios Mylonas and Stelios Dritsas and Bill Tsoumas and Dimitris Gritzalis}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Smartphone Security Evaluation - The Malware Attack Case}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {25--36}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MylonasDTG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NakanishiBI11, author = {Isao Nakanishi and Sadanao Baba and Masahiro Inoue}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Driver Authentication using Brain Waves While Route Tracing as a Mental Task}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {90--96}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 24 Jun 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NakanishiBI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PiuriS11, author = {Vincenzo Piuri and Fabio Scotti}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Biometrics Privacy - Technologies and Applications}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {07}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PiuriS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PivaD11, author = {Fabio Piva and Ricardo Dahab}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {E-Commerce and Fair Exchange - The Problem of Item Validation}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {317--324}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PivaD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PopoveniucKL11, author = {Stefan Popoveniuc and John Kelsey and Eugen Leontie}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {On the Privacy Threats of Electronic Poll Books}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {281--286}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PopoveniucKL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PrietoMMI11, author = {Iria Prieto and Eduardo Maga{\~{n}}a and Daniel Morat{\'{o}} and Mikel Izal}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Botnet Detection based on {DNS} Records and Active Probing}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {307--316}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PrietoMMI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RassS11, author = {Stefan Rass and Peter Schartner}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Information-leakage in Hybrid Randomized Protocols}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {134--143}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RassS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RavariF11, author = {Ali Noorollahi Ravari and Mehran S. Fallah}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Logical View of Nonmonotonicity in Access Control}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {472--481}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RavariF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Redouane11, author = {Abdesselam Redouane}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Towards a Calculus for Non Repudiation Protocols}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {383--386}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Redouane11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Rodriguez-GomezMG11, author = {Rafael Rodr{\'{\i}}guez{-}G{\'{o}}mez and Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and Pedro Garcia{-}Teodoro}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Analysis of Botnets through Life-cycle}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {257--262}, publisher = {SciTePress}, year = {2011}, timestamp = {Sat, 04 Feb 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Rodriguez-GomezMG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SalehaniY11, author = {Yaser Esmaeili Salehani and Amr M. Youssef}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Differential Fault Analysis of Hummingbird}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {357--361}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SalehaniY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SantosLB11, author = {Igor Santos and Carlos Laorden and Pablo Garc{\'{\i}}a Bringas}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Collective Classification for Unknown Malware Detection}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {251--256}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 28 Jul 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SantosLB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SantosLUSB11, author = {Igor Santos and Carlos Laorden and Xabier Ugarte{-}Pedrero and Borja Sanz and Pablo Garc{\'{\i}}a Bringas}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Anomaly-based Spam Filtering}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--14}, publisher = {SciTePress}, year = {2011}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SantosLUSB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Schutte11, author = {Julian Sch{\"{u}}tte}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Apollon: Towards a Semantically Extensible Policy Framework}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {391--395}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Schutte11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Solis11, author = {John Solis}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Private Searching for Sensitive File Signatures}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {341--344}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Solis11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Stelte11, author = {Bj{\"{o}}rn Stelte}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Byzantine Decisions for Inferring Trust in Sensor Networks}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {396--399}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Stelte11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Suarez-TangilPPR11, author = {Guillermo Suarez{-}Tangil and Esther Palomar and Sergio Pastrana and Arturo Ribagorda}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Artificial Immunity-based Correlation System}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {422--425}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Suarez-TangilPPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TaddeoMF11, author = {Antonio Vincenzo Taddeo and Luis Germ{\'{a}}n Garc{\'{\i}}a Morales and Alberto Ferrante}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Framework for Security and Workload Gradual Adaptation}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {178--187}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TaddeoMF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Varela-VacaGP11, author = {Angel Jesus Varela{-}Vaca and Rafael M. Gasca and Sergio Pozo}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {{OPBUS:} Risk-aware Framework for the Conformance of Security-quality Requirements in Business Processes}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {370--374}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Varela-VacaGP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Vaudenay11, author = {Serge Vaudenay}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Related-key Attack against Triple Encryption based on Fixed Points}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {59--67}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Vaudenay11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VivekSR11, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {{CCA} Secure Certificateless Encryption Schemes based on {RSA}}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {208--217}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VivekSR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VrakasGL11, author = {Nikos Vrakas and Dimitris Geneiatakis and Costas Lambrinoudakis}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {{IS} {IP} Multimedia Subsystem Affected by `Malformed Message' Attacks? - An Evaluation of OpenIMS}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {275--280}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VrakasGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/XieLLZL11, author = {Xin Xie and Fenlin Liu and Bin Lu and Tao Zhao and Hanning Li}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Static Software Birthmark based on Use-define Chains for Detecting the Theft of Java Programs}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {231--237}, publisher = {SciTePress}, year = {2011}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/XieLLZL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/XuZF11, author = {Jing Xu and Wen Tao Zhu and Dengguo Feng}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {A Smart Card based Generic Construction for Anonymous Authentication in Mobile Networks}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {269--274}, publisher = {SciTePress}, year = {2011}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/XuZF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YangZLL11, author = {Chunfang Yang and Tao Zhao and Hanning Li and Fenlin Liu}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Embedding Ratio Estimation based on Weighted Stego Image for Embedding in 