default search action
SECRYPT 2007: Barcelona, Spain
- Javier Hernando, Eduardo Fernández-Medina, Manu Malek:
SECRYPT 2007, Proceedings of the International Conference on Security and Cryptography, Barcelona, Spain, July 28-13, 2007, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications. INSTICC Press 2007, ISBN 978-989-8111-12-8
Invited Speakers
Keynote Lectures
- Kecheng Liu:
Pragmatic Computing. SECRYPT 2007: 5 - Ivan Ivanov:
Utility Computing: Reality and Beyond. SECRYPT 2007: 7 - Tony C. Shan:
SOA Wisdom. SECRYPT 2007: 9-10 - Franco Davoli:
Cross-Layer Resource Allocation in Satellite Networks. SECRYPT 2007: 11 - Santanu Dutta:
Recent Trends in the Design of Video Signal Processing IPS and Multimedia SoCs. SECRYPT 2007: 13 - Mohammad S. Obaidat:
Future and Challenges of the Security of e-Systems and Computer Networks. SECRYPT 2007: 15-16 - Günther Pernul:
Infrastructures for Authentication, Authorization and Privilege Management Scope, Evaluation and use in the Access-eGov Project. SECRYPT 2007: 17
Access Control and Intrusion Detection
Full Papers
- Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro, Laurent Toutain:
Reliable Process for Security Policy Deployment. SECRYPT 2007: 5-15 - Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware. SECRYPT 2007: 16-24 - Daniel Socek, Dubravko Culibrk, Vladimir Bozovic:
Practical Secure Biometrics using Set Intersection as a Similarity Measure. SECRYPT 2007: 25-32 - Pascual Ejarque, Javier Hernando:
On the Effect of Score Equalization in SVM Multimodal Biometric Systems. SECRYPT 2007: 33-38
Short Papers
- Rafael Páez, Joan Tomàs, Jordi Forné, Miguel Soriano:
MAIS: Mobile Agent Integrity System - A Security System to IDS based on Autonomous Agents. SECRYPT 2007: 41-47 - Alan McCabe, Jarrod Trevathan:
Implementation and Analysis of a Handwritten Signature Verification Technique. SECRYPT 2007: 48-58 - Laurent Gomez, Ivonne Thomas:
Towards User Authentication Flexibility. SECRYPT 2007: 59-66 - Urko Zurutuza, Roberto Uribeetxeberria, Ekain Azketa, G. Gil, Jesus Lizarraga, Miguel Fernández:
Combined Data Mining Approach for Intrusion Detection. SECRYPT 2007: 67-73 - Paola Baldassarri, Anna Montesanto, Paolo Puliti:
Detecting Anomalous Traffic using Statistical Processing and Self-Organizing Maps. SECRYPT 2007: 74-79 - Christian Payne:
An Improved Model for Secure Cryptographic Integrity Verification of Local Code. SECRYPT 2007: 80-84 - Mei-Yu Wu, Duen-Ren Liu:
Role and Task Based Authorization Management for Process-View. SECRYPT 2007: 85-90
Posters
- Lih-Yang Wang, Chao-Chih Chen:
On the Improvement of Remote Authentication Scheme with Smart Cards. SECRYPT 2007: 93-97 - Lei Xia, Hao Huang, Shuying Yu:
Towards a Multi-model Views Security Framework. SECRYPT 2007: 98-101 - Paulo F. Andrade, Fernando Mira da Silva, Carlos Ribeiro:
An Efficient Intrusion Detection System for Networks with Centralized Routing. SECRYPT 2007: 102-106 - György Kálmán, Josef Noll:
Integrated Right Management for Home Content - A SIM based Right Management Solution for Home Networks. SECRYPT 2007: 107-111
Network Security and Protocols
Full Papers
- Noa Bar-Yosef, Avishai Wool:
Remote Algorithmic Complexity Attacks against Randomized Hash Tables. SECRYPT 2007: 117-124 - Paolo Cennamo, Antonio Fresa, Anton Luca Robustelli, Francesco Toro, Maurizio Longo, Fabio Postiglione:
A 3g IMS-based Testbed for Secure Real-Time Audio Sessions. SECRYPT 2007: 125-132 - Alberto Ferrante, Sathish Chandra, Vincenzo Piuri:
A Query Unit for The IPSec Databases. SECRYPT 2007: 133-139 - Kai Tao, Jing Li, Srinivas Sampalli:
Wise Guard - MAC Address Spoofing Detection System for Wireless LANs. SECRYPT 2007: 140-147
Short Papers
- M. Razvi Doomun, K. M. Sunjiv Soyjaudah:
Modified Temporal Key Integrity Protocol for Efficient Wireless Network Security. SECRYPT 2007: 151-156 - Hanane Houmani, Mohamed Mejri:
Practical and Universal Interpretation Functions for Secrecy. SECRYPT 2007: 157-164
Posters
- Clare McGrath, Ghazanfar Ali Safdar, Máire McLoone:
Identity Based Public Key Exchange (IDPKE) for Wireless Ad Hoc Networks. SECRYPT 2007: 167-170 - Paulo F. Oliveira, Rui A. Costa, João Barros:
Mobile Secret Key Distribution with Network Coding. SECRYPT 2007: 171-174 - Slim Trabelsi, Yves Roudier:
Secure Service Publishing with Untrusted Registries - Securing Service Discovery. SECRYPT 2007: 175-179 - Igor V. Kotenko, Alexander Ulanov:
Investigation of Cooperative Defense against DDoS. SECRYPT 2007: 180-183
Cryptographic Techniques and Key Management
Full Papers
- Marc Joye, Michael Tunstall:
Securing OpenSSL against Micro-Architectural Attacks. SECRYPT 2007: 189-196 - Jheng-Ru Ou, Shi-Chun Tsai, Wen-Guey Tzeng:
Efficient Large-Scale Distributed Key Generation against Burst Interruption. SECRYPT 2007: 197-203 - Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2: A Stream Cipher Algorithm using Dynamic Feedback Control. SECRYPT 2007: 204-213 - Dennis Y. W. Liu, Shuang Chang, Duncan S. Wong:
A More Efficient Convertible Nominative Signature. SECRYPT 2007: 214-221 - Konstantinos Chalkias, F. Mpaldimtsi, Dimitris Hristu-Varsakelis, George Stephanides:
On the Key-Compromise Impersonation Vulnerability of One-Pass Key Establishment Protocols. SECRYPT 2007: 222-228 - Pascal Giorgi, Christophe Nègre, Thomas Plantard:
Subquadratic Binary Field Multiplier in Double Polynomial System. SECRYPT 2007: 229-236
Short Papers
- Amitabh Saxena:
Additive Proofs of Knowledge - A New Notion for Non-Interactive Proofs. SECRYPT 2007: 239-244 - Volker Gruhn, Malte Hülder, Vincent Wolff-Marting:
Utilizing Social Networking Platforms to Support Public Key Infrastructures. SECRYPT 2007: 245-250 - Carlos Serrão, Miguel Sales Dias, Jaime Delgado:
Secure License Management - Management of Digital Object Licenses in a DRM Environment. SECRYPT 2007: 251-256
Posters
- Slobodan Petrovic:
Clock Control Sequence Reconstruction in the Generalized Shrinking Generator. SECRYPT 2007: 259-262 - Ibrahim Mostafa Ibrahim, Sherif Hazem Nour El-Din, Abdel Fatah A. Hegazy:
An Effective and Secure Watermarking Protocol for Digital Rights Protection over the Second-Hand Market. SECRYPT 2007: 263-268 - Neculai Daniel Stoleru, Victor Valeriu Patriciu:
The Polynomial Multicomposition Problem in (Z/nZ). SECRYPT 2007: 269-272 - Branislav Jovic, Charles P. Unsworth:
Improving Security in Chaotic Spread Spectrum Communication Systems with a Novel 'Bit Power Parameter Spectrum' Measure. SECRYPT 2007: 273-280 - Toshiyuki Fujisawa, Kazuto Ogawa, Takeshi Kimura, Masaki Inamura, Toshiaki Tanaka:
Anonymous Prepaid Content Viewing System with Mobile Terminal. SECRYPT 2007: 281-288 - Bartek Gedrojc, Jan C. A. van der Lubbe, Martin van Hensbergen:
Private Computing with Beehive Organized Agents. SECRYPT 2007: 289-294 - Hongxia Jin:
A Closer Look at Broadcast Encryption and Traitor Tracing for Content Protection. SECRYPT 2007: 295-298 - Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji:
Mobile Agent Security with Efficient Oblivious Transfer. SECRYPT 2007: 299-304 - Shivaramakrishnan Narayan, Parampalli Udaya:
A Provably Secure Multi-Receiver Identity-based Signcryption using Bilinear Maps. SECRYPT 2007: 305-308
Information Assurance
Short Papers
- Mariusz Stawowski:
Formal Analysis Methods of Network Security Design. SECRYPT 2007: 313-318 - Adrian Leung, Geong Sen Poh:
An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted Computing. SECRYPT 2007: 319-326
Posters
- Adnan Abdul-Aziz Gutub, Lahouari Ghouti, Alaaeldin A. Amin, Talal M. Alkharobi, Mohammad K. Ibrahim:
Utilizing Extension Character 'Kashida' with Pointed Letters for Arabic Text Digital Watermarking. SECRYPT 2007: 329-332 - Jordi Puiggali, Victor Morales-Rocha:
Independent Voter Verifiability for Remote Electronic Voting. SECRYPT 2007: 333-336 - Emmanouel Kellinis, Konstantinos Papapanagiotou:
Using Steganography to Improve Hash Functions' Collision Resistance. SECRYPT 2007: 337-340
Security in Information Systems
Full Papers
- Sebastian Obermeier, Stefan Böttcher:
Secure Computation of Common Data among Malicious Partners. SECRYPT 2007: 345-354 - Luis Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini:
Developing a Model and a Tool to Manage the Information Security in Small and Medium Enterprises. SECRYPT 2007: 355-362 - Azzam Mourad, Marc-André Laverdière, Mourad Debbabi:
A High-Level Aspect-Oriented based Language for Software Security Hardening. SECRYPT 2007: 363-370
Short Papers
- Goran Sladic, Branko Milosavljevic, Zora Konjovic:
Extensible Access Control Model for XML Document Collections. SECRYPT 2007: 373-380 - Saeed Samet, Ali Miri, Luis Orozco-Barbosa:
Privacy Preserving k-Means Clustering in Multi-Party Environment. SECRYPT 2007: 381-385 - Annett Laube, Laurent Gomez:
Dynamic Context-Aware Access Control - Use of Resource Hierarchies to Define Fine-grained, Adaptable Authorization Policies. SECRYPT 2007: 386-393 - Christos Ilioudis, Dimitrios A. Baltatzis, George Pangalos, Christos K. Georgiadis:
Securing Healthgrid Environments. SECRYPT 2007: 394-401 - Simone Lupetti, Gianluca Dini:
Practical Verification of Untrusted Terminals using Remote Attestation. SECRYPT 2007: 402-407 - Sharon Nachtigal:
e-Business Security Design using Process Security Requirements Septet. SECRYPT 2007: 408-413 - Guido van 't Noordende, Ádám Balogh, Rutger F. H. Hofman, Frances M. T. Brazier, Andrew S. Tanenbaum:
A Secure Jailing System for Confining Untrusted Applications. SECRYPT 2007: 414-423
Posters
- Masaki Inamura, Toshiaki Tanaka:
Implementation and Evaluation of New Illegal Copy Protection - Protection Against Making a Illegal Copy of a Copy. SECRYPT 2007: 427-432
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.