Search dblp for Publications

export results for "secrypt"

 download as .bib file

@proceedings{DBLP:conf/icete/2019-2,
  editor    = {Mohammad S. Obaidat and
               Pierangela Samarati},
  title     = {Proceedings of the 16th International Joint Conference on e-Business
               and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
               Czech Republic, July 26-28, 2019},
  publisher = {SciTePress},
  year      = {2019}
}
@proceedings{DBLP:conf/icete/2018-2,
  editor    = {Pierangela Samarati and
               Mohammad S. Obaidat},
  title     = {Proceedings of the 15th International Joint Conference on e-Business
               and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
               July 26-28, 2018},
  publisher = {SciTePress},
  year      = {2018}
}
@inproceedings{DBLP:conf/secrypt/0001HAW17,
  author    = {Manuel Huber and
               Julian Horsch and
               Junaid Ali and
               Sascha Wessel},
  title     = {Freeze {\&}amp; Crypt: Linux Kernel Support for Main Memory Encryption},
  booktitle = {{SECRYPT}},
  pages     = {17--30},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/AlibertiPG17,
  author    = {Giulio Aliberti and
               Roberto Di Pietro and
               Stefano Guarino},
  title     = {{SLAP:} Secure Lightweight Authentication Protocol for Resource-constrained
               Devices},
  booktitle = {{SECRYPT}},
  pages     = {163--174},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/AmaranteB17,
  author    = {Jo{\~{a}}o Amarante and
               Jo{\~{a}}o Paulo Barros},
  title     = {Exploring {USB} Connection Vulnerabilities on Android Devices - Breaches
               using the Android Debug Bridge},
  booktitle = {{SECRYPT}},
  pages     = {572--577},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/Amthor17,
  author    = {Peter Amthor},
  title     = {Efficient Heuristic Safety Analysis of Core-based Security Policies},
  booktitle = {{SECRYPT}},
  pages     = {384--392},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/AonzoLM17,
  author    = {Simone Aonzo and
               Giovanni Lagorio and
               Alessio Merlo},
  title     = {RmPerm: {A} Tool for Android Permissions Removal},
  booktitle = {{SECRYPT}},
  pages     = {319--326},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/AtzeniMMS17,
  author    = {Andrea S. Atzeni and
               Andrea Marcelli and
               Francesco Muroni and
               Giovanni Squillero},
  title     = {{HAIT:} Heap Analyzer with Input Tracing},
  booktitle = {{SECRYPT}},
  pages     = {327--334},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/AxonG17,
  author    = {Louise Axon and
               Michael Goldsmith},
  title     = {{PB-PKI:} {A} Privacy-aware Blockchain-based {PKI}},
  booktitle = {{SECRYPT}},
  pages     = {311--318},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/BakiriCG17,
  author    = {Mohammed Bakiri and
               Jean{-}Fran{\c{c}}ois Couchot and
               Christophe Guyeux},
  title     = {One Random Jump and One Permutation: Sufficient Conditions to Chaotic,
               Statistically Faultless, and Large Throughput {PRNG} for {FPGA}},
  booktitle = {{SECRYPT}},
  pages     = {295--302},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/BarradasBD0R17,
  author    = {Diogo Barradas and
               Tiago Brito and
               David Duarte and
               Nuno Santos and
               Lu{\'{\i}}s Rodrigues},
  title     = {Forensic Analysis of Communication Records of Web-based Messaging
               Applications from Physical Memory},
  booktitle = {{SECRYPT}},
  pages     = {43--54},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/BecerraIOS17,
  author    = {Jos{\'{e}} Becerra and
               Vincenzo Iovino and
               Dimiter Ostrev and
               Marjan Skrobot},
  title     = {On the Relation Between {SIM} and IND-RoR Security Models for PAKEs},
  booktitle = {{SECRYPT}},
  pages     = {151--162},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/BelguithKLJA17,
  author    = {Sana Belguith and
               Nesrine Kaaniche and
               Maryline Laurent and
               Abderrazak Jemai and
               Rabah Attia},
  title     = {Constant-size Threshold Attribute based SignCryption for Cloud Applications},
  booktitle = {{SECRYPT}},
  pages     = {212--225},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/BernackiKS17,
  author    = {Jaroslaw Bernacki and
               Marek Klonowski and
               Piotr Syga},
  title     = {Some Remarks about Tracing Digital Cameras - Faster Method and Usable
               Countermeasure},
  booktitle = {{SECRYPT}},
  pages     = {343--350},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/Berrima0GR17,
  author    = {Mouhebeddine Berrima and
               Pascal Lafourcade and
               Matthieu Giraud and
               Narjes Ben Rajeb},
  title     = {Formal Analyze of a Private Access Control Protocol to a Cloud Storage},
  booktitle = {{SECRYPT}},
  pages     = {495--500},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/BouazzouniCPB17,
  author    = {Mohamed Amine Bouazzouni and
               Emmanuel Conchon and
               Fabrice Peyrard and
               Pierre{-}Fran{\c{c}}ois Bonnefoi},
  title     = {A Card-less TEE-based Solution for Trusted Access Control},
  booktitle = {{SECRYPT}},
  pages     = {456--461},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/BozaM17,
  author    = {Miguel Hern{\'{a}}ndez Boza and
               Alfonso Mu{\~{n}}oz},
  title     = {(In) Security in Graph Databases - Analysis and Data Leaks},
  booktitle = {{SECRYPT}},
  pages     = {303--310},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/BreuerBP017,
  author    = {Peter T. Breuer and
               Jonathan P. Bowen and
               Esther Palomar and
               Zhiming Liu},
  title     = {On Obfuscating Compilation for Encrypted Computing},
  booktitle = {{SECRYPT}},
  pages     = {247--254},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/CampoCSDC17,
  author    = {David Ortega del Campo and
               Cristina Conde and
               {\'{A}}ngel Serrano and
               Isaac Mart{\'{\i}}n de Diego and
               Enrique Cabello},
  title     = {Face Recognition-based Presentation Attack Detection in a Two-step
               Segregated Automated Border Control e-Gate - Results of a Pilot Experience
               at Adolfo Su{\'{a}}rez Madrid-Barajas Airport},
  booktitle = {{SECRYPT}},
  pages     = {129--138},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/CanforaCCMMRV17,
  author    = {Gerardo Canfora and
               Giovanni Cappabianca and
               Pasquale Carangelo and
               Fabio Martinelli and
               Francesco Mercaldo and
               Ernesto Rosario Russo and
               Corrado Aaron Visaggio},
  title     = {Mobile Silent and Continuous Authentication using Apps Sequence},
  booktitle = {{SECRYPT}},
  pages     = {79--91},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/CanforaPV17,
  author    = {Gerardo Canfora and
               Antonio Pirozzi and
               Aaron Visaggio},
  title     = {s2ipt: {A} Lightweight Network Intrusion Detection/Prevention System
               based on IPtables},
  booktitle = {{SECRYPT}},
  pages     = {462--467},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/DiazAR17,
  author    = {Jesus Diaz and
               David Arroyo and
               Francisco B. Rodr{\'{\i}}guez},
  title     = {Fair and Accountable Anonymity for the Tor Network},
  booktitle = {{SECRYPT}},
  pages     = {560--565},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/DreierPP0R17,
  author    = {Jannik Dreier and
               Maxime Puys and
               Marie{-}Laure Potet and
               Pascal Lafourcade and
               Jean{-}Louis Roch},
  title     = {Formally Verifying Flow Properties in Industrial Systems},
  booktitle = {{SECRYPT}},
  pages     = {55--66},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/Dumas0MOT17,
  author    = {Jean{-}Guillaume Dumas and
               Pascal Lafourcade and
               Francis Melemedjian and
               Jean{-}Baptiste Orfila and
               Pascal Thoniel},
  title     = {{LOCALPKI:} {A} User-Centric Formally Proven Alternative to {PKIX}},
  booktitle = {{SECRYPT}},
  pages     = {187--199},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/DwivediKMNPW17,
  author    = {Ashutosh Dhar Dwivedi and
               Milos Kloucek and
               Pawel Morawiecki and
               Ivica Nikolic and
               Josef Pieprzyk and
               Sebastian W{\'{o}}jtowicz},
  title     = {SAT-based Cryptanalysis of Authenticated Ciphers from the {CAESAR}
               Competition},
  booktitle = {{SECRYPT}},
  pages     = {237--246},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/DwivediMW17,
  author    = {Ashutosh Dhar Dwivedi and
               Pawel Morawiecki and
               Sebastian W{\'{o}}jtowicz},
  title     = {Differential and Rotational Cryptanalysis of Round-reduced {MORUS}},
  booktitle = {{SECRYPT}},
  pages     = {275--284},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/DwivediMW17a,
  author    = {Ashutosh Dhar Dwivedi and
               Pawel Morawiecki and
               Sebastian W{\'{o}}jtowicz},
  title     = {Differential-linear and Impossible Differential Cryptanalysis of Round-reduced
               Scream},
  booktitle = {{SECRYPT}},
  pages     = {501--506},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/DzurendaHMR17,
  author    = {Petr Dzurenda and
               Jan Hajny and
               Lukas Malina and
               Sara Ricci},
  title     = {Anonymous Credentials with Practical Revocation using Elliptic Curves},
  booktitle = {{SECRYPT}},
  pages     = {534--539},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/FanM17,
  author    = {Guyu Fan and
               Manoranjan Mohanty},
  title     = {Privacy-preserving Disease Susceptibility Test with Shamir's Secret
               Sharing},
  booktitle = {{SECRYPT}},
  pages     = {525--533},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/FeronLL17,
  author    = {Cyrielle Feron and
               Vianney Lapotre and
               Lo{\"{\i}}c Lagadec},
  title     = {PAnTHErS: {A} Prototyping and Analysis Tool for Homomorphic Encryption
               Schemes},
  booktitle = {{SECRYPT}},
  pages     = {359--366},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/GarciaMGRVJ17,
  author    = {Alberto Garc{\'{\i}}a and
               Alberto Garcia Moro and
               Jos{\'{e}} Javier Garc{\'{\i}}a and
               Jorge Roncero and
               V{\'{\i}}ctor A. Villagr{\'{a}} and
               Helena Jalain},
  title     = {Context-based Encryption Applied to Data Leakage Prevention Solutions},
  booktitle = {{SECRYPT}},
  pages     = {566--571},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/GiraudAB017,
  author    = {Matthieu Giraud and
               Alexandre Anzala{-}Yamajako and
               Olivier Bernard and
               Pascal Lafourcade},
  title     = {Practical Passive Leakage-abuse Attacks Against Symmetric Searchable
               Encryption},
  booktitle = {{SECRYPT}},
  pages     = {200--211},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/GiustolisiIL17,
  author    = {Rosario Giustolisi and
               Vincenzo Iovino and
               Gabriele Lenzini},
  title     = {Privacy-Preserving Verifiability - {A} Case for an Electronic Exam
               Protocol},
  booktitle = {{SECRYPT}},
  pages     = {139--150},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/HadjABKE17,
  author    = {Maryem Ait El Hadj and
               Meryeme Ayache and
               Yahya Benkaouz and
               Ahmed Khoumsi and
               Mohammed Erradi},
  title     = {Clustering-based Approach for Anomaly Detection in {XACML} Policies},
  booktitle = {{SECRYPT}},
  pages     = {548--553},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/HamdiGBY17,
  author    = {Sana Hamdi and
               Alda Lopes Gan{\c{c}}arski and
               Amel Bouzeghoub and
               Sadok Ben Yahia},
  title     = {Reputation Management in Online Social Networks - {A} New Clustering-based
               Approach},
  booktitle = {{SECRYPT}},
  pages     = {468--473},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/HarbJ17,
  author    = {Salah Harb and
               Moath Jarrah},
  title     = {Accelerating Square Root Computations Over Large {GF} (2m)},
  booktitle = {{SECRYPT}},
  pages     = {229--236},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/HarvanLMP17,
  author    = {Mat{\'{u}}s Harvan and
               Thomas Locher and
               Marta Mularczyk and
               Yvonne Anne Pignolet},
  title     = {Privacy-preserving Regression on Partially Encrypted Data},
  booktitle = {{SECRYPT}},
  pages     = {255--266},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/HoweO17,
  author    = {James Howe and
               M{\'{a}}ire O'Neill},
  title     = {{GLITCH:} {A} Discrete Gaussian Testing Suite for Lattice-based Cryptography},
  booktitle = {{SECRYPT}},
  pages     = {413--419},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/ImYJ17,
  author    = {Jonghwan Im and
               Jongwon Yoon and
               Minsik Jin},
  title     = {Interaction Platform for Improving Detection Capability of Dynamic
               Application Security Testing},
  booktitle = {{SECRYPT}},
  pages     = {474--479},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/JaschkeGAS17,
  author    = {Angela J{\"{a}}schke and
               Bj{\"{o}}rn Grohmann and
               Frederik Armknecht and
               Andreas Schaad},
  title     = {Short Paper: Industrial Feasibility of Private Information Retrieval},
  booktitle = {{SECRYPT}},
  pages     = {395--400},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/JauvartFG17,
  author    = {Damien Jauvart and
               Jacques J. A. Fournier and
               Louis Goubin},
  title     = {First Practical Side-channel Attack to Defeat Point Randomization
               in Secure Implementations of Pairing-based Cryptography},
  booktitle = {{SECRYPT}},
  pages     = {104--115},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/JolfaeiK17,
  author    = {Alireza Jolfaei and
               Krishna Kant},
  title     = {A Lightweight Integrity Protection Scheme for Fast Communications
               in Smart Grid},
  booktitle = {{SECRYPT}},
  pages     = {31--42},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/KaanicheL17,
  author    = {Nesrine Kaaniche and
               Maryline Laurent},
  title     = {Attribute based Encryption for Multi-level Access Control Policies},
  booktitle = {{SECRYPT}},
  pages     = {67--78},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/KushwahaM17,
  author    = {Prabhat Kushwaha and
               Ayan Mahalanobis},
  title     = {A Probabilistic Baby-step Giant-step Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {401--406},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/LaskarB17,
  author    = {Bekkar Laskar and
               Merouane Bouzid},
  title     = {Vector Quantization based Steganography for Secure Speech Communication
               System},
  booktitle = {{SECRYPT}},
  pages     = {407--412},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/MekkiHAK17,
  author    = {Neila Mekki and
               Mohamed Hamdi and
               Taoufik Aguili and
               Tai{-}Hoon Kim},
  title     = {Scenario-based Vulnerability Analysis in IoT-based Patient Monitoring
               System},
  booktitle = {{SECRYPT}},
  pages     = {554--559},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/MenezesW17,
  author    = {Luis Menezes and
               Roland Wism{\"{u}}ller},
  title     = {FlowSlicer - {A} Hybrid Approach to Detect and Avoid Sensitive Information
               Leaks in Android Applications using Program Slicing and Instrumentation},
  booktitle = {{SECRYPT}},
  pages     = {450--455},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/MjolsnesO17,
  author    = {Stig Fr. Mj{\o}lsnes and
               Ruxandra F. Olimid},
  title     = {Experimental Assessment of Private Information Disclosure in {LTE}
               Mobile Networks},
  booktitle = {{SECRYPT}},
  pages     = {507--512},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/MosharrafJR17,
  author    = {Negar Mosharraf and
               Anura P. Jayasumana and
               Indrakshi Ray},
  title     = {Using a History-based Profile to Detect and Respond to DDoS Attacks},
  booktitle = {{SECRYPT}},
  pages     = {175--186},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/PareekP17,
  author    = {Gaurav Pareek and
               B. R. Purushothama},
  title     = {On Efficient Access Control Mechanisms in Hierarchy using Unidirectional
               and Transitive Proxy Re-encryption Schemes},
  booktitle = {{SECRYPT}},
  pages     = {519--524},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/PatilS17,
  author    = {Vishwas T. Patil and
               R. K. Shyamasundar},
  title     = {Privacy as a Currency: Un-regulated?},
  booktitle = {{SECRYPT}},
  pages     = {586--595},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/PrestridgeD17,
  author    = {Shawn Prestridge and
               James Dunham},
  title     = {Improving Throughput in {BB84} Quantum Key Distribution},
  booktitle = {{SECRYPT}},
  pages     = {437--443},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/PrunsterRR17,
  author    = {Bernd Pr{\"{u}}nster and
               Florian Reimair and
               Andreas Reiter},
  title     = {The Net Rat - Rethinking Connected Services for Increased Security},
  booktitle = {{SECRYPT}},
  pages     = {375--383},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/RegateiroPA17,
  author    = {Diogo Domingues Regateiro and
               {\'{O}}scar Mort{\'{a}}gua Pereira and
               Rui L. Aguiar},
  title     = {On the Application of Fuzzy Set Theory for Access Control Enforcement},
  booktitle = {{SECRYPT}},
  pages     = {540--547},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/ReimairFZKZ17,
  author    = {Florian Reimair and
               Johannes Feichtner and
               Dominik Ziegler and
               Sandra Kreuzhuber and
               Thomas Zefferer},
  title     = {Cryptographic Service Providers in Current Device Landscapes: An Inconvenient
               Truth},
  booktitle = {{SECRYPT}},
  pages     = {367--374},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/RubioARL17,
  author    = {Juan Enrique Rubio and
               Cristina Alcaraz and
               Rodrigo Roman and
               Javier L{\'{o}}pez},
  title     = {Analysis of Intrusion Detection Systems in Industrial Ecosystems},
  booktitle = {{SECRYPT}},
  pages     = {116--128},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/SadhyaCS17,
  author    = {Debanjan Sadhya and
               Bodhi Chakraborty and
               Sanjay Kumar Singh},
  title     = {Capturing the Effects of Attribute based Correlation on Privacy in
               Micro-databases},
  booktitle = {{SECRYPT}},
  pages     = {430--436},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/SaiaC17,
  author    = {Roberto Saia and
               Salvatore Carta},
  title     = {Evaluating Credit Card Transactions in the Frequency Domain for a
               Proactive Fraud Detection Approach},
  booktitle = {{SECRYPT}},
  pages     = {335--342},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/SinghS17,
  author    = {Bhupendra Singh and
               Upasna Singh},
  title     = {Program Execution Analysis using UserAssist Key in Modern Windows},
  booktitle = {{SECRYPT}},
  pages     = {420--429},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/SinigagliaCC17,
  author    = {Federico Sinigaglia and
               Roberto Carbone and
               Gabriele Costa},
  title     = {Strong Authentication for e-Banking: {A} Survey on European Regulations
               and Implementations},
  booktitle = {{SECRYPT}},
  pages     = {480--485},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/SondeckLF17,
  author    = {Louis Philippe Sondeck and
               Maryline Laurent and
               Vincent Frey},
  title     = {The Semantic Discrimination Rate Metric for Privacy Measurements which
               Questions the Benefit of t-closeness over l-diversity},
  booktitle = {{SECRYPT}},
  pages     = {285--294},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/SouissiAB17,
  author    = {Ilhem Souissi and
               Nadia Ben Azzouna and
               Tahar Berradia},
  title     = {Towards a Self-adaptive Trust Management Model for VANETs},
  booktitle = {{SECRYPT}},
  pages     = {513--518},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/SysKS17,
  author    = {Marek S{\'{y}}s and
               Dusan Klinec and
               Petr Svenda},
  title     = {The Efficient Randomness Testing using Boolean Functions},
  booktitle = {{SECRYPT}},
  pages     = {92--103},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/TillemEL17,
  author    = {Gamze Tillem and
               Zekeriya Erkin and
               Reginald L. Lagendijk},
  title     = {Mining Encrypted Software Logs using Alpha Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {267--274},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/TongTLL17,
  author    = {Val{\'{e}}rie Viet Triem Tong and
               Aur{\'{e}}lien Trulla and
               Mourad Leslous and
               Jean{-}Fran{\c{c}}ois Lalande},
  title     = {Information Flows at {OS} Level Unmask Sophisticated Android Malware},
  booktitle = {{SECRYPT}},
  pages     = {578--585},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/WatsonLG17,
  author    = {Venesa Watson and
               Xinxin Lou and
               Yuan Gao},
  title     = {A Review of {PROFIBUS} Protocol Vulnerabilities - Considerations for
               Implementing Authentication and Authorization Controls},
  booktitle = {{SECRYPT}},
  pages     = {444--449},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/Yee17,
  author    = {George O. M. Yee},
  title     = {Adding Privacy Protection to Distributed Software Systems},
  booktitle = {{SECRYPT}},
  pages     = {351--358},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/ZhangLG17,
  author    = {Xichen Zhang and
               Arash Habibi Lashkari and
               Ali A. Ghorbani},
  title     = {A Lightweight Online Advertising Classification System using Lexical-based
               Features},
  booktitle = {{SECRYPT}},
  pages     = {486--494},
  publisher = {SciTePress},
  year      = {2017}
}
@proceedings{DBLP:conf/secrypt/2017,
  editor    = {Pierangela Samarati and
               Mohammad S. Obaidat and
               Enrique Cabello},
  title     = {Proceedings of the 14th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2017) - Volume 4: SECRYPT, Madrid,
               Spain, July 24-26, 2017},
  publisher = {SciTePress},
  year      = {2017}
}
@inproceedings{DBLP:conf/secrypt/AchenbachLMR16,
  author    = {Dirk Achenbach and
               Bernhard L{\"{o}}we and
               J{\"{o}}rn M{\"{u}}ller{-}Quade and
               Jochen Rill},
  title     = {Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting},
  booktitle = {{SECRYPT}},
  pages     = {85--96},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/AhmadvandSOP16,
  author    = {Mohsen Ahmadvand and
               Antoine Scemama and
               Mart{\'{\i}}n Ochoa and
               Alexander Pretschner},
  title     = {Enhancing Operation Security using Secret Sharing},
  booktitle = {{SECRYPT}},
  pages     = {446--451},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/AlcarazLC16,
  author    = {Cristina Alcaraz and
               Javier L{\'{o}}pez and
               Kim{-}Kwang Raymond Choo},
  title     = {Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control
               Systems},
  booktitle = {{SECRYPT}},
  pages     = {19--27},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/AssidiAS16,
  author    = {Hafsa Assidi and
               Edoukou Berenger Ayebie and
               El Mamoun Souidi},
  title     = {A Code-based Group Signature Scheme with Shorter Public Key Length},
  booktitle = {{SECRYPT}},
  pages     = {432--439},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/AwadL16,
  author    = {Abir Awad and
               Brian Lee},
  title     = {A Metaphone based Chaotic Searchable Encryption Algorithm for Border
               Management},
  booktitle = {{SECRYPT}},
  pages     = {397--402},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BalushiMS16,
  author    = {Abdullah Al Balushi and
               Kieran McLaughlin and
               Sakir Sezer},
  title     = {{OSCIDS:} An Ontology based {SCADA} Intrusion Detection Framework},
  booktitle = {{SECRYPT}},
  pages     = {327--335},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BarakatBNG16,
  author    = {Sara Barakat and
               Bechara al Bouna and
               Mohamed Nassar and
               Christophe Guyeux},
  title     = {On the Evaluation of the Privacy Breach in Disassociated Set-valued
               Datasets},
  booktitle = {{SECRYPT}},
  pages     = {318--326},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BelguithKJLA16,
  author    = {Sana Belguith and
               Nesrine Kaaniche and
               Abderrazak Jemai and
               Maryline Laurent and
               Rabah Attia},
  title     = {PAbAC: {A} Privacy Preserving Attribute based Framework for Fine Grained
               Access Control in Clouds},
  booktitle = {{SECRYPT}},
  pages     = {133--146},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BelyaevR16,
  author    = {Kirill Belyaev and
               Indrakshi Ray},
  title     = {Towards Access Control for Isolated Applications},
  booktitle = {{SECRYPT}},
  pages     = {171--182},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BernardoD16,
  author    = {Vitor Bernardo and
               Dulce Domingos},
  title     = {Web-based Fingerprinting Techniques},
  booktitle = {{SECRYPT}},
  pages     = {271--282},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BhattacharjeeC16,
  author    = {Debjyoti Bhattacharjee and
               Anupam Chattopadhyay},
  title     = {Hardware Accelerator for Stream Cipher Spritz},
  booktitle = {{SECRYPT}},
  pages     = {215--222},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BlazyB016,
  author    = {Olivier Blazy and
               Xavier Bultel and
               Pascal Lafourcade},
  title     = {Two Secure Anonymous Proxy-based Data Storages},
  booktitle = {{SECRYPT}},
  pages     = {251--258},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BouderBCLL16,
  author    = {H{\'{e}}l{\`{e}}ne Le Bouder and
               Thierno Barry and
               Damien Courouss{\'{e}} and
               Jean{-}Louis Lanet and
               Ronan Lashermes},
  title     = {A Template Attack Against {VERIFY} {PIN} Algorithms},
  booktitle = {{SECRYPT}},
  pages     = {231--238},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BreuerBP016,
  author    = {Peter T. Breuer and
               Jonathan P. Bowen and
               Esther Palomar and
               Zhiming Liu},
  title     = {A Practical Encrypted Microprocessor},
  booktitle = {{SECRYPT}},
  pages     = {239--250},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/BuccafurriSS16,
  author    = {Francesco Buccafurri and
               Rajeev Anand Sahu and
               Vishal Saraswat},
  title     = {Efficient Proxy Signature Scheme from Pairings},
  booktitle = {{SECRYPT}},
  pages     = {471--476},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/CanforaMPV16,
  author    = {Gerardo Canfora and
               Francesco Mercaldo and
               Antonio Pirozzi and
               Corrado Aaron Visaggio},
  title     = {How {I} Met Your Mother? - An Empirical Study about Android Malware
               Phylogenesis},
  booktitle = {{SECRYPT}},
  pages     = {310--317},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/CanforaNMV16,
  author    = {Gerardo Canfora and
               Paolo Di Notte and
               Francesco Mercaldo and
               Corrado Aaron Visaggio},
  title     = {Silent and Continuous Authentication in Mobile Environment},
  booktitle = {{SECRYPT}},
  pages     = {97--108},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/ChatterjeePS16,
  author    = {Sumanta Chatterjee and
               Alwyn R. Pais and
               Sumit Saurabh},
  title     = {Distributed Data Aggregation in Wireless Sensor Network - with Peer
               Verification},
  booktitle = {{SECRYPT}},
  pages     = {440--445},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/CouchotCFG16,
  author    = {Jean{-}Fran{\c{c}}ois Couchot and
               Rapha{\"{e}}l Couturier and
               Yousra Ahmed Fadil and
               Christophe Guyeux},
  title     = {A Second Order Derivatives based Approach for Steganography},
  booktitle = {{SECRYPT}},
  pages     = {424--431},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/CourtoisSSP16,
  author    = {Nicolas T. Courtois and
               Pouyan Sepehrdad and
               Guangyan Song and
               Iason Papapanagiotakis{-}Bousy},
  title     = {Predicting Outcomes of ElimLin Attack on Lightweight Block Cipher
               Simon},
  booktitle = {{SECRYPT}},
  pages     = {465--470},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/CucurullGG16,
  author    = {Jordi Cucurull and
               Sandra Guasch and
               David Galindo},
  title     = {Transitioning to a Javascript Voting Client for Remote Online Voting},
  booktitle = {{SECRYPT}},
  pages     = {121--132},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/Dumas0OP16,
  author    = {Jean{-}Guillaume Dumas and
               Pascal Lafourcade and
               Jean{-}Baptiste Orfila and
               Maxime Puys},
  title     = {Private Multi-party Matrix Multiplication and Trust Computations},
  booktitle = {{SECRYPT}},
  pages     = {61--72},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/FrieslaarI16,
  author    = {Ibraheem Frieslaar and
               Barry Irwin},
  title     = {Towards a Software Approach to Mitigate Correlation Power Analysis},
  booktitle = {{SECRYPT}},
  pages     = {403--410},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/FukushimaHK16,
  author    = {Kazuhide Fukushima and
               Seira Hidano and
               Shinsaku Kiyomoto},
  title     = {Sensor-based Wearable {PUF}},
  booktitle = {{SECRYPT}},
  pages     = {207--214},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/GeltinkV16,
  author    = {Gerben Geltink and
               Sergei Volokitin},
  title     = {{FPGA} Implementation of {HS1-SIV}},
  booktitle = {{SECRYPT}},
  pages     = {41--48},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/GiustolisiG16,
