default search action
16. ISC 2013: Dallas, Texas, USA
- Yvo Desmedt:
Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 7807, Springer 2015, ISBN 978-3-319-27658-8 - Irfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev:
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection. 3-19 - Steffen Wagner, Christoph Krauß, Claudia Eckert:
Lightweight Attestation and Secure Code Update for Multiple Separated Microkernel Tasks. 20-36 - Teng Guo, Feng Liu, Chuan Kun Wu, YoungChang Hou, YaWei Ren, Wen Wang:
The Security Defect of a Multi-pixel Encoding Method. 39-48 - Stephen R. Tate, Roopa Vishwanathan, Scott Weeks:
Encrypted Secret Sharing and Analysis by Plaintext Randomization. 49-65 - Tadanori Teruya, Jun Sakuma:
Round-Efficient Private Stable Matching from Additive Homomorphic Encryption. 69-86 - Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai:
Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption. 87-99 - Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length. 100-109 - Marián Kühnel, Ulrike Meyer:
4GMOP: Mopping Malware Initiated SMS Traffic in Mobile Networks. 113-129 - Byungho Min, Vijay Varadharajan:
Design and Analysis of a Sophisticated Malware Attack Against Smart Grid. 130-139 - Cristina Alcaraz, Estefanía Etchevés Miciolino, Stephen D. Wolthusen:
Multi-round Attacks on Structural Controllability Properties for Non-complete Random Graphs. 140-151 - Dongxia Bai, Hongbo Yu:
Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA. 155-168 - Lin Jiao, Bin Zhang, Mingsheng Wang:
Establishing Equations: The Complexity of Algebraic and Fast Algebraic Attacks Revisited. 169-184 - Routo Terada, Reynaldo Cáceres Villena:
Factoring a Multiprime Modulus N with Random Bits. 185-196 - Roberto Avanzi, Billy Bob Brumley:
Faster 128-EEA3 and 128-EIA3 Software. 199-208 - Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan Arturo Nolazco-Flores:
Merging the Camellia, SMS4 and AES S-Boxes in a Single S-Box with Composite Bases. 209-217 - Ding Wang, Ping Wang:
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards. 221-237 - Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou:
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices. 238-247 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Practical and Provably Secure Distance-Bounding. 248-258 - Niharika Sachdeva, Nitesh Saxena, Ponnurangam Kumaraguru:
On the Viability of CAPTCHAs for use in Telephony Systems: A Usability Field Study. 261-279 - Vaibhav Garg, L. Jean Camp:
Cars, Condoms, and Facebook. 280-289 - Yanjiang Yang, Xuhua Ding, Haibing Lu, Zhiguo Wan, Jianying Zhou:
Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data. 293-308 - Xing Jin, Lusha Wang, Tongbo Luo, Wenliang Du:
Fine-Grained Access Control for HTML5-Based Mobile Applications in Android. 309-318 - Christoph Kerschbaumer, Eric Hennigan, Per Larsen, Stefan Brunthaler, Michael Franz:
CrowdFlow: Efficient Information Flow Security. 321-337 - Sarker T. Ahmed Rumee, Donggang Liu:
DroidTest: Testing Android Applications for Leakage of Private Information. 341-353 - Ping Chen, Nick Nikiforakis, Christophe Huygens, Lieven Desmet:
A Dangerous Mix: Large-Scale Analysis of Mixed-Content Websites. 354-363 - Naoto Yanai, Masahiro Mambo, Eiji Okamoto:
An Ordered Multisignature Scheme Under the CDH Assumption Without Random Oracles. 367-377 - Mohsen Alimomeni, Reihaneh Safavi-Naini:
Human Assisted Randomness Generation Using Video Games. 378-390 - Antoine Joux, Antoine Rojat:
Security Ranking Among Assumptions Within the Uber Assumption Framework. 391-406 - Matheus F. de Oliveira, Marco Aurélio Amaral Henriques:
A Secure and Efficient Method for Scalar Multiplication on Supersingular Elliptic Curves over Binary Fields. 407-416
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.