2LSB}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {97--104}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YangZLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YiTO11, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Three-party Password-authenticated Key Exchange without Random Oracles}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {15--24}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YiTO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YuB11, author = {Jinying Yu and Philipp Brune}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {No Security by Obscurity - Why Two Factor Authentication Should Be based on an Open Design}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {418--421}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YuB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2011, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2011}, isbn = {978-989-8425-71-3}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Akyildiz10, author = {Ian F. Akyildiz}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Nanonetworks - {A} New Frontier in Communications}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Akyildiz10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Al-KhazzarS10, author = {Ahmed Al{-}Khazzar and Nick Savage}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Graphical Authentication based on user Behaviour}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {86--89}, publisher = {SciTePress}, year = {2010}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Al-KhazzarS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Alvarez-CuberoZ10, author = {Jos{\'{e}} Antonio {\'{A}}lvarez{-}Cubero and Pedro J. Zufiria}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {A {C++} Class for Analysing Vector Boolean Functions from a Cryptographic Perspective}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {512--520}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Alvarez-CuberoZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AndukuriC10, author = {Murthy S. Andukuri and C. Edward Chow}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Efficient Asymmetric IPSec for Secure iSCSI}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {314--317}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AndukuriC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AzizAJACR10, author = {Benjamin Aziz and Alvaro Arenas and Ian Johnson and Matej Artac and Ales Cernivec and Philip Robinson}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Management of Security Policies in Virtual Organisations}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {467--477}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/AzizAJACR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BakerC10, author = {Bradley Baker and C. Edward Chow}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {{HTEE:} An {HMAC} based Tamper Evident Encryption}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {196--205}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BakerC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BhatSSVP10, author = {Veena H. Bhat and S. Krishna and P. Deepa Shenoy and K. R. Venugopal and Lalit M. Patnaik}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {{HUBFIRE} - {A} Multi-class {SVM} based {JPEG} Steganalysis using {HBCL} Statistics and {FR} Index}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {447--452}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 23 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BhatSSVP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BiryukovPZ10, author = {Alex Biryukov and Deike Priemuth{-}Schmid and Bin Zhang}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Analysis of {SNOW} 3G{\(\oplus\)} Resynchronization Mechanism}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {327--333}, publisher = {SciTePress}, year = {2010}, timestamp = {Sat, 22 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BiryukovPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Bourbakis10, author = {Nikolaos G. Bourbakis}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Information Security: The {SCAN} - Secure Processor with Crypto-Biometrics Capabilities}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {11}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 02 Oct 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Bourbakis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CabidduCV10, author = {Giovanni Cabiddu and Emanuele Cesena and Davide Vernizzi}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous Networks}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {221--225}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/CabidduCV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChatzipoulidisM10, author = {Aristeidis Chatzipoulidis and Ioannis Mavridis}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {An {ICT} Security Management Framework}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {459--462}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ChatzipoulidisM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ClarkTMCAIS10, author = {John A. Clark and Juan E. Tapiador and John A. McDermid and Pau{-}Chen Cheng and Dakshi Agrawal and Natalie Ivanic and Dave Slogget}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Risk based Access Control with Uncertain and Time-dependent Sensitivity}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--13}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ClarkTMCAIS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DarapureddiMP10, author = {Avinash Darapureddi and Radhesh Mohandas and Alwyn Roshan Pais}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Throttling DDoS Attacks using Discrete Logarithm Problem}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {263--269}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DarapureddiMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DasguptaSN10, author = {Dipankar Dasgupta and Sudip Saha and Aregahegn Negatu}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Techniques for Validation and Controlled Execution of Processes, Codes and Data - {A} Survey}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {77--85}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DasguptaSN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Djuric10, author = {Petar M. Djuric}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {From Nature to Methods and Back to Nature}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {7}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Djuric10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DorflingerVKF10, author = {Tim D{\"{o}}rflinger and Anna Voth and Juliane Kr{\"{a}}mer and Ronald Fromm}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {"My Smartphone is a Safe!" - The User's Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {155--164}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/DorflingerVKF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FardW10, author = {Amin Milani Fard and Ke Wang}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {An Effective Clustering Approach to Web Query Log Anonymization}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {109--119}, publisher = {SciTePress}, year = {2010}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FardW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FischerK10, author = {Anja Fischer and Winfried E. K{\"{u}}hnhauser}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Efficient Algorithmic Safety Analysis of {HRU} Security Models}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {49--58}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/FischerK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FrikkenZ10, author = {Keith B. Frikken and Yihua Zhang}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Confidentiality and Integrity for {SUM} Aggregation in Sensor Networks}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {231--240}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/FrikkenZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GibsonCM10, author = {Marcia Gibson and Marc Conrad and Carsten Maple}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Infinite Alphabet Passwords - {A} Unified Model for a Class of Authentication Systems}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {94--99}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/GibsonCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GmelchP10, author = {Oliver Gmelch and G{\"{u}}nther Pernul}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Preventing Malicious Portlets from Communicating and Intercepting in Collaboration Portals}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {177--182}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/GmelchP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GuyeuxB10, author = {Christophe Guyeux and Jacques M. Bahi}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {A New Chaos-based Watermarking Algorithm}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {455--458}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/GuyeuxB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HajnyPZ10, author = {Jan Hajny and Tomas Pelka and Vaclav Zeman}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Privacy Protection for user Authentication}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {90--93}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HajnyPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Hernandez-CastroRS10, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and Arturo Ribagorda and Yago S{\'{a}}ez}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Side-channel Attack on the HumanAuth {CAPTCHA}}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {59--65}, publisher = {SciTePress}, year = {2010}, timestamp = {Thu, 27 Oct 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Hernandez-CastroRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IbraimiAP10, author = {Luan Ibraimi and Muhammad Asim and Milan Petkovic}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {An Encryption Scheme for a Secure Policy Updating}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {399--408}, publisher = {SciTePress}, year = {2010}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IbraimiAP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IonRC10, author = {Mihaela Ion and Giovanni Russello and Bruno Crispo}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Providing Confidentiality in Content-based Publish/subscribe Systems}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {287--292}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/IonRC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KarimiC10, author = {Vahid R. Karimi and Donald D. Cowan}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Access Control Models for Business Processes}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {489--498}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KarimiC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Kartalopoulos10, author = {Stamatios V. Kartalopoulos}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Chaotic Quantum Cryptography - The Ultimate for Network Security}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {9}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Kartalopoulos10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Kumar10, author = {Sandeep S. Kumar}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Anonymous Social Stamps - Authenticating Anonymous Statements to Friends with Privacy}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {183--188}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Kumar10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KumarAVLR10, author = {Swarun Kumar and Shivank Agrawal and Ramarathnam Venkatesan and Satyanarayana V. Lokam and C. Pandu Rangan}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Forcing Out a Confession - Threshold Discernible Ring Signatures}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {379--388}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KumarAVLR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Lang10, author = {Bo Lang}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Trust Degree based Access Control for Social Networks}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {43--48}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Lang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LangarMA10, author = {Mahjoub Langar and Mohamed Mejri and Kamel Adi}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Rewriting-based Security Enforcement of Concurrent Systems - {A} Formal Approach}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {66--74}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/LangarMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MallikM10, author = {Dibyendu Mallik and Debdeep Mukhopadhyay}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {New Pseudo Near Collision Attack on Tiger}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {427--430}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MallikM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MannesSLS10, author = {Elisa Mannes and Eduardo da Silva and Michele Nogueira Lima and Aldri Luiz dos Santos}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Implications of Misbehaving Attacks on Probabilistic Quorum System for MANETs}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {189--195}, publisher = {SciTePress}, year = {2010}, timestamp = {Tue, 11 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MannesSLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MappALP10, author = {Glenford E. Mapp and Mahdi Aiash and Aboubaker Lasebae and Raphael Chung{-}Wei Phan}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Security Models for Heterogeneous Networking}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {318--321}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 14 Feb 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MappALP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MichailAKGGP10, author = {Harris E. Michail and George Athanasiou and Angeliki Kritikakou and Costas E. Goutis and Andreas Gregoriades and Vicky G. Papadopoulou}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Ultra High Speed {SHA-256} Hashing Cryptographic Module for IPSec Hardware/Software Codesign}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {309--313}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MichailAKGGP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MichalopoulosM10, author = {Dimitrios Michalopoulos and Ioannis Mavridis}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Towards Risk based Prevention of Grooming Attacks}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {217--220}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MichalopoulosM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MillikenM10, author = {Jonny Milliken and Alan Marshall}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {The Threat-Victim Table - {A} Security Prioritisation Framework For Diverse {WLAN} Network Topographies}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--42}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 08 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MillikenM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MunillaOP10, author = {Jorge Munilla and Andr{\'{e}}s Ortiz and Alberto Peinado}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {What can {RFID} do for Vanets? - {A} Cryptographic Point of View}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {295--298}, publisher = {SciTePress}, year = {2010}, timestamp = {Thu, 28 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MunillaOP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MunozGA10, author = {Alfonso Mu{\~{n}}oz Mu{\~{n}}oz and Justo Carracedo Gallardo and Irina Arguelles {\'{A}}lvarez}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Improving N-Gram Linguistic Steganography based on Templates}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {209--212}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MunozGA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NakanoKKT10, author = {Yuto Nakano and Jun Kurihara and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {On a Construction of Stream-cipher-based Hash Functions}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {334--343}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/NakanoKKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NeupaneS10, author = {Kashi Neupane and Rainer Steinwandt}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Server-assisted Long-term Secure 3-party Key Establishment}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {372--378}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/NeupaneS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/OttavianiZR10, author = {Vittorio Ottaviani and Alberto Zanoni and Massimo Regoli}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Conjugation as Public Key Agreement Protocol in Mobile Cryptography}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {411--416}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/OttavianiZR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PanosXS10, author = {Christoforos Panos and Christos Xenakis and Ioannis Stavrakakis}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {A Novel Intrusion Detection System for MANETs}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {25--34}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PanosXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PapanikolaouCGMP10, author = {Nick Papanikolaou and Sadie Creese and Michael Goldsmith and Marco Casassa Mont and Siani Pearson}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {EnCoRe: Towards a Holistic Approach to Privacy}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {171--176}, publisher = {SciTePress}, year = {2010}, timestamp = {Wed, 03 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PapanikolaouCGMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PatelMP10, author = {Vipul Patel and Radhesh Mohandas and Alwyn R. Pais}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Attacks on Web Services and Mitigation Schemes}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {499--504}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PatelMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PengB10, author = {Kun Peng and Feng Bao}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Vulnerability of a Non-membership Proof Scheme}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {419--422}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PengB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PopoveniucL10, author = {Stefan Popoveniuc and Eugen Leontie}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Safe {RPC} - Auditing Mixnets Safely using Randomized Partial Checking}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {165--170}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PopoveniucL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PuraPB10, author = {Mihai{-}Lica Pura and Victor Valeriu Patriciu and Ion Bica}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Formal Verification of {G-PAKE} Using Casper/FDR2 - Securing a Group {PAKE} Protocol Using Casper/FDR2}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {299--303}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/PuraPB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SelviVAR10, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Sakhi S. Anand and C. Pandu Rangan}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {An Identity based Ring Signcryption Scheme with Public Verifiability}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {362--371}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SelviVAR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SharT10, author = {Lwin Khin Shar and Hee Beng Kuan Tan}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Auditing the Defense Against Cross Site Scripting in Web Applications}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {505--511}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SharT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SlamanigR10, author = {Daniel Slamanig and Stefan Rass}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Anonymous but Authorized Transactions Supporting Selective Traceability}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {132--141}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SlamanigR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SojkaPL10, author = {Anna Sojka and Krzysztof Piotrowski and Peter Langend{\"{o}}rfer}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Short {ECC} - {A} Lightweight Security Approach for Wireless Sensor Networks}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {304--308}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/SojkaPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/StavrouPHH10, author = {Eliana Stavrou and Andreas Pitsillides and George C. Hadjichristofi and Christoforos N. Hadjicostis}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Security in Future Mobile Sensor Networks - Issues and Challenges}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {278--286}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/StavrouPHH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TabiaL10, author = {Karim Tabia and Philippe Leray}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Handling IDS' Reliability in Alert Correlation - {A} Bayesian Network-based Model for Handling IDS's Reliability and Controlling Prediction/False Alarm Rate Tradeoffs}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {14--24}, publisher = {SciTePress}, year = {2010}, timestamp = {Tue, 30 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/TabiaL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/TaddeoMF10, author = {Antonio Vincenzo Taddeo and Marcello Mura and Alberto Ferrante}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {QoS and Security in Energy-harvesting Wireless Sensor Networks}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {241--250}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/TaddeoMF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UshidaOKY10, author = {Mebae Ushida and Kazuo Ohta and Yutaka Kawai and Kazuki Yoneyama}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Proxiable Designated Verifier Signature}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {344--353}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/UshidaOKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VascoHV10, author = {Mar{\'{\i}}a Isabel Gonz{\'{a}}lez Vasco and Somayeh Heidarvand and Jorge L. Villar}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Anonymous Subscription Schemes - {A} Flexible Construction for On-line Services Access}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {120--131}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 31 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/VascoHV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Vaya10, author = {Shailesh Vaya}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Realizing Secure Multiparty Computation on Incomplete Networks}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {270--277}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Vaya10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WahidR10, author = {Khan Ferdous Wahid and Javier Rubio{-}Loyola}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Secure Bridging in Large Scale Deployment of Ethernet}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {251--260}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/WahidR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Wang10, author = {Alex Hai Wang}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Don't Follow Me - Spam Detection in Twitter}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {142--151}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Wang10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WilliamsTH10, author = {David M. Williams and Helen Treharne and Anthony T. S. Ho}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {On the Importance of One-time Key Pairs in Buyer-seller Watermarking Protocols}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {441--446}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/WilliamsTH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WuWL10, author = {Xiaoyu Wu and Duncan S. Wong and Qing Li}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Extended Visual Cryptography Scheme for Color Images with no Pixel Expansion}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {423--426}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/WuWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YeeXM10, author = {George Yee and Xingli Xie and Shikharesh Majumdar}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Automated Threat Identification for {UML}}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {521--527}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/YeeXM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YuWZL10, author = {Meng Yu and Alex Hai Wang and Wanyu Zang and Peng Liu}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Evaluating Survivability and Costs of Three Virtual Machine based Server Architectures}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {478--485}, publisher = {SciTePress}, year = {2010}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YuWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZaidiAK10, author = {Abdelhalim Zaidi and Nazim Agoulmine and Tayeb Kenaza}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Piecewise Classification of Attack Patterns for Efficient Network Intrusion Detection}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {100--104}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ZaidiAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZannonePE10, author = {Nicola Zannone and Milan Petkovic and Sandro Etalle}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Towards Data Protection Compliance}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {213--216}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ZannonePE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZhouMDZPZ10, author = {Xiaoyi Zhou and Jixin Ma and Wencai Du and Bo Zhao and Miltos Petridis and Yongzhe Zhao}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {{BMQE} System - {A} {MQ} Equations System based on Ergodic Matrix}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {431--435}, publisher = {SciTePress}, year = {2010}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZhouMDZPZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZhuANS10, author = {Huafei Zhu and Tadashi Araragi and Takashi Nishide and Kouichi Sakurai}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Adaptive and Composable Non-interactive String-commitment Protocols}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {354--361}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ZhuANS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZhuANS10a, author = {Huafei Zhu and Tadashi Araragi and Takashi Nishide and Kouichi Sakurai}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {389--398}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/ZhuANS10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2010, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2010}, isbn = {978-989-8425-18-8}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AzerEE09, author = {Marianne Azer and Sherif El{-}Kassas and Magdy S. El{-}Soudani}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based Schemes}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {69--74}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Wed, 22 Jun 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AzerEE09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BaileyBRP09, author = {Daniel V. Bailey and John G. Brainard and Sebastian Rohde and Christof Paar}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {One-touch Financial Transaction Authentication}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--12}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BaileyBRP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BarisonMM09, author = {Dherik Barison and Rodrigo Sanches Miani and Leonardo de Souza Mendes}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Evaluation of Quality and Security of a VoIP Network based on Asterisk and OpenVPN}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {144--147}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 11 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BarisonMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenferhatBD09, author = {Salem Benferhat and Abdelhamid Boudjelida and Habiba Drias}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Adding Expert Knowledge to TAN-based Intrusion Detection Systems}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {61--64}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 20 Jan 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BenferhatBD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BhaumikC09, author = {Jaydeb Bhaumik and Dipanwita Roy Chowdhury}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Nmix: An Ideal Candidate for Key Mixing}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {285--288}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BhaumikC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BourgeoisH09, author = {Julien Bourgeois and Syed Raheel Hassan}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Managing Security of Grid Architecture with a Grid Security Operation Center}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {403--408}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BourgeoisH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChenJ09, author = {Shiwei Chen and Chenhui Jin}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {245--248}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChenJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChengGH09, author = {Jingde Cheng and Yuichi Goto and Daisuke Horie}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{ISEE:} An Information Security Engineering Environment}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {395--400}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChengGH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChewZK09, author = {Guanhan Chew and Aileen Zhang and Khoongming Khoo}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland Functions}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {159--162}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChewZK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChoiLKK09, author = {Jaeun Choi and Myungjong Lee and Gisung Kim and Sehun Kim}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Monitoring Node Selection Algorithm for Intrusion Detection in Congested Sensor Network}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {117--120}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChoiLKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Corral-GarciaGSG09, author = {Javier Corral{-}Garc{\'{\i}}a and Carlos{-}Jorge del Arco Gonz{\'{a}}lez and Jos{\'{e}} Luis Gonz{\'{a}}lez S{\'{a}}nchez and Jos{\'{e}} Luis Redondo Garc{\'{\i}}a}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Free Security Suite 2 - Easy, Intuitive and Complete Free Security Suite with Web Browser Integration}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {341--344}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Mon, 18 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Corral-GarciaGSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Courtois09, author = {Nicolas T. Courtois}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {The Dark Side of Security by Obscurity - and Cloning MiFare Classic Rail and Building Passes, Anywhere, Anytime}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {331--338}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Courtois09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CretTSG09, author = {Octavian Cret and Radu Tudoran and Alin Suciu and Tamas Gy{\"{o}}rfi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Implementing True Random Number Generators in FPGAs by Chip Filling}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {167--174}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CretTSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Dagorn09, author = {Nathalie Dagorn}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Identifying Security Elements for Cooperative Information Systems}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {319--324}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Dagorn09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Dragan09, author = {Constantin Catalin Dragan}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Interactive Secret Share Management}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {266--269}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Dragan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Gallego-NicasioMMS09, author = {Beatriz Gallego{-}Nicasio and Antonio Mu{\~{n}}oz and Antonio Ma{\~{n}}a and Daniel Serrano}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Security Patterns, Towards a Further Level}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {349--356}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Gallego-NicasioMMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GujjunooriSJDMP09, author = {Saraiah Gujjunoori and Taqi Ali Syed and Madhu Babu J. and Avinash Darapureddi and Radhesh Mohandas and Alwyn R. Pais}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Throttling DDoS Attacks}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {121--126}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/GujjunooriSJDMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HajnyPL09, author = {Jan Hajny and Tomas Pelka and Petra Lambertova}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Universal Authentication Framework - Requirements and Phase Design}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {57--60}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HajnyPL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HamadK09, author = {A. M. Hamad and Walid I. Khedr}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Ad-hoc on Demand Authentication Chain Protocol - An Authentication Protocol for Ad-Hoc Networks}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {274--284}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Tue, 12 Jan 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/HamadK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HegazyED09, author = {Ola M. Hegazy and Ayman M. Bahaa Eldin and Yasser H. Dakroury}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Quantum Secure Direct Communication using Entanglement and Super Dense Coding}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {175--181}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HegazyED09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HeoOJ09, author = {Young{-}Jun Heo and Jintae Oh and Jongsoo Jang}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Behavior-based Clustering for Discrimination between Flash Crowds and DDoS Attacks}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {140--143}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HeoOJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Hernandez-ArdietaFRR09, author = {Jorge L. Hernandez{-}Ardieta and Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and Benjam{\'{\i}}n Ramos and Arturo Ribagorda}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {On the Need to Divide the Signature Creation Environment}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {375--380}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Hernandez-ArdietaFRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Hutter09, author = {Michael Hutter}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{RFID} Authentication Protocols based on Elliptic Curves - {A} Top-Down Evaluation Survey}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {101--110}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Hutter09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/IatrouVS09, author = {Michael G. Iatrou and Artemios G. Voyiatzis and Dimitrios N. Serpanos}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Network Stack Optimization for Improved IPsec Performance on Linux}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {83--91}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/IatrouVS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JakubowskiSV09, author = {Mariusz H. Jakubowski and Chit Wei Saw and Ramarathnam Venkatesan}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Iterated Transformations and Quantitative Metrics for Software Protection}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {359--368}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 11 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JakubowskiSV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Jin09, author = {Hongxia Jin}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Efficient Traitor Tracing for Content Protection}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {270--273}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Jin09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoFM09, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Keith M. Martin}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Offline Peer-to-peer Broadcasting Scheme with Anonymity}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {75--82}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoFM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KosterKNBBO09, author = {Friedrich K{\"{o}}ster and Michael Klaas and Hanh Quyen Nguyen and Walter Brenner and Markus Br{\"{a}}ndle and Sebastian Obermeier}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Collaborative Security Assessments in Embedded Systems Development - The {ESSAF} Framework for Structured Qualitative Analysis}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {305--312}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KosterKNBBO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Leymann09, author = {Frank Leymann}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Cloud Computing - Fundamental Architecture {\&} Future Applications}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {31--31}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 11 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Leymann09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/LinHY09, author = {Changlu Lin and Lein Harn and Dingfeng Ye}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Information-theoretically Secure Strong Verifiable Secret Sharing}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {233--238}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/LinHY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Marca09, author = {David A. Marca}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {e-Business Design - {A} Shift to Adaptability}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {21--29}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Marca09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MianiPM09, author = {Rodrigo Sanches Miani and Felipe Marques Pires and Leonardo de Souza Mendes}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Alternative Approach for Formula Modelling in Security Metrics}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {381--386}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MianiPM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Mihai-LicaPB09, author = {Mihai{-}Lica Pura and Victor Valeriu Patriciu and Ion Bica}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {135--139}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 07 Jan 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Mihai-LicaPB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MisraOBBG09, author = {Sudip Misra and Mohammad S. Obaidat and Atig Bagchi and Ravindara Bhatt and Soumalya Ghosh}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Attack Graph Generation with Infused Fuzzy Clustering}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {92--98}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/MisraOBBG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/NguyenKKBOB09, author = {Hanh Quyen Nguyen and Friedrich K{\"{o}}ster and Michael Klaas and Walter Brenner and Sebastian Obermeier and Markus Br{\"{a}}ndle}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Tool Support for Achieving Qualitative Security Assessments of Critical Infrastructures - The {ESSAF} Framework for Structured Qualitative Analysis}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {297--304}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Tue, 09 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/NguyenKKBOB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW09, author = {Vijayakrishnan Pasupathinathan and Josef Pieprzyk and Huaxiong Wang}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Certified Pseudonyms Colligated with Master Secret Key}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {190--197}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PasupathinathanPW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/PozoVGC09, author = {Sergio Pozo and Angel Jesus Varela{-}Vaca and Rafael M. Gasca and Rafael Ceballos}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Efficient Algorithms and Abstract Data Types for Local Inconsistency Isolation in Firewall ACLs}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {42--53}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Wed, 15 Jun 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/PozoVGC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RahmaniSK09, author = {Hamza Rahmani and Nabil Sahli and Farouk Kamoun}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Traffic Coherence Analysis Model for DDoS Attack Detection}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {148--154}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Mon, 18 Jun 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RahmaniSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Reistad09, author = {Tord Ingolf Reistad}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Multiparty Comparison - An Improved Multiparty Protocol for Comparison of Secret-shared Values}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {325--330}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Reistad09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RetamosaV09, author = {Germ{\'{a}}n Retamosa and Jorge E. L{\'{o}}pez de Vergara}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Assessment of Mobile Security Platforms}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {127--132}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RetamosaV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RibeiroR09, author = {Leonardo Ribeiro and Guerra Ruy}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Safe Reverse Auctions Protocol - Adding Treatment Against Collusive Shill Bidding and Sniping Attacks}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {239--244}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RibeiroR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/RomanovO09, author = {Anton Romanov and Eiji Okamoto}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Approach for Designing of Enterprise {IT} Landscapes to Perform Quantitave Information Security Risk Assessment}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {313--318}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/RomanovO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Saeb09, author = {Magdy Saeb}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {The Chameleon Cipher-192 {(CC-192)} - {A} Polymorphic Cipher}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {198--209}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Saeb09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SahaC09, author = {Mounita Saha and Dipanwita Roy Chowdhury}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Efficient Group Key Agreement Protocol for Heterogeneous Environment}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {182--189}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SahaC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Samarati09, author = {Pierangela Samarati}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Protecting Information Privacy in the Electronic Society}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {19--19}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Samarati09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Sato09, author = {Hideo Sato}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Finger Vein Verification Technology for Mobile Apparatus}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--41}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Sato09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SengaD09, author = {Wataru Senga and Hiroshi Doi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {On the Security of Adding Confirmers into Designated Confirmer Signatures}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {249--256}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SengaD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Sheikholeslam09, author = {S. Arash Sheikholeslam}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Chaos based Encryption Method using Dynamical Systems with Strange Attractors}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {259--265}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 25 