  author    = {Rosario Giustolisi and
               Christian Gehrmann},
  title     = {Threats to 5G Group-based Authentication},
  booktitle = {{SECRYPT}},
  pages     = {360--367},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/GrozaMA16,
  author    = {Bogdan Groza and
               Pal{-}Stefan Murvay and
               Tudor Andreica},
  title     = {Evaluating {SRAM} as Source for Fingerprints and Randomness on Automotive
               Grade Controllers},
  booktitle = {{SECRYPT}},
  pages     = {109--120},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/HajnyDM16,
  author    = {Jan Hajny and
               Petr Dzurenda and
               Lukas Malina},
  title     = {Multi-Device Authentication using Wearables and IoT},
  booktitle = {{SECRYPT}},
  pages     = {483--488},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/HockKG16,
  author    = {Denis Hock and
               Martin Kappes and
               Bogdan V. Ghita},
  title     = {A Pre-clustering Method To Improve Anomaly Detection},
  booktitle = {{SECRYPT}},
  pages     = {391--396},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/KiljanVE16,
  author    = {Sven Kiljan and
               Harald P. E. Vranken and
               Marko C. J. D. van Eekelen},
  title     = {User-friendly Manual Transfer of Authenticated Online Banking Transaction
               Data - {A} Case Study that Applies the What You Enter Is What You
               Sign Transaction Authorization Information Scheme},
  booktitle = {{SECRYPT}},
  pages     = {259--270},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/LesavoureyNP16,
  author    = {Andrea Lesavourey and
               Christophe N{\`{e}}gre and
               Thomas Plantard},
  title     = {Efficient Randomized Regular Modular Exponentiation using Combined
               Montgomery and Barrett Multiplications},
  booktitle = {{SECRYPT}},
  pages     = {368--375},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/MilosevicMF16,
  author    = {Jelena Milosevic and
               Miroslaw Malek and
               Alberto Ferrante},
  title     = {A Friend or a Foe? Detecting Malware using Memory and {CPU} Features},
  booktitle = {{SECRYPT}},
  pages     = {73--84},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/MimotoBK16,
  author    = {Tomoaki Mimoto and
               Anirban Basu and
               Shinsaku Kiyomoto},
  title     = {Towards Practical k-Anonymization: Correlation-based Construction
               of Generalization Hierarchy},
  booktitle = {{SECRYPT}},
  pages     = {411--418},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/MohammedCG16,
  author    = {Mohammed Bakiri and
               Jean{-}Fran{\c{c}}ois Couchot and
               Christophe Guyeux},
  title     = {{FPGA} Implementation of F2-Linear Pseudorandom Number Generators
               based on Zynq MPSoC: {A} Chaotic Iterations Post Processing Case Study},
  booktitle = {{SECRYPT}},
  pages     = {302--309},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/MohantyAR16,
  author    = {Manoranjan Mohanty and
               Muhammad Rizwan Asghar and
               Giovanni Russello},
  title     = {3DCrypt: Privacy-preserving Pre-classification Volume Ray-casting
               of 3D Images in the Cloud},
  booktitle = {{SECRYPT}},
  pages     = {283--291},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/MuranakaYOF16,
  author    = {Kenta Muranaka and
               Naoto Yanai and
               Shingo Okamura and
               Toru Fujiwara},
  title     = {{ISDSR:} Secure {DSR} with ID-based Sequential Aggregate Signature},
  booktitle = {{SECRYPT}},
  pages     = {376--387},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/PatelP16,
  author    = {Asma Patel and
               Esther Palomar},
  title     = {LP-Cache: Privacy-aware Cache Model for Location-based Apps},
  booktitle = {{SECRYPT}},
  pages     = {183--194},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/PereiraRA16,
  author    = {{\'{O}}scar Mort{\'{a}}gua Pereira and
               Diogo Domingues Regateiro and
               Rui L. Aguiar},
  title     = {Protecting Databases from Schema Disclosure - {A} CRUD-Based Protection
               Model},
  booktitle = {{SECRYPT}},
  pages     = {292--301},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/PutD16,
  author    = {Andreas Put and
               Bart De Decker},
  title     = {PACCo: Privacy-friendly Access Control with Context},
  booktitle = {{SECRYPT}},
  pages     = {159--170},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/RanathungaRKF16,
  author    = {Dinesha Ranathunga and
               Matthew Roughan and
               Phil Kernick and
               Nick Falkner},
  title     = {The Mathematical Foundations for Mapping Policies to Network Devices},
  booktitle = {{SECRYPT}},
  pages     = {197--206},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/RanathungaRKFNM16,
  author    = {Dinesha Ranathunga and
               Matthew Roughan and
               Phil Kernick and
               Nick Falkner and
               Hung X. Nguyen and
               Marian Mihailescu and
               Michelle McClintock},
  title     = {Verifiable Policy-defined Networking for Security Management},
  booktitle = {{SECRYPT}},
  pages     = {344--351},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/Rao16,
  author    = {Srinivasa Rao Subramanya Rao},
  title     = {Differential Addition in Edwards Coordinates Revisited and a Short
               Note on Doubling in Twisted Edwards Form},
  booktitle = {{SECRYPT}},
  pages     = {336--343},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/Schneider16,
  author    = {Johannes Schneider},
  title     = {Lean and Fast Secure Multi-party Computation: Minimizing Communication
               and Local Computation using a Helper},
  booktitle = {{SECRYPT}},
  pages     = {223--230},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/SchneiderLLPHO16,
  author    = {Johannes Schneider and
               Bin Lu and
               Thomas Locher and
               Yvonne Anne Pignolet and
               Mat{\'{u}}s Harvan and
               Sebastian Obermeier},
  title     = {Subdomain and Access Pattern Privacy - Trading off Confidentiality
               and Performance},
  booktitle = {{SECRYPT}},
  pages     = {49--60},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/SciarrettaACR16,
  author    = {Giada Sciarretta and
               Alessandro Armando and
               Roberto Carbone and
               Silvio Ranise},
  title     = {Security of Mobile Single Sign-On: {A} Rational Reconstruction of
               Facebook Login Solution},
  booktitle = {{SECRYPT}},
  pages     = {147--158},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG16,
  author    = {George Stergiopoulos and
               Panagiotis Katsaros and
               Dimitris Gritzalis and
               Theodore K. Apostolopoulos},
  title     = {Combining Invariant Violation with Execution Path Classification for
               Detecting Multiple Types of Logical Errors and Race Conditions},
  booktitle = {{SECRYPT}},
  pages     = {28--40},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/TatarNN16,
  author    = {Ahmet Emin Tatar and
               Marius Nagy and
               Naya Nagy},
  title     = {The Cost of Breaking a Quantum Bit Commitment Protocol on Equivalence
               Classes},
  booktitle = {{SECRYPT}},
  pages     = {419--423},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/TrabelsiMZ16,
  author    = {Slim Trabelsi and
               Skander Ben Mahmoud and
               Anis Zouaoui},
  title     = {Predictive Model for Exploit Kit based Attacks},
  booktitle = {{SECRYPT}},
  pages     = {477--482},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/WaageHW16,
  author    = {Tim Waage and
               Daniel Homann and
               Lena Wiese},
  title     = {Practical Application of Order-preserving Encryption in Wide Column
               Stores},
  booktitle = {{SECRYPT}},
  pages     = {352--359},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/WodoH16,
  author    = {Wojciech Wodo and
               Lucjan Hanzlik},
  title     = {Thermal Imaging Attacks on Keypad Security Systems},
  booktitle = {{SECRYPT}},
  pages     = {458--464},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/WodoHK16,
  author    = {Wojciech Wodo and
               Lucjan Hanzlik and
               Kamil Kluczniak},
  title     = {Computations on Private Sets and their Application to Biometric based
               Authentication Systems},
  booktitle = {{SECRYPT}},
  pages     = {452--457},
  publisher = {SciTePress},
  year      = {2016}
}
@proceedings{DBLP:conf/secrypt/2016,
  editor    = {Christian Callegari and
               Marten van Sinderen and
               Panagiotis G. Sarigiannidis and
               Pierangela Samarati and
               Enrique Cabello and
               Pascal Lorenz and
               Mohammad S. Obaidat},
  title     = {Proceedings of the 13th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
               Portugal, July 26-28, 2016},
  publisher = {SciTePress},
  year      = {2016}
}
@inproceedings{DBLP:conf/secrypt/AiashL15,
  author    = {Mahdi Aiash and
               Jonathan Loo},
  title     = {A Formally Verified Access Control Mechanism for Information Centric
               Networks},
  booktitle = {{SECRYPT}},
  pages     = {377--383},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/Amthor15,
  author    = {Peter Amthor},
  title     = {A Uniform Modeling Pattern for Operating Systems Access Control Policies
               with an Application to SELinux},
  booktitle = {{SECRYPT}},
  pages     = {88--99},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/BelhaouaneGD15,
  author    = {Malek Belhaouane and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Herv{\'{e}} Debar},
  title     = {Evaluating the Comprehensive Complexity of Authorization-based Access
               Control Policies using Quantitative Metrics},
  booktitle = {{SECRYPT}},
  pages     = {53--64},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/BellizziV15,
  author    = {Jennifer Bellizzi and
               Mark Vella},
  title     = {WeXpose: Towards on-Line Dynamic Analysis of Web Attack Payloads using
               Just-In-Time Binary Modification},
  booktitle = {{SECRYPT}},
  pages     = {5--15},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/BenmoussaKO15,
  author    = {Hajar Benmoussa and
               Anas Abou El Kalam and
               Abdellah Ait Ouahman},
  title     = {Distributed Intrusion Detection System based on Anticipation and Prediction
               Approach},
  booktitle = {{SECRYPT}},
  pages     = {343--348},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/Birjoveanu15,
  author    = {Catalin V. B{\^{\i}}rjoveanu},
  title     = {Anonymity and Fair-Exchange in e-Commerce Protocol for Physical Products
               Delivery},
  booktitle = {{SECRYPT}},
  pages     = {170--177},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/Bottasso15,
  author    = {Luigi Maria Bottasso},
  title     = {A Public-Key Cryptography Tool for Personal Use - {A} Real-world Implementation
               of {ECC} for Secure File Exchange},
  booktitle = {{SECRYPT}},
  pages     = {194--201},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/BuccafurriLSS15,
  author    = {Francesco Buccafurri and
               Gianluca Lax and
               Rajeev Anand Sahu and
               Vishal Saraswat},
  title     = {Practical and Secure Integrated {PKE+PEKS} with Keyword Privacy},
  booktitle = {{SECRYPT}},
  pages     = {448--453},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/CanforaMV15,
  author    = {Gerardo Canfora and
               Francesco Mercaldo and
               Corrado Aaron Visaggio},
  title     = {Mobile Malware Detection using Op-code Frequency Histograms},
  booktitle = {{SECRYPT}},
  pages     = {27--38},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/CimatoMS15,
  author    = {Stelvio Cimato and
               Silvia Mella and
               Ruggero Susella},
  title     = {New Results for Partial Key Exposure on {RSA} with Exponent Blinding},
  booktitle = {{SECRYPT}},
  pages     = {136--147},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/CincillaBHK15,
  author    = {Pierpaolo Cincilla and
               Aymen Boudguiga and
               Makhlouf Hadji and
               Arnaud Kaiser},
  title     = {Light Blind: Why Encrypt If You Can Share?},
  booktitle = {{SECRYPT}},
  pages     = {361--368},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/DreierKL15,
  author    = {Jannik Dreier and
               Ali Kassem and
               Pascal Lafourcade},
  title     = {Formal Analysis of E-Cash Protocols},
  booktitle = {{SECRYPT}},
  pages     = {65--75},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/FernandezY15,
  author    = {Eduardo B. Fern{\'{a}}ndez and
               Dereje Yimam},
  title     = {Towards Compliant Reference Architectures by Finding Analogies and
               Overlaps in Compliance Regulations},
  booktitle = {{SECRYPT}},
  pages     = {435--440},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/Garcia15,
  author    = {Johan Garcia},
  title     = {Examining the Performance for Forensic Detection of Rare Videos Under
               Time Constraints},
  booktitle = {{SECRYPT}},
  pages     = {419--426},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/GuesmiCLB15,
  author    = {Asma Guesmi and
               Patrice Clemente and
               Fr{\'{e}}d{\'{e}}ric Loulergue and
               Pascal Berthom{\'{e}}},
  title     = {Cloud Resources Placement based on Functional and Non-functional Requirements},
  booktitle = {{SECRYPT}},
  pages     = {335--342},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/HajilouMA15,
  author    = {Fleura Hajilou and
               Ehsan Mazidi and
               Shahab Ardalan},
  title     = {{DPA} Resistance Enhancement through a Self-healing {PLL} based Power
               Mask},
  booktitle = {{SECRYPT}},
  pages     = {267--272},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/HajnyDM15,
  author    = {Jan Hajny and
               Petr Dzurenda and
               Lukas Malina},
  title     = {Secure Physical Access Control with Strong Cryptographic Protection},
  booktitle = {{SECRYPT}},
  pages     = {220--227},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/HoangCN15,
  author    = {Thang Hoang and
               Deokjai Choi and
               Thuc Dinh Nguyen},
  title     = {On the Instability of Sensor Orientation in Gait Verification on Mobile
               Phone},
  booktitle = {{SECRYPT}},
  pages     = {148--159},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/HuangCT15,
  author    = {Kaibin Huang and
               Yu{-}Chi Chen and
               Raylin Tso},
  title     = {Semantic Secure Public Key Encryption with Filtered Equality Test
               - {PKE-FET}},
  booktitle = {{SECRYPT}},
  pages     = {327--334},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/IrshadSVBSA15,
  author    = {Hassaan Irshad and
               Basit Shafiq and
               Jaideep Vaidya and
               Muhammad Ahmed Bashir and
               Shafay Shamail and
               Nabil R. Adam},
  title     = {Preserving Privacy in Collaborative Business Process Composition},
  booktitle = {{SECRYPT}},
  pages     = {112--123},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/JaidiA15,
  author    = {Faouzi Ja{\"{\i}}di and
               Faten Labbene Ayachi},
  title     = {A Risk Awareness Approach for Monitoring the Compliance of RBAC-based
               Policies},
  booktitle = {{SECRYPT}},
  pages     = {454--459},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/Joye15,
  author    = {Marc Joye},
  title     = {A Key-private Cryptosystem from the Quadratic Residuosity},
  booktitle = {{SECRYPT}},
  pages     = {398--404},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/Ka15,
  author    = {Ka Ahmad Khoureich},
  title     = {hHB: {A} Harder HB\({}^{\mbox{+}}\) Protocol},
  booktitle = {{SECRYPT}},
  pages     = {163--169},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/KenazaLBS15,
  author    = {Tayeb Kenaza and
               Abdenour Labed and
               Yacine Boulahia and
               Mohcen Sebehi},
  title     = {Adaptive SVDD-based Learning for False Alarm Reduction in Intrusion
               Detection},
  booktitle = {{SECRYPT}},
  pages     = {405--412},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15,
  author    = {Yukou Kobayashi and
               Naoto Yanai and
               Kazuki Yoneyama and
               Takashi Nishide and
               Goichiro Hanaoka and
               Kwangjo Kim and
               Eiji Okamoto},
  title     = {Gateway Threshold Password-based Authenticated Key Exchange Secure
               against Undetectable On-line Dictionary Attack},
  booktitle = {{SECRYPT}},
  pages     = {39--52},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/LorenzS15,
  author    = {Claas Lorenz and
               Bettina Schnor},
  title     = {Policy Anomaly Detection for Distributed IPv6 Firewalls},
  booktitle = {{SECRYPT}},
  pages     = {210--219},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/MalinaMHH15,
  author    = {Lukas Malina and
               Petr Munster and
               Jan Hajny and
               Tom{\'{a}}s Horv{\'{a}}th},
  title     = {Towards Secure Gigabit Passive Optical Networks - Signal Propagation
               based Key Establishment},
  booktitle = {{SECRYPT}},
  pages     = {349--354},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/MarfiaNPC15,
  author    = {Fabio Marfia and
               Mario Arrigoni Neri and
               Filippo Pellegrini and
               Marco Colombetti},
  title     = {An OWL-based {XACML} Policy Framework},
  booktitle = {{SECRYPT}},
  pages     = {124--135},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/MauroL15,
  author    = {Mario Di Mauro and
               Maurizio Longo},
  title     = {Revealing Encrypted WebRTC Traffic via Machine Learning Tools},
  booktitle = {{SECRYPT}},
  pages     = {259--266},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/MohsenP15,
  author    = {Rabih Mohsen and
               Alexandre Miranda Pinto},
  title     = {Algorithmic Information Theory for Obfuscation Security},
  booktitle = {{SECRYPT}},
  pages     = {76--87},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/NegreR15,
  author    = {Christophe N{\`{e}}gre and
               Jean{-}Marc Robert},
  title     = {Parallel Approaches for Efficient Scalar Multiplication over Elliptic
               Curve},
  booktitle = {{SECRYPT}},
  pages     = {202--209},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/PandeyS15,
  author    = {Pankaj Pandey and
               Einar Arthur Snekkenes},
  title     = {Design and Performance Aspects of Information Security Prediction
               Markets for Risk Management},
  booktitle = {{SECRYPT}},
  pages     = {273--284},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/PavloskiGG15,
  author    = {Mihajlo Pavloski and
               G{\"{o}}k{\c{c}}e G{\"{o}}rbil and
               Erol Gelenbe},
  title     = {Counter based Detection and Mitigation of Signalling Attacks},
  booktitle = {{SECRYPT}},
  pages     = {413--418},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/Rao15,
  author    = {Srinivasa Rao Subramanya Rao},
  title     = {A Note on Schoenmakers Algorithm for Multi Exponentiation},
  booktitle = {{SECRYPT}},
  pages     = {384--391},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/ReevesS15,
  author    = {Jason Reeves and
               Sean W. Smith},
  title     = {Solving the Grid Defender's Dilemma: Tamper Protection for Distributed
               Cyber-Physical Systems},
  booktitle = {{SECRYPT}},
  pages     = {309--316},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/ReimairTKT15,
  author    = {Florian Reimair and
               Peter Teufl and
               Christian Kollmann and
               Christoph Thaller},
  title     = {MoCrySIL - Carry Your Cryptographic Keys in Your Pocket},
  booktitle = {{SECRYPT}},
  pages     = {285--292},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/RhinowC15,
  author    = {Florian Rhinow and
               Michael Clear},
  title     = {Scargos: Towards Automatic Vulnerability Distribution},
  booktitle = {{SECRYPT}},
  pages     = {369--376},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/RoyGCM15,
  author    = {Bholanath Roy and
               Ravi Prakash Giri and
               Ashokkumar C. and
               Bernard Menezes},
  title     = {Design and Implementation of an Espionage Network for Cache-based
               Side Channel Attacks on {AES}},
  booktitle = {{SECRYPT}},
  pages     = {441--447},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/SalferSE15,
  author    = {Martin Salfer and
               Claudia Eckert},
  title     = {Attack Surface and Vulnerability Assessment of Automotive Electronic
               Control Units},
  booktitle = {{SECRYPT}},
  pages     = {317--326},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/SchlegelHO15,
  author    = {Roman Schlegel and
               Ana Hristova and
               Sebastian Obermeier},
  title     = {A Framework for Incident Response in Industrial Control Systems},
  booktitle = {{SECRYPT}},
  pages     = {178--185},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/SelisM15,
  author    = {Valerio Selis and
               Alan J. Marshall},
  title     = {{MEDA:} {A} Machine Emulation Detection Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {228--235},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/SerbanescuOY15,
  author    = {Alexandru Vlad Serbanescu and
               Sebastian Obermeier and
               Der{-}Yeuan Yu},
  title     = {A Flexible Architecture for Industrial Control System Honeypots},
  booktitle = {{SECRYPT}},
  pages     = {16--26},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/SmolyakovSKG15,
  author    = {Alexey D. Smolyakov and
               Amir I. Sulimov and
               Arkadij V. Karpov and
               Aidar V. Galiev},
  title     = {Experimental Extraction of Shared Secret Key from Fluctuations of
               Multipath Channel at Moving a Mobile Transceiver in an Urban Environment},
  booktitle = {{SECRYPT}},
  pages     = {355--360},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosPK15,
  author    = {George Stergiopoulos and
               Panagiotis Petsanas and
               Panagiotis Katsaros and
               Dimitris Gritzalis},
  title     = {Automated Exploit Detection using Path Profiling - The Disposition
               Should Matter, Not the Position},
  booktitle = {{SECRYPT}},
  pages     = {100--111},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/SulimovK15,
  author    = {Amir I. Sulimov and
               Arkadij V. Karpov},
  title     = {Performance Evaluation of Meteor Key Distribution},
  booktitle = {{SECRYPT}},
  pages     = {392--397},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/SytaFWSGF15,
  author    = {Ewa Syta and
               Michael J. Fischer and
               David Wolinsky and
               Abraham Silberschatz and
               Gina Gallegos{-}Garc{\'{\i}}a and
               Bryan Ford},
  title     = {Private Eyes: Secure Remote Biometric Authentication},
  booktitle = {{SECRYPT}},
  pages     = {243--250},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/TrabelsiPAAZMGA15,
  author    = {Slim Trabelsi and
               Henrik Plate and
               Amine Abida and
               M. Marouane Ben Aoun and
               Anis Zouaoui and
               Chedy Missaoui and
               Sofien Gharbi and
               Alaeddine Ayari},
  title     = {Monitoring Software Vulnerabilities through Social Networks Analysis},
  booktitle = {{SECRYPT}},
  pages     = {236--242},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/TsiatsikasFPGKK15,
  author    = {Zisis Tsiatsikas and
               Alexandros Fakis and
               Dimitrios Papamartzivanos and
               Dimitris Geneiatakis and
               Georgios Kambourakis and
               Constantinos Kolias},
  title     = {Battling Against DDoS in {SIP} - Is Machine Learning-based Detection
               an Effective Weapon?},
  booktitle = {{SECRYPT}},
  pages     = {301--308},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/UtthaBR15,
  author    = {Worachet Uttha and
               Clara Bertolissi and
               Silvio Ranise},
  title     = {Modeling Authorization Policies for Web Services in Presence of Transitive
               Dependencies},
  booktitle = {{SECRYPT}},
  pages     = {293--300},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/VermaR15,
  author    = {Rakesh M. Verma and
               Nirmala Rai},
  title     = {Phish-IDetector: Message-Id Based Automatic Phishing Detection},
  booktitle = {{SECRYPT}},
  pages     = {427--434},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/VivekB15,
  author    = {S. Sree Vivek and
               Guhan Balasubramanian},
  title     = {Controlled Proxy Re-signing - Conditional Proxy Re-Signatures},
  booktitle = {{SECRYPT}},
  pages     = {186--193},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/VivekSMR15,
  author    = {S. Sree Vivek and
               S. Sharmila Deva Selvi and
               Aanchal Malhotra and
               C. Pandu Rangan},
  title     = {Practical {IBE} Secure under {CBDH} - Encrypting Without Pairing},
  booktitle = {{SECRYPT}},
  pages     = {251--258},
  publisher = {SciTePress},
  year      = {2015}
}
@proceedings{DBLP:conf/secrypt/2015,
  editor    = {Mohammad S. Obaidat and
               Pascal Lorenz and
               Pierangela Samarati},
  title     = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
               on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
               2015},
  publisher = {SciTePress},
  year      = {2015}
}
@inproceedings{DBLP:conf/secrypt/Aissaoui-MehrezUP14,
  author    = {Hassane Aissaoui{-}Mehrez and
               Pascal Urien and
               Guy Pujolle},
  title     = {Framework Implementation Based on Grid of Smartcards to Authenticate
               Users and Virtual Machines},
  booktitle = {{SECRYPT}},
  pages     = {285--290},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/AouadMGM14,
  author    = {Lamine M. Aouad and
               Alejandro Mosquera and
               Slawomir Grzonkowski and
               Dylan Morss},
  title     = {{SMS} Spam - {A} Holistic View},
  booktitle = {{SECRYPT}},
  pages     = {221--228},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/ArmknechtM14,
  author    = {Frederik Armknecht and
               Vasily Mikhalev},
  title     = {Revisiting a Recent Resource-efficient Technique for Increasing the
               Throughput of Stream Ciphers},
  booktitle = {{SECRYPT}},
  pages     = {379--386},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/AzizMP14,
  author    = {Benjamin Aziz and
               Philippe Massonet and
               Christophe Ponsard},
  title     = {A Formal Model for Forensic Storage Media Preparation Tools},
  booktitle = {{SECRYPT}},
  pages     = {165--170},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/BadrinarayananR14,
  author    = {Saikrishna Badrinarayanan and
               C. Pandu Rangan},
  title     = {Pairing-free Single Round Certificateless and Identity Based Authenticated
               Key Exchange Protocols},
  booktitle = {{SECRYPT}},
  pages     = {67--78},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/BarenghiP14,
  author    = {Alessandro Barenghi and
               Gerardo Pelosi},
  title     = {On the Security of Partially Masked Software Implementations},
  booktitle = {{SECRYPT}},
  pages     = {492--499},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/BelaaziRB14,
  author    = {Maherzia Belaazi and
               Hanen Boussi Rahmouni and
               Adel Bouhoula},
  title     = {Towards a Legislation Driven Framework for Access Control and Privacy
               Protection in Public Cloud},
  booktitle = {{SECRYPT}},
  pages     = {463--468},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Bittl14,
  author    = {Sebastian Bittl},
  title     = {Efficient Construction of Infinite Length Hash Chains with Perfect
               Forward Secrecy Using Two Independent Hash Functions},
  booktitle = {{SECRYPT}},
  pages     = {213--220},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Brandic14,
  author    = {Ivona Brandic},
  title     = {Democratization in Science and Technology through Cloud Computing},
  booktitle = {{SECRYPT}},
  pages     = {IS--7},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/BuccafurriL14,
  author    = {Francesco Buccafurri and
               Gianluca Lax},
  title     = {A Novel Pseudo Random Number Generator Based on L'Ecuyer's Scheme},
  booktitle = {{SECRYPT}},
  pages     = {321--328},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/CelikkanG14,
  author    = {Ufuk Celikkan and
               Can Gelis},
  title     = {{NFC} Based Mobile Single Sign-On Solution as a Chrome Extension},
  booktitle = {{SECRYPT}},
  pages     = {337--343},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/ChangX14,
  author    = {Jinyong Chang and
               Rui Xue},
  title     = {{KDM-CCA} Security of the Cramer-Shoup Cryptosystem, Revisited},
  booktitle = {{SECRYPT}},
  pages     = {299--306},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/CorenaBNKM14,
  author    = {Juan Camilo Corena and
               Anirban Basu and
               Yuto Nakano and
               Shinsaku Kiyomoto and
               Yutaka Miyake},
  title     = {A Multiple-server Efficient Reusable Proof of Data Possesion from
               Private Information Retrieval Techniques},
  booktitle = {{SECRYPT}},
  pages     = {307--314},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/CouchotHGWB14,
  author    = {Jean{-}Fran{\c{c}}ois Couchot and
               Pierre{-}Cyrille H{\'{e}}am and
               Christophe Guyeux and
               Qianxue Wang and
               Jacques M. Bahi},
  title     = {Pseudorandom Number Generators with Balanced Gray Codes},
  booktitle = {{SECRYPT}},
  pages     = {469--475},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/CourousseRLBNJL14,
  author    = {Damien Courouss{\'{e}} and
               Bruno Robisson and
               Jean{-}Louis Lanet and
               Thierno Barry and
               Hassan N. Noura and
               Philippe Jaillon and
               Philippe Lalev{\'{e}}e},
  title     = {{COGITO:} Code Polymorphism to Secure Devices},
  booktitle = {{SECRYPT}},
  pages     = {451--456},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/CourtoisEN14,
  author    = {Nicolas T. Courtois and
               Pinar Emirdag and
               Daniel A. Nagy},
