Search - Security Engineering and Intelligence Informatics Access content directly

Filter your results

32 results
Deposit type : Fulltext
Image document

Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios

Francesco Flammini , Stefano Marrone , Nicola Mazzocca , Alfio Pappalardo , Concetta Pragliola , et al.
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.442-456
Conference papers hal-01506553v1
Image document

PPM: Privacy Policy Manager for Personalized Services

Shinsaku Kiyomoto , Toru Nakamura , Haruo Takasaki , Ryu Watanabe , Yutaka Miyake
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.377-392
Conference papers hal-01506558v1
Image document

Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine

Danilo Câmara , Conrado Gouvêa , Julio López , Ricardo Dahab
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.137-154
Conference papers hal-01506572v1
Image document

Optimal Parameters for XMSSMT

Andreas Hülsing , Lea Rausch , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.194-208
Conference papers hal-01506577v1
Image document

SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences

Chien-Ning Chen , Jheng-Hong Tu , Sung-Ming Yen
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.222-235
Conference papers hal-01506557v1
Image document

Code-Based Public-Key Encryption Resistant to Key Leakage

Edoardo Persichetti
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.44-54
Conference papers hal-01506563v1
Image document

How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function

Wolfgang Boehmer
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.288-304
Conference papers hal-01506570v1
Image document

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness

Arcangelo Castiglione , Ciriaco D’ambrosio , Alfredo De Santis , Francesco Palmieri
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.414-429
Conference papers hal-01506692v1
Image document

Intelligent UBMSS Systems for Strategic Information Management

Lidia Ogiela , Marek R. Ogiela
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.408-413
Conference papers hal-01506573v1
Image document

Solving the Discrete Logarithm Problem for Packing Candidate Preferences

James Heather , Chris Culnane , Steve Schneider , Sriramkrishnan Srinivasan , Zhe Xia
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.209-221
Conference papers hal-01506684v1
Image document

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions

Asato Kubai , Junji Shikata , Yohei Watanabe
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.16-28
Conference papers hal-01506569v1
Image document

Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace

Clara Maria Colombini , Antonio Colella , Marco Mattiucci , Aniello Castiglione
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.236-252
Conference papers hal-01506705v1
Image document

Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves

Christian Hanser , Christian Wagner
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.168-179
Conference papers hal-01506561v1
Image document

Code-Based Identification and Signature Schemes in Software

Sidi Mohamed El Yousfi Alaoui , Pierre-Louis Cayrel , Rachid El Bansarkhani , Gerhard Hoffmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.122-136
Conference papers hal-00864936v1
Image document

Cumulus4j: A Provably Secure Database Abstraction Layer

Matthias Huber , Matthias Gabel , Marco Schulze , Alexander Bieber
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.180-193
Conference papers hal-01506571v1
Image document

A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

Abdel Alim Kamal , Roger Zahno , Amr M. Youssef
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.75-90
Conference papers hal-01506556v1
Image document

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

Xuyun Nie , Albrecht Petzoldt , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers hal-01506559v1
Image document

An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks

Bo Liu , Baokang Zhao , Bo Liu , Chunqing Wu
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.393-407
Conference papers hal-01506576v1
Image document

VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment

Igor Kotenko , Evgenia Novikova
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.345-360
Conference papers hal-01506568v1
Image document

Analyzing the Internet Stability in Presence of Disasters

Francesco Palmieri , Ugo Fiore , Aniello Castiglione , Fang-Yie Leu , Alfredo De Santis
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.253-268
Conference papers hal-01506694v1
Image document

A Denial of Service Attack to GSM Networks via Attach Procedure

Nicola Gobbo , Alessio Merlo , Mauro Migliardi
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.361-376
Conference papers hal-01506555v1
Image document

Using Probabilistic Analysis for the Certification of Machine Control Systems

Atif Mashkoor , Osman Hasan , Wolfgang Beer
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.305-320
Conference papers hal-01506575v1
Image document

On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography

Kishan Chand Gupta , Indranil Ghosh Ray
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.29-43
Conference papers hal-01506562v1
Image document

Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms

Suliman A. Alsuhibany , Ahmad Alonaizi , Charles Morisset , Chris Smith , Aad Van Moorsel
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.321-336
Conference papers hal-01506554v1
Image document

Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid’5000 Project

Thomas Schaberreiter , Sébastien Varrette , Pascal Bouvry , Juha Röning , Djamel Khadraoui
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.269-287
Conference papers hal-01506574v1
Image document

On the Security of LBlock against the Cube Attack and Side Channel Cube Attack

Saad Islam , Mehreen Afzal , Adnan Rashdi
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.105-121
Conference papers hal-01506698v1
Image document

Computer Karate Trainer in Tasks of Personal and Homeland Security Defense

Tomasz Hachaj , Marek R. Ogiela
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.430-441
Conference papers hal-01506565v1
Image document

Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves

Gerwin Gsenger , Christian Hanser
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.155-167
Conference papers hal-01506564v1
Image document

A Multiple-Key Management Scheme in Wireless Sensor Networks

William Cheng-Chung Chu , Jung-Chun Liu , Yi-Li Huang , Fang-Yie Leu , Ilsun You , et al.
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.337-344
Conference papers hal-01506711v1
Image document

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock

Jiageng Chen , Atsuko Miyaji
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.1-15
Conference papers hal-01506560v1