CD-ARES Workshops 2013: Regensburg, Germany
Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu, Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu
Springer, Lecture Notes in Computer Science 8128, ISBN: 978-3-642-40587-7
Contents
Modern Cryptography
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
Asato Kubai, Junji Shikata, Yohei Watanabe
16-28
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography.
Kishan Chand Gupta, Indranil Ghosh Ray
29-43
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
55-74
Abdel Alim Kamal, Roger Zahno, Amr M. Youssef
75-90
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method.
Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann
91-104
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack.
Saad Islam, Mehreen Afzal, Adnan Rashdi
105-121
Security Engineering
Code-Based Identification and Signature Schemes in Software.
Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann
122-136
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine.
Danilo F. Câmara, Conrado Porto Lopes Gouvêa, Julio López, Ricardo Dahab
137-154
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves.
Gerwin Gsenger, Christian Hanser
155-167
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves.
Christian Hanser, Christian Wagner
168-179
Cumulus4j: A Provably Secure Database Abstraction Layer.
Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber
180-193
Solving the Discrete Logarithm Problem for Packing Candidate Preferences.
James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia
209-221
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences.
Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen
222-235
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace.
Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione
236-252
Analyzing the Internet Stability in Presence of Disasters.
Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis
253-268
Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui
269-287
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function.
Wolfgang Boehmer
288-304
Using Probabilistic Analysis for the Certification of Machine Control Systems.
Atif Mashkoor, Osman Hasan, Wolfgang Beer
305-320
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.
Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel
321-336
A Multiple-Key Management Scheme in Wireless Sensor Networks.
Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu
337-344
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment.
Igor Kotenko, Evgenia Novikova
345-360
A Denial of Service Attack to GSM Networks via Attach Procedure.
Nicola Gobbo, Alessio Merlo, Mauro Migliardi
361-376
PPM: Privacy Policy Manager for Personalized Services.
Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake
377-392
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks.
Bo Liu, Baokang Zhao, Bo Liu, Chunqing Wu
393-407
Intelligent UBMSS Systems for Strategic Information Management.
Lidia Ogiela, Marek R. Ogiela
408-413
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.
Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Francesco Palmieri
414-429
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense.
Tomasz Hachaj, Marek R. Ogiela
430-441
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios.
Francesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini
442-456
Vaise Patu, Shuichiro Yamamoto
457-464