  title     = {Could Bitcoin Transactions Be 100x Faster?},
  booktitle = {{SECRYPT}},
  pages     = {426--431},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/CourtoisMSSS14,
  author    = {Nicolas Courtois and
               Theodosis Mourouzis and
               Guangyan Song and
               Pouyan Sepehrdad and
               Petr Susil},
  title     = {Combined Algebraic and Truncated Differential Cryptanalysis on Reduced-round
               Simon},
  booktitle = {{SECRYPT}},
  pages     = {399--404},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/CucurullGENA14,
  author    = {Jordi Cucurull and
               Sandra Guasch and
               Alex Escala and
               Guillermo Navarro{-}Arribas and
               V{\'{\i}}ctor Ac{\'{\i}}n},
  title     = {{QR} Steganography - {A} Threat to New Generation Electronic Voting
               Systems},
  booktitle = {{SECRYPT}},
  pages     = {484--491},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/DahshanE14,
  author    = {Mai Dahshan and
               Sherif Elkassas},
  title     = {Framework for Securing Data in Cloud Storage Services},
  booktitle = {{SECRYPT}},
  pages     = {267--274},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/DaritiS14,
  author    = {Rabi{\^{\i}} Dariti and
               El Mamoun Souidi},
  title     = {A Steganographic Protocol Based on Linear Error-Block Codes},
  booktitle = {{SECRYPT}},
  pages     = {178--183},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/DazaPLS14,
  author    = {Vanesa Daza and
               Roberto Di Pietro and
               Flavio Lombardi and
               Matteo Signorini},
  title     = {{FORCE} - Fully Off-line secuRe CrEdits for Mobile Micro Payments},
  booktitle = {{SECRYPT}},
  pages     = {125--136},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Diaz-SantiagoRC14,
  author    = {Sandra Diaz{-}Santiago and
               Lil Mar{\'{\i}}a Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
               Debrup Chakraborty},
  title     = {A Cryptographic Study of Tokenization Systems},
  booktitle = {{SECRYPT}},
  pages     = {393--398},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/DreierGKLLR14,
  author    = {Jannik Dreier and
               Rosario Giustolisi and
               Ali Kassem and
               Pascal Lafourcade and
               Gabriele Lenzini and
               Peter Y. A. Ryan},
  title     = {Formal Analysis of Electronic Exams},
  booktitle = {{SECRYPT}},
  pages     = {101--112},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/ElkhiyaouiOM14,
  author    = {Kaoutar Elkhiyaoui and
               Melek {\"{O}}nen and
               Refik Molva},
  title     = {Privacy Preserving Delegated Word Search in the Cloud},
  booktitle = {{SECRYPT}},
  pages     = {137--150},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/ElrakaibyP14,
  author    = {Yehia Elrakaiby and
               Jun Pang},
  title     = {Dynamic Analysis of Usage Control Policies},
  booktitle = {{SECRYPT}},
  pages     = {88--100},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/EnacheS14,
  author    = {Adriana{-}Cristina Enache and
               Valentin Sgarciu},
  title     = {Enhanced Intrusion Detection System Based on Bat Algorithm-support
               Vector Machine},
  booktitle = {{SECRYPT}},
  pages     = {184--189},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/FerranteKM14,
  author    = {Alberto Ferrante and
               Igor Kaitovic and
               Jelena Milosevic},
  title     = {Modeling Requirements for Security-enhanced Design of Embedded Systems},
  booktitle = {{SECRYPT}},
  pages     = {315--320},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/GhoshMCG14,
  author    = {Nirnay Ghosh and
               Triparna Mondal and
               Debangshu Chatterjee and
               Soumya K. Ghosh},
  title     = {Verifying Conformance of Security Implementation with Organizational
               Access Policies in Community Cloud - {A} Formal Approach},
  booktitle = {{SECRYPT}},
  pages     = {329--336},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Goodman14,
  author    = {Seymour E. Goodman},
  title     = {A Need-based Assessment for Building a National Cyber Security Workforce},
  booktitle = {{SECRYPT}},
  pages     = {IS--5},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/GuleriaD14,
  author    = {Vandana Guleria and
               Ratna Dutta},
  title     = {Adaptive Oblivious Transfer with Hidden Access Policy Realizing Disjunction},
  booktitle = {{SECRYPT}},
  pages     = {43--54},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/KaanicheLB14,
  author    = {Nesrine Kaaniche and
               Maryline Laurent and
               Mohammed El{-}Barbori},
  title     = {CloudaSec: {A} Novel Public-key Based Framework to Handle Data Sharing
               Security in Clouds},
  booktitle = {{SECRYPT}},
  pages     = {5--18},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/KavanSK14,
  author    = {Daniel Kavan and
               Kl{\'{a}}ra Skodov{\'{a}} and
               Martin Kl{\'{\i}}ma},
  title     = {Network-based Intrusion Prevention System Prototype with Multi-Detection
               - {A} Position Paper},
  booktitle = {{SECRYPT}},
  pages     = {417--425},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Kiviharju14,
  author    = {Mikko Kiviharju},
  title     = {{RBAC} with {ABS} - Implementation Practicalities for {RBAC} Integrity
               Policies},
  booktitle = {{SECRYPT}},
  pages     = {500--509},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Lee14,
  author    = {Byoungcheon Lee},
  title     = {Hybrid-Style Personal Key Management in Ubiquitous Computing},
  booktitle = {{SECRYPT}},
  pages     = {238--243},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Marfia14,
  author    = {Fabio Marfia},
  title     = {Using Abductive and Inductive Inference to Generate Policy Explanations},
  booktitle = {{SECRYPT}},
  pages     = {457--462},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/MellaMV14,
  author    = {Silvia Mella and
               Filippo Melzani and
               Andrea Visconti},
  title     = {Differential Fault Attacks against {AES} Tampering with the Instruction
               Flow},
  booktitle = {{SECRYPT}},
  pages     = {439--444},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/MeraoumiaCB14,
  author    = {Abdallah Meraoumia and
               Salim Chitroub and
               Ahmed Bouridane},
  title     = {Robust Multispectral Palmprint Identification System by Jointly Using
               Contourlet Decomposition {\&} Gabor Filter Response},
  booktitle = {{SECRYPT}},
  pages     = {190--197},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/MunozM14,
  author    = {Antonio Mu{\~{n}}oz and
               Antonio Ma{\~{n}}a},
  title     = {Software and Hardware Certification Techniques in a Combined Certification
               Model},
  booktitle = {{SECRYPT}},
  pages     = {405--410},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/NouraMA14,
  author    = {Hassan N. Noura and
               Steven Martin and
               Khaldoun Al Agha},
  title     = {An Efficient Lightweight Security Algorithm for Random Linear Network
               Coding},
  booktitle = {{SECRYPT}},
  pages     = {171--177},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/OprisnikHT14,
  author    = {Alexander Oprisnik and
               Daniel M. Hein and
               Peter Teufl},
  title     = {Identifying Cryptographic Functionality in Android Applications},
  booktitle = {{SECRYPT}},
  pages     = {151--162},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/OuedraogoKTP0SC14,
  author    = {Moussa Ouedraogo and
               Chien{-}Ting Kuo and
               Simon Tjoa and
               David Preston and
               Eric Dubois and
               Paulo Sim{\~{o}}es and
               Tiago Cruz},
  title     = {Keeping an Eye on Your Security Through Assurance Indicators},
  booktitle = {{SECRYPT}},
  pages     = {476--483},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/PavloskiG14,
  author    = {Mihajlo Pavloski and
               Erol Gelenbe},
  title     = {Signaling Attacks in Mobile Telephony},
  booktitle = {{SECRYPT}},
  pages     = {206--212},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/PinoMSD14,
  author    = {Pablo Ant{\'{o}}n del Pino and
               Antoine Monsifrot and
               Charles Salmon{-}Legagneur and
               Gwena{\"{e}}l J. Do{\"{e}}rr},
  title     = {Secure Video Player for Mobile Devices Integrating a Watermarking-based
               Tracing Mechanism},
  booktitle = {{SECRYPT}},
  pages     = {253--260},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/PoddarBM14,
  author    = {Pratik Poddar and
               Achin Bansal and
               Bernard Menezes},
  title     = {Optimizing Elliptic Curve Scalar Multiplication with Near-Factorization},
  booktitle = {{SECRYPT}},
  pages     = {361--370},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/PolcakF14,
  author    = {Libor Polcak and
               Barbora Frankov{\'{a}}},
  title     = {On Reliability of Clock-skew-based Remote Computer Identification},
  booktitle = {{SECRYPT}},
  pages     = {291--298},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Rodriguez-HenriquezC14,
  author    = {Lil Mar{\'{\i}}a Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
               Debrup Chakraborty},
  title     = {Using Bitmaps for Executing Range Queries in Encrypted Databases},
  booktitle = {{SECRYPT}},
  pages     = {432--438},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/SaraswatS14,
  author    = {Vishal Saraswat and
               Rajeev Anand Sahu},
  title     = {A Secure Anonymous Proxy Multi-signature Scheme},
  booktitle = {{SECRYPT}},
  pages     = {55--66},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/SchindlerESS14,
  author    = {Sven Schindler and
               Oliver Eggert and
               Bettina Schnor and
               Thomas Scheffler},
  title     = {Shellcode Detection in IPv6 Networks with HoneydV6},
  booktitle = {{SECRYPT}},
  pages     = {198--205},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/SeiO14,
  author    = {Yuichi Sei and
               Akihiko Ohsuga},
  title     = {Randomized Addition of Sensitive Attributes for l-diversity},
  booktitle = {{SECRYPT}},
  pages     = {350--360},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/ShakarianPAJ14,
  author    = {Paulo Shakarian and
               Damon Paulo and
               Massimiliano Albanese and
               Sushil Jajodia},
  title     = {Keeping Intruders at Large - {A} Graph-theoretic Approach to Reducing
               the Probability of Successful Network Intrusions},
  booktitle = {{SECRYPT}},
  pages     = {19--30},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/ShibliAKG14,
  author    = {Muhammad Awais Shibli and
               Naveed Ahmad and
               Ayesha Kanwal and
               Abdul Ghafoor Abbasi},
  title     = {Secure Virtual Machine Migration {(SV2M)} in Cloud Federation},
  booktitle = {{SECRYPT}},
  pages     = {344--349},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/ShinR14,
  author    = {Jinse Shin and
               Christoph Ruland},
  title     = {A Hybrid Approach for Content Based Image Authentication},
  booktitle = {{SECRYPT}},
  pages     = {371--378},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/SulimovK14,
  author    = {Amir I. Sulimov and
               Arkadij V. Karpov},
  title     = {Secure Key Distribution based on Meteor Burst Communications},
  booktitle = {{SECRYPT}},
  pages     = {445--450},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/SulimovSKS14,
  author    = {Amir I. Sulimov and
               Alexey D. Smolyakov and
               Arkadij V. Karpov and
               Oleg N. Sherstyukov},
  title     = {Experimental Study of Performance and Security Constraints on Wireless
               Key Distribution Using Random Phase of Multipath Radio Signal},
  booktitle = {{SECRYPT}},
  pages     = {411--416},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/SultanASN14,
  author    = {Shizra Sultan and
               Abdul Ghafoor Abbasi and
               Muhammad Awais Shibli and
               Muhammad Ali Nasir},
  title     = {Secure Protocol for Financial Transactions Using Smartphones - {SPFT}
               - Formally Proved by {AVISPA}},
  booktitle = {{SECRYPT}},
  pages     = {387--392},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/SysSUM14,
  author    = {Marek S{\'{y}}s and
               Petr Svenda and
               Martin Ukrop and
               Vashek Matyas},
  title     = {Constructing Empirical Tests of Randomness},
  booktitle = {{SECRYPT}},
  pages     = {229--237},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Vateva-GurovaLPS14,
  author    = {Tsvetoslava Vateva{-}Gurova and
               Jesus Luna and
               Giancarlo Pellegrino and
               Neeraj Suri},
  title     = {Towards a Framework for Assessing the Feasibility of Side-channel
               Attacks in Virtualized Environments},
  booktitle = {{SECRYPT}},
  pages     = {113--124},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/VirvilisTMG14,
  author    = {Nikos Virvilis and
               Nikolaos Tsalis and
               Alexios Mylonas and
               Dimitris Gritzalis},
  title     = {Mobile Devices - {A} Phisher's Paradise},
  booktitle = {{SECRYPT}},
  pages     = {79--87},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/VukovicGD14,
  author    = {Dijana Vukovic and
               Danilo Gligoroski and
               Zoran Djuric},
  title     = {On Privacy Protection in the Internet Surveillance Era},
  booktitle = {{SECRYPT}},
  pages     = {261--266},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/WagnerS14,
  author    = {Andreas Wagner and
               Johannes Sametinger},
  title     = {Using the Juliet Test Suite to Compare Static Security Scanners},
  booktitle = {{SECRYPT}},
  pages     = {244--252},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/WeiWM14,
  author    = {Yun Wei and
               Fushan Wei and
               Chuangui Ma},
  title     = {Certificateless Non-Interactive Key Exchange Protocol without Pairings},
  booktitle = {{SECRYPT}},
  pages     = {31--42},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/Weippl14,
  author    = {Edgar R. Weippl},
  title     = {Advanced Persistent Threats {\&} Social Engineering},
  booktitle = {{SECRYPT}},
  pages     = {IS--13},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/ZanganehBS14,
  author    = {Omid Zanganeh and
               Nandita Bhattacharjee and
               Bala Srinivasan},
  title     = {Partial Fingerprint Identification Through Correlation-based Approach},
  booktitle = {{SECRYPT}},
  pages     = {275--284},
  publisher = {SciTePress},
  year      = {2014}
}
@proceedings{DBLP:conf/secrypt/2014,
  editor    = {Mohammad S. Obaidat and
               Andreas Holzinger and
               Pierangela Samarati},
  title     = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
               on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  publisher = {SciTePress},
  year      = {2014}
}
@inproceedings{DBLP:conf/secrypt/AlbaneseJSW13,
  author    = {Massimiliano Albanese and
               Sushil Jajodia and
               Anoop Singhal and
               Lingyu Wang},
  title     = {An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities},
  booktitle = {{SECRYPT}},
  pages     = {207--218},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/AliasgariB13,
  author    = {Mehrdad Aliasgari and
               Marina Blanton},
  title     = {Secure Computation of Hidden Markov Models},
  booktitle = {{SECRYPT}},
  pages     = {242--253},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/BahiFG13,
  author    = {Jacques M. Bahi and
               Nicolas Friot and
               Christophe Guyeux},
  title     = {Topological Study and Lyapunov Exponent of a Secure Steganographic
               Scheme},
  booktitle = {{SECRYPT}},
  pages     = {275--283},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/BelaidBDGR13,
  author    = {Sonia Bela{\"{\i}}d and
               Luk Bettale and
               Emmanuelle Dottax and
               Laurie Genelle and
               Franck Rondepierre},
  title     = {Differential Power Analysis of {HMAC} {SHA-2} in the Hamming Weight
               Model},
  booktitle = {{SECRYPT}},
  pages     = {230--241},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/BongiovanniST13,
  author    = {Simone Bongiovanni and
               Giuseppe Scotti and
               Alessandro Trifiletti},
  title     = {Security Evaluation and Optimization of the Delay-based Dual-rail
               Pre-charge Logic in Presence of Early Evaluation of Data},
  booktitle = {{SECRYPT}},
  pages     = {183--194},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Campo-GiralteCDC13,
  author    = {Luis Campo{-}Giralte and
               Cristina Conde and
               Isaac Mart{\'{\i}}n de Diego and
               Enrique Cabello},
  title     = {InCC: Hiding Information by Mimicking Traffic In Network Flows},
  booktitle = {{SECRYPT}},
  pages     = {5--14},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/CataneH13,
  author    = {Boaz Catane and
               Amir Herzberg},
  title     = {Secure Second Price Auctions with a Rational Auctioneer},
  booktitle = {{SECRYPT}},
  pages     = {158--169},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/CataneH13a,
  author    = {Boaz Catane and
               Amir Herzberg},
  title     = {Massive Group Message Authentication with Revocable Anonymity},
  booktitle = {{SECRYPT}},
  pages     = {331--338},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/CazorlaMM13,
  author    = {Micka{\"{e}}l Cazorla and
               Kevin Marquet and
               Marine Minier},
  title     = {Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor
               Networks},
  booktitle = {{SECRYPT}},
  pages     = {543--548},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ChabanneCP13,
  author    = {Herv{\'{e}} Chabanne and
               G{\'{e}}rard D. Cohen and
               Alain Patey},
  title     = {Public-key Cryptography from Different Assumptions - {A} Multi-bit
               Version},
  booktitle = {{SECRYPT}},
  pages     = {561--567},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ChinPBH13,
  author    = {Ji{-}Jian Chin and
               Raphael C.{-}W. Phan and
               Rouzbeh Behnia and
               Swee{-}Huay Heng},
  title     = {An Efficient and Provably Secure Certificateless Identification Scheme},
  booktitle = {{SECRYPT}},
  pages     = {371--378},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ChionisCN13,
  author    = {Ioannis Chionis and
               Maria Chroni and
               Stavros D. Nikolopoulos},
  title     = {A Dynamic Watermarking Model for Embedding Reducible Permutation Graphs
               into Software},
  booktitle = {{SECRYPT}},
  pages     = {74--85},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/CiancamerlaMP13,
  author    = {Ester Ciancamerla and
               Michele Minichino and
               S. Palmieri},
  title     = {Modelling {SCADA} and Corporate Network of a Medium Voltage Power
               Grid under Cyber Attacks},
  booktitle = {{SECRYPT}},
  pages     = {123--134},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ClearM13,
  author    = {Michael Clear and
               Ciaran McGoldrick},
  title     = {Policy-based Non-interactive Outsourcing of Computation using Multikey
               {FHE} and {CP-ABE}},
  booktitle = {{SECRYPT}},
  pages     = {444--452},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/CostanteVEHPZ13,
  author    = {Elisa Costante and
               Sokratis Vavilis and
               Sandro Etalle and
               Jerry den Hartog and
               Milan Petkovic and
               Nicola Zannone},
  title     = {Database Anomalous Activities - Detection and Quantification},
  booktitle = {{SECRYPT}},
  pages     = {603--608},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/CourtoisMM13,
  author    = {Nicolas T. Courtois and
               Theodosis Mourouzis and
               Michal Misztal},
  title     = {Enhanced Truncated Differential Cryptanalysis of {GOST}},
  booktitle = {{SECRYPT}},
  pages     = {411--418},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Domingo-Ferrer13,
  author    = {Josep Domingo{-}Ferrer},
  title     = {On the Connection between t-Closeness and Differential Privacy for
               Data Releases},
  booktitle = {{SECRYPT}},
  pages     = {478--481},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/FerranteMJ13,
  author    = {Alberto Ferrante and
               Jelena Milosevic and
               Marija Janjusevic},
  title     = {A Security-enhanced Design Methodology for Embedded Systems},
  booktitle = {{SECRYPT}},
  pages     = {39--50},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/FreitasN13,
  author    = {Daniel Santana de Freitas and
               Jorge Nakahara Jr.},
  title     = {Non-random Properties of Compression and Hash Functions using Linear
               Cryptanalysis},
  booktitle = {{SECRYPT}},
  pages     = {471--477},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/GrootSVL13,
  author    = {Joep A. de Groot and
               Boris Skoric and
               Niels de Vreede and
               Jean{-}Paul M. G. Linnartz},
  title     = {Diagnostic Category Leakage in Helper Data Schemes for Biometric Authentication},
  booktitle = {{SECRYPT}},
  pages     = {506--511},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/HaarS13,
  author    = {Dustin van der Haar and
               Basie von Solms},
  title     = {Are Biometric Web Services a Reality? - {A} Best Practice Analysis
               for Telebiometric Deployment in Open Networks},
  booktitle = {{SECRYPT}},
  pages     = {494--499},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/HajnyMMZ13,
  author    = {Jan Hajny and
               Lukas Malina and
               Zdenek Martinasek and
               Vaclav Zeman},
  title     = {Privacy-preserving SVANETs - Privacy-preserving Simple Vehicular Ad-hoc
               Networks},
  booktitle = {{SECRYPT}},
  pages     = {267--274},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/HanserS13,
  author    = {Christian Hanser and
               Daniel Slamanig},
  title     = {Efficient Simultaneous Privately and Publicly Verifiable Robust Provable
               Data Possession from Elliptic Curves},
  booktitle = {{SECRYPT}},
  pages     = {15--26},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/HanzlikW13,
  author    = {Lucjan Hanzlik and
               Wojciech Wodo},
  title     = {Identity Security in Biometric Systems based on Keystroking},
  booktitle = {{SECRYPT}},
  pages     = {524--530},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/HaynbergRAM13,
  author    = {Rolf Haynberg and
               Jochen Rill and
               Dirk Achenbach and
               J{\"{o}}rn M{\"{u}}ller{-}Quade},
  title     = {Symmetric Searchable Encryption for Exact Pattern Matching using Directed
               Acyclic Word Graphs},
  booktitle = {{SECRYPT}},
  pages     = {403--410},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/HenricksenK13,
  author    = {Matt Henricksen and
               Shinsaku Kiyomoto},
  title     = {{AVON} - {A} Fast Hash Function for Intel {SIMD} Architectures},
  booktitle = {{SECRYPT}},
  pages     = {482--487},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/HiroseK13,
  author    = {Shoichi Hirose and
               Hidenori Kuwakado},
  title     = {Redactable Signature Scheme for Tree-structured Data based on Merkle
               Tree},
  booktitle = {{SECRYPT}},
  pages     = {313--320},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/HuarteGUMI13,
  author    = {Maider Huarte and
               I{\~{n}}aki Goirizelaia and
               Juan Jos{\'{e}} Unzilla and
               Jon Mat{\'{\i}}as and
               Juan J. Igarza},
  title     = {A New Fully Auditable Proposal for an Internet Voting System with
               Secure Individual Verification and Complaining Capabilities},
  booktitle = {{SECRYPT}},
  pages     = {395--402},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Ii-YungKP13,
  author    = {Ruth Ng Ii{-}Yung and
               Khoongming Khoo and
               Raphael C.{-}W. Phan},
  title     = {On the Security of the {XOR} Sandwiching Paradigm for Multiple Keyed
               Block Ciphers},
  booktitle = {{SECRYPT}},
  pages     = {305--312},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/IshiguroKM13,
  author    = {Tsukasa Ishiguro and
               Shinsaku Kiyomoto and
               Yutaka Miyake},
  title     = {A Key-revocable Attribute-based Encryption for Mobile Cloud Environments},
  booktitle = {{SECRYPT}},
  pages     = {51--61},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Iyengar13,
  author    = {Vinay S. Iyengar},
  title     = {Efficient Characteristic 3 Galois Field Operations for Elliptic Curve
               Cryptographic Applications},
  booktitle = {{SECRYPT}},
  pages     = {531--536},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/JhawarP13,
  author    = {Ravi Jhawar and
               Vincenzo Piuri},
  title     = {Adaptive Resource Management for Balancing Availability and Performance
               in Cloud Computing},
  booktitle = {{SECRYPT}},
  pages     = {254--264},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Kadhem13,
  author    = {Hasan Kadhem},
  title     = {{MINHO} - {A} Novel Authentication Scheme based on Pre-Authentication
               Service},
  booktitle = {{SECRYPT}},
  pages     = {586--594},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/KandiasMSG13,
  author    = {Miltiadis Kandias and
               Lilian Mitrou and
               Vasilis Stavrou and
               Dimitris Gritzalis},
  title     = {Which Side Are You On? - {A} New Panopticon vs. Privacy},
  booktitle = {{SECRYPT}},
  pages     = {98--110},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/KhalfaouiMG13,
  author    = {Mehdi Khalfaoui and
               Refik Molva and
               Laurent Gomez},
  title     = {Secure Alert Tracking in Supply Chain},
  booktitle = {{SECRYPT}},
  pages     = {219--229},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoRNRM13,
  author    = {Shinsaku Kiyomoto and
               Andre Rein and
               Yuto Nakano and
               Carsten Rudolph and
               Yutaka Miyake},
  title     = {{LMM} - {A} Common Component for Software License Management on Cloud},
  booktitle = {{SECRYPT}},
  pages     = {284--295},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Knospe13,
  author    = {Heiko Knospe},
  title     = {Privacy-enhanced Perceptual Hashing of Audio Data},
  booktitle = {{SECRYPT}},
  pages     = {549--554},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/LacharmeCR13,
  author    = {Patrick Lacharme and
               Estelle Cherrier and
               Christophe Rosenberger},
  title     = {Preimage Attack on BioHashing},
  booktitle = {{SECRYPT}},
  pages     = {363--370},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/LangXD13,
  author    = {Bo Lang and
               Runhua Xu and
               Yawei Duan},
  title     = {Extending the Ciphertext-Policy Attribute Based Encryption Scheme
               for Supporting Flexible Access Control},
  booktitle = {{SECRYPT}},
  pages     = {147--157},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/LegendreDK13,
  author    = {Florian Legendre and
               Gilles Dequen and
               Micha{\"{e}}l Krajecki},
  title     = {From a Logical Approach to Internal States of Hash Functions - How
               {SAT} Problem Can Help to Understand SHA-* and MD*},
  booktitle = {{SECRYPT}},
  pages     = {435--443},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/LermanNV13,
  author    = {Liran Lerman and
               Jorge Nakahara Jr. and
               Nikita Veshchikov},
  title     = {Improving Block Cipher Design by Rearranging Internal Operations},
  booktitle = {{SECRYPT}},
  pages     = {27--38},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/MalinaHM13,
  author    = {Lukas Malina and
               Jan Hajny and
               Zdenek Martinasek},
  title     = {Efficient Group Signatures with Verifier-local Revocation Employing
               a Natural Expiration},
  booktitle = {{SECRYPT}},
  pages     = {555--560},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/MauriceONHF13,
  author    = {Cl{\'{e}}mentine Maurice and
               St{\'{e}}phane Onno and
               Christoph Neumann and
               Olivier Heen and
               Aur{\'{e}}lien Francillon},
  title     = {Improving 802.11 Fingerprinting of Similar Devices by Cooperative
               Fingerprinting},
  booktitle = {{SECRYPT}},
  pages     = {379--386},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/MillikenSYM13,
  author    = {Jonny Milliken and
               Valerio Selis and
               Kian Meng Yap and
               Alan J. Marshall},
  title     = {Development of Device Identity using WiFi Layer 2 Management Frames
               for Combating Rogue APs},
  booktitle = {{SECRYPT}},
  pages     = {488--493},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/NanavatiJ13,
  author    = {Nirali R. Nanavati and
               Devesh C. Jinwala},
  title     = {A Game Theory based Repeated Rational Secret Sharing Scheme for Privacy
               Preserving Distributed Data Mining},
  booktitle = {{SECRYPT}},
  pages     = {512--517},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/NeriGMMP13,
  author    = {Mario Arrigoni Neri and
               Marco Guarnieri and
               Eros Magri and
               Simone Mutti and
               Stefano Paraboschi},
  title     = {A Model-driven Approach for Securing Software Architectures},
  booktitle = {{SECRYPT}},
  pages     = {595--602},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/NouraMA13,
  author    = {Hassan N. Noura and
               Steven Martin and
               Khaldoun Al Agha},
  title     = {{E3SN} - Efficient Security Scheme for Sensor Networks},
  booktitle = {{SECRYPT}},
  pages     = {615--621},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/OhtakeHKEHWYKYI13,
  author    = {Go Ohtake and
               Yuki Hironaka and
               Kenjiro Kai and
               Yosuke Endo and
               Goichiro Hanaoka and
               Hajime Watanabe and
               Shota Yamada and
               Kohei Kasamatsu and
               Takashi Yamakawa and
               Hideki Imai},
  title     = {Partially Wildcarded Attribute-based Encryption and Its Efficient
               Construction},
  booktitle = {{SECRYPT}},
  pages     = {339--346},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Patsakis13,
  author    = {Constantinos Patsakis},
