


default search action
19. ISC 2016: Honolulu, HI, USA
- Matt Bishop, Anderson C. A. Nascimento:
Information Security - 19th International Conference, ISC 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings. Lecture Notes in Computer Science 9866, Springer 2016, ISBN 978-3-319-45870-0
Cryptanalysis
- Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef:
Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128. 3-17 - Ahmed Abdelkhalek, Mohamed Tolba, Amr M. Youssef:
Improved Linear Cryptanalysis of Round-Reduced ARIA. 18-34 - Atsushi Takayasu, Noboru Kunihiro
:
Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits. 35-47 - Jun Xu, Lei Hu, Xiaona Zhang, Liqiang Peng, Zhangjie Huang:
Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication. 48-58 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai, Na Pang:
Enhanced Correlation Power Analysis by Biasing Power Traces. 59-72 - Tomer Ashur
, Bart Mennink:
Damaging, Simplifying, and Salvaging p-OMD. 73-92
Cryptographic Protocols
- Franziskus Kiefer, Mark Manulis
:
Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols. 95-114 - Lucjan Hanzlik, Miroslaw Kutylowski:
Chip Authentication for E-Passports: PACE with Chip Authentication Mapping v2. 115-129 - Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:
AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash. 130-146 - Franziskus Kiefer, Mark Manulis
:
Universally Composable Two-Server PAKE. 147-166 - Samiran Bag, Kouichi Sakurai:
Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools. 167-180
Network and Systems Security and Access Control
- Gaute Wangen, Andrii Shalaginov, Christoffer Hallstensen:
Cyber Security Risk Assessment of a DDoS Attack. 183-202 - Li Wang, Dinghao Wu:
Moving Target Defense Against Network Reconnaissance with Software Defined Networking. 203-217 - Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan
:
Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control. 218-230 - George D. Webster, Zachary D. Hanif, Andre L. P. Ludwig, Tamas K. Lengyel, Apostolis Zarras
, Claudia Eckert:
SKALD: A Scalable Architecture for Feature Extraction, Multi-user Analysis, and Real-Time Information Sharing. 231-249
Privacy and Watermarking
- Apostolis Zarras
:
Leveraging Internet Services to Evade Censorship. 253-270 - Atsushi Waseda, Ryo Nojima:
Analyzing Randomized Response Mechanisms Under Differential Privacy. 271-282 - David Eppstein, Michael T. Goodrich, Jenny Lam, Nil Mamano, Michael Mitzenmacher, Manuel R. Torres:
Models and Algorithms for Graph Watermarking. 283-301
Software Security
- Steffen Wagner, Claudia Eckert:
Policy-Based Implicit Attestation for Microkernel-Based Virtualized Systems. 305-322 - Dongpeng Xu, Jiang Ming, Dinghao Wu:
Generalized Dynamic Opaque Predicates: A New Control Flow Obfuscation Method. 323-342 - Guanhua Yan, Yunus Kucuk, Max Slocum, David C. Last:
A Bayesian Cogntive Approach to Quantifying Software Exploitability Based on Reachability Testing. 343-365 - Yan Lin, Xiaoxiao Tang, Debin Gao
, Jianming Fu:
Control Flow Integrity Enforcement with Dynamic Code Optimization. 366-385
Encryption, Signatures and Fundamentals
- Masayuki Fukumitsu, Shingo Hasegawa:
Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle Model. 389-407 - Junichi Tomida, Masayuki Abe, Tatsuaki Okamoto:
Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security. 408-425 - Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt:
MQSAS - A Multivariate Sequential Aggregate Signature Scheme. 426-439 - Jun Xu, Lei Hu, Santanu Sarkar
, Xiaona Zhang, Zhangjie Huang, Liqiang Peng:
Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption. 440-453

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.