IFIP TC6 Open Digital Library

CD-ARES Workshops 2013: Regensburg, Germany

Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings

Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu, Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu

Springer, Lecture Notes in Computer Science 8128, ISBN: 978-3-642-40587-7


Modern Cryptography

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock.

Jiageng Chen, Atsuko Miyaji


Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.

Asato Kubai, Junji Shikata, Yohei Watanabe


On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography.

Kishan Chand Gupta, Indranil Ghosh Ray


Code-Based Public-Key Encryption Resistant to Key Leakage.

Edoardo Persichetti


Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.

Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba


A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.

Abdel Alim Kamal, Roger Zahno, Amr M. Youssef


Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method.

Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann


On the Security of LBlock against the Cube Attack and Side Channel Cube Attack.

Saad Islam, Mehreen Afzal, Adnan Rashdi


Security Engineering

Code-Based Identification and Signature Schemes in Software.

Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel, Rachid El Bansarkhani, Gerhard Hoffmann


Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine.

Danilo F. Câmara, Conrado Porto Lopes Gouvêa, Julio López, Ricardo Dahab


Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves.

Gerwin Gsenger, Christian Hanser


Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves.

Christian Hanser, Christian Wagner


Cumulus4j: A Provably Secure Database Abstraction Layer.

Matthias Huber, Matthias Gabel, Marco Schulze, Alexander Bieber


Optimal Parameters for XMSS MT.

Andreas Hülsing, Lea Rausch, Johannes Buchmann


Solving the Discrete Logarithm Problem for Packing Candidate Preferences.

James Heather, Chris Culnane, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia


SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences.

Chien-Ning Chen, Jheng-Hong Tu, Sung-Ming Yen


Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace.

Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione


Analyzing the Internet Stability in Presence of Disasters.

Francesco Palmieri, Ugo Fiore, Aniello Castiglione, Fang-Yie Leu, Alfredo De Santis


Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project.

Thomas Schaberreiter, Sébastien Varrette, Pascal Bouvry, Juha Röning, Djamel Khadraoui


How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function.

Wolfgang Boehmer


Using Probabilistic Analysis for the Certification of Machine Control Systems.

Atif Mashkoor, Osman Hasan, Wolfgang Beer


Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.

Suliman A. Alsuhibany, Ahmad Alonaizi, Charles Morisset, Chris Smith, Aad P. A. van Moorsel


A Multiple-Key Management Scheme in Wireless Sensor Networks.

Jung-Chun Liu, Yi-Li Huang, Fang-Yie Leu, Ilsun You, Feng-Ching Chiang, Chao-Tung Yang, William Cheng-Chung Chu


VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment.

Igor Kotenko, Evgenia Novikova


A Denial of Service Attack to GSM Networks via Attach Procedure.

Nicola Gobbo, Alessio Merlo, Mauro Migliardi


PPM: Privacy Policy Manager for Personalized Services.

Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake


An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks.

Bo Liu, Baokang Zhao, Bo Liu, Chunqing Wu


Intelligent UBMSS Systems for Strategic Information Management.

Lidia Ogiela, Marek R. Ogiela


Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.

Arcangelo Castiglione, Ciriaco D'Ambrosio, Alfredo De Santis, Francesco Palmieri


Computer Karate Trainer in Tasks of Personal and Homeland Security Defense.

Tomasz Hachaj, Marek R. Ogiela


Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios.

Francesco Flammini, Stefano Marrone, Nicola Mazzocca, Alfio Pappalardo, Concetta Pragliola, Valeria Vittorini


A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process.

Vaise Patu, Shuichiro Yamamoto