  title     = {Recovering {RSA} Private Keys on Implementations with Tampered LSBs},
  booktitle = {{SECRYPT}},
  pages     = {453--460},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Raiteri13,
  author    = {Daniele Codetta Raiteri},
  title     = {A Preliminary Application of Generalized Fault Trees to Security},
  booktitle = {{SECRYPT}},
  pages     = {609--614},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Rass13,
  author    = {Stefan Rass},
  title     = {Dynamic Proofs of Retrievability from Chameleon-Hashes},
  booktitle = {{SECRYPT}},
  pages     = {296--304},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/RaviBV13,
  author    = {Saradha Ravi and
               N. Balakrishnan and
               Bharath Venkatesh},
  title     = {Behavior-based Malware Analysis using Profile Hidden Markov Models},
  booktitle = {{SECRYPT}},
  pages     = {195--206},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ReynagaC13,
  author    = {Gerardo Reynaga and
               Sonia Chiasson},
  title     = {The Usability of CAPTCHAs on Smartphones},
  booktitle = {{SECRYPT}},
  pages     = {427--434},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/RostamiCT13,
  author    = {Saeed Rostami and
               Sadegh Bamohabbat Chafjiri and
               Seyed Amir Hossein Tabatabaei},
  title     = {Related-key Impossible Differential Cryptanalysis of Full-round {HIGHT}},
  booktitle = {{SECRYPT}},
  pages     = {537--542},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/SalvaZL13,
  author    = {S{\'{e}}bastien Salva and
               Stassia R. Zafimiharisoa and
               Patrice Lauren{\c{c}}ot},
  title     = {Intent Security Testing - An Approach to Testing the Intent-based
               Vulnerability of Android Components},
  booktitle = {{SECRYPT}},
  pages     = {355--362},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/SanzSULNB13,
  author    = {Borja Sanz and
               Igor Santos and
               Xabier Ugarte{-}Pedrero and
               Carlos Laorden and
               Javier Nieves and
               Pablo Garc{\'{\i}}a Bringas},
  title     = {Instance-based Anomaly Method for Android Malware Detection},
  booktitle = {{SECRYPT}},
  pages     = {387--394},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/SarwarMBK13,
  author    = {Golam Sarwar and
               Olivier Mehani and
               Roksana Boreli and
               Mohamed Ali K{\^{a}}afar},
  title     = {On the Effectiveness of Dynamic Taint Analysis for Protecting against
               Private Information Leaks on Android-based Devices},
  booktitle = {{SECRYPT}},
  pages     = {461--468},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13,
  author    = {Yu Sasaki and
               Wataru Komatsubara and
               Yasuhide Sakai and
               Lei Wang and
               Mitsugu Iwamoto and
               Kazuo Sakiyama and
               Kazuo Ohta},
  title     = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5}
               and {HAVAL}},
  booktitle = {{SECRYPT}},
  pages     = {111--122},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/SchindlerSKSZ13,
  author    = {Sven Schindler and
               Bettina Schnor and
               Simon Kiertscher and
               Thomas Scheffler and
               Eldad Zack},
  title     = {HoneydV6: {A} Low-interaction IPv6 Honeypot},
  booktitle = {{SECRYPT}},
  pages     = {86--97},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/SchreudersB13,
  author    = {Z. Cliffe Schreuders and
               Adil M. Bhat},
  title     = {Not All ISPs Equally Secure Home Users - An Empirical Study Comparing
               Wi-Fi Security Provided by {UK} ISPs},
  booktitle = {{SECRYPT}},
  pages     = {568--573},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/StergiopoulosKG13,
  author    = {George Stergiopoulos and
               Miltiadis Kandias and
               Dimitris Gritzalis},
  title     = {Approaching Encryption through Complex Number Logarithms},
  booktitle = {{SECRYPT}},
  pages     = {574--579},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/SvendaUM13,
  author    = {Petr Svenda and
               Martin Ukrop and
               Vashek Matyas},
  title     = {Towards Cryptographic Function Distinguishers with Evolutionary Circuits},
  booktitle = {{SECRYPT}},
  pages     = {135--146},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/TeuflZSH13,
  author    = {Peter Teufl and
               Thomas Zefferer and
               Christof Stromberger and
               Christoph Hechenblaikner},
  title     = {iOS Encryption Systems - Deploying iOS Devices in Security-critical
               Environments},
  booktitle = {{SECRYPT}},
  pages     = {170--182},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/TrabelsiB13,
  author    = {Slim Trabelsi and
               Hana Bouafif},
  title     = {Abusing Social Networks with Abuse Reports - {A} Coalition Attack
               for Social Networks},
  booktitle = {{SECRYPT}},
  pages     = {500--505},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/TrojahnSO13,
  author    = {Matthias Trojahn and
               Christian Schadewald and
               Frank Ortmeier},
  title     = {Keystroke Authentication with a Capacitive Display using Different
               Mobile Devices},
  booktitle = {{SECRYPT}},
  pages     = {580--585},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama13,
  author    = {Kazuki Yoneyama},
  title     = {Practical and Exposure-resilient Hierarchical ID-based Authenticated
               Key Exchange without Random Oracles},
  booktitle = {{SECRYPT}},
  pages     = {518--523},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ZeffererT13,
  author    = {Thomas Zefferer and
               Peter Teufl},
  title     = {Policy-based Security Assessment of Mobile End-user Devices - An Alternative
               to Mobile Device Management Solutions for Android Smartphones},
  booktitle = {{SECRYPT}},
  pages     = {347--354},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ZhouVH13,
  author    = {Lan Zhou and
               Vijay Varadharajan and
               Michael Hitchens},
  title     = {Trust-based Secure Cloud Data Storage with Cryptographic Role-based
               Access Control},
  booktitle = {{SECRYPT}},
  pages     = {62--73},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ZolotavkinJ13,
  author    = {Yevhen Zolotavkin and
               Martti Juhola},
  title     = {SVD-based Digital Image Watermarking on approximated Orthogonal Matrix},
  booktitle = {{SECRYPT}},
  pages     = {321--330},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/ZwattendorferS13,
  author    = {Bernd Zwattendorfer and
               Daniel Slamanig},
  title     = {Privacy-preserving Realization of the {STORK} Framework in the Public
               Cloud},
  booktitle = {{SECRYPT}},
  pages     = {419--426},
  publisher = {SciTePress},
  year      = {2013}
}
@proceedings{DBLP:conf/secrypt/2013,
  editor    = {Pierangela Samarati},
  title     = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
               on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
               July, 2013},
  publisher = {SciTePress},
  year      = {2013}
}
@inproceedings{DBLP:conf/secrypt/Al-KhazzarS12,
  author    = {Ahmed Al{-}Khazzar and
               Nick Savage},
  title     = {Biometric Identification in Virtual Worlds using Biometric Fusion
               Techniques},
  booktitle = {{SECRYPT}},
  pages     = {263--269},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/AtallahFW12,
  author    = {Mikhail J. Atallah and
               Keith B. Frikken and
               Shumiao Wang},
  title     = {Private Outsourcing of Matrix Multiplication over Closed Semi-rings},
  booktitle = {{SECRYPT}},
  pages     = {136--144},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/AthanasiouCBMTG12,
  author    = {George Athanasiou and
               Chara I. Chalkou and
               D. Bardis and
               Harris E. Michail and
               George Theodoridis and
               Costas E. Goutis},
  title     = {High-throughput Hardware Architectures of the {JH} Round-three {SHA-3}
               Candidate - An {FPGA} Design and Implementation Approach},
  booktitle = {{SECRYPT}},
  pages     = {126--135},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/BarbuHD12,
  author    = {Guillaume Barbu and
               Philippe Hoogvorst and
               Guillaume Duc},
  title     = {Tampering with Java Card Exceptions - The Exception Proves the Rule},
  booktitle = {{SECRYPT}},
  pages     = {55--63},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/BhattacharyaDCBI12,
  author    = {Anup Kumar Bhattacharya and
               Abhijit Das and
               Dipanwita Roy Chowdhury and
               Bhargav Bellur and
               Aravind Iyer},
  title     = {SIMD-based Implementations of Eta Pairing Over Finite Fields of Small
               Characteristics},
  booktitle = {{SECRYPT}},
  pages     = {94--101},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/BrennerPS12,
  author    = {Michael Brenner and
               Henning Perl and
               Matthew Smith},
  title     = {Practical Applications of Homomorphic Encryption},
  booktitle = {{SECRYPT}},
  pages     = {5--14},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/BringerCP12,
  author    = {Julien Bringer and
               Herv{\'{e}} Chabanne and
               Alain Patey},
  title     = {An Application of a Group Signature Scheme with Backward Unlinkability
               to Biometric Identity Management},
  booktitle = {{SECRYPT}},
  pages     = {421--425},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/BringerP12,
  author    = {Julien Bringer and
               Alain Patey},
  title     = {{VLR} Group Signatures - How to Achieve Both Backward Unlinkability
               and Efficient Revocation Checks},
  booktitle = {{SECRYPT}},
  pages     = {215--220},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/ButinB12,
  author    = {Denis Butin and
               Giampaolo Bella},
  title     = {Verifying Privacy by Little Interaction and No Process Equivalence},
  booktitle = {{SECRYPT}},
  pages     = {251--256},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/CarlosMPC12,
  author    = {Marcelo Carlomagno Carlos and
               Jean Everson Martina and
               Geraint Price and
               Ricardo Felipe Cust{\'{o}}dio},
  title     = {A Proposed Framework for Analysing Security Ceremonies},
  booktitle = {{SECRYPT}},
  pages     = {440--445},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/ChouOL12,
  author    = {Yuyu Chou and
               Jan Oetting and
               Olga Levina},
  title     = {Building the Security Foundation to Embrace Public Software-as-a-Service
               (SaaS) - Security Policies for SaaS Data Protection},
  booktitle = {{SECRYPT}},
  pages     = {227--232},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/ClementeLR12,
  author    = {Patrice Clemente and
               Jean{-}Fran{\c{c}}ois Lalande and
               Jonathan Rouzaud{-}Cornabas},
  title     = {HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-interaction
               Honeypots},
  booktitle = {{SECRYPT}},
  pages     = {434--439},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Correia12,
  author    = {Lu{\'{\i}}s M. Correia},
  title     = {A Perspective of the Networks of the Future and Smart Cities},
  booktitle = {{SECRYPT}},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/CourtoisML12,
  author    = {Nicolas T. Courtois and
               Theodosis Mourouzis and
               Pho V. Le},
  title     = {Extension of de Weger's Attack on {RSA} with Large Public Keys},
  booktitle = {{SECRYPT}},
  pages     = {145--153},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/DharwadkarA12,
  author    = {Nagaraj V. Dharwadkar and
               B. B. Amberker},
  title     = {Reversible Steganographic Scheme with High Embedding Capacity using
               Dual Cover Images},
  booktitle = {{SECRYPT}},
  pages     = {15--24},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Diaz-SantiagoC12,
  author    = {Sandra Diaz{-}Santiago and
               Debrup Chakraborty},
  title     = {On Securing Communication from Profilers},
  booktitle = {{SECRYPT}},
  pages     = {154--162},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/EfremovP12,
  author    = {Denis Efremov and
               Nikolay V. Pakulin},
  title     = {Sevigator: Network Confinement of Malware Applications and Untrusted
               Operating Systems},
  booktitle = {{SECRYPT}},
  pages     = {395--398},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/EmuraR12,
  author    = {Keita Emura and
               Mohammad Shahriar Rahman},
  title     = {Constructing Secure-channel Free Searchable Encryption from Anonymous
               {IBE} with Partitioned Ciphertext Structure},
  booktitle = {{SECRYPT}},
  pages     = {84--93},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/EmuraS12,
  author    = {Keita Emura and
               Takashi Sato},
  title     = {Flexible Group Key Exchange with On-demand Computation of Subgroup
               Keys Supporting Subgroup Key Randomization},
  booktitle = {{SECRYPT}},
  pages     = {353--357},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/FallahpourMN12,
  author    = {Mehdi Fallahpour and
               David Meg{\'{\i}}as and
               Hossein Najaf{-}Zadeh},
  title     = {Adaptive Speech Watermarking in Wavelet Domain based on Logarithm},
  booktitle = {{SECRYPT}},
  pages     = {412--415},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Fournaris12,
  author    = {Apostolos P. Fournaris},
  title     = {Distributed Threshold Certificate based Encryption Scheme with No
               Trusted Dealer},
  booktitle = {{SECRYPT}},
  pages     = {314--320},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Fox12,
  author    = {Geoffrey Charles Fox},
  title     = {Cyberinfrastructure for eScience and eBusiness from Clouds to Exascale},
  booktitle = {{SECRYPT}},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Frikken12,
  author    = {Keith B. Frikken},
  title     = {Cryptographic Enforcement of Access Control while Mitigating Key Sharing},
  booktitle = {{SECRYPT}},
  pages     = {245--250},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Garcia12,
  author    = {Johan Garcia},
  title     = {Quantifying the Benefits of File Size Information for Forensic Hash
               Matching},
  booktitle = {{SECRYPT}},
  pages     = {333--338},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/GarciaGVS12,
  author    = {Jesus Luna Garcia and
               Hamza Ghani and
               Tsvetoslava Vateva and
               Neeraj Suri},
  title     = {Quantitative Assessment of Cloud Security Level Agreements - {A} Case
               Study},
  booktitle = {{SECRYPT}},
  pages     = {64--73},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Govindaraju12,
  author    = {Venu Govindaraju},
  title     = {Making Sense of All Things Handwritten - From Postal Addresses to
               Tablet Notes},
  booktitle = {{SECRYPT}},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/HameedKF12,
  author    = {Sufian Hameed and
               Tobias Kloht and
               Xiaoming Fu},
  title     = {iSATS: Leveraging Identity based Sender Authentication for Spam Mitigation},
  booktitle = {{SECRYPT}},
  pages     = {408--411},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/HammamiS12,
  author    = {Ali Hammami and
               No{\"{e}}mie Simoni},
  title     = {Secure and Seamless Session Management in Mobile and Heterogeneous
               Environment},
  booktitle = {{SECRYPT}},
  pages     = {282--289},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Henricksen12,
  author    = {Matt Henricksen},
  title     = {Two Dragons - {A} Family of Fast Word-based Stream Ciphers},
  booktitle = {{SECRYPT}},
  pages     = {35--44},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/HoumaniD12,
  author    = {Hanane Houmani and
               Mourad Debbabi},
  title     = {Formal Analysis of the {TLS} Handshake Protocol},
  booktitle = {{SECRYPT}},
  pages     = {192--205},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Jajodia12,
  author    = {Sushil Jajodia},
  title     = {A Mission-centric Framework for Cyber Situational Awareness},
  booktitle = {{SECRYPT}},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/KhayatiSUO12,
  author    = {Leyli Javid Khayati and
               Erkay Savas and
               Berkant Ustaoglu and
               Cengiz {\"{O}}rencik},
  title     = {Privacy-preserving Targeted Advertising Scheme for {IPTV} using the
               Cloud},
  booktitle = {{SECRYPT}},
  pages     = {74--83},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/KimKC12,
  author    = {Byoung{-}Koo Kim and
               Ikkyun Kim and
               Tai{-}Myoung Chung},
  title     = {Network-based Executable File Extraction and Analysis for Malware
               Detection},
  booktitle = {{SECRYPT}},
  pages     = {430--433},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Kiviharju12,
  author    = {Mikko Kiviharju},
  title     = {Towards Pervasive Cryptographic Access Control Models},
  booktitle = {{SECRYPT}},
  pages     = {239--244},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/KlonowskiSW12,
  author    = {Marek Klonowski and
               Piotr Syga and
               Wojciech Wodo},
  title     = {Some Remarks on Keystroke Dynamics - Global Surveillance, Retrieving
               Information and Simple Countermeasures},
  booktitle = {{SECRYPT}},
  pages     = {296--301},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/KotenkoCN12,
  author    = {Igor V. Kotenko and
               Andrey Chechulin and
               Evgenia Novikova},
  title     = {Attack Modelling and Security Evaluation for Security Information
               and Event Management},
  booktitle = {{SECRYPT}},
  pages     = {391--394},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/KotenkoPS12,
  author    = {Igor V. Kotenko and
               Olga Polubelova and
               Igor Saenko},
  title     = {Data Repository for Security Information and Event Management in Service
               Infrastructures},
  booktitle = {{SECRYPT}},
  pages     = {308--313},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/LampeP12,
  author    = {Rodolphe Lampe and
               Jacques Patarin},
  title     = {Analysis of Some Natural Variants of the {PKP} Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {209--214},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/LegendreDK12,
  author    = {Florian Legendre and
               Gilles Dequen and
               Micha{\"{e}}l Krajecki},
  title     = {Inverting Thanks to {SAT} Solving - An Application on Reduced-step
               MD*},
  booktitle = {{SECRYPT}},
  pages     = {339--344},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/LermanMN12,
  author    = {Liran Lerman and
               Olivier Markowitch and
               Jorge Nakahara Jr.},
  title     = {Key Management as a Service},
  booktitle = {{SECRYPT}},
  pages     = {276--281},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/LiZBZYH12,
  author    = {Min Li and
               Yulong Zhang and
               Kun Bai and
               Wanyu Zang and
               Meng Yu and
               Xubin He},
  title     = {Improving Cloud Survivability through Dependency based Virtual Machine
               Placement},
  booktitle = {{SECRYPT}},
  pages     = {321--326},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Maccari12,
  author    = {Leonardo Maccari},
  title     = {A Collaborative Firewall for Wireless Ad-Hoc Social Networks},
  booktitle = {{SECRYPT}},
  pages     = {290--295},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/MauroMJ12,
  author    = {Alessio Di Mauro and
               Alessandro Mei and
               Sushil Jajodia},
  title     = {Secure File Allocation and Caching in Large-scale Distributed Systems},
  booktitle = {{SECRYPT}},
  pages     = {182--191},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/MichailAGTG12,
  author    = {Harris E. Michail and
               George Athanasiou and
               Andreas Gregoriades and
               George Theodoridis and
               Costas E. Goutis},
  title     = {On the Development of Totally Self-checking Hardware Design for the
               {SHA-1} Hash Function},
  booktitle = {{SECRYPT}},
  pages     = {270--275},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/NanavatiJ12,
  author    = {Nirali R. Nanavati and
               Devesh C. Jinwala},
  title     = {Privacy Preserving Approaches for Global Cycle Detections for Cyclic
               Association Rules in Distributed Databases},
  booktitle = {{SECRYPT}},
  pages     = {368--371},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/PatsakisD12,
  author    = {Constantinos Patsakis and
               Kleanthis Dellios},
  title     = {Securing In-vehicle Communication and Redefining the Role of Automotive
               Immobilizer},
  booktitle = {{SECRYPT}},
  pages     = {221--226},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/PohlsSMP12,
  author    = {Henrich Christopher P{\"{o}}hls and
               Kai Samelin and
               Hermann de Meer and
               Joachim Posegga},
  title     = {Flexible Redactable Signature Schemes for Trees - Extended Security
               Model and Construction},
  booktitle = {{SECRYPT}},
  pages     = {113--125},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/PolychroniadouCS12,
  author    = {Antigoni Polychroniadou and
               Konstantinos Chalkias and
               George Stephanides},
  title     = {The Concept of Compatibility between Identity-based and Certificateless
               Encryption Schemes},
  booktitle = {{SECRYPT}},
  pages     = {403--407},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/RassK12,
  author    = {Stefan Rass and
               Michal Koza},
  title     = {On Secure Communication over Wireless Sensor Networks},
  booktitle = {{SECRYPT}},
  pages     = {364--367},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/RatnayakeKY12,
  author    = {Deepthi N. Ratnayake and
               Hassan B. Kazemian and
               Syed A. Yusuf},
  title     = {Improved Detection of Probe Request Attacks - Using Neural Networks
               and Genetic Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {345--350},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/ReinmanW12,
  author    = {Tzachy Reinman and
               Erez Waisbard},
  title     = {PPiTTA - Preserving Privacy in {TV} Targeted Advertising},
  booktitle = {{SECRYPT}},
  pages     = {327--332},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/RyckDPJ12,
  author    = {Philippe De Ryck and
               Lieven Desmet and
               Frank Piessens and
               Wouter Joosen},
  title     = {A Security Analysis of Emerging Web Standards - {HTML5} and Friends,
               from Specification to Implementation},
  booktitle = {{SECRYPT}},
  pages     = {257--262},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/SchiavoV12,
  author    = {Chiara Valentina Schiavo and
               Andrea Visconti},
  title     = {An Improved Public-key Tracing Scheme with Sublinear Ciphertext Size},
  booktitle = {{SECRYPT}},
  pages     = {302--307},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/SchickR12,
  author    = {Rainer Schick and
               Christoph Ruland},
  title     = {Non-repudiation of Forwarding - Traceability of Confidential Data
               Via Multiple Recipients},
  booktitle = {{SECRYPT}},
  pages     = {387--390},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/SchutteFG12,
  author    = {Julian Sch{\"{u}}tte and
               Hervais Simo Fhom and
               Mark Gall},
  title     = {Security Policies in Dynamic Service Compositions},
  booktitle = {{SECRYPT}},
  pages     = {233--238},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/SchutteSS12,
  author    = {Martin Sch{\"{u}}tte and
               Thomas Scheffler and
               Bettina Schnor},
  title     = {Development of a Snort IPv6 Plugin - Detection of Attacks on the Neighbor
               Discovery Protocol},
  booktitle = {{SECRYPT}},
  pages     = {399--402},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/SojkaP12,
  author    = {Anna Sojka and
               Krzysztof Piotrowski},
  title     = {lmRNG: {A} Lightweight Pseudorandom Number Generator for Wireless
               Sensor Networks},
  booktitle = {{SECRYPT}},
  pages     = {358--363},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/SonnenbichlerG12,
  author    = {Andreas C. Sonnenbichler and
               Andreas Geyer{-}Schulz},
  title     = {{ADQL:} {A} Flexible Access Definition and Query Language to Define
               Access Control Models},
  booktitle = {{SECRYPT}},
  pages     = {379--386},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/SunWZ12,
  author    = {Yonglin Sun and
               Yongjun Wang and
               Yi Zhang},
  title     = {Self-ad-MCNHA-SLOS - {A} Self-adaptive Minimum-Cost Network Hardening
               Algorithm based on Stochastic Loose Optimize Strategy},
  booktitle = {{SECRYPT}},
  pages     = {372--378},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Tunstall12,
  author    = {Michael Tunstall},
  title     = {Improved "Partial Sums"-based Square Attack on {AES}},
  booktitle = {{SECRYPT}},
  pages     = {25--34},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/VetterUWS12,
  author    = {Benjamin Vetter and
               Osman Ugus and
               Dirk Westhoff and
               Christoph Sorge},
  title     = {Homomorphic Primitives for a Privacy-friendly Smart Metering Architecture},
  booktitle = {{SECRYPT}},
  pages     = {102--112},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/VitaliVSBM12,
  author    = {Domenico Vitali and
               Antonio Villani and
               Angelo Spognardi and
               Roberto Battistoni and
               Luigi V. Mancini},
  title     = {DDoS Detection with Information Theory Metrics and Netflows - {A}
               Real Case},
  booktitle = {{SECRYPT}},
  pages     = {172--181},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/YangHS12,
  author    = {Chenguang Yang and
               Ghaith Hammouri and
               Berk Sunar},
  title     = {Voice Passwords Revisited},
  booktitle = {{SECRYPT}},
  pages     = {163--171},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/YiTO12,
  author    = {Xun Yi and
               Raylin Tso and
               Eiji Okamoto},
  title     = {Identity-based Password-Authenticated Key Exchange for Client/Server
               Model},
  booktitle = {{SECRYPT}},
  pages     = {45--54},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/YoonOKJ12,
  author    = {Seungyong Yoon and
               Jintae Oh and
               Ikkyun Kim and
               Jongsoo Jang},
  title     = {Defense Against {TCP} Flooding Attack},
  booktitle = {{SECRYPT}},
  pages     = {416--420},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/YouL12,
  author    = {Lin You and
               Jie Lu},
  title     = {A Novel Fuzzy Vault Scheme for Secret Key Exchange},
  booktitle = {{SECRYPT}},
  pages     = {426--429},
  publisher = {SciTePress},
  year      = {2012}
}
@proceedings{DBLP:conf/secrypt/2012,
  editor    = {Pierangela Samarati and
               Wenjing Lou and
               Jianying Zhou},
  title     = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
               and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  publisher = {SciTePress},
  year      = {2012}
}
@inproceedings{DBLP:conf/secrypt/Abyaneh11,
  author    = {Mohammad Reza Sohizadeh Abyaneh},
  title     = {Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids},
  booktitle = {{SECRYPT}},
  pages     = {293--299},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/AlcaidePBA11,
  author    = {Almudena Alcaide and
               Esther Palomar and
               Israel Barroso{-}Perez and
               Ali E. Abdallah},
  title     = {Privacy-enhancing Cryptography-based Materials},
  booktitle = {{SECRYPT}},
  pages     = {379--382},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/AokiRSS11,
  author    = {Kazumaro Aoki and
               G{\"{u}}nther Roland and
               Yu Sasaki and
               Martin Schl{\"{a}}ffer},
  title     = {Byte Slicing Gr{\o}stl - Optimized Intel {AES-NI} and 8-bit Implementations
               of the {SHA-3} Finalist Gr{\o}stl},
  booktitle = {{SECRYPT}},
  pages     = {124--133},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/BernabePCCPG11,
  author    = {Jorge Bernal Bernab{\'{e}} and
               Juan Manuel Mar{\'{\i}}n P{\'{e}}rez and
               Jose M. Alcaraz Calero and
               F{\'{e}}lix J. Garc{\'{\i}}a Clemente and
               Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
               Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title     = {Towards an Authorization System for Cloud Infrastructure Providers},
  booktitle = {{SECRYPT}},
  pages     = {333--338},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/BiswasCD11,
  author    = {Praloy Kr. Biswas and
               Dipanwita Roy Chowdhury and
               K. S. Dasgupta},
  title     = {Fast Selective Encryption Scheme for {MP3} Files - Using {GRAIN} Stream
               Cipher},
  booktitle = {{SECRYPT}},
  pages     = {414--417},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/BlantonA11,
  author    = {Marina Blanton and
               Mehrdad Aliasgari},
  title     = {On the (Non-)reusability of Fuzzy Sketches and Extractors and Security
               in the Computational Setting},
  booktitle = {{SECRYPT}},
  pages     = {68--77},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/BounaCG11,
  author    = {Bechara al Bouna and
               Richard Chbeir and
               Alban Gabillon},
  title     = {The Image Protector - {A} Flexible Security Rule Specification Toolkit},
  booktitle = {{SECRYPT}},
  pages     = {345--350},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/BousquetCL11,
  author    = {Aline Bousquet and
               Patrice Clemente and
               Jean{-}Fran{\c{c}}ois Lalande},
  title     = {{SYNEMA:} Visual Monitoring of Network and System Security Sensors},
  booktitle = {{SECRYPT}},
  pages     = {375--378},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/BrahmiYP11,
  author    = {Imen Brahmi and
               Sadok Ben Yahia and
               Pascal Poncelet},
  title     = {A Snort-based Mobile Agent for a Distributed Intrusion Detection System},
  booktitle = {{SECRYPT}},
  pages     = {198--207},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/BrennerWVS11,
  author    = {Michael Brenner and
               Jan Wiebelitz and
               Gabriele von Voigt and
