default search action
9th ACNS 2011: Nerja, Spain
- Javier López, Gene Tsudik:
Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Lecture Notes in Computer Science 6715, 2011, ISBN 978-3-642-21553-7
Malware and Intrusion Detection
- Yipeng Wang, Zhibin Zhang, Danfeng (Daphne) Yao, Buyun Qu, Li Guo:
Inferring Protocol State Machine from Network Traces: A Probabilistic Approach. 1-18 - Ashwin Chaugule, Zhi Xu, Sencun Zhu:
A Specification Based Intrusion Detection Framework for Mobile Phones. 19-37 - Mansoor Alicherry, Angelos D. Keromytis:
Misuse Detection in Consent-Based Networks. 38-56
Attacks I
- Martin R. Albrecht, Carlos Cid:
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. 57-72 - Werner Schindler, Kouichi Itoh:
Exponent Blinding Does Not Always Lift (Partial) Spa Resistance to Higher-Level Security. 73-90 - Alex Biryukov, Ilya Kizhvatov, Bin Zhang:
Cryptanalysis of the Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. 91-109 - Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux:
Cache Timing Analysis of RC4. 110-129
Applied Crypto I
- Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:
Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. 130-146 - Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. 147-165
Signatures and Friends
- Henrich Christopher Pöhls, Kai Samelin, Joachim Posegga:
Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency. 166-182 - Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo:
Double-Trapdoor Anonymous Tags for Traceable Signatures. 183-200 - Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao:
Hierarchical Identity-Based Chameleon Hash and Its Applications. 201-219
Eclectic Assortment
- Daiki Chiba, Takahiro Matsuda, Jacob C. N. Schuldt, Kanta Matsuura:
Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting. 220-237 - Patrick Butler, Kui Xu, Danfeng (Daphne) Yao:
Quantitatively Analyzing Stealthy Communication Channels. 238-254 - Dario Catalano, Mario Di Raimondo, Dario Fiore, Rosario Gennaro, Orazio Puglisi:
Fully Non-interactive Onion Routing with Forward-Secrecy. 255-273
Theory
- Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Generic Fully Simulatable Adaptive Oblivious Transfer. 274-291 - Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. 292-308 - Marc Fischlin, Cristina Onete:
Relaxed Security Notions for Signatures of Knowledge. 309-326
Encryption
- Wenling Wu, Lei Zhang:
LBlock: A Lightweight Block Cipher. 327-344 - Cihangir Tezcan, Serge Vaudenay:
On Hiding a Plaintext Length by Preencryption. 345-358
Broadcast Encryption
- Paolo D'Arco, Angel L. Pérez del Pozo:
Fighting Pirates 2.0. 359-376 - Duong Hieu Phan, David Pointcheval, Mario Strefler:
Security Notions for Broadcast Encryption. 377-394
Security Services
- Kari Kostiainen, N. Asokan, Alexandra Afanasyeva:
Towards User-Friendly Credential Transfer on Open Credential Platforms. 395-412 - Jacob C. N. Schuldt, Goichiro Hanaoka:
Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks. 413-430 - Ran Canetti, Suresh Chari, Shai Halevi, Birgit Pfitzmann, Arnab Roy, Michael Steiner, Wietse Z. Venema:
Composable Security Analysis of OS Services. 431-448
Attacks II
- Stefan Kölbl, Florian Mendel:
Practical Attacks on the Maelstrom-0 Compression Function. 449-461 - Tomer Ashur, Orr Dunkelman:
Linear Analysis of Reduced-Round CubeHash. 462-478 - Rishiraj Bhattacharyya, Avradip Mandal:
On the Indifferentiability of Fugue and Luffa. 479-497 - Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto:
Analysis of Message Injection in Stream Cipher-Based Hash Functions. 498-513
Applied Crypto II
- Keith B. Frikken, Hao Yuan, Mikhail J. Atallah:
Secure Authenticated Comparisons. 514-531 - Luan Ibraimi, Svetla Nikova, Pieter H. Hartel, Willem Jonker:
Public-Key Encryption with Delegated Search. 532-549
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.