default search action
15. ISC 2012: Passau, Germany
- Dieter Gollmann, Felix C. Freiling:
Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings. Lecture Notes in Computer Science 7483, Springer 2012, ISBN 978-3-642-33382-8
Invited Paper
- Manas A. Pathak, José Portelo, Bhiksha Raj, Isabel Trancoso:
Privacy-Preserving Speaker Authentication. 1-22
Cryptography and Cryptanalysis
- Florian Mendel, Tomislav Nad, Stefan Scherz, Martin Schläffer:
Differential Attacks on Reduced RIPEMD-160. 23-38 - Bogdan Groza, Bogdan Warinschi:
Revisiting Difficulty Notions for Client Puzzles and DoS Resilience. 39-54 - Noboru Kunihiro:
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. 55-69
Mobility
- Sanna Suoranta, André Andrade, Tuomas Aura:
Strong Authentication with Mobile Phone. 70-85 - Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot:
Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? 86-103
Cards and Sensors
- Jens Bender, Özgür Dagdelen, Marc Fischlin, Dennis Kügler:
Domain-Specific Pseudonymous Signatures for the German Identity Card. 104-119 - Falko Strenzke:
Solutions for the Storage Problem of McEliece Public and Private Keys on Memory-Constrained Platforms. 120-135 - Samiran Bag, Aritra Dhar, Pinaki Sarkar:
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks. 136-150
Software Security
- Lei Zhao, Debin Gao, Lina Wang:
Learning Fine-Grained Structured Input for Memory Corruption Detection. 151-167 - Sami Alsouri, Jan Sinschek, Andreas Sewe, Eric Bodden, Mira Mezini, Stefan Katzenbeisser:
Dynamic Anomaly Detection for More Trustworthy Outsourced Computation. 168-187 - Jiangang Wang, Xiaohong Li, Xuhui Liu, Xinshu Dong, Junjie Wang, Zhenkai Liang, Zhiyong Feng:
An Empirical Study of Dangerous Behaviors in Firefox Extensions. 188-203
Processing Encrypted Data
- Michael Clear, Karl Reid, Desmond Ennis, Arthur Hughes, Hitesh Tewari:
Collaboration-Preserving Authenticated Encryption for Operational Transformation Systems. 204-223 - Christoph Bösch, Qiang Tang, Pieter H. Hartel, Willem Jonker:
Selective Document Retrieval from Encrypted Database. 224-241 - Andreas Peter, Max Kronberg, Wilke Trei, Stefan Katzenbeisser:
Additively Homomorphic Encryption with a Double Decryption Mechanism, Revisited. 242-257
Authentication and Identification
- Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Secure Hierarchical Identity-Based Identification without Random Oracles. 258-273 - Essam Ghadafi, Nigel P. Smart:
Efficient Two-Move Blind Signatures in the Common Reference String Model. 274-289
New Directions in Access Control
- Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. 290-305 - Peter Drábik, Fabio Martinelli, Charles Morisset:
A Quantitative Approach for Inexact Enforcement of Security Policies. 306-321 - Nezar Nassr, Nidal Aboudagga, Eric Steegmans:
OSDM: An Organizational Supervised Delegation Model for RBAC. 322-337
GPU for Security
- Johannes Gilger, Johannes Barnickel, Ulrike Meyer:
GPU-Acceleration of Block Ciphers in the OpenSSL Cryptographic Library. 338-353 - Ciprian-Petrisor Pungila, Viorel Negru:
A Highly-Efficient Memory-Compression Approach for GPU-Accelerated Virus Signature Matching. 354-369
Models for Risk and Revocation
- Lisa Rajbhandari, Einar Snekkenes:
Intended Actions: Risk Is Conflicting Incentives. 370-386 - Carlos Gañán, Jorge Mata-Díaz, Jose L. Muñoz, Oscar Esparza, Juanjo Alins:
On the Self-similarity Nature of the Revocation Data. 387-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.