               Matthew Smith},
  title     = {A Smart-gentry based Software System for Secret Program Execution},
  booktitle = {{SECRYPT}},
  pages     = {238--244},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Cabello11,
  author    = {Enrique Cabello},
  title     = {Face Biometrics without Intrusion in Airport},
  booktitle = {{SECRYPT}},
  pages     = {09},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/CaoO11,
  author    = {Xiaolin Cao and
               M{\'{a}}ire O'Neill},
  title     = {A Forward Private Protocol based on {PRNG} and {LPN} for Low-cost
               {RFID}},
  booktitle = {{SECRYPT}},
  pages     = {287--292},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Chao11,
  author    = {Han{-}Chieh Chao},
  title     = {WiMAX? - {A} Case Study on Minimizing Construction Cost for {IEEE}
               802.16j Multi-hop Relay Networks},
  booktitle = {{SECRYPT}},
  pages     = {05},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/ChenV11,
  author    = {Yanling Chen and
               A. J. Han Vinck},
  title     = {A Fresh Look into the Biometric Authentication - Perspective from
               Shannon's Secrecy System and a Special Wiretap Channel},
  booktitle = {{SECRYPT}},
  pages     = {168--177},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/CourtoisM11,
  author    = {Nicolas Courtois and
               Theodosis Mourouzis},
  title     = {Black-box Collision Attacks on the Compression Function of the {GOST}
               Hash Function},
  booktitle = {{SECRYPT}},
  pages     = {325--332},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/DasVGMNN11,
  author    = {Saptarsi Das and
               Keshavan Varadarajan and
               Ganesh Garga and
               Rajdeep Mondal and
               Ranjani Narayan and
               S. K. Nandy},
  title     = {A Method for Flexible Reduction over Binary Fields using a Field Multiplier},
  booktitle = {{SECRYPT}},
  pages     = {50--58},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/FarmerA11,
  author    = {Michael E. Farmer and
               William Arthur},
  title     = {Study of the Phenomenology of {DDOS} Network Attacks in Phase Space},
  booktitle = {{SECRYPT}},
  pages     = {78--89},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/FiazzaPV11,
  author    = {Maria{-}Camilla Fiazza and
               Michele Peroli and
               Luca Vigan{\`{o}}},
  title     = {Attack Interference in Non-collaborative Scenarios for Security Protocol
               Analysis},
  booktitle = {{SECRYPT}},
  pages     = {144--156},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/FischerIP11,
  author    = {Michael J. Fischer and
               Michaela Iorga and
               Ren{\'{e}} Peralta},
  title     = {A Public Randomness Service},
  booktitle = {{SECRYPT}},
  pages     = {434--438},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Fournaris11,
  author    = {Apostolos P. Fournaris},
  title     = {Distributed Threshold Cryptography Certification with No Trusted Dealer},
  booktitle = {{SECRYPT}},
  pages     = {400--404},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/FriotGB11,
  author    = {Nicolas Friot and
               Christophe Guyeux and
               Jacques M. Bahi},
  title     = {Chaotic Iterations for Steganography - Stego-security and Chaos-security},
  booktitle = {{SECRYPT}},
  pages     = {218--227},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/FukushimaKMS11,
  author    = {Kazuhide Fukushima and
               Shinsaku Kiyomoto and
               Yutaka Miyake and
               Kouichi Sakurai},
  title     = {Towards Optimal Revocation and Tracing Schemes - The Power of the
               Ternary Tree},
  booktitle = {{SECRYPT}},
  pages     = {37--49},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/GligoroskiKAJ11,
  author    = {Danilo Gligoroski and
               Svein Johan Knapskog and
               J{\o}rn Amundsen and
               Rune Erlend Jensen},
  title     = {Internationally Standardized Efficient Cryptographic Hash Function},
  booktitle = {{SECRYPT}},
  pages     = {426--433},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Gomi11,
  author    = {Hidehito Gomi},
  title     = {Data and Access Management using Access Tokens for Delegating Authority
               to Persons and Software},
  booktitle = {{SECRYPT}},
  pages     = {457--463},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/GrozaM11,
  author    = {Bogdan Groza and
               Pal{-}Stefan Murvay},
  title     = {Higher Layer Authentication for Broadcast in Controller Area Networks},
  booktitle = {{SECRYPT}},
  pages     = {188--197},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/HajnyMZ11,
  author    = {Jan Hajny and
               Lukas Malina and
               Vaclav Zeman},
  title     = {Practical Anonymous Authentication - Designing Anonymous Authentication
               for Everyday Use},
  booktitle = {{SECRYPT}},
  pages     = {405--408},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Hernandez-CastroRC11,
  author    = {Carlos Javier Hern{\'{a}}ndez{-}Castro and
               Arturo Ribagorda and
               Julio C{\'{e}}sar Hern{\'{a}}ndez Castro},
  title     = {On the Strength of Egglue and Other Logic CAPTCHAs},
  booktitle = {{SECRYPT}},
  pages     = {157--167},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/InamuraIWNT11,
  author    = {Masaki Inamura and
               Keiichi Iwamura and
               Ryu Watanabe and
               Makoto Nishikawa and
               Toshiaki Tanaka},
  title     = {A New Tree-structure-specified Multisignature Scheme for a Document
               Circulation System},
  booktitle = {{SECRYPT}},
  pages     = {362--369},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/ItaniKC11,
  author    = {Wassim Itani and
               Ayman I. Kayssi and
               Ali Chehab},
  title     = {Policy-based Security Channels for Protecting Network Communication
               in Mobile Cloud Computing},
  booktitle = {{SECRYPT}},
  pages     = {450--456},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Jeske11,
  author    = {Tobias Jeske},
  title     = {Privacy-preserving Smart Metering without a Trusted-third-party},
  booktitle = {{SECRYPT}},
  pages     = {114--123},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/JiagueFGKLMS11,
  author    = {Michel Embe Jiague and
               Marc Frappier and
               Fr{\'{e}}d{\'{e}}ric Gervais and
               Pierre Konopacki and
               R{\'{e}}gine Laleau and
               J{\'{e}}r{\'{e}}my Milhau and
               Richard St.{-}Denis},
  title     = {A Four-concern-oriented Secure {IS} Development Approach},
  booktitle = {{SECRYPT}},
  pages     = {464--471},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/JouhariS11,
  author    = {Houda Jouhari and
               El Mamoun Souidi},
  title     = {A New Steganographic Scheme based on First Order Reed Muller Codes
               - {A} New Steganographic Scheme},
  booktitle = {{SECRYPT}},
  pages     = {351--356},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Kasten11,
  author    = {Andreas Kasten},
  title     = {Towards an Information Control Policy Model - Achieving More Transparency
               in Internet Filtering Approaches},
  booktitle = {{SECRYPT}},
  pages     = {409--413},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/KlonowskiKK11,
  author    = {Marek Klonowski and
               Michal Koza and
               Miroslaw Kutylowski},
  title     = {How to Transmit Messages via {WSN} in a Hostile Environment},
  booktitle = {{SECRYPT}},
  pages     = {387--390},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Lackner11,
  author    = {G{\"{u}}nther Lackner},
  title     = {On the Security of Location Determination and Verification Methods
               for Wireless Networks},
  booktitle = {{SECRYPT}},
  pages     = {263--268},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Lamersdorf11,
  author    = {Winfried Lamersdorf},
  title     = {Paradigms of Distributed Software Systems - Services, Processes, and
               Self-organization},
  booktitle = {{SECRYPT}},
  pages     = {011},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/LiuXJL11,
  author    = {Zongbin Liu and
               Luning Xia and
               Jiwu Jing and
               Peng Liu},
  title     = {A Tiny {RSA} Coprocessor based on Optimized Systolic Montgomery Architecture},
  booktitle = {{SECRYPT}},
  pages     = {105--113},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/LunaGGS11,
  author    = {Jesus Luna Garcia and
               Hamza Ghani and
               Daniel Germanus and
               Neeraj Suri},
  title     = {A Security Metrics Framework for the Cloud},
  booktitle = {{SECRYPT}},
  pages     = {245--250},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/MaieroM11,
  author    = {Carlo Maiero and
               Marino Miculan},
  title     = {Unobservable Intrusion Detection based on Call Traces in Paravirtualized
               Systems},
  booktitle = {{SECRYPT}},
  pages     = {300--306},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/ModicaT11,
  author    = {Giuseppe Di Modica and
               Orazio Tomarchio},
  title     = {Semantic Annotations for Security Policy Matching in WS-policy},
  booktitle = {{SECRYPT}},
  pages     = {443--449},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/MylonasDTG11,
  author    = {Alexios Mylonas and
               Stelios Dritsas and
               Bill Tsoumas and
               Dimitris Gritzalis},
  title     = {Smartphone Security Evaluation - The Malware Attack Case},
  booktitle = {{SECRYPT}},
  pages     = {25--36},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/NakanishiBI11,
  author    = {Isao Nakanishi and
               Sadanao Baba and
               Masahiro Inoue},
  title     = {Driver Authentication using Brain Waves While Route Tracing as a Mental
               Task},
  booktitle = {{SECRYPT}},
  pages     = {90--96},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/PiuriS11,
  author    = {Vincenzo Piuri and
               Fabio Scotti},
  title     = {Biometrics Privacy - Technologies and Applications},
  booktitle = {{SECRYPT}},
  pages     = {07},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/PivaD11,
  author    = {Fabio Piva and
               Ricardo Dahab},
  title     = {E-Commerce and Fair Exchange - The Problem of Item Validation},
  booktitle = {{SECRYPT}},
  pages     = {317--324},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/PopoveniucKL11,
  author    = {Stefan Popoveniuc and
               John Kelsey and
               Eugen Leontie},
  title     = {On the Privacy Threats of Electronic Poll Books},
  booktitle = {{SECRYPT}},
  pages     = {281--286},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/PrietoMMI11,
  author    = {Iria Prieto and
               Eduardo Maga{\~{n}}a and
               Daniel Morat{\'{o}} and
               Mikel Izal},
  title     = {Botnet Detection based on {DNS} Records and Active Probing},
  booktitle = {{SECRYPT}},
  pages     = {307--316},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/RassS11,
  author    = {Stefan Rass and
               Peter Schartner},
  title     = {Information-leakage in Hybrid Randomized Protocols},
  booktitle = {{SECRYPT}},
  pages     = {134--143},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/RavariF11,
  author    = {Ali Noorollahi Ravari and
               Mehran S. Fallah},
  title     = {A Logical View of Nonmonotonicity in Access Control},
  booktitle = {{SECRYPT}},
  pages     = {472--481},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Redouane11,
  author    = {Abdesselam Redouane},
  title     = {Towards a Calculus for Non Repudiation Protocols},
  booktitle = {{SECRYPT}},
  pages     = {383--386},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Rodriguez-GomezMG11,
  author    = {Rafael Rodr{\'{\i}}guez{-}G{\'{o}}mez and
               Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
               Pedro Garcia{-}Teodoro},
  title     = {Analysis of Botnets through Life-cycle},
  booktitle = {{SECRYPT}},
  pages     = {257--262},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/SalehaniY11,
  author    = {Yaser Esmaeili Salehani and
               Amr M. Youssef},
  title     = {Differential Fault Analysis of Hummingbird},
  booktitle = {{SECRYPT}},
  pages     = {357--361},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/SantosLB11,
  author    = {Igor Santos and
               Carlos Laorden and
               Pablo Garc{\'{\i}}a Bringas},
  title     = {Collective Classification for Unknown Malware Detection},
  booktitle = {{SECRYPT}},
  pages     = {251--256},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/SantosLUSB11,
  author    = {Igor Santos and
               Carlos Laorden and
               Xabier Ugarte{-}Pedrero and
               Borja Sanz and
               Pablo Garc{\'{\i}}a Bringas},
  title     = {Anomaly-based Spam Filtering},
  booktitle = {{SECRYPT}},
  pages     = {5--14},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Schutte11,
  author    = {Julian Sch{\"{u}}tte},
  title     = {Apollon: Towards a Semantically Extensible Policy Framework},
  booktitle = {{SECRYPT}},
  pages     = {391--395},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Solis11,
  author    = {John Solis},
  title     = {Private Searching for Sensitive File Signatures},
  booktitle = {{SECRYPT}},
  pages     = {341--344},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Stelte11,
  author    = {Bj{\"{o}}rn Stelte},
  title     = {Byzantine Decisions for Inferring Trust in Sensor Networks},
  booktitle = {{SECRYPT}},
  pages     = {396--399},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Suarez-TangilPPR11,
  author    = {Guillermo Suarez{-}Tangil and
               Esther Palomar and
               Sergio Pastrana and
               Arturo Ribagorda},
  title     = {Artificial Immunity-based Correlation System},
  booktitle = {{SECRYPT}},
  pages     = {422--425},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/TaddeoMF11,
  author    = {Antonio Vincenzo Taddeo and
               Luis Germ{\'{a}}n Garc{\'{\i}}a Morales and
               Alberto Ferrante},
  title     = {A Framework for Security and Workload Gradual Adaptation},
  booktitle = {{SECRYPT}},
  pages     = {178--187},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Varela-VacaGP11,
  author    = {Angel Jesus Varela{-}Vaca and
               Rafael M. Gasca and
               Sergio Pozo},
  title     = {{OPBUS:} Risk-aware Framework for the Conformance of Security-quality
               Requirements in Business Processes},
  booktitle = {{SECRYPT}},
  pages     = {370--374},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Vaudenay11,
  author    = {Serge Vaudenay},
  title     = {Related-key Attack against Triple Encryption based on Fixed Points},
  booktitle = {{SECRYPT}},
  pages     = {59--67},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/VivekSR11,
  author    = {S. Sree Vivek and
               S. Sharmila Deva Selvi and
               C. Pandu Rangan},
  title     = {{CCA} Secure Certificateless Encryption Schemes based on {RSA}},
  booktitle = {{SECRYPT}},
  pages     = {208--217},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/VrakasGL11,
  author    = {Nikos Vrakas and
               Dimitris Geneiatakis and
               Costas Lambrinoudakis},
  title     = {{IS} {IP} Multimedia Subsystem Affected by `Malformed Message' Attacks?
               - An Evaluation of OpenIMS},
  booktitle = {{SECRYPT}},
  pages     = {275--280},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/XieLLZL11,
  author    = {Xin Xie and
               Fenlin Liu and
               Bin Lu and
               Tao Zhao and
               Hanning Li},
  title     = {A Static Software Birthmark based on Use-define Chains for Detecting
               the Theft of Java Programs},
  booktitle = {{SECRYPT}},
  pages     = {231--237},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/XuZF11,
  author    = {Jing Xu and
               Wen Tao Zhu and
               Dengguo Feng},
  title     = {A Smart Card based Generic Construction for Anonymous Authentication
               in Mobile Networks},
  booktitle = {{SECRYPT}},
  pages     = {269--274},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/YangZLL11,
  author    = {Chunfang Yang and
               Tao Zhao and
               Hanning Li and
               Fenlin Liu},
  title     = {Embedding Ratio Estimation based on Weighted Stego Image for Embedding
               in 2LSB},
  booktitle = {{SECRYPT}},
  pages     = {97--104},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/YiTO11,
  author    = {Xun Yi and
               Raylin Tso and
               Eiji Okamoto},
  title     = {Three-party Password-authenticated Key Exchange without Random Oracles},
  booktitle = {{SECRYPT}},
  pages     = {15--24},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/YuB11,
  author    = {Jinying Yu and
               Philipp Brune},
  title     = {No Security by Obscurity - Why Two Factor Authentication Should Be
               based on an Open Design},
  booktitle = {{SECRYPT}},
  pages     = {418--421},
  publisher = {SciTePress},
  year      = {2011}
}
@proceedings{DBLP:conf/secrypt/2011,
  editor    = {Javier L{\'{o}}pez and
               Pierangela Samarati},
  title     = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
               and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {SciTePress},
  year      = {2011}
}
@inproceedings{DBLP:conf/secrypt/Akyildiz10,
  author    = {Ian F. Akyildiz},
  title     = {Nanonetworks - {A} New Frontier in Communications},
  booktitle = {{SECRYPT}},
  pages     = {5},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Al-KhazzarS10,
  author    = {Ahmed Al{-}Khazzar and
               Nick Savage},
  title     = {Graphical Authentication based on user Behaviour},
  booktitle = {{SECRYPT}},
  pages     = {86--89},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Alvarez-CuberoZ10,
  author    = {Jos{\'{e}} Antonio {\'{A}}lvarez{-}Cubero and
               Pedro J. Zufiria},
  title     = {A {C++} Class for Analysing Vector Boolean Functions from a Cryptographic
               Perspective},
  booktitle = {{SECRYPT}},
  pages     = {512--520},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/AndukuriC10,
  author    = {Murthy S. Andukuri and
               C. Edward Chow},
  title     = {Efficient Asymmetric IPSec for Secure iSCSI},
  booktitle = {{SECRYPT}},
  pages     = {314--317},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/AzizAJACR10,
  author    = {Benjamin Aziz and
               Alvaro Arenas and
               Ian Johnson and
               Matej Artac and
               Ales Cernivec and
               Philip Robinson},
  title     = {Management of Security Policies in Virtual Organisations},
  booktitle = {{SECRYPT}},
  pages     = {467--477},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/BakerC10,
  author    = {Bradley Baker and
               C. Edward Chow},
  title     = {{HTEE:} An {HMAC} based Tamper Evident Encryption},
  booktitle = {{SECRYPT}},
  pages     = {196--205},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/BhatSSVP10,
  author    = {Veena H. Bhat and
               S. Krishna and
               P. Deepa Shenoy and
               K. R. Venugopal and
               Lalit M. Patnaik},
  title     = {{HUBFIRE} - {A} Multi-class {SVM} based {JPEG} Steganalysis using
               {HBCL} Statistics and {FR} Index},
  booktitle = {{SECRYPT}},
  pages     = {447--452},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/BiryukovPZ10,
  author    = {Alex Biryukov and
               Deike Priemuth{-}Schmid and
               Bin Zhang},
  title     = {Analysis of {SNOW} 3G{\(\oplus\)} Resynchronization Mechanism},
  booktitle = {{SECRYPT}},
  pages     = {327--333},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Bourbakis10,
  author    = {Nikolaos G. Bourbakis},
  title     = {Information Security: The {SCAN} - Secure Processor with Crypto-Biometrics
               Capabilities},
  booktitle = {{SECRYPT}},
  pages     = {11},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/CabidduCV10,
  author    = {Giovanni Cabiddu and
               Emanuele Cesena and
               Davide Vernizzi},
  title     = {Anonymous Services - Enhancing End-user Privacy Exploiting Anonymous
               Networks},
  booktitle = {{SECRYPT}},
  pages     = {221--225},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/ChatzipoulidisM10,
  author    = {Aristeidis Chatzipoulidis and
               Ioannis Mavridis},
  title     = {An {ICT} Security Management Framework},
  booktitle = {{SECRYPT}},
  pages     = {459--462},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/ClarkTMCAIS10,
  author    = {John A. Clark and
               Juan E. Tapiador and
               John A. McDermid and
               Pau{-}Chen Cheng and
               Dakshi Agrawal and
               Natalie Ivanic and
               Dave Slogget},
  title     = {Risk based Access Control with Uncertain and Time-dependent Sensitivity},
  booktitle = {{SECRYPT}},
  pages     = {5--13},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/DarapureddiMP10,
  author    = {Avinash Darapureddi and
               Radhesh Mohandas and
               Alwyn Roshan Pais},
  title     = {Throttling DDoS Attacks using Discrete Logarithm Problem},
  booktitle = {{SECRYPT}},
  pages     = {263--269},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/DasguptaSN10,
  author    = {Dipankar Dasgupta and
               Sudip Saha and
               Aregahegn Negatu},
  title     = {Techniques for Validation and Controlled Execution of Processes, Codes
               and Data - {A} Survey},
  booktitle = {{SECRYPT}},
  pages     = {77--85},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Djuric10,
  author    = {Petar M. Djuric},
  title     = {From Nature to Methods and Back to Nature},
  booktitle = {{SECRYPT}},
  pages     = {7},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/DorflingerVKF10,
  author    = {Tim D{\"{o}}rflinger and
               Anna Voth and
               Juliane Kr{\"{a}}mer and
               Ronald Fromm},
  title     = {"My Smartphone is a Safe!" - The User's Point of View Regarding Novel
               Authentication Methods and Gradual Security Levels on Smartphones},
  booktitle = {{SECRYPT}},
  pages     = {155--164},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/FardW10,
  author    = {Amin Milani Fard and
               Ke Wang},
  title     = {An Effective Clustering Approach to Web Query Log Anonymization},
  booktitle = {{SECRYPT}},
  pages     = {109--119},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/FischerK10,
  author    = {Anja Fischer and
               Winfried E. K{\"{u}}hnhauser},
  title     = {Efficient Algorithmic Safety Analysis of {HRU} Security Models},
  booktitle = {{SECRYPT}},
  pages     = {49--58},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/FrikkenZ10,
  author    = {Keith B. Frikken and
               Yihua Zhang},
  title     = {Confidentiality and Integrity for {SUM} Aggregation in Sensor Networks},
  booktitle = {{SECRYPT}},
  pages     = {231--240},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/GibsonCM10,
  author    = {Marcia Gibson and
               Marc Conrad and
               Carsten Maple},
  title     = {Infinite Alphabet Passwords - {A} Unified Model for a Class of Authentication
               Systems},
  booktitle = {{SECRYPT}},
  pages     = {94--99},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/GmelchP10,
  author    = {Oliver Gmelch and
               G{\"{u}}nther Pernul},
  title     = {Preventing Malicious Portlets from Communicating and Intercepting
               in Collaboration Portals},
  booktitle = {{SECRYPT}},
  pages     = {177--182},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/GuyeuxB10,
  author    = {Christophe Guyeux and
               Jacques M. Bahi},
  title     = {A New Chaos-based Watermarking Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {455--458},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/HajnyPZ10,
  author    = {Jan Hajny and
               Tomas Pelka and
               Vaclav Zeman},
  title     = {Privacy Protection for user Authentication},
  booktitle = {{SECRYPT}},
  pages     = {90--93},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Hernandez-CastroRS10,
  author    = {Carlos Javier Hern{\'{a}}ndez{-}Castro and
               Arturo Ribagorda and
               Yago S{\'{a}}ez},
  title     = {Side-channel Attack on the HumanAuth {CAPTCHA}},
  booktitle = {{SECRYPT}},
  pages     = {59--65},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/IbraimiAP10,
  author    = {Luan Ibraimi and
               Muhammad Asim and
               Milan Petkovic},
  title     = {An Encryption Scheme for a Secure Policy Updating},
  booktitle = {{SECRYPT}},
  pages     = {399--408},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/IonRC10,
  author    = {Mihaela Ion and
               Giovanni Russello and
               Bruno Crispo},
  title     = {Providing Confidentiality in Content-based Publish/subscribe Systems},
  booktitle = {{SECRYPT}},
  pages     = {287--292},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/KarimiC10,
  author    = {Vahid R. Karimi and
               Donald D. Cowan},
  title     = {Access Control Models for Business Processes},
  booktitle = {{SECRYPT}},
  pages     = {489--498},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Kartalopoulos10,
  author    = {Stamatios V. Kartalopoulos},
  title     = {Chaotic Quantum Cryptography - The Ultimate for Network Security},
  booktitle = {{SECRYPT}},
  pages     = {9},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Kumar10,
  author    = {Sandeep S. Kumar},
  title     = {Anonymous Social Stamps - Authenticating Anonymous Statements to Friends
               with Privacy},
  booktitle = {{SECRYPT}},
  pages     = {183--188},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/KumarAVLR10,
  author    = {Swarun Kumar and
               Shivank Agrawal and
               Ramarathnam Venkatesan and
               Satyanarayana V. Lokam and
               C. Pandu Rangan},
  title     = {Forcing Out a Confession - Threshold Discernible Ring Signatures},
  booktitle = {{SECRYPT}},
  pages     = {379--388},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Lang10,
  author    = {Bo Lang},
  title     = {Trust Degree based Access Control for Social Networks},
  booktitle = {{SECRYPT}},
  pages     = {43--48},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/LangarMA10,
  author    = {Mahjoub Langar and
               Mohamed Mejri and
               Kamel Adi},
  title     = {Rewriting-based Security Enforcement of Concurrent Systems - {A} Formal
               Approach},
  booktitle = {{SECRYPT}},
  pages     = {66--74},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/MallikM10,
  author    = {Dibyendu Mallik and
               Debdeep Mukhopadhyay},
  title     = {New Pseudo Near Collision Attack on Tiger},
  booktitle = {{SECRYPT}},
  pages     = {427--430},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/MannesSLS10,
  author    = {Elisa Mannes and
               Eduardo da Silva and
               Michele Nogueira Lima and
               Aldri Luiz dos Santos},
  title     = {Implications of Misbehaving Attacks on Probabilistic Quorum System
               for MANETs},
  booktitle = {{SECRYPT}},
  pages     = {189--195},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/MappALP10,
  author    = {Glenford E. Mapp and
               Mahdi Aiash and
               Aboubaker Lasebae and
               Raphael Chung{-}Wei Phan},
  title     = {Security Models for Heterogeneous Networking},
  booktitle = {{SECRYPT}},
  pages     = {318--321},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/MichailAKGGP10,
  author    = {Harris E. Michail and
               George Athanasiou and
               Angeliki Kritikakou and
               Costas E. Goutis and
               Andreas Gregoriades and
               Vicky G. Papadopoulou},
  title     = {Ultra High Speed {SHA-256} Hashing Cryptographic Module for IPSec
               Hardware/Software Codesign},
  booktitle = {{SECRYPT}},
  pages     = {309--313},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/MichalopoulosM10,
  author    = {Dimitrios Michalopoulos and
               Ioannis Mavridis},
  title     = {Towards Risk based Prevention of Grooming Attacks},
  booktitle = {{SECRYPT}},
  pages     = {217--220},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/MillikenM10,
  author    = {Jonny Milliken and
               Alan J. Marshall},
  title     = {The Threat-Victim Table - {A} Security Prioritisation Framework For
               Diverse {WLAN} Network Topographies},
  booktitle = {{SECRYPT}},
  pages     = {37--42},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/MunillaOP10,
  author    = {Jorge Munilla and
               Andr{\'{e}}s Ortiz and
               Alberto Peinado},
  title     = {What can {RFID} do for Vanets? - {A} Cryptographic Point of View},
  booktitle = {{SECRYPT}},
  pages     = {295--298},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/MunozGA10,
  author    = {Alfonso Mu{\~{n}}oz Mu{\~{n}}oz and
               Justo Carracedo Gallardo and
               Irina Arguelles {\'{A}}lvarez},
  title     = {Improving N-Gram Linguistic Steganography based on Templates},
  booktitle = {{SECRYPT}},
  pages     = {209--212},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/NakanoKKT10,
  author    = {Yuto Nakano and
               Jun Kurihara and
               Shinsaku Kiyomoto and
               Toshiaki Tanaka},
  title     = {On a Construction of Stream-cipher-based Hash Functions},
  booktitle = {{SECRYPT}},
  pages     = {334--343},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/NeupaneS10,
  author    = {Kashi Neupane and
               Rainer Steinwandt},
  title     = {Server-assisted Long-term Secure 3-party Key Establishment},
  booktitle = {{SECRYPT}},
  pages     = {372--378},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/OttavianiZR10,
  author    = {Vittorio Ottaviani and
               Alberto Zanoni and
               Massimo Regoli},
  title     = {Conjugation as Public Key Agreement Protocol in Mobile Cryptography},
  booktitle = {{SECRYPT}},
  pages     = {411--416},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/PanosXS10,
  author    = {Christoforos Panos and
               Christos Xenakis and
               Ioannis Stavrakakis},
  title     = {A Novel Intrusion Detection System for MANETs},
  booktitle = {{SECRYPT}},
  pages     = {25--34},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/PapanikolaouCGMP10,
  author    = {Nick Papanikolaou and
               Sadie Creese and
               Michael Goldsmith and
               Marco Casassa Mont and
               Siani Pearson},