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Sheikholeslam09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Shishkov09, author = {Blagovest Shishkov}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Adaptive Antennas in Wireless Communication Networks}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {5--17}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Shishkov09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SichaniM09, author = {Mohsen Hajsalehi Sichani and Ali Movaghar}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A New Analysis of {RC4} - {A} Data Mining Approach {(J48)}}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {213--218}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Wed, 12 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SichaniM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SilvaSA09, author = {Renan Fischer e Silva and Eduardo da Silva and Luiz Carlos Pessoa Albini}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Resisting Impersonation Attacks in Chaining-based Public-Key Management on Manets - The Virtual Public-key Management}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {155--158}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SilvaSA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SlamanigSS09, author = {Daniel Slamanig and Peter Schartner and Christian Stingl}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Practical Traceable Anonymous Identification}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {225--232}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SlamanigSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Torrano-GimenezPA09, author = {Carmen Torrano{-}Gimenez and Alejandro P{\'{e}}rez{-}Villegas and Gonzalo {\'{A}}lvarez}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Anomaly-based Web Application Firewall}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {23--28}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Fri, 03 Jun 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Torrano-GimenezPA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Tout09, author = {Hicham Tout}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Phishpin: An Integrated, Identity-based Anti-phishing Approach}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {369--374}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Tout09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VarshneyC09, author = {Mayank Varshney and Dipanwita Roy Chowdhury}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A New Image Encryption Algorithm using Cellular Automata}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {289--292}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VarshneyC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VerslypeD09, author = {Kristof Verslype and Bart De Decker}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Service and Timeframe Dependent Unlinkable One-time Pseudonyms}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {13--20}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VerslypeD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/VivekSR09, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {On the Security of Two Ring Signcryption Schemes}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {219--224}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/VivekSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Vossen09, author = {Gottfried Vossen}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Web 2.0: {A} Buzzword, a Serious Development, just Fun, or What?}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {33--40}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Vossen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/WiesauerS09, author = {Andreas Wiesauer and Johannes Sametinger}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Security Design Pattern Taxonomy based on Attack Patterns - Findings of a Systematic Literature Review}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {387--394}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/WiesauerS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YangMY09, author = {Peng Yang and Yuanchen Ma and Satoshi Yoshizawa}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Fast Re-estabilishment of IKEv2 Security Associations for Recovery of IPsec Gateways in Mobile Network}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {111--116}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YangMY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ZadicN09, author = {Mirad Zadic and Andrea Nowak}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Visual Programming Language for Security Requirements in Business Processes as Model-driven Software Development}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {29--36}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ZadicN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/secrypt/2009, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {{INSTICC} Press}, year = {2009}, isbn = {978-989-674-005-4}, timestamp = {Thu, 10 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlisCEG08, author = {Jorge Blasco Al{\'{\i}}s and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda Garnacho}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {CSteg: Talking in {C} Code - Steganography of {C} Source Code in Text}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {399--406}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:20:36 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlisCEG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AmberkerS08, author = {B. B. Amberker and N. R. Sunitha}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer with Multiple Original Signers}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {245--252}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AmberkerS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ApampaZWA08, author = {Kikelomo Maria Apampa and Tian Zhang and Gary B. Wills and David Argles}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Ensuring Privacy of Biometric Factors in Multi-Factor Authentication Systems}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {44--49}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ApampaZWA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ArenasAS08, author = {{\'{A}}lvaro Enrique Arenas and Benjamin Aziz and Gheorghe Cosmin Silaghi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Reputation Management in Grid-based Virtual Organisations}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {538--545}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ArenasAS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Atta-ur-RahmanHKS08, author = {Atta{-}ur{-}Rahman and Mureed Hussain and Kahina Kabri and Dominique Seret}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Kerberos Implementation in Manets}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {161--166}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Atta-ur-RahmanHKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BagheriSN08, author = {Nasour Bagheri and Babak Sadeghiyan and Majid Naderi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Multi-Collisions Attack in Ring Hash Structure}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {278--284}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 03 Dec 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/BagheriSN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenferhatS08, author = {Salem Benferhat and Karima Sedki}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Alert Correlation based on a Logical Handling of Administrator Preferences and Knowledge}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {50--56}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BenferhatS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenferhatT08, author = {Salem Benferhat and Karim Tabia}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Novel and Anomalous Behavior Detection using Bayesian Network Classifiers}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {13--20}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BenferhatT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BenferhatT08a, author = {Salem Benferhat and Karim Tabia}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {New Schemes for Anomaly Score Aggregation and Thresholding}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {21--28}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BenferhatT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BertoniBFR08, author = {Guido Marco Bertoni and Luca Breveglieri and Roberto Farina and Francesco Regazzoni}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A 640 Mbit/S 32-Bit Pipelined Implementation of the {AES} Algorithm}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {453--459}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BertoniBFR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/BoulaicheA08, author = {Ammar Boulaiche and Kamel Adi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Honeyd Detection Via Abnormal Behaviors Generated by the {ARPD} Daemon}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {65--71}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 