Login / Signup
CD-ARES Workshops
2013
2013
2013
Keyphrases
Publications
2013
Thomas Schaberreiter
,
Sébastien Varrette
,
Pascal Bouvry
,
Juha Röning
,
Djamel Khadraoui
Dependency Analysis for Critical Infrastructure Security Modelling: A Case Study within the Grid'5000 Project.
CD-ARES Workshops
(2013)
Suliman A. Alsuhibany
,
Ahmad Alonaizi
,
Charles Morisset
,
Chris Smith
,
Aad P. A. van Moorsel
Experimental Investigation in the Impact on Security of the Release Order of Defensive Algorithms.
CD-ARES Workshops
(2013)
Jiageng Chen
,
Atsuko Miyaji
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock.
CD-ARES Workshops
(2013)
Vaise Patu
,
Shuichiro Yamamoto
A New Approach to Develop a Dependable Security Case by Combining Real Life Security Experiences (Lessons Learned) with D-Case Development Process.
CD-ARES Workshops
(2013)
Gerwin Gsenger
,
Christian Hanser
Improving the Efficiency of Elliptic Curve Scalar Multiplication Using Binary Huff Curves.
CD-ARES Workshops
(2013)
Igor V. Kotenko
,
Evgenia Novikova
VisSecAnalyzer: A Visual Analytics Tool for Network Security Assessment.
CD-ARES Workshops
(2013)
Francesco Palmieri
,
Ugo Fiore
,
Aniello Castiglione
,
Fang-Yie Leu
,
Alfredo De Santis
Analyzing the Internet Stability in Presence of Disasters.
CD-ARES Workshops
(2013)
Edoardo Persichetti
Code-Based Public-Key Encryption Resistant to Key Leakage.
CD-ARES Workshops
(2013)
Christian Hanser
,
Christian Wagner
Speeding Up the Fixed-Base Comb Method for Faster Scalar Multiplication on Koblitz Curves.
CD-ARES Workshops
(2013)
Asato Kubai
,
Junji Shikata
,
Yohei Watanabe
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
CD-ARES Workshops
(2013)
Bo Liu
,
Baokang Zhao
,
Bo Liu
,
Chunqing Wu
An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks.
CD-ARES Workshops
(2013)
Atif Mashkoor
,
Osman Hasan
,
Wolfgang Beer
Using Probabilistic Analysis for the Certification of Machine Control Systems.
CD-ARES Workshops
(2013)
Xuyun Nie
,
Albrecht Petzoldt
,
Johannes Buchmann
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method.
CD-ARES Workshops
(2013)
Sidi Mohamed El Yousfi Alaoui
,
Pierre-Louis Cayrel
,
Rachid El Bansarkhani
,
Gerhard Hoffmann
Code-Based Identification and Signature Schemes in Software.
CD-ARES Workshops
(2013)
Jung-Chun Liu
,
Yi-Li Huang
,
Fang-Yie Leu
,
Ilsun You
,
Feng-Ching Chiang
,
Chao-Tung Yang
,
William Cheng-Chung Chu
A Multiple-Key Management Scheme in Wireless Sensor Networks.
CD-ARES Workshops
(2013)
Shinsaku Kiyomoto
,
Toru Nakamura
,
Haruo Takasaki
,
Ryu Watanabe
,
Yutaka Miyake
PPM: Privacy Policy Manager for Personalized Services.
CD-ARES Workshops
(2013)
Andreas Hülsing
,
Lea Rausch
,
Johannes Buchmann
Optimal Parameters for XMSS MT.
CD-ARES Workshops
(2013)
Nicola Gobbo
,
Alessio Merlo
,
Mauro Migliardi
A Denial of Service Attack to GSM Networks via Attach Procedure.
CD-ARES Workshops
(2013)
James Heather
,
Chris Culnane
,
Steve A. Schneider
,
Sriramkrishnan Srinivasan
,
Zhe Xia
Solving the Discrete Logarithm Problem for Packing Candidate Preferences.
CD-ARES Workshops
(2013)
Tomasz Hachaj
,
Marek R. Ogiela
Computer Karate Trainer in Tasks of Personal and Homeland Security Defense.
CD-ARES Workshops
(2013)
Matthias Huber
,
Matthias Gabel
,
Marco Schulze
,
Alexander Bieber
Cumulus4j: A Provably Secure Database Abstraction Layer.
CD-ARES Workshops
(2013)
Chien-Ning Chen
,
Jheng-Hong Tu
,
Sung-Ming Yen
SPA on MIST Exponentiation Algorithm with Multiple Computational Sequences.
CD-ARES Workshops
(2013)
Clara Maria Colombini
,
Antonio Colella
,
Marco Mattiucci
,
Aniello Castiglione
Cyber Threats Monitoring: Experimental Analysis of Malware Behavior in Cyberspace.
CD-ARES Workshops
(2013)
Arcangelo Castiglione
,
Ciriaco D'Ambrosio
,
Alfredo De Santis
,
Francesco Palmieri
Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.
CD-ARES Workshops
(2013)
Masaya Yasuda
,
Takeshi Shimoyama
,
Jun Kogure
,
Kazuhiro Yokoyama
,
Takeshi Koshiba
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
CD-ARES Workshops
(2013)
Kishan Chand Gupta
,
Indranil Ghosh Ray
On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography.
CD-ARES Workshops
(2013)
Danilo F. Câmara
,
Conrado Porto Lopes Gouvêa
,
Julio César López-Hernández
,
Ricardo Dahab
Fast Software Polynomial Multiplication on ARM Processors Using the NEON Engine.
CD-ARES Workshops
(2013)
Abdel Alim Kamal
,
Roger Zahno
,
Amr M. Youssef
A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images.
CD-ARES Workshops
(2013)
Saad Islam
,
Mehreen Afzal
,
Adnan Rashdi
On the Security of LBlock against the Cube Attack and Side Channel Cube Attack.
CD-ARES Workshops
(2013)
Wolfgang Boehmer
How to Estimate a Technical VaR Using Conditional Probability, Attack Trees and a Crime Function.
CD-ARES Workshops
(2013)
Lidia Ogiela
,
Marek R. Ogiela
Intelligent UBMSS Systems for Strategic Information Management.
CD-ARES Workshops
(2013)
Francesco Flammini
,
Stefano Marrone
,
Nicola Mazzocca
,
Alfio Pappalardo
,
Concetta Pragliola
,
Valeria Vittorini
Trustworthiness Evaluation of Multi-sensor Situation Recognition in Transit Surveillance Scenarios.
CD-ARES Workshops
(2013)
volume 8128, 2013
Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings
CD-ARES Workshops
8128 (2013)