  title     = {EnCoRe: Towards a Holistic Approach to Privacy},
  booktitle = {{SECRYPT}},
  pages     = {171--176},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/PatelMP10,
  author    = {Vipul Patel and
               Radhesh Mohandas and
               Alwyn R. Pais},
  title     = {Attacks on Web Services and Mitigation Schemes},
  booktitle = {{SECRYPT}},
  pages     = {499--504},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/PengB10,
  author    = {Kun Peng and
               Feng Bao},
  title     = {Vulnerability of a Non-membership Proof Scheme},
  booktitle = {{SECRYPT}},
  pages     = {419--422},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/PopoveniucL10,
  author    = {Stefan Popoveniuc and
               Eugen Leontie},
  title     = {Safe {RPC} - Auditing Mixnets Safely using Randomized Partial Checking},
  booktitle = {{SECRYPT}},
  pages     = {165--170},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/PuraPB10,
  author    = {Mihai{-}Lica Pura and
               Victor Valeriu Patriciu and
               Ion Bica},
  title     = {Formal Verification of {G-PAKE} Using Casper/FDR2 - Securing a Group
               {PAKE} Protocol Using Casper/FDR2},
  booktitle = {{SECRYPT}},
  pages     = {299--303},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/SelviVAR10,
  author    = {S. Sharmila Deva Selvi and
               S. Sree Vivek and
               Sakhi S. Anand and
               C. Pandu Rangan},
  title     = {An Identity based Ring Signcryption Scheme with Public Verifiability},
  booktitle = {{SECRYPT}},
  pages     = {362--371},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/SharT10,
  author    = {Lwin Khin Shar and
               Hee Beng Kuan Tan},
  title     = {Auditing the Defense Against Cross Site Scripting in Web Applications},
  booktitle = {{SECRYPT}},
  pages     = {505--511},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/SlamanigR10,
  author    = {Daniel Slamanig and
               Stefan Rass},
  title     = {Anonymous but Authorized Transactions Supporting Selective Traceability},
  booktitle = {{SECRYPT}},
  pages     = {132--141},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/SojkaPL10,
  author    = {Anna Sojka and
               Krzysztof Piotrowski and
               Peter Langend{\"{o}}rfer},
  title     = {Short {ECC} - {A} Lightweight Security Approach for Wireless Sensor
               Networks},
  booktitle = {{SECRYPT}},
  pages     = {304--308},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/StavrouPHH10,
  author    = {Eliana Stavrou and
               Andreas Pitsillides and
               George C. Hadjichristofi and
               Christoforos N. Hadjicostis},
  title     = {Security in Future Mobile Sensor Networks - Issues and Challenges},
  booktitle = {{SECRYPT}},
  pages     = {278--286},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/TabiaL10,
  author    = {Karim Tabia and
               Philippe Leray},
  title     = {Handling IDS' Reliability in Alert Correlation - {A} Bayesian Network-based
               Model for Handling IDS's Reliability and Controlling Prediction/False
               Alarm Rate Tradeoffs},
  booktitle = {{SECRYPT}},
  pages     = {14--24},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/TaddeoMF10,
  author    = {Antonio Vincenzo Taddeo and
               Marcello Mura and
               Alberto Ferrante},
  title     = {QoS and Security in Energy-harvesting Wireless Sensor Networks},
  booktitle = {{SECRYPT}},
  pages     = {241--250},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/UshidaOKY10,
  author    = {Mebae Ushida and
               Kazuo Ohta and
               Yutaka Kawai and
               Kazuki Yoneyama},
  title     = {Proxiable Designated Verifier Signature},
  booktitle = {{SECRYPT}},
  pages     = {344--353},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/VascoHV10,
  author    = {Maria Isabel Gonzalez Vasco and
               Somayeh Heidarvand and
               Jorge L. Villar},
  title     = {Anonymous Subscription Schemes - {A} Flexible Construction for On-line
               Services Access},
  booktitle = {{SECRYPT}},
  pages     = {120--131},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Vaya10,
  author    = {Shailesh Vaya},
  title     = {Realizing Secure Multiparty Computation on Incomplete Networks},
  booktitle = {{SECRYPT}},
  pages     = {270--277},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/WahidR10,
  author    = {Khan Ferdous Wahid and
               Javier Rubio{-}Loyola},
  title     = {Secure Bridging in Large Scale Deployment of Ethernet},
  booktitle = {{SECRYPT}},
  pages     = {251--260},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/Wang10,
  author    = {Alex Hai Wang},
  title     = {Don't Follow Me - Spam Detection in Twitter},
  booktitle = {{SECRYPT}},
  pages     = {142--151},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/WilliamsTH10,
  author    = {David M. Williams and
               Helen Treharne and
               Anthony T. S. Ho},
  title     = {On the Importance of One-time Key Pairs in Buyer-seller Watermarking
               Protocols},
  booktitle = {{SECRYPT}},
  pages     = {441--446},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/WuWL10,
  author    = {Xiaoyu Wu and
               Duncan S. Wong and
               Qing Li},
  title     = {Extended Visual Cryptography Scheme for Color Images with no Pixel
               Expansion},
  booktitle = {{SECRYPT}},
  pages     = {423--426},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/YeeXM10,
  author    = {George Yee and
               Xingli Xie and
               Shikharesh Majumdar},
  title     = {Automated Threat Identification for {UML}},
  booktitle = {{SECRYPT}},
  pages     = {521--527},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/YuWZL10,
  author    = {Meng Yu and
               Alex Hai Wang and
               Wanyu Zang and
               Peng Liu},
  title     = {Evaluating Survivability and Costs of Three Virtual Machine based
               Server Architectures},
  booktitle = {{SECRYPT}},
  pages     = {478--485},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/ZaidiAK10,
  author    = {Abdelhalim Zaidi and
               Nazim Agoulmine and
               Tayeb Kenaza},
  title     = {Piecewise Classification of Attack Patterns for Efficient Network
               Intrusion Detection},
  booktitle = {{SECRYPT}},
  pages     = {100--104},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/ZannonePE10,
  author    = {Nicola Zannone and
               Milan Petkovic and
               Sandro Etalle},
  title     = {Towards Data Protection Compliance},
  booktitle = {{SECRYPT}},
  pages     = {213--216},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/ZhouMDZPZ10,
  author    = {Xiaoyi Zhou and
               Jixin Ma and
               Wencai Du and
               Bo Zhao and
               Miltos Petridis and
               Yongzhe Zhao},
  title     = {{BMQE} System - {A} {MQ} Equations System based on Ergodic Matrix},
  booktitle = {{SECRYPT}},
  pages     = {431--435},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/ZhuANS10,
  author    = {Huafei Zhu and
               Tadashi Araragi and
               Takashi Nishide and
               Kouichi Sakurai},
  title     = {Adaptive and Composable Non-interactive String-commitment Protocols},
  booktitle = {{SECRYPT}},
  pages     = {354--361},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/ZhuANS10a,
  author    = {Huafei Zhu and
               Tadashi Araragi and
               Takashi Nishide and
               Kouichi Sakurai},
  title     = {Universally Composable Non-committing Encryptions in the Presence
               of Adaptive Adversaries},
  booktitle = {{SECRYPT}},
  pages     = {389--398},
  publisher = {SciTePress},
  year      = {2010}
}
@proceedings{DBLP:conf/secrypt/2010,
  editor    = {Sokratis K. Katsikas and
               Pierangela Samarati},
  title     = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
               and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  publisher = {SciTePress},
  year      = {2010}
}
@inproceedings{DBLP:conf/secrypt/AzerEE09,
  author    = {Marianne Azer and
               Sherif El{-}Kassas and
               Magdy S. El{-}Soudani},
  title     = {Preventing Wormhole Attack in Wireless Ad Hoc Networks using Cost-based
               Schemes},
  booktitle = {{SECRYPT}},
  pages     = {69--74},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/BaileyBRP09,
  author    = {Daniel V. Bailey and
               John G. Brainard and
               Sebastian Rohde and
               Christof Paar},
  title     = {One-touch Financial Transaction Authentication},
  booktitle = {{SECRYPT}},
  pages     = {5--12},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/BarisonMM09,
  author    = {Dherik Barison and
               Rodrigo Sanches Miani and
               Leonardo de Souza Mendes},
  title     = {Evaluation of Quality and Security of a VoIP Network based on Asterisk
               and OpenVPN},
  booktitle = {{SECRYPT}},
  pages     = {144--147},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/BenferhatBD09,
  author    = {Salem Benferhat and
               Abdelhamid Boudjelida and
               Habiba Drias},
  title     = {Adding Expert Knowledge to TAN-based Intrusion Detection Systems},
  booktitle = {{SECRYPT}},
  pages     = {61--64},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/BhaumikC09,
  author    = {Jaydeb Bhaumik and
               Dipanwita Roy Chowdhury},
  title     = {Nmix: An Ideal Candidate for Key Mixing},
  booktitle = {{SECRYPT}},
  pages     = {285--288},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/BourgeoisH09,
  author    = {Julien Bourgeois and
               Raheel Hassan Syed},
  title     = {Managing Security of Grid Architecture with a Grid Security Operation
               Center},
  booktitle = {{SECRYPT}},
  pages     = {403--408},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/ChenJ09,
  author    = {Shiwei Chen and
               Chenhui Jin},
  title     = {A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation
               for Hash Functions},
  booktitle = {{SECRYPT}},
  pages     = {245--248},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/ChengGH09,
  author    = {Jingde Cheng and
               Yuichi Goto and
               Daisuke Horie},
  title     = {{ISEE:} An Information Security Engineering Environment},
  booktitle = {{SECRYPT}},
  pages     = {395--400},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/ChewZK09,
  author    = {Guanhan Chew and
               Aileen Zhang and
               Khoongming Khoo},
  title     = {Resynchronization Attack on Stream Ciphers Filtered by Maiorana-McFarland
               Functions},
  booktitle = {{SECRYPT}},
  pages     = {159--162},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/ChoiLKK09,
  author    = {Jaeun Choi and
               Myungjong Lee and
               Gisung Kim and
               Sehun Kim},
  title     = {Monitoring Node Selection Algorithm for Intrusion Detection in Congested
               Sensor Network},
  booktitle = {{SECRYPT}},
  pages     = {117--120},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Corral-GarciaGSG09,
  author    = {Javier Corral{-}Garc{\'{\i}}a and
               Carlos{-}Jorge del Arco Gonz{\'{a}}lez and
               Jos{\'{e}} Luis Gonz{\'{a}}lez S{\'{a}}nchez and
               Jos{\'{e}} Luis Redondo Garc{\'{\i}}a},
  title     = {Free Security Suite 2 - Easy, Intuitive and Complete Free Security
               Suite with Web Browser Integration},
  booktitle = {{SECRYPT}},
  pages     = {341--344},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Courtois09,
  author    = {Nicolas Courtois},
  title     = {The Dark Side of Security by Obscurity - and Cloning MiFare Classic
               Rail and Building Passes, Anywhere, Anytime},
  booktitle = {{SECRYPT}},
  pages     = {331--338},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/CretTSG09,
  author    = {Octavian Cret and
               Radu Tudoran and
               Alin Suciu and
               Tamas Gy{\"{o}}rfi},
  title     = {Implementing True Random Number Generators in FPGAs by Chip Filling},
  booktitle = {{SECRYPT}},
  pages     = {167--174},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Dagorn09,
  author    = {Nathalie Dagorn},
  title     = {Identifying Security Elements for Cooperative Information Systems},
  booktitle = {{SECRYPT}},
  pages     = {319--324},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Dragan09,
  author    = {Constantin Catalin Dragan},
  title     = {Interactive Secret Share Management},
  booktitle = {{SECRYPT}},
  pages     = {266--269},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Gallego-NicasioMMS09,
  author    = {Beatriz Gallego{-}Nicasio and
               Antonio Mu{\~{n}}oz and
               Antonio Ma{\~{n}}a and
               Daniel Serrano},
  title     = {Security Patterns, Towards a Further Level},
  booktitle = {{SECRYPT}},
  pages     = {349--356},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/GujjunooriSJDMP09,
  author    = {Saraiah Gujjunoori and
               Taqi Ali Syed and
               Madhu Babu J. and
               Avinash Darapureddi and
               Radhesh Mohandas and
               Alwyn R. Pais},
  title     = {Throttling DDoS Attacks},
  booktitle = {{SECRYPT}},
  pages     = {121--126},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/HajnyPL09,
  author    = {Jan Hajny and
               Tomas Pelka and
               Petra Lambertova},
  title     = {Universal Authentication Framework - Requirements and Phase Design},
  booktitle = {{SECRYPT}},
  pages     = {57--60},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/HamadK09,
  author    = {A. M. Hamad and
               Walid I. Khedr},
  title     = {Ad-hoc on Demand Authentication Chain Protocol - An Authentication
               Protocol for Ad-Hoc Networks},
  booktitle = {{SECRYPT}},
  pages     = {274--284},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/HegazyED09,
  author    = {Ola M. Hegazy and
               Ayman M. Bahaa Eldin and
               Yasser H. Dakroury},
  title     = {Quantum Secure Direct Communication using Entanglement and Super Dense
               Coding},
  booktitle = {{SECRYPT}},
  pages     = {175--181},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/HeoOJ09,
  author    = {Young{-}Jun Heo and
               Jintae Oh and
               Jongsoo Jang},
  title     = {Behavior-based Clustering for Discrimination between Flash Crowds
               and DDoS Attacks},
  booktitle = {{SECRYPT}},
  pages     = {140--143},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Hernandez-ArdietaFRR09,
  author    = {Jorge L. Hernandez{-}Ardieta and
               Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and
               Benjam{\'{\i}}n Ramos and
               Arturo Ribagorda},
  title     = {On the Need to Divide the Signature Creation Environment},
  booktitle = {{SECRYPT}},
  pages     = {375--380},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Hutter09,
  author    = {Michael Hutter},
  title     = {{RFID} Authentication Protocols based on Elliptic Curves - {A} Top-Down
               Evaluation Survey},
  booktitle = {{SECRYPT}},
  pages     = {101--110},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/IatrouVS09,
  author    = {Michael G. Iatrou and
               Artemios G. Voyiatzis and
               Dimitrios N. Serpanos},
  title     = {Network Stack Optimization for Improved IPsec Performance on Linux},
  booktitle = {{SECRYPT}},
  pages     = {83--91},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/JakubowskiSV09,
  author    = {Mariusz H. Jakubowski and
               Chit Wei Saw and
               Ramarathnam Venkatesan},
  title     = {Iterated Transformations and Quantitative Metrics for Software Protection},
  booktitle = {{SECRYPT}},
  pages     = {359--368},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Jin09,
  author    = {Hongxia Jin},
  title     = {Efficient Traitor Tracing for Content Protection},
  booktitle = {{SECRYPT}},
  pages     = {270--273},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoFM09,
  author    = {Shinsaku Kiyomoto and
               Kazuhide Fukushima and
               Keith M. Martin},
  title     = {An Offline Peer-to-peer Broadcasting Scheme with Anonymity},
  booktitle = {{SECRYPT}},
  pages     = {75--82},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/KosterKNBBO09,
  author    = {Friedrich K{\"{o}}ster and
               Michael Klaas and
               Hanh Quyen Nguyen and
               Walter Brenner and
               Markus Br{\"{a}}ndle and
               Sebastian Obermeier},
  title     = {Collaborative Security Assessments in Embedded Systems Development
               - The {ESSAF} Framework for Structured Qualitative Analysis},
  booktitle = {{SECRYPT}},
  pages     = {305--312},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Leymann09,
  author    = {Frank Leymann},
  title     = {Cloud Computing - Fundamental Architecture {\&} Future Applications},
  booktitle = {{SECRYPT}},
  pages     = {31--31},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/LinHY09,
  author    = {Changlu Lin and
               Lein Harn and
               Dingfeng Ye},
  title     = {Information-theoretically Secure Strong Verifiable Secret Sharing},
  booktitle = {{SECRYPT}},
  pages     = {233--238},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Marca09,
  author    = {David A. Marca},
  title     = {e-Business Design - {A} Shift to Adaptability},
  booktitle = {{SECRYPT}},
  pages     = {21--29},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/MianiPM09,
  author    = {Rodrigo Sanches Miani and
               Felipe Marques Pires and
               Leonardo de Souza Mendes},
  title     = {An Alternative Approach for Formula Modelling in Security Metrics},
  booktitle = {{SECRYPT}},
  pages     = {381--386},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Mihai-LicaPB09,
  author    = {Mihai{-}Lica Pura and
               Victor Valeriu Patriciu and
               Ion Bica},
  title     = {Simulation of an Identity-based Cryptography Scheme for Ad Hoc Networks},
  booktitle = {{SECRYPT}},
  pages     = {135--139},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/MisraOBBG09,
  author    = {Sudip Misra and
               Mohammad S. Obaidat and
               Atig Bagchi and
               Ravindara Bhatt and
               Soumalya Ghosh},
  title     = {Attack Graph Generation with Infused Fuzzy Clustering},
  booktitle = {{SECRYPT}},
  pages     = {92--98},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/NguyenKKBOB09,
  author    = {Hanh Quyen Nguyen and
               Friedrich K{\"{o}}ster and
               Michael Klaas and
               Walter Brenner and
               Sebastian Obermeier and
               Markus Br{\"{a}}ndle},
  title     = {Tool Support for Achieving Qualitative Security Assessments of Critical
               Infrastructures - The {ESSAF} Framework for Structured Qualitative
               Analysis},
  booktitle = {{SECRYPT}},
  pages     = {297--304},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW09,
  author    = {Vijayakrishnan Pasupathinathan and
               Josef Pieprzyk and
               Huaxiong Wang},
  title     = {Certified Pseudonyms Colligated with Master Secret Key},
  booktitle = {{SECRYPT}},
  pages     = {190--197},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/PozoVGC09,
  author    = {Sergio Pozo and
               Angel Jesus Varela{-}Vaca and
               Rafael M. Gasca and
               Rafael Ceballos},
  title     = {Efficient Algorithms and Abstract Data Types for Local Inconsistency
               Isolation in Firewall ACLs},
  booktitle = {{SECRYPT}},
  pages     = {42--53},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/RahmaniSK09,
  author    = {Hamza Rahmani and
               Nabil Sahli and
               Farouk Kamoun},
  title     = {A Traffic Coherence Analysis Model for DDoS Attack Detection},
  booktitle = {{SECRYPT}},
  pages     = {148--154},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Reistad09,
  author    = {Tord Ingolf Reistad},
  title     = {Multiparty Comparison - An Improved Multiparty Protocol for Comparison
               of Secret-shared Values},
  booktitle = {{SECRYPT}},
  pages     = {325--330},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/RetamosaV09,
  author    = {Germ{\'{a}}n Retamosa and
               Jorge E. L{\'{o}}pez de Vergara},
  title     = {Assessment of Mobile Security Platforms},
  booktitle = {{SECRYPT}},
  pages     = {127--132},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/RibeiroR09,
  author    = {Leonardo Ribeiro and
               Guerra Ruy},
  title     = {Safe Reverse Auctions Protocol - Adding Treatment Against Collusive
               Shill Bidding and Sniping Attacks},
  booktitle = {{SECRYPT}},
  pages     = {239--244},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/RomanovO09,
  author    = {Anton Romanov and
               Eiji Okamoto},
  title     = {An Approach for Designing of Enterprise {IT} Landscapes to Perform
               Quantitave Information Security Risk Assessment},
  booktitle = {{SECRYPT}},
  pages     = {313--318},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Saeb09,
  author    = {Magdy Saeb},
  title     = {The Chameleon Cipher-192 {(CC-192)} - {A} Polymorphic Cipher},
  booktitle = {{SECRYPT}},
  pages     = {198--209},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/SahaC09,
  author    = {Mounita Saha and
               Dipanwita Roy Chowdhury},
  title     = {An Efficient Group Key Agreement Protocol for Heterogeneous Environment},
  booktitle = {{SECRYPT}},
  pages     = {182--189},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Samarati09,
  author    = {Pierangela Samarati},
  title     = {Protecting Information Privacy in the Electronic Society},
  booktitle = {{SECRYPT}},
  pages     = {19--19},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Sato09,
  author    = {Hideo Sato},
  title     = {Finger Vein Verification Technology for Mobile Apparatus},
  booktitle = {{SECRYPT}},
  pages     = {37--41},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/SengaD09,
  author    = {Wataru Senga and
               Hiroshi Doi},
  title     = {On the Security of Adding Confirmers into Designated Confirmer Signatures},
  booktitle = {{SECRYPT}},
  pages     = {249--256},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Sheikholeslam09,
  author    = {Arash Sheikholeslam},
  title     = {A Chaos based Encryption Method using Dynamical Systems with Strange
               Attractors},
  booktitle = {{SECRYPT}},
  pages     = {259--265},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Shishkov09,
  author    = {Blagovest Shishkov},
  title     = {Adaptive Antennas in Wireless Communication Networks},
  booktitle = {{SECRYPT}},
  pages     = {5--17},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/SichaniM09,
  author    = {Mohsen Hajsalehi Sichani and
               Ali Movaghar},
  title     = {A New Analysis of {RC4} - {A} Data Mining Approach {(J48)}},
  booktitle = {{SECRYPT}},
  pages     = {213--218},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/SilvaSA09,
  author    = {Renan Fischer e Silva and
               Eduardo da Silva and
               Luiz Carlos Pessoa Albini},
  title     = {Resisting Impersonation Attacks in Chaining-based Public-Key Management
               on Manets - The Virtual Public-key Management},
  booktitle = {{SECRYPT}},
  pages     = {155--158},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/SlamanigSS09,
  author    = {Daniel Slamanig and
               Peter Schartner and
               Christian Stingl},
  title     = {Practical Traceable Anonymous Identification},
  booktitle = {{SECRYPT}},
  pages     = {225--232},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Torrano-GimenezPA09,
  author    = {Carmen Torrano{-}Gimenez and
               Alejandro P{\'{e}}rez{-}Villegas and
               Gonzalo {\'{A}}lvarez},
  title     = {An Anomaly-based Web Application Firewall},
  booktitle = {{SECRYPT}},
  pages     = {23--28},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Tout09,
  author    = {Hicham Tout},
  title     = {Phishpin: An Integrated, Identity-based Anti-phishing Approach},
  booktitle = {{SECRYPT}},
  pages     = {369--374},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/VarshneyC09,
  author    = {Mayank Varshney and
               Dipanwita Roy Chowdhury},
  title     = {A New Image Encryption Algorithm using Cellular Automata},
  booktitle = {{SECRYPT}},
  pages     = {289--292},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/VerslypeD09,
  author    = {Kristof Verslype and
               Bart De Decker},
  title     = {Service and Timeframe Dependent Unlinkable One-time Pseudonyms},
  booktitle = {{SECRYPT}},
  pages     = {13--20},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/VivekSR09,
  author    = {S. Sree Vivek and
               S. Sharmila Deva Selvi and
               C. Pandu Rangan},
  title     = {On the Security of Two Ring Signcryption Schemes},
  booktitle = {{SECRYPT}},
  pages     = {219--224},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/Vossen09,
  author    = {Gottfried Vossen},
  title     = {Web 2.0: {A} Buzzword, a Serious Development, just Fun, or What?},
  booktitle = {{SECRYPT}},
  pages     = {33--40},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/WiesauerS09,
  author    = {Andreas Wiesauer and
               Johannes Sametinger},
  title     = {A Security Design Pattern Taxonomy based on Attack Patterns - Findings
               of a Systematic Literature Review},
  booktitle = {{SECRYPT}},
  pages     = {387--394},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/YangMY09,
  author    = {Peng Yang and
               Yuanchen Ma and
               Satoshi Yoshizawa},
  title     = {Fast Re-estabilishment of IKEv2 Security Associations for Recovery
               of IPsec Gateways in Mobile Network},
  booktitle = {{SECRYPT}},
  pages     = {111--116},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/ZadicN09,
  author    = {Mirad Zadic and
               Andrea Nowak},
  title     = {Visual Programming Language for Security Requirements in Business
               Processes as Model-driven Software Development},
  booktitle = {{SECRYPT}},
  pages     = {29--36},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@proceedings{DBLP:conf/secrypt/2009,
  editor    = {Eduardo Fern{\'{a}}ndez{-}Medina and
               Manu Malek and
               Javier Hernando},
  title     = {{SECRYPT} 2009, Proceedings of the International Conference on Security
               and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
               of {ICETE} - The International Joint Conference on e-Business and
               Telecommunications},
  publisher = {{INSTICC} Press},
  year      = {2009}
}
@inproceedings{DBLP:conf/secrypt/AlisCEG08,
  author    = {Jorge Blasco Al{\'{\i}}s and
               Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
               Juan M. Est{\'{e}}vez{-}Tapiador and
               Arturo Ribagorda Garnacho},
  title     = {CSteg: Talking in {C} Code - Steganography of {C} Source Code in Text},
  booktitle = {{SECRYPT}},
  pages     = {399--406},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/AmberkerS08,
  author    = {B. B. Amberker and
               N. R. Sunitha},
  title     = {Forward-Secure Proxy Signature and Revocation Scheme for a Proxy Signer
               with Multiple Original Signers},
  booktitle = {{SECRYPT}},
  pages     = {245--252},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/ApampaZWA08,
  author    = {Kikelomo Maria Apampa and
               Tian Zhang and
               Gary B. Wills and
               David Argles},
  title     = {Ensuring Privacy of Biometric Factors in Multi-Factor Authentication
               Systems},
  booktitle = {{SECRYPT}},
  pages     = {44--49},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/ArenasAS08,
  author    = {{\'{A}}lvaro Enrique Arenas and
               Benjamin Aziz and
               Gheorghe Cosmin Silaghi},
  title     = {Reputation Management in Grid-based Virtual Organisations},
  booktitle = {{SECRYPT}},
  pages     = {538--545},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Atta-ur-RahmanHKS08,
  author    = {Atta{-}ur{-}Rahman and
               Mureed Hussain and
               Kahina Kabri and
               Dominique Seret},
  title     = {Kerberos Implementation in Manets},
  booktitle = {{SECRYPT}},
  pages     = {161--166},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/BagheriSN08,
  author    = {Nasour Bagheri and
               Babak Sadeghiyan and
               Majid Naderi},
  title     = {Multi-Collisions Attack in Ring Hash Structure},
  booktitle = {{SECRYPT}},
  pages     = {278--284},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/BenferhatS08,
  author    = {Salem Benferhat and
               Karima Sedki},
  title     = {Alert Correlation based on a Logical Handling of Administrator Preferences
               and Knowledge},
  booktitle = {{SECRYPT}},
  pages     = {50--56},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/BenferhatT08,
  author    = {Salem Benferhat and
               Karim Tabia},
  title     = {Novel and Anomalous Behavior Detection using Bayesian Network Classifiers},
  booktitle = {{SECRYPT}},
  pages     = {13--20},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/BenferhatT08a,
  author    = {Salem Benferhat and
               Karim Tabia},
  title     = {New Schemes for Anomaly Score Aggregation and Thresholding},
  booktitle = {{SECRYPT}},
  pages     = {21--28},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/BertoniBFR08,
  author    = {Guido Marco Bertoni and
               Luca Breveglieri and
               Roberto Farina and
               Francesco Regazzoni},
  title     = {A 640 Mbit/S 32-Bit Pipelined Implementation of the {AES} Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {453--459},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/BoulaicheA08,
  author    = {Ammar Boulaiche and
               Kamel Adi},
  title     = {Honeyd Detection Via Abnormal Behaviors Generated by the {ARPD} Daemon},
  booktitle = {{SECRYPT}},
  pages     = {65--71},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/CampoHP08,
  author    = {Juan Vera del Campo and
               Juan Hern{\'{a}}ndez{-}Serrano and
               Josep Pegueroles},
  title     = {{SCFS:} Towards Design and Implementation of a Secure Distributed
               Filesystem},
  booktitle = {{SECRYPT}},
  pages     = {169--176},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Carvalho08,
  author    = {Nuno Borges Carvalho},
  title     = {The Importance of Metrology in Wireless Communication Systems - From
               {AM/FM} to {SDR} Systems},