17 Aug 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/BoulaicheA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CampoHP08, author = {Juan Vera del Campo and Juan Hern{\'{a}}ndez{-}Serrano and Josep Pegueroles}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{SCFS:} Towards Design and Implementation of a Secure Distributed Filesystem}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {169--176}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CampoHP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Carvalho08, author = {Nuno Borges Carvalho}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {The Importance of Metrology in Wireless Communication Systems - From {AM/FM} to {SDR} Systems}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {35--35}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Carvalho08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Chen08, author = {Hsiao{-}Hwa Chen}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Next Generation {CDMA} Technologies for Futuristic Wireless Communications}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Chen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ChewK08, author = {Guanhan Chew and Khoongming Khoo}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off Attacks on Stream Ciphers}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {300--305}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ChewK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/CoiO08, author = {Juri Luca De Coi and Daniel Olmedilla}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Review of Trust Management, Security and Privacy Policy Languages}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {483--490}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/CoiO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Cox08, author = {Ingemar J. Cox}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Watermarking, Steganography and Content Forensics}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {29--29}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Cox08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Diehl08, author = {Malte Diehl}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Geographic Data and Steganography - Using Google Earth and {KML} Files for High-Capacity Steganography}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {381--387}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Diehl08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/DionysiouBHF08, author = {Ioanna Dionysiou and David E. Bakken and Carl H. Hauser and Deborah A. Frincke}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Formalizing End-to-End Context-Aware Trust Relationships in Collaborative Activities}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {546--553}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/DionysiouBHF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/El-FotouhD08, author = {Mohamed Abo El{-}Fotouh and Klaus Diepold}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Fast Encryption Scheme for Networks Applications}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {119--127}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/El-FotouhD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/El-FotouhD08a, author = {Mohamed Abo El{-}Fotouh and Klaus Diepold}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {The Substitution Cipher Chaining Mode}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {421--429}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/El-FotouhD08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ElrakaibyCC08, author = {Yehia ElRakaiby and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Interactivity for Reactive Access Control}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {57--64}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Sat, 15 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ElrakaibyCC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GomathisankaranKT08, author = {Mahadevan Gomathisankaran and Ka{-}Ming Keung and Akhilesh Tyagi}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {{REBEL} - Reconfigurable Block Encryption Logic}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {312--318}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GomathisankaranKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GoodB08, author = {Tim Good and Mohammed Benaissa}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Price to Provide {RFID} Security and Privacy?}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {209--213}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GoodB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GroverSMK08, author = {Satyajit Grover and Divya Naidu Kolar Sunder and Samuel O. Moffatt and Michael E. Kounavis}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {411--420}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GroverSMK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/GuelzimO08, author = {Tarik Guelzim and Mohammad S. Obaidat}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Novel Neurocomputing-based Scheme to Authenticate {WLAN} Users Employing Distance Proximity Threshold}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {145--153}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/GuelzimO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HassanB08, author = {Mohamed N. Hassan and Mohammed Benaissa}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Low Area Scalable Montgomery Inversion Over GF(2m)}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {363--367}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HassanB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HerbosaDC08, author = {Ra{\'{u}}l Herbosa and Gabriel D{\'{\i}}az and Manuel Castro}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Securing the Email Services - New System for Secure Managing the Organization's Mail Service}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {469--472}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HerbosaDC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HidalgoCG08, author = {Sergio Pozo Hidalgo and Rafael Ceballos and Rafael Martinez Gasca}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis in Firewall Rule Sets}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {430--441}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HidalgoCG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HoumaniM08, author = {Hanane Houmani and Mohamed Mejri}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Ensuring the Correctness of Cryptographic Protocols with Respect to Secrecy}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {184--189}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HoumaniM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/HwangTC08, author = {Min{-}Shiang Hwang and Shiang{-}Feng Tzeng and Shu{-}Fen Chiou}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Improvement of Strong Proxy Signature and Its Applications}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {95--98}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/HwangTC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JensenK08, author = {Christian Damsgaard Jensen and Thomas Rune Korsgaard}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Dynamics of Trust Evolution - Auto-configuration of Dispositional Trust Dynamics}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {509--517}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JensenK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Jin08, author = {Hongxia Jin}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Traitor Tracing for Anonymous Attack in Content Protection}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {331--336}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Jin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/JoshiP08, author = {Shankar Joshi and Alwyn R. Pais}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {A New Probabilistic Rekeying Method for Secure Dynamic Groups}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {325--330}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/JoshiP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KilincY08, author = {Celalettin Kilinc and Ali G{\"{o}}khan Yavuz}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Applying {SRP} on {SIP} Authentication}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {227--231}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Mon, 02 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KilincY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KimN08, author = {Kwang Ho Kim and Christophe N{\`{e}}gre}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Point Multiplication on Supersingular Elliptic Curves Defined over Fields of Characteristic 2 and 3}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {373--376}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KimN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoTS08, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {FPGA-Targeted Hardware Implementations of {K2}}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {270--277}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.