index - Security Engineering and Intelligence Informatics
   


Full Text Documents

32

Search


Table of Contents
2nd International Workshop on Modern Cryptography and Security Engineering (MoCrySEn 2013)
Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, LidaXu (Eds.)
Front Matter

Modern Cryptography



Symmetric-Key Cryptography


Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock
Jiageng Chen, Atsuko Miyaji
1-15
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions
Asato Kubai, Junji Shikata, Yohei Watanabe
16-28
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography
Kishan Gupta, Indranil Ray
29-43

Public-Key Cryptography


Code-Based Public-Key Encryption Resistant to Key Leakage
Edoardo Persichetti
44-54
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
55-74

Algorithmic Cryptanalysis


A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images
Abdel Kamal, Roger Zahno, Amr Youssef
75-90
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method
Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann
91-104
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack
Saad Islam, Mehreen Afzal, Adnan Rashdi
105-121

Security Engineering



Software and Hardware Implementation of Cryptographic Algorithms


Code-Based Identification and Signature Schemes in Software
Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, and Gerhard Hoffmann
122-136
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine
Danilo Câmara, Conrado Gouvêa, Julio López, Ricardo Dahab
137-154
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves
Gerwin Gsenger, Christian Hanser
155-167
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves
Christian Hanser, Christian Wagner
168-179

Database Encryption


Cumulus4j: A Provably Secure Database Abstraction Layer
Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber
180-193

Interaction between Cryptographic Theory and Implementation Issues


Optimal Parameters for XMSSMT
Andreas Hülsing, Lea Rausch, Johannes Buchmann
194-208
Solving the Discrete Logarithm Problem for Packing Candidate Preferences
James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia
209-221
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences
Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen
222-235

3rd International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2013)



Cyber Security and Dependability


Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace
Clara Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione
236-252
Analyzing the Internet Stability in Presence of Disasters
Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo Santis
253-268
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project
Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui
269-287
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function
Wolfgang Boehmer
288-304
Using Probabilistic Analysis for the Certification of Machine Control Systems
Atif Mashkoor, Osman Hasan, Wolfgang Beer
305-320
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms
Suliman Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad Moorsel
321-336

Network Security and Privacy


A Multiple-Key Management Scheme in Wireless Sensor Networks
William Chu, Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang
337-344
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment
Igor Kotenko, Evgenia Novikova
345-360
A Denial of Service Attack to GSM Networks via Attach Procedure
Nicola Gobbo, Alessio Merlo, Mauro Migliardi
361-376
PPM: Privacy Policy Manager for Personalized Services
Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake
377-392
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks
Bo Liu, Baokang Zhao, Bo Liu, Chunqing Wu
393-407

Multimedia Technology for Homeland Defense


Intelligent UBMSS Systems for Strategic Information Management
Lidia Ogiela, Marek Ogiela
408-413
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness
Arcangelo Castiglione, Ciriaco D’ambrosio, Alfredo Santis, Francesco Palmieri
414-429
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense
Tomasz Hachaj, Marek Ogiela
430-441
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios
Francesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini
442-456
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process
Vaise Patu, Shuichiro Yamamoto
457-464

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/