  booktitle = {{SECRYPT}},
  pages     = {35--35},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Chen08,
  author    = {Hsiao{-}Hwa Chen},
  title     = {Next Generation {CDMA} Technologies for Futuristic Wireless Communications},
  booktitle = {{SECRYPT}},
  pages     = {37},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/ChewK08,
  author    = {Guanhan Chew and
               Khoongming Khoo},
  title     = {A General Framework for Guess-and-Determine and Time-Memory-Data Trade-Off
               Attacks on Stream Ciphers},
  booktitle = {{SECRYPT}},
  pages     = {300--305},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/CoiO08,
  author    = {Juri Luca De Coi and
               Daniel Olmedilla},
  title     = {A Review of Trust Management, Security and Privacy Policy Languages},
  booktitle = {{SECRYPT}},
  pages     = {483--490},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Cox08,
  author    = {Ingemar J. Cox},
  title     = {Watermarking, Steganography and Content Forensics},
  booktitle = {{SECRYPT}},
  pages     = {29--29},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Diehl08,
  author    = {Malte Diehl},
  title     = {Geographic Data and Steganography - Using Google Earth and {KML} Files
               for High-Capacity Steganography},
  booktitle = {{SECRYPT}},
  pages     = {381--387},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/DionysiouBHF08,
  author    = {Ioanna Dionysiou and
               David E. Bakken and
               Carl H. Hauser and
               Deborah A. Frincke},
  title     = {Formalizing End-to-End Context-Aware Trust Relationships in Collaborative
               Activities},
  booktitle = {{SECRYPT}},
  pages     = {546--553},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/El-FotouhD08,
  author    = {Mohamed Abo El{-}Fotouh and
               Klaus Diepold},
  title     = {A Fast Encryption Scheme for Networks Applications},
  booktitle = {{SECRYPT}},
  pages     = {119--127},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/El-FotouhD08a,
  author    = {Mohamed Abo El{-}Fotouh and
               Klaus Diepold},
  title     = {The Substitution Cipher Chaining Mode},
  booktitle = {{SECRYPT}},
  pages     = {421--429},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/ElrakaibyCC08,
  author    = {Yehia Elrakaiby and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Nora Cuppens{-}Boulahia},
  title     = {Interactivity for Reactive Access Control},
  booktitle = {{SECRYPT}},
  pages     = {57--64},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/GomathisankaranKT08,
  author    = {Mahadevan Gomathisankaran and
               Ka{-}Ming Keung and
               Akhilesh Tyagi},
  title     = {{REBEL} - Reconfigurable Block Encryption Logic},
  booktitle = {{SECRYPT}},
  pages     = {312--318},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/GoodB08,
  author    = {Tim Good and
               Mohammed Benaissa},
  title     = {Price to Provide {RFID} Security and Privacy?},
  booktitle = {{SECRYPT}},
  pages     = {209--213},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/GroverSMK08,
  author    = {Satyajit Grover and
               Divya Naidu Kolar Sunder and
               Samuel O. Moffatt and
               Michael E. Kounavis},
  title     = {An Event-Driven, Inclusionary and Secure Approach to Kernel Integrity},
  booktitle = {{SECRYPT}},
  pages     = {411--420},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/GuelzimO08,
  author    = {Tarik Guelzim and
               Mohammad S. Obaidat},
  title     = {Novel Neurocomputing-based Scheme to Authenticate {WLAN} Users Employing
               Distance Proximity Threshold},
  booktitle = {{SECRYPT}},
  pages     = {145--153},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/HassanB08,
  author    = {Mohamed N. Hassan and
               Mohammed Benaissa},
  title     = {Low Area Scalable Montgomery Inversion Over GF(2m)},
  booktitle = {{SECRYPT}},
  pages     = {363--367},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/HerbosaDC08,
  author    = {Ra{\'{u}}l Herbosa and
               Gabriel D{\'{\i}}az and
               Manuel Castro},
  title     = {Securing the Email Services - New System for Secure Managing the Organization's
               Mail Service},
  booktitle = {{SECRYPT}},
  pages     = {469--472},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/HidalgoCG08,
  author    = {Sergio Pozo Hidalgo and
               Rafael Ceballos and
               Rafael Martinez Gasca},
  title     = {A Heuristic Polynomial Algorithm for Local Inconsistency Diagnosis
               in Firewall Rule Sets},
  booktitle = {{SECRYPT}},
  pages     = {430--441},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/HoumaniM08,
  author    = {Hanane Houmani and
               Mohamed Mejri},
  title     = {Ensuring the Correctness of Cryptographic Protocols with Respect to
               Secrecy},
  booktitle = {{SECRYPT}},
  pages     = {184--189},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/HwangTC08,
  author    = {Min{-}Shiang Hwang and
               Shiang{-}Feng Tzeng and
               Shu{-}Fen Chiou},
  title     = {An Improvement of Strong Proxy Signature and Its Applications},
  booktitle = {{SECRYPT}},
  pages     = {95--98},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/JensenK08,
  author    = {Christian Damsgaard Jensen and
               Thomas Rune Korsgaard},
  title     = {Dynamics of Trust Evolution - Auto-configuration of Dispositional
               Trust Dynamics},
  booktitle = {{SECRYPT}},
  pages     = {509--517},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Jin08,
  author    = {Hongxia Jin},
  title     = {Traitor Tracing for Anonymous Attack in Content Protection},
  booktitle = {{SECRYPT}},
  pages     = {331--336},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/JoshiP08,
  author    = {Shankar Joshi and
               Alwyn R. Pais},
  title     = {A New Probabilistic Rekeying Method for Secure Dynamic Groups},
  booktitle = {{SECRYPT}},
  pages     = {325--330},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/KilincY08,
  author    = {Celalettin Kilinc and
               Ali G{\"{o}}khan Yavuz},
  title     = {Applying {SRP} on {SIP} Authentication},
  booktitle = {{SECRYPT}},
  pages     = {227--231},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/KimN08,
  author    = {Kwang Ho Kim and
               Christophe N{\`{e}}gre},
  title     = {Point Multiplication on Supersingular Elliptic Curves Defined over
               Fields of Characteristic 2 and 3},
  booktitle = {{SECRYPT}},
  pages     = {373--376},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoTS08,
  author    = {Shinsaku Kiyomoto and
               Toshiaki Tanaka and
               Kouichi Sakurai},
  title     = {FPGA-Targeted Hardware Implementations of {K2}},
  booktitle = {{SECRYPT}},
  pages     = {270--277},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Kogan08,
  author    = {Yaakov Kogan},
  title     = {Improving Reliability in Commercial {IP} Networks},
  booktitle = {{SECRYPT}},
  pages     = {17--19},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/KuzuuHMW08,
  author    = {Kazuto Kuzuu and
               Yasushi Hirano and
               Kenji Mase and
               Toyohide Watanabe},
  title     = {Application to a Shared Terminal of a Roaming User Profile Set Up
               through LDAP-Smart Card Authentication Cooperation},
  booktitle = {{SECRYPT}},
  pages     = {29--34},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/LeeNU08,
  author    = {Peter Hyun{-}Jeen Lee and
               Shivaramakrishnan Narayan and
               Parampalli Udaya},
  title     = {Secure Communication in Mobile Ad Hoc Network using Efficient Certificateless
               Encryption},
  booktitle = {{SECRYPT}},
  pages     = {306--311},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/LenziniSE08,
  author    = {Gabriele Lenzini and
               Nabil Sahli and
               Henk Eertink},
  title     = {Trust Model for High Quality Recommendation},
  booktitle = {{SECRYPT}},
  pages     = {518--528},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/LiN08,
  author    = {Yin Li and
               Christophe N{\`{e}}gre},
  title     = {An Efficient Multiplication Algorithm using Binomial Residue Representation},
  booktitle = {{SECRYPT}},
  pages     = {319--324},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Lopez-GarciaRC08,
  author    = {Lourdes L{\'{o}}pez{-}Garc{\'{\i}}a and
               Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
               Miguel Le{\'{o}}n Ch{\'{a}}vez},
  title     = {An e-Voting Protocol based on Pairing Blind Signatures},
  booktitle = {{SECRYPT}},
  pages     = {214--217},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Marca08,
  author    = {David A. Marca},
  title     = {e-Business Innovation - Surviving the Coming Decades},
  booktitle = {{SECRYPT}},
  pages     = {5--16},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Maurer08,
  author    = {Ueli M. Maurer},
  title     = {Rethinking Digital Signatures},
  booktitle = {{SECRYPT}},
  pages     = {31--33},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/MelladoFP08,
  author    = {Daniel Mellado and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Mario Piattini},
  title     = {Security Requirements in Software Product Lines},
  booktitle = {{SECRYPT}},
  pages     = {442--449},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/MianiZMP08,
  author    = {Rodrigo Sanches Miani and
               Bruno Bogaz Zarpel{\~{a}}o and
               Leonardo de Souza Mendes and
               Mario Lemes Proen{\c{c}}a Jr.},
  title     = {Metrics Application in Metropolitan Broadband Access Network Security
               Analysis},
  booktitle = {{SECRYPT}},
  pages     = {473--476},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/MizunoD08,
  author    = {Takeo Mizuno and
               Hiroshi Doi},
  title     = {Efficient {IBE-PKE} Proxy Re-Encryption},
  booktitle = {{SECRYPT}},
  pages     = {285--293},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/MouradAD08,
  author    = {Azzam Mourad and
               Dima Alhadidi and
               Mourad Debbabi},
  title     = {Towards Language-Independent Approach for Security Concerns Weaving},
  booktitle = {{SECRYPT}},
  pages     = {460--465},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/MufticS08,
  author    = {Sead Muftic and
               Gernot Schmoelzer},
  title     = {Cryptonet: Secure E-Mail System},
  booktitle = {{SECRYPT}},
  pages     = {84--91},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Muller08,
  author    = {Volker M{\"{u}}ller},
  title     = {A Short Note on Secret Sharing using Elliptic Curves},
  booktitle = {{SECRYPT}},
  pages     = {359--362},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Munoz-GeaMMSG08,
  author    = {Juan Pedro Mu{\~{n}}oz{-}Gea and
               Josemaria Malgosa{-}Sanahuja and
               Pilar Manzanares{-}Lopez and
               Juan Carlos S{\'{a}}nchez{-}Aarnoutse and
               Joan Garc{\'{\i}}a{-}Haro},
  title     = {An Efficient Methodology to Limit Path Length Guaranteeing Anonymity
               in Overlay Networks},
  booktitle = {{SECRYPT}},
  pages     = {205--208},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/MurtyV08,
  author    = {V. Kumar Murty and
               Nikolajs Volkovs},
  title     = {A Polynomial based Hashing Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {103--106},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/MurtyX08,
  author    = {V. Kumar Murty and
               Guangwu Xu},
  title     = {Security and Authentication for Networked Storage},
  booktitle = {{SECRYPT}},
  pages     = {477--480},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/NagyAK08,
  author    = {Marius Nagy and
               Selim G. Akl and
               Sean Kershaw},
  title     = {Key Distribution based on Quantum Fourier Transform},
  booktitle = {{SECRYPT}},
  pages     = {263--269},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/NarayanUL08,
  author    = {Shivaramakrishnan Narayan and
               Parampalli Udaya and
               Peter Hyun{-}Jeen Lee},
  title     = {Identity-based Signcryption without Random Oracles},
  booktitle = {{SECRYPT}},
  pages     = {342--347},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/NeppachPWLMSW08,
  author    = {Andreas Neppach and
               Christian Pfaffel{-}Janser and
               Ilse Wimberger and
               Thomas Lor{\"{u}}nser and
               Michael Meyenburg and
               Alexander Szekely and
               Johannes Wolkerstorfer},
  title     = {Key Management of Quantum Generated Keys in IPsec},
  booktitle = {{SECRYPT}},
  pages     = {177--183},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/NikovV08,
  author    = {Ventzislav Nikov and
               Marc Vauclair},
  title     = {Yet Another Secure Distance-Bounding Protocol},
  booktitle = {{SECRYPT}},
  pages     = {218--221},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/OhtsukaKTBY08,
  author    = {Shinsuke Ohtsuka and
               Satoshi Kawamoto and
               Shigeru Takano and
               Kensuke Baba and
               Hiroto Yasuura},
  title     = {A Note on Biometrics-based Authentication with Portable Device},
  booktitle = {{SECRYPT}},
  pages     = {99--102},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/OrencikPSK08,
  author    = {Cengiz {\"{O}}rencik and
               Thomas Brochmann Pedersen and
               Erkay Savas and
               Mehmet Keskinoz},
  title     = {Improved Fuzzy Vault Scheme for Fingerprint Verification},
  booktitle = {{SECRYPT}},
  pages     = {37--43},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Overbeck08,
  author    = {Raphael Overbeck},
  title     = {A Multiple Birthday Attack on {NTRU}},
  booktitle = {{SECRYPT}},
  pages     = {237--244},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/PasupathinathanPW08,
  author    = {Vijayakrishnan Pasupathinathan and
               Josef Pieprzyk and
               Huaxiong Wang},
  title     = {A Fair e-Tendering Protocol},
  booktitle = {{SECRYPT}},
  pages     = {294--299},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/PohM08,
  author    = {Geong Sen Poh and
               Keith M. Martin},
  title     = {On the (In)Security of Two Buyer-Seller Watermarking Protocols},
  booktitle = {{SECRYPT}},
  pages     = {253--260},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Preneel08,
  author    = {Bart Preneel},
  title     = {Cryptographic Algorithms - Successes, Failures and Challenges},
  booktitle = {{SECRYPT}},
  pages     = {21--27},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/QuerciaCZ08,
  author    = {Daniele Quercia and
               Licia Capra and
               Valentina Zanardi},
  title     = {Selecting Trustworthy Content using Tags},
  booktitle = {{SECRYPT}},
  pages     = {501--508},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/QureshiSI08,
  author    = {Muhammed Nauman Qureshi and
               Muhammad Nadeem Sial and
               Nassar Ikram},
  title     = {An Efficient Reconfigurable {SOS} Montgomery Multiplier in {GF} {(P)}
               usign {FPGA} {DSP} Slices},
  booktitle = {{SECRYPT}},
  pages     = {355--358},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/SalvadorNFV08,
  author    = {Paulo Salvador and
               Ant{\'{o}}nio Nogueira and
               Ulisses Fran{\c{c}}a and
               Rui Valadas},
  title     = {Detection of Illicit Traffic using Neural Networks},
  booktitle = {{SECRYPT}},
  pages     = {5--12},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/SanchezVFP08,
  author    = {Lu{\'{\i}}s Enrique Sanchez and
               Daniel Villafranca and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Mario Piattini},
  title     = {Practical Application of a Security Management Maturity Model for
               SMEs based on Predefined Schemas},
  booktitle = {{SECRYPT}},
  pages     = {391--398},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/SchreudersP08,
  author    = {Z. Cliffe Schreuders and
               Christian Payne},
  title     = {Functionality-based Application Confinement - Parameterised Hierarchical
               Application Restrictions},
  booktitle = {{SECRYPT}},
  pages     = {72--77},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/ShibliM08,
  author    = {Muhammad Awais Shibli and
               Sead Muftic},
  title     = {Intrusion Detection and Prevention System using Secure Mobile Agents},
  booktitle = {{SECRYPT}},
  pages     = {107--113},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/SilvaSAL08,
  author    = {Eduardo da Silva and
               Aldri Luiz dos Santos and
               Luiz Carlos Pessoa Albini and
               Michele Nogueira Lima},
  title     = {Quantifying Misbehaviour Attacks Against the Self-Organized Public
               Key Management on Manets},
  booktitle = {{SECRYPT}},
  pages     = {128--135},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/SundararajanO08,
  author    = {Mukund Sundararajan and
               Mohammad S. Obaidat},
  title     = {New Techniques to Enhance the Capabilities of the Socks Network Security
               Protocol},
  booktitle = {{SECRYPT}},
  pages     = {197--201},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/SzollosiFM08,
  author    = {Lor{\'{a}}nd Sz{\"{o}}ll{\"{o}}si and
               G{\'{a}}bor Feh{\'{e}}r and
               Tam{\'{a}}s Marosits},
  title     = {Proper Key Generation for the IzoSign Algorithm},
  booktitle = {{SECRYPT}},
  pages     = {368--372},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/VergaraVG08,
  author    = {Jorge E. L{\'{o}}pez de Vergara and
               Enrique V{\'{a}}zquez and
               Javier Guerra},
  title     = {Security Policy Instantiation to React to Network Attacks - An Ontology-based
               Approach using {OWL} and {SWRL}},
  booktitle = {{SECRYPT}},
  pages     = {78--83},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/WangZ08,
  author    = {Qinghua Wang and
               Tingting Zhang},
  title     = {Sec-SNMP: Policy-based Security Management for Sensor Networks},
  booktitle = {{SECRYPT}},
  pages     = {222--226},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/XiongT08,
  author    = {Kaiqi Xiong and
               David J. Thuente},
  title     = {Efficient Localization Schemes in Sensor Networks with Malicious Nodes},
  booktitle = {{SECRYPT}},
  pages     = {190--196},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/XuFSW08,
  author    = {Peng Xu and
               Zhiyi Fang and
               Hang Su and
               Chuyi Wei},
  title     = {Experimental Research and Capability Valuation on Security of {SOA-SCA}
               based {SDO}},
  booktitle = {{SECRYPT}},
  pages     = {337--341},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Yan08,
  author    = {Zheng Yan},
  title     = {Autonomic Trust Management for a Pervasive System},
  booktitle = {{SECRYPT}},
  pages     = {491--500},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/YasirHKS08,
  author    = {Muhammad Yasir and
               Mureed Hussain and
               Kahina Kabri and
               Dominique Seret},
  title     = {{SAKE} - Secure Authenticated Key Establishment in Sensor Networks},
  booktitle = {{SECRYPT}},
  pages     = {154--160},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/YilmazLS08,
  author    = {Omer Zekvan Yilmaz and
               Albert Levi and
               Erkay Savas},
  title     = {Multiphase Deployment Models for Fast Self Healing in Wireless Sensor
               Networks},
  booktitle = {{SECRYPT}},
  pages     = {136--144},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama08,
  author    = {Kazuki Yoneyama},
  title     = {Anonymous Message Authentication - Universally Composable Definition
               and Construction},
  booktitle = {{SECRYPT}},
  pages     = {351--354},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/Zuquete08,
  author    = {Andr{\'{e}} Z{\'{u}}quete},
  title     = {Enhanced Secure Interface for a Portable e-Voting Terminal},
  booktitle = {{SECRYPT}},
  pages     = {529--537},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@proceedings{DBLP:conf/secrypt/2008,
  editor    = {Eduardo Fern{\'{a}}ndez{-}Medina and
               Manu Malek and
               Javier Hernando},
  title     = {{SECRYPT} 2008, Proceedings of the International Conference on Security
               and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {{INSTICC} Press},
  year      = {2008}
}
@inproceedings{DBLP:conf/secrypt/AndradeSR07,
  author    = {Paulo F. Andrade and
               Fernando Mira da Silva and
               Carlos Ribeiro},
  title     = {An Efficient Intrusion Detection System for Networks with Centralized
               Routing},
  booktitle = {{SECRYPT}},
  pages     = {102--106},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/BaldassarriMP07,
  author    = {Paola Baldassarri and
               Anna Montesanto and
               Paolo Puliti},
  title     = {Detecting Anomalous Traffic using Statistical Processing and Self-Organizing
               Maps},
  booktitle = {{SECRYPT}},
  pages     = {74--79},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Bar-YosefW07,
  author    = {Noa Bar{-}Yosef and
               Avishai Wool},
  title     = {Remote Algorithmic Complexity Attacks against Randomized Hash Tables},
  booktitle = {{SECRYPT}},
  pages     = {117--124},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/CennamoFRTLP07,
  author    = {Paolo Cennamo and
               Antonio Fresa and
               Anton Luca Robustelli and
               Francesco Toro and
               Maurizio Longo and
               Fabio Postiglione},
  title     = {A 3g IMS-based Testbed for Secure Real-Time Audio Sessions},
  booktitle = {{SECRYPT}},
  pages     = {125--132},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/ChalkiasMHS07,
  author    = {Konstantinos Chalkias and
               F. Mpaldimtsi and
               Dimitris Hristu{-}Varsakelis and
               George Stephanides},
  title     = {On the Key-Compromise Impersonation Vulnerability of One-Pass Key
               Establishment Protocols},
  booktitle = {{SECRYPT}},
  pages     = {222--228},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Davoli07,
  author    = {Franco Davoli},
  title     = {Cross-Layer Resource Allocation in Satellite Networks},
  booktitle = {{SECRYPT}},
  pages     = {11},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/DoomunS07,
  author    = {M. Razvi Doomun and
               K. M. Sunjiv Soyjaudah},
  title     = {Modified Temporal Key Integrity Protocol for Efficient Wireless Network
               Security},
  booktitle = {{SECRYPT}},
  pages     = {151--156},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Dutta07,
  author    = {Santanu Dutta},
  title     = {Recent Trends in the Design of Video Signal Processing {IPS} and Multimedia
               SoCs},
  booktitle = {{SECRYPT}},
  pages     = {13},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/EjarqueH07,
  author    = {Pascual Ejarque and
               Javier Hernando},
  title     = {On the Effect of Score Equalization in {SVM} Multimodal Biometric
               Systems},
  booktitle = {{SECRYPT}},
  pages     = {33--38},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/FerranteCP07,
  author    = {Alberto Ferrante and
               Sathish Chandra and
               Vincenzo Piuri},
  title     = {A Query Unit for The IPSec Databases},
  booktitle = {{SECRYPT}},
  pages     = {133--139},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/FujisawaOKIT07,
  author    = {Toshiyuki Fujisawa and
               Kazuto Ogawa and
               Takeshi Kimura and
               Masaki Inamura and
               Toshiaki Tanaka},
  title     = {Anonymous Prepaid Content Viewing System with Mobile Terminal},
  booktitle = {{SECRYPT}},
  pages     = {281--288},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/GedrojcLH07,
  author    = {Bartek Gedrojc and
               Jan C. A. van der Lubbe and
               Martin van Hensbergen},
  title     = {Private Computing with Beehive Organized Agents},
  booktitle = {{SECRYPT}},
  pages     = {289--294},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/GiorgiNP07,
  author    = {Pascal Giorgi and
               Christophe N{\`{e}}gre and
               Thomas Plantard},
  title     = {Subquadratic Binary Field Multiplier in Double Polynomial System},
  booktitle = {{SECRYPT}},
  pages     = {229--236},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/GomezT07,
  author    = {Laurent Gomez and
               Ivonne Thomas},
  title     = {Towards User Authentication Flexibility},
  booktitle = {{SECRYPT}},
  pages     = {59--66},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/GruhnHW07,
  author    = {Volker Gruhn and
               Malte H{\"{u}}lder and
               Vincent Wolff{-}Marting},
  title     = {Utilizing Social Networking Platforms to Support Public Key Infrastructures},
  booktitle = {{SECRYPT}},
  pages     = {245--250},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/GutubGAAI07,
  author    = {Adnan Abdul{-}Aziz Gutub and
               Lahouari Ghouti and
               Alaaeldin A. Amin and
               Talal M. Alkharobi and
               Mohammad K. Ibrahim},
  title     = {Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic
               Text Digital Watermarking},
  booktitle = {{SECRYPT}},
  pages     = {329--332},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/HasegawaSM07,
  author    = {Wataru Hasegawa and
               Masakazu Soshi and
               Atsuko Miyaji},
  title     = {Mobile Agent Security with Efficient Oblivious Transfer},
  booktitle = {{SECRYPT}},
  pages     = {299--304},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/HoumaniM07,
  author    = {Hanane Houmani and
               Mohamed Mejri},
  title     = {Practical and Universal Interpretation Functions for Secrecy},
  booktitle = {{SECRYPT}},
  pages     = {157--164},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/IbrahimEH07,
  author    = {Ibrahim M. Ibrahim and
               Sherif Hazem Nour El{-}Din and
               Abdel Fatah A. Hegazy},
  title     = {An Effective and Secure Watermarking Protocol for Digital Rights Protection
               over the Second-Hand Market},
  booktitle = {{SECRYPT}},
  pages     = {263--268},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/IlioudisBPG07,
  author    = {Christos Ilioudis and
               Dimitrios A. Baltatzis and
               George Pangalos and
               Christos K. Georgiadis},
  title     = {Securing Healthgrid Environments},
  booktitle = {{SECRYPT}},
  pages     = {394--401},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/InamuraT07,
  author    = {Masaki Inamura and
               Toshiaki Tanaka},
  title     = {Implementation and Evaluation of New Illegal Copy Protection - Protection
               Against Making a Illegal Copy of a Copy},
  booktitle = {{SECRYPT}},
  pages     = {427--432},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Ivanov07,
  author    = {Ivan Ivanov},
  title     = {Utility Computing: Reality and Beyond},
  booktitle = {{SECRYPT}},
  pages     = {7},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Jin07,
  author    = {Hongxia Jin},
  title     = {A Closer Look at Broadcast Encryption and Traitor Tracing for Content
               Protection},
  booktitle = {{SECRYPT}},
  pages     = {295--298},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/JovicU07,
  author    = {Branislav Jovic and
               Charles P. Unsworth},
  title     = {Improving Security in Chaotic Spread Spectrum Communication Systems
               with a Novel 'Bit Power Parameter Spectrum' Measure},
  booktitle = {{SECRYPT}},
  pages     = {273--280},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/JoyeT07,
  author    = {Marc Joye and
               Michael Tunstall},
  title     = {Securing OpenSSL against Micro-Architectural Attacks},
  booktitle = {{SECRYPT}},
  pages     = {189--196},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/KalmanN07,
  author    = {Gy{\"{o}}rgy K{\'{a}}lm{\'{a}}n and
               Josef Noll},
  title     = {Integrated Right Management for Home Content - {A} {SIM} based Right
               Management Solution for Home Networks},
  booktitle = {{SECRYPT}},
  pages     = {107--111},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/KellinisP07,
  author    = {Emmanouel Kellinis and
               Konstantinos Papapanagiotou},
  title     = {Using Steganography to Improve Hash Functions' Collision Resistance},
  booktitle = {{SECRYPT}},
  pages     = {337--340},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoTS07,
  author    = {Shinsaku Kiyomoto and
               Toshiaki Tanaka and
               Kouichi Sakurai},
  title     = {{K2:} {A} Stream Cipher Algorithm using Dynamic Feedback Control},
  booktitle = {{SECRYPT}},
  pages     = {204--213},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/KotenkoU07,
  author    = {Igor V. Kotenko and
               Alexander Ulanov},
  title     = {Investigation of Cooperative Defense against DDoS},
  booktitle = {{SECRYPT}},
  pages     = {180--183},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/LaubeG07,
  author    = {Annett Laube and
               Laurent Gomez},
  title     = {Dynamic Context-Aware Access Control - Use of Resource Hierarchies
               to Define Fine-grained, Adaptable Authorization Policies},
  booktitle = {{SECRYPT}},
  pages     = {386--393},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/LeungP07,
  author    = {Adrian Leung and
               Geong Sen Poh},
  title     = {An Anonymous waterMarking Scheme for Content Distribution Protection
               using Trusted Computing},
  booktitle = {{SECRYPT}},
  pages     = {319--326},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Liu07,
  author    = {Kecheng Liu},
  title     = {Pragmatic Computing},
  booktitle = {{SECRYPT}},
  pages     = {5},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/LiuCW07,
  author    = {Dennis Y. W. Liu and
               Shuang Chang and
               Duncan S. Wong},
  title     = {A More Efficient Convertible Nominative Signature},
  booktitle = {{SECRYPT}},
  pages     = {214--221},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/LupettiD07,
  author    = {Simone Lupetti and
               Gianluca Dini},
  title     = {Practical Verification of Untrusted Terminals using Remote Attestation},
  booktitle = {{SECRYPT}},
  pages     = {402--407},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/McCabeT07,
  author    = {Alan McCabe and
               Jarrod Trevathan},
  title     = {Implementation and Analysis of a Handwritten Signature Verification
               Technique},
  booktitle = {{SECRYPT}},
