


default search action
10th ACNS 2012: Singapore
- Feng Bao, Pierangela Samarati

, Jianying Zhou
:
Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings. Lecture Notes in Computer Science 7341, Springer 2012, ISBN 978-3-642-31283-0
Authentication
- Feng Hao

, Dylan Clarke:
Security Analysis of a Multi-factor Authenticated Key Exchange Protocol. 1-11 - Vu Duc Nguyen, Yang-Wai Chow

, Willy Susilo
:
Breaking an Animated CAPTCHA Scheme. 12-29 - Assaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti Yung:

Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens. 30-47
Key Management
- Nan Zhang, Jingqiang Lin, Jiwu Jing, Neng Gao:

RIKE: Using Revocable Identities to Support Key Escrow in PKIs. 48-65 - Tilo Müller, Benjamin Taubmann, Felix C. Freiling:

TreVisor - OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks. 66-83
Block Ciphers
- Basel Alomair

:
Authenticated Encryption: How Reordering Can Impact Performance. 84-99 - Haibin Zhang:

Length-Doubling Ciphers and Tweakable Ciphers. 100-116 - Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng, Chuankun Wu:

Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers. 117-134
Identity-Based Cryptography
- Atsushi Fujioka, Taiichi Saito, Keita Xagawa

:
Security Enhancements by OR-Proof in Identity-Based Identification. 135-152 - Yu Chen, Zongyang Zhang, Dongdai Lin, Zhenfu Cao

:
Identity-Based Extractable Hash Proofs and Their Applications. 153-170
Cryptographic Primitives
- Kai Samelin, Henrich Christopher Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer:

On Structural Signatures for Tree Data Structures. 171-187 - Xiang Xie

, Rui Xue, Rui Zhang:
Inner-Product Lossy Trapdoor Functions and Applications. 188-205 - Afonso Arriaga

, Manuel Barbosa
, Pooya Farshim:
On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification. 206-223 - Helger Lipmaa

:
Secure Accumulators from Euclidean Rings without Trusted Setup. 224-240
Cryptanalysis
- Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li:

Linear Fault Analysis of Block Ciphers. 241-256 - Yuki Asano, Shingo Yanagihara, Tetsu Iwata:

Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys. 257-274 - Yu Sasaki, Lei Wang:

Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions. 275-292
Side Channel Attacks
- Fangguo Zhang

, Qiping Lin, Shengli Liu:
Zero-Value Point Attacks on Kummer-Based Cryptosystem. 293-310 - Gilles Piret, Thomas Roche, Claude Carlet:

PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance. 311-328 - Xin Ye, Thomas Eisenbarth

:
Wide Collisions in Practice. 329-343
Network Security
- Reihaneh Safavi-Naini, Mohammed Ashraful Tuhin, Pengwei Wang:

A General Construction for 1-Round δ-RMT and (0, δ)-SMT. 344-362 - Tingwen Liu

, Yong Sun, Alex X. Liu, Li Guo, Binxing Fang:
A Prefiltering Approach to Regular Expression Matching for Network Security Systems. 363-380
Web Security
- Jason Gionta, Peng Ning, Xiaolan Zhang:

iHTTP: Efficient Authentication of Non-confidential HTTP Traffic. 381-399 - Elias Athanasopoulos, Vasileios P. Kemerlis

, Michalis Polychronakis, Evangelos P. Markatos:
ARC: Protecting against HTTP Parameter Pollution Attacks Using Application Request Caches. 400-417 - Minh Tran, Xinshu Dong, Zhenkai Liang

, Xuxian Jiang:
Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations. 418-435
Security and Privacy in Social Networks
- Bogdan Carbunar, Radu Sion, Rahul Potharaju, Moussa Ehsan:

The Shy Mayor: Private Badges in GeoSocial Networks. 436-454 - Zi Chu, Indra Widjaja, Haining Wang:

Detecting Social Spam Campaigns on Twitter. 455-472
Security and Privacy in RFID Systems
- Shaoying Cai, Robert H. Deng

, Yingjiu Li, Yunlei Zhao:
A New Framework for Privacy of RFID Path Authentication. 473-488 - Panagiotis Rizomiliotis, Stefanos Gritzalis

:
GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol. 489-506
Security and Privacy in Cloud Systems
- Boyang Wang, Baochun Li, Hui Li:

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud. 507-525 - Sherman S. M. Chow

, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment. 526-543
Security and Privacy in Smart Grids
- Hsiao-Ying Lin, Wen-Guey Tzeng, Shiuan-Tzuo Shen, Bao-Shuh Paul Lin:

A Practical Smart Metering System Supporting Privacy Preserving Billing and Load Monitoring. 544-560 - Zekeriya Erkin, Gene Tsudik:

Private Computation of Spatial and Temporal Power Consumption with Smart Meters. 561-577

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