  pages     = {48--58},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/McGrathSM07,
  author    = {Clare McGrath and
               Ghazanfar Ali Safdar and
               M{\'{a}}ire McLoone},
  title     = {Identity Based Public Key Exchange {(IDPKE)} for Wireless Ad Hoc Networks},
  booktitle = {{SECRYPT}},
  pages     = {167--170},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/MouradLD07,
  author    = {Azzam Mourad and
               Marc{-}Andr{\'{e}} Laverdi{\`{e}}re and
               Mourad Debbabi},
  title     = {A High-Level Aspect-Oriented based Language for Software Security
               Hardening},
  booktitle = {{SECRYPT}},
  pages     = {363--370},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Nachtigal07,
  author    = {Sharon Nachtigal},
  title     = {e-Business Security Design using Process Security Requirements Septet},
  booktitle = {{SECRYPT}},
  pages     = {408--413},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/NarayanU07,
  author    = {Shivaramakrishnan Narayan and
               Parampalli Udaya},
  title     = {A Provably Secure Multi-Receiver Identity-based Signcryption using
               Bilinear Maps},
  booktitle = {{SECRYPT}},
  pages     = {305--308},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/NoordendeBHBT07,
  author    = {Guido van 't Noordende and
               {\'{A}}d{\'{a}}m Balogh and
               Rutger F. H. Hofman and
               Frances M. T. Brazier and
               Andrew S. Tanenbaum},
  title     = {A Secure Jailing System for Confining Untrusted Applications},
  booktitle = {{SECRYPT}},
  pages     = {414--423},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Obaidat07,
  author    = {Mohammad S. Obaidat},
  title     = {Future and Challenges of the Security of e-Systems and Computer Networks},
  booktitle = {{SECRYPT}},
  pages     = {15--16},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/ObermeierB07,
  author    = {Sebastian Obermeier and
               Stefan B{\"{o}}ttcher},
  title     = {Secure Computation of Common Data among Malicious Partners},
  booktitle = {{SECRYPT}},
  pages     = {345--354},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/OliveiraCB07,
  author    = {Paulo F. Oliveira and
               Rui A. Costa and
               Jo{\~{a}}o Barros},
  title     = {Mobile Secret Key Distribution with Network Coding},
  booktitle = {{SECRYPT}},
  pages     = {171--174},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/OmoteST07,
  author    = {Kazumasa Omote and
               Takeshi Shimoyama and
               Satoru Torii},
  title     = {A Combinatorics Proliferation Model to Determine the Timing for Blocking
               Scanning Malware},
  booktitle = {{SECRYPT}},
  pages     = {16--24},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/OuTT07,
  author    = {Jheng{-}Ru Ou and
               Shi{-}Chun Tsai and
               Wen{-}Guey Tzeng},
  title     = {Efficient Large-Scale Distributed Key Generation against Burst Interruption},
  booktitle = {{SECRYPT}},
  pages     = {197--203},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/PaezTFS07,
  author    = {Rafael P{\'{a}}ez and
               Joan Tom{\`{a}}s and
               Jordi Forn{\'{e}} and
               Miguel Soriano},
  title     = {{MAIS:} Mobile Agent Integrity System - {A} Security System to {IDS}
               based on Autonomous Agents},
  booktitle = {{SECRYPT}},
  pages     = {41--47},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Payne07,
  author    = {Christian Payne},
  title     = {An Improved Model for Secure Cryptographic Integrity Verification
               of Local Code},
  booktitle = {{SECRYPT}},
  pages     = {80--84},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Pernul07,
  author    = {G{\"{u}}nther Pernul},
  title     = {Infrastructures for Authentication, Authorization and Privilege Management
               Scope, Evaluation and use in the Access-eGov Project},
  booktitle = {{SECRYPT}},
  pages     = {17},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Petrovic07,
  author    = {Slobodan Petrovic},
  title     = {Clock Control Sequence Reconstruction in the Generalized Shrinking
               Generator},
  booktitle = {{SECRYPT}},
  pages     = {259--262},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/PredaCCGT07,
  author    = {Stere Preda and
               Nora Cuppens{-}Boulahia and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Laurent Toutain},
  title     = {Reliable Process for Security Policy Deployment},
  booktitle = {{SECRYPT}},
  pages     = {5--15},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/PuiggaliaM07,
  author    = {Jordi Puiggali and
               Victor Morales{-}Rocha},
  title     = {Independent Voter Verifiability for Remote Electronic Voting},
  booktitle = {{SECRYPT}},
  pages     = {333--336},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/SametMO07,
  author    = {Saeed Samet and
               Ali Miri and
               Luis Orozco{-}Barbosa},
  title     = {Privacy Preserving k-Means Clustering in Multi-Party Environment},
  booktitle = {{SECRYPT}},
  pages     = {381--385},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/SanchezVFP07,
  author    = {Lu{\'{\i}}s Enrique Sanchez and
               Daniel Villafranca and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Mario Piattini},
  title     = {Developing a Model and a Tool to Manage the Information Security in
               Small and Medium Enterprises},
  booktitle = {{SECRYPT}},
  pages     = {355--362},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Saxena07,
  author    = {Amitabh Saxena},
  title     = {Additive Proofs of Knowledge - {A} New Notion for Non-Interactive
               Proofs},
  booktitle = {{SECRYPT}},
  pages     = {239--244},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/SerraoDD07,
  author    = {Carlos Serr{\~{a}}o and
               Miguel Sales Dias and
               Jaime Delgado},
  title     = {Secure License Management - Management of Digital Object Licenses
               in a {DRM} Environment},
  booktitle = {{SECRYPT}},
  pages     = {251--256},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Shan07,
  author    = {Tony C. Shan},
  title     = {{SOA} Wisdom},
  booktitle = {{SECRYPT}},
  pages     = {9--10},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/SladicMK07,
  author    = {Goran Sladic and
               Branko Milosavljevic and
               Zora Konjovic},
  title     = {Extensible Access Control Model for {XML} Document Collections},
  booktitle = {{SECRYPT}},
  pages     = {373--380},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/SocekCB07,
  author    = {Daniel Socek and
               Dubravko Culibrk and
               Vladimir Bozovic},
  title     = {Practical Secure Biometrics using Set Intersection as a Similarity
               Measure},
  booktitle = {{SECRYPT}},
  pages     = {25--32},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/Stawowski07,
  author    = {Mariusz Stawowski},
  title     = {Formal Analysis Methods of Network Security Design},
  booktitle = {{SECRYPT}},
  pages     = {313--318},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/StoleruP07,
  author    = {Neculai Daniel Stoleru and
               Victor Valeriu Patriciu},
  title     = {The Polynomial Multicomposition Problem in (Z/nZ)},
  booktitle = {{SECRYPT}},
  pages     = {269--272},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/TaoLS07,
  author    = {Kai Tao and
               Jing Li and
               Srinivas Sampalli},
  title     = {Wise Guard - {MAC} Address Spoofing Detection System for Wireless
               LANs},
  booktitle = {{SECRYPT}},
  pages     = {140--147},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/TrabelsiR07,
  author    = {Slim Trabelsi and
               Yves Roudier},
  title     = {Secure Service Publishing with Untrusted Registries - Securing Service
               Discovery},
  booktitle = {{SECRYPT}},
  pages     = {175--179},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/WangC07,
  author    = {Lih{-}Yang Wang and
               Chao{-}Chih Chen},
  title     = {On the Improvement of Remote Authentication Scheme with Smart Cards},
  booktitle = {{SECRYPT}},
  pages     = {93--97},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/WuL07,
  author    = {Mei{-}Yu Wu and
               Duen{-}Ren Liu},
  title     = {Role and Task Based Authorization Management for Process-View},
  booktitle = {{SECRYPT}},
  pages     = {85--90},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/XiaHY07,
  author    = {Lei Xia and
               Hao Huang and
               Shuying Yu},
  title     = {Towards a Multi-model Views Security Framework},
  booktitle = {{SECRYPT}},
  pages     = {98--101},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/ZurutuzaUAGLF07,
  author    = {Urko Zurutuza and
               Roberto Uribeetxeberria and
               E. Azketa and
               G. Gil and
               Jesus Lizarraga and
               Miguel Fern{\'{a}}ndez},
  title     = {Combined Data Mining Approach for Intrusion Detection},
  booktitle = {{SECRYPT}},
  pages     = {67--73},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@proceedings{DBLP:conf/secrypt/2007,
  editor    = {Javier Hernando and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Manu Malek},
  title     = {{SECRYPT} 2007, Proceedings of the International Conference on Security
               and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
               part of {ICETE} - The International Joint Conference on e-Business
               and Telecommunications},
  publisher = {{INSTICC} Press},
  year      = {2007}
}
@inproceedings{DBLP:conf/secrypt/ArfaouiJZA06,
  author    = {Najla Arfaoui and
               Farah Jemili and
               Montaceur Zaghdoud and
               Mohamed Ben Ahmed},
  title     = {Comparative Study between Bayesian Network and Possibilistic Network
               in Intrusion Detection},
  booktitle = {{SECRYPT}},
  pages     = {24--31},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/AzerEE06,
  author    = {Marianne Azer and
               Sherif El{-}Kassas and
               Magdy S. El{-}Soudani},
  title     = {Using Attack Graphs in Ad Hoc Networks - For Intrusion Prediction
               Correlation and Detection},
  booktitle = {{SECRYPT}},
  pages     = {63--68},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Barclay06,
  author    = {Les Barclay},
  title     = {Wireless Communications, a new Emphasis for Effective Use of the Radio
               Spectrum},
  booktitle = {{SECRYPT}},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Bard06,
  author    = {Gregory V. Bard},
  title     = {A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack
               on {SSL}},
  booktitle = {{SECRYPT}},
  pages     = {99--109},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/BurdescuS06,
  author    = {Dumitru Dan Burdescu and
               Liana Stanescu},
  title     = {An Algorithm for Authentication of Digital Images},
  booktitle = {{SECRYPT}},
  pages     = {303--308},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/ChenH06,
  author    = {Chun{-}Hua Chen and
               Gwoboa Horng},
  title     = {More Robust Private Information},
  booktitle = {{SECRYPT}},
  pages     = {297--302},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Dagorn06,
  author    = {Nathalie Dagorn},
  title     = {Intrusion Detection for Web Applications (Short Version)},
  booktitle = {{SECRYPT}},
  pages     = {32--39},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/FekiZAS06,
  author    = {Ines Feki and
               Xiaoli Zheng and
               Mohammed Achemlal and
               Ahmed Serhrouchni},
  title     = {Internet Routing Security: An Approach to Detect and to React to Incorrect
               Advertisements},
  booktitle = {{SECRYPT}},
  pages     = {110--117},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Fries06,
  author    = {Steffen Fries},
  title     = {Security Considerations in Current VoIP Protocols},
  booktitle = {{SECRYPT}},
  pages     = {183--191},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/GanV06,
  author    = {Zaobin Gan and
               Vijay Varadharajan},
  title     = {Design and Implementation of a Practical Secure Distributed Healthcare
               Application},
  booktitle = {{SECRYPT}},
  pages     = {431--436},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/GanWV06,
  author    = {Zaobin Gan and
               Dengwei Wei and
               Vijay Varadharajan},
  title     = {Improving Software Security Through an Integrated Approach},
  booktitle = {{SECRYPT}},
  pages     = {437--442},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/GanameBBS06,
  author    = {Abdoul Karim Ganame and
               Julien Bourgeois and
               Renaud Bidou and
               Fran{\c{c}}ois Spies},
  title     = {Evaluation of the Intrusion Detection Capabilities and Performance
               of a Security Operation Center},
  booktitle = {{SECRYPT}},
  pages     = {48--55},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/GarciaNO06,
  author    = {Juan Manuel Garc{\'{\i}}a and
               Tom{\'{a}}s Navarrete and
               Carlos Orozco},
  title     = {Workload Hidden Markov Model for Anomaly Detection},
  booktitle = {{SECRYPT}},
  pages     = {56--59},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/GedrojcCL06,
  author    = {Bartek Gedrojc and
               Kathy Cartrysse and
               Jan C. A. van der Lubbe},
  title     = {Private Bidding for Mobile Agents},
  booktitle = {{SECRYPT}},
  pages     = {277--282},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Greene06,
  author    = {Thomas Greene},
  title     = {Redefining the Market Place: Only the Numbers are Different?},
  booktitle = {{SECRYPT}},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/GutierrezFP06,
  author    = {Carlos Guti{\'{e}}rrez and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Mario Piattini},
  title     = {Security Risk Analysis in Web Services Systems},
  booktitle = {{SECRYPT}},
  pages     = {425--430},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/GuvensanY06,
  author    = {M. Ama{\c{c}} G{\"{u}}vensan and
               Ali G{\"{o}}khan Yavuz},
  title     = {Protocol Independent Lightweight Secure Communication},
  booktitle = {{SECRYPT}},
  pages     = {211--217},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/HaalandR06,
  author    = {Kari Anne Haaland and
               Chunming Rong},
  title     = {Securing Web Services Using Identity-Based Encryption {(IBE)}},
  booktitle = {{SECRYPT}},
  pages     = {413--418},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/HassaniA06,
  author    = {Seyed Hamed Hassani and
               Mohammad Reza Aref},
  title     = {A New (t, n) Multi-Secret Sharing Scheme Based on Linear Algebra},
  booktitle = {{SECRYPT}},
  pages     = {443--449},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/HernandoFEGL06,
  author    = {Javier Hernando and
               Mireia Farr{\'{u}}s and
               Pascual Ejarque and
               Ainara Garde and
               Jordi Luque},
  title     = {Person Verification by Fusion of Prosodic, Voice Spectral and Facial
               Parameters},
  booktitle = {{SECRYPT}},
  pages     = {17--23},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/HerzbergY06,
  author    = {Amir Herzberg and
               Igal Yoffe},
  title     = {Layered Architecture for Secure E-Commerce Applications},
  booktitle = {{SECRYPT}},
  pages     = {118--125},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/HuangZ06,
  author    = {Kun Huang and
               Dafang Zhang},
  title     = {On the Self-Similarity of the 1999 DARPA/Lincoln Laboratory Evaluation
               Data},
  booktitle = {{SECRYPT}},
  pages     = {75--79},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/InamuraTFOK06,
  author    = {Masaki Inamura and
               Toshiaki Tanaka and
               Toshiyuki Fujisawa and
               Kazuto Ogawa and
               Takeshi Kimura},
  title     = {Flexible License Transfer System Using Mobile Terminal},
  booktitle = {{SECRYPT}},
  pages     = {397--404},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/IntronaM06,
  author    = {Domenico Introna and
               Francescomaria Marino},
  title     = {{JASTEG2000} - Steganography for {JPEG2000} Coded Images},
  booktitle = {{SECRYPT}},
  pages     = {329--336},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/JinLB06,
  author    = {Hongxia Jin and
               Jeffrey B. Lotspiech and
               Mario Blaum},
  title     = {Traitor Tracing for Subscription-Based Systems},
  booktitle = {{SECRYPT}},
  pages     = {223--228},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Jurjens06,
  author    = {Jan J{\"{u}}rjens},
  title     = {Model-Based Security Engineering},
  booktitle = {{SECRYPT}},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/KacedM06,
  author    = {Ahmed R{\'{e}}da Kaced and
               Jean{-}Claude Moissinac},
  title     = {Protecting Adaptive Multimedia Delivery and Adaptation Using Proxy
               Based Approach},
  booktitle = {{SECRYPT}},
  pages     = {87--90},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/KnudsenT06,
  author    = {Lars R. Knudsen and
               S{\o}ren S. Thomsen},
  title     = {Proposals for Iterated Hash Functions},
  booktitle = {{SECRYPT}},
  pages     = {246--253},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/KotenkoS06,
  author    = {Igor V. Kotenko and
               Mikhail Stepashkin},
  title     = {Network Security Evaluation Based on Simulation of Malfactor's Behavior},
  booktitle = {{SECRYPT}},
  pages     = {339--344},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/LaiZ06,
  author    = {Chunren Lai and
               Chang N. Zhang},
  title     = {Quantitative Analysis and Enforcement of the Principle of Least Privilege
               in Role-Based},
  booktitle = {{SECRYPT}},
  pages     = {69--74},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/LeungM06,
  author    = {Adrian Leung and
               Chris J. Mitchell},
  title     = {A Service Discovery Threat Model for Ad Hoc Networks},
  booktitle = {{SECRYPT}},
  pages     = {167--174},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/LevinIN06,
  author    = {Timothy E. Levin and
               Cynthia E. Irvine and
               Thuy D. Nguyen},
  title     = {Least Privilege in Separation Kernels},
  booktitle = {{SECRYPT}},
  pages     = {355--362},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/LianhaiM06,
  author    = {Wang Lianhai and
               Manu Malek},
  title     = {Digital Contract Signature Scheme Based on Multiple Cryptosystem},
  booktitle = {{SECRYPT}},
  pages     = {267--274},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/LoeK06,
  author    = {Chuan{-}Wen Loe and
               Khoongming Khoo},
  title     = {Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext
               Attack},
  booktitle = {{SECRYPT}},
  pages     = {135--140},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Macia-FernandezDG06,
  author    = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and
               Jes{\'{u}}s E. D{\'{\i}}az{-}Verdejo and
               Pedro Garcia{-}Teodoro},
  title     = {On the Design of a Low-Rate DoS Attack Against Iterative Servers},
  booktitle = {{SECRYPT}},
  pages     = {149--156},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Malek06,
  author    = {Manu Malek},
  title     = {{IT} Security Forensics: Promises and Shortcomings},
  booktitle = {{SECRYPT}},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Marca06,
  author    = {David A. Marca},
  title     = {E-Business Strategy - Charting a Way through Uncertain Waters of Electronic
               Commerce},
  booktitle = {{SECRYPT}},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Marca06a,
  author    = {David A. Marca},
  title     = {Project Management for E-Business Initiatives . Project Framework,
               Proven Practices, Coordinated Work, Focused Sub-Teams},
  booktitle = {{SECRYPT}},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Martinez-PelaezRZ06,
  author    = {Rafael Mart{\'{\i}}nez{-}Pel{\'{a}}ez and
               Francisco Rico{-}Novella and
               Luis A. Zarza{-}L{\'{o}}pez},
  title     = {Digital Pseudonym Identity for E-Commerce},
  booktitle = {{SECRYPT}},
  pages     = {91--94},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/McEvoyM06,
  author    = {Robert P. McEvoy and
               Colin C. Murphy},
  title     = {Efficient All-or-Nothing Encryption Using {CTR} Mode},
  booktitle = {{SECRYPT}},
  pages     = {237--245},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/MelladoFP06,
  author    = {Daniel Mellado and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Mario Piattini},
  title     = {Secure Information Systems Development - Based on a Security Requirements
               Engineering Process},
  booktitle = {{SECRYPT}},
  pages     = {467--470},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/NachtigalM06,
  author    = {Sharon Nachtigal and
               Chris J. Mitchell},
  title     = {Modelling E-Business Security Using Business Processes},
  booktitle = {{SECRYPT}},
  pages     = {459--464},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Negre06,
  author    = {Christophe N{\`{e}}gre},
  title     = {Parallel Multiplication in F2n Using Condensed Matrix Representation},
  booktitle = {{SECRYPT}},
  pages     = {254--259},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Negre06a,
  author    = {Christophe N{\`{e}}gre},
  title     = {Finite Field Multiplication in Lagrange Representation Using Fast
               Fourrier Transform},
  booktitle = {{SECRYPT}},
  pages     = {320--323},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/NemrIA06,
  author    = {Rehab K. El Nemr and
               Imane Aly Saroit Ismail and
               S. H. Ahmed},
  title     = {Action-Triggered Public-Key System for {GSM} Using {RSA} with Phone-Dependent
               Encryption},
  booktitle = {{SECRYPT}},
  pages     = {175--182},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Nikov06,
  author    = {Ventzislav Nikov},
  title     = {A DoS Attack Against the Integrity-Less {ESP} {(IPSEC)}},
  booktitle = {{SECRYPT}},
  pages     = {192--199},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Pereira06,
  author    = {Fernando Pereira},
  title     = {Multimedia Representation in {MPEG} Standards: Achievements and Challenges},
  booktitle = {{SECRYPT}},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/PimentaS06,
  author    = {Francisco Pimenta and
               Carlos Serr{\~{a}}o},
  title     = {Using {OMA} {DRM} 2.0 Protected Content - Ogg Vorbis Protected Audio
               under Symbian {OS}},
  booktitle = {{SECRYPT}},
  pages     = {311--315},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Qi06,
  author    = {Wenhua Qi},
  title     = {Access Control and Joint Management for Collaborative Peer Groups},
  booktitle = {{SECRYPT}},
  pages     = {83--86},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/QiZL06,
  author    = {Chun Qi and
               Haitao Zhou and
               Bin Long},
  title     = {Smooth Blocks-Based Blind Watermarking Algorithm in Compressed {DCT}
               Domain},
  booktitle = {{SECRYPT}},
  pages     = {347--350},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/RassSG06,
  author    = {Stefan Rass and
               Mohamed Ali Sfaxi and
               Solange Ghernaouti{-}Helie},
  title     = {Achieving Unconditional Security in Existing Networks Using Quantum
               Cryptography},
  booktitle = {{SECRYPT}},
  pages     = {207--210},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/RicciCCJKMOGS06,
  author    = {R. Ricci and
               G{\'{e}}rard Chollet and
               M. V. Crispino and
               Sabah Jassim and
               Jacques C. Koreman and
               Andrew C. Morris and
               M. Olivar{-}Dimas and
               Sonia Garcia{-}Salicetti and
               Pedro Soria{-}Rodriguez},
  title     = {The "SECUREPHONE" - {A} Mobile Phone with Biometric Authentication
               and e-Signature Support for Dealing Secure Transactions on the Fly},
  booktitle = {{SECRYPT}},
  pages     = {9--16},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/RosadoGFP06,
  author    = {David G. Rosado and
               Carlos Guti{\'{e}}rrez and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Mario Piattini},
  title     = {Defining Viewpoints for Security Architectural Patterns},
  booktitle = {{SECRYPT}},
  pages     = {419--424},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Ruiz-MartinezGR06,
  author    = {Antonio Ruiz{-}Mart{\'{\i}}nez and
               Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
               {\'{O}}scar C{\'{a}}novas Reverte},
  title     = {Combination of a Smartcard E-Purse and E-Coin to Make Electronic Payments
               on the Internet},
  booktitle = {{SECRYPT}},
  pages     = {203--206},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Saarinen06,
  author    = {Markku{-}Juhani Olavi Saarinen},
  title     = {Chosen-IV Statistical Attacks on eStream Ciphers},
  booktitle = {{SECRYPT}},
  pages     = {260--266},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/SanchezLGR06,
  author    = {Manuel S{\'{a}}nchez and
               Gabriel L{\'{o}}pez and
               Antonio Fernandez G{\'{o}}mez{-}Skarmeta and
               {\'{O}}scar C{\'{a}}novas Reverte},
  title     = {Using Microsoft Office Infopath to Generate {XACML} Policies},
  booktitle = {{SECRYPT}},
  pages     = {379--386},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/SattarzadehAJ06,
  author    = {Behnam Sattarzadeh and
               Mahdi Asadpour and
               Rasool Jalili},
  title     = {Security Enhancement for a Low Computation Cost User Authentication
               Scheme},
  booktitle = {{SECRYPT}},
  pages     = {5--8},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/SerraoDD06,
  author    = {Carlos Serr{\~{a}}o and
               Miguel Sales Dias and
               Jaime Delgado},
  title     = {Digital Object Rights Management - Interoperable Client-side {DRM}
               Middleware},
  booktitle = {{SECRYPT}},
  pages     = {229--236},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Taleb06,
  author    = {Anisse Taleb},
  title     = {Advances in Speech and Audio Coding and its Applications for Mobile
               Multimedia},
  booktitle = {{SECRYPT}},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Toyoizumi06,
  author    = {Hiroshi Toyoizumi},
  title     = {An Infinite Phase-Size {BMAP/M/1} Queue and its Application to Secure
               Group Communication},
  booktitle = {{SECRYPT}},
  pages     = {283--288},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/TrabelsiS06,
  author    = {Zouheir Trabelsi and
               Khaled Shuaib},
  title     = {Spoofed {ARP} Packets Detection in Switched {LAN} Networks},
  booktitle = {{SECRYPT}},
  pages     = {40--47},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/TrevathanR06,
  author    = {Jarrod Trevathan and
               Wayne Read},
  title     = {Secure Online English Auctions},
  booktitle = {{SECRYPT}},
  pages     = {387--396},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/TrevathanR06a,
  author    = {Jarrod Trevathan and
               Wayne Read},
  title     = {Undesirable and Fraudulent Behaviour in Online Auctions},
  booktitle = {{SECRYPT}},
  pages     = {450--458},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/TsukubaN06,
  author    = {Takahito Tsukuba and
               Kenichiro Noguchi},
  title     = {Extending {XML} Signature and Applying it to Web Page Signing},
  booktitle = {{SECRYPT}},
  pages     = {407--412},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/UrienB06,
  author    = {Pascal Urien and
               Mohamad Badra},
  title     = {Secure Access Modules for Identity Protection over the {EAP-TLS} -
               Smartcard Benefits for User Anonymity in Wireless Infrastructures},
  booktitle = {{SECRYPT}},
  pages     = {157--163},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/VeignerR06,
  author    = {Christian Veigner and
               Chunming Rong},
  title     = {On Use of Identity-Based Encryption for Secure Emailing},
  booktitle = {{SECRYPT}},
  pages     = {289--296},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/WhittakerACE06,
  author    = {Richard Whittaker and
               Gonzalo Argote{-}Garcia and
               Peter J. Clarke and
               Raimund K. Ege},
  title     = {Collaboration Security for Modern Information Systems},
  booktitle = {{SECRYPT}},
  pages     = {363--370},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/Wierzbicki06,
  author    = {Adam Wierzbicki},
  title     = {Trust Management without Reputation in {P2P} Games},
  booktitle = {{SECRYPT}},
  pages     = {126--134},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/YasudaAFF06,
  author    = {Kan Yasuda and
               Kazumaro Aoki and
               Eiichiro Fujisaki and
               Atsushi Fujioka},
  title     = {Forward-Secure Authenticated-Encryption in Multi-Receiver Setting},
  booktitle = {{SECRYPT}},
  pages     = {141--148},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/ZarzaPSM06,
  author    = {Luis Zarza and
               Josep Pegueroles and
               Miguel Soriano and
               Rafael Mart{\'{\i}}nez},
  title     = {Design of Cryptographic Protocols by Means of Genetic Algorithms Techniques},
  booktitle = {{SECRYPT}},
  pages     = {316--319},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/ZhangR06,
  author    = {Zheng Zhang and
               Walid Rjaibi},
  title     = {Inter-Node Relationship Labeling: {A} Fine-Grained {XML} Access Control
               Implementation Using Generic Security Labels},
  booktitle = {{SECRYPT}},
  pages     = {371--378},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@inproceedings{DBLP:conf/secrypt/ZhuLZ06,
  author    = {Yi{-}qun Zhu and
               Jianhua Li and
               Quan{-}hai Zhang},
  title     = {An Extended Role-Based Access Control for Web Services},
  booktitle = {{SECRYPT}},
  pages     = {471--474},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
@proceedings{DBLP:conf/secrypt/2006,
  editor    = {Manu Malek and
               Eduardo Fern{\'{a}}ndez{-}Medina and
               Javier Hernando},
  title     = {{SECRYPT} 2006, Proceedings of the International Conference on Security
               and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
               {SECRYPT} is part of {ICETE} - The International Joint Conference
               on e-Business and Telecommunications},
  publisher = {{INSTICC} Press},
  year      = {2006}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics