Full Text Documents

Search


Table of Contents
Communications and Multimedia Security
Bart Decker, Jorn Lapon, Vincent Naessens, Andreas Uhl
Front Matter

Research Papers


Analysis of Revocation Strategies for Anonymous Idemix Credentials
Jorn Lapon, Markulf Kohlweiss, Bart Decker, Vincent Naessens
3-17
A Secure Key Management Framework for Heterogeneous Wireless Sensor Networks
Mahdi Alagheband, Mohammad Aref
18-31
Twin Clouds: Secure Cloud Computing with Low Latency
Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
32-44
Implementation Aspects of Anonymous Credential Systems for Mobile Trusted Platforms
Kurt Dietrich, Johannes Winter, Granit Luzhnica, Siegfried Podesser
45-58
Approximation of a Mathematical Aging Function for Latent Fingerprint Traces Based on First Experiments Using a Chromatic White Light (CWL) Sensor and the Binary Pixel Aging Feature
Ronny Merkel, Jana Dittmann, Claus Vielhauer
59-71
Two-Factor Biometric Recognition with Integrated Tamper-Protection Watermarking
Reinhard Huber, Herbert Stögner, Andreas Uhl
72-84
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting
Karl Kümmel, Tobias Scheidat, Christian Arndt, Claus Vielhauer
85-93
Dynamic Software Birthmark for Java Based on Heap Memory Analysis
Patrick Chan, Lucas Hui, S. Yiu
94-107
A Secure Perceptual Hash Algorithm for Image Content Authentication
Li Weng, Bart Preneel
108-121
Low-Attention Forwarding for Mobile Network Covert Channels
Steffen Wendzel, Jörg Keller
122-133
Cryptanalysis of a SIP Authentication Scheme
Fuwen Liu, Hartmut Koenig
134-143

Work in Progress


Mapping between Classical Risk Management and Game Theoretical Approaches
Lisa Rajbhandari, Einar Snekkenes
147-154
Digital Signatures: How Close Is Europe to Truly Interoperable Solutions?
Konstantinos Rantos
155-162
A Generic Architecture for Integrating Health Monitoring and Advanced Care Provisioning
Koen Decroix, Milica Milutinovic, Bart Decker, Vincent Naessens
163-170
A Modular Test Platform for Evaluation of Security Protocols in NFC Applications
Geoffrey Ottoy, Jeroen Martens, Nick Saeys, Bart Preneel, Lieven Strycker, Jean-Pierre Goemaere, Tom Hamelinckx
171-177
GPU-Assisted AES Encryption Using GCM
Georg Schönberger, Jürgen Fuß
178-185
Radon Transform-Based Secure Image Hashing
Dung Nguyen, Li Weng, Bart Preneel
186-193
On Detecting Abrupt Changes in Network Entropy Time Series
Philipp Winter, Harald Lampesberger, Markus Zeilinger, Eckehard Hermann
194-205
Motif-Based Attack Detection in Network Communication Graphs
Krzysztof Juszczyszyn, Grzegorz Kołaczek
206-213
Secure Negotiation for Manual Authentication Protocols
Milica Milutinovic, Roel Peeters, Bart Decker
214-221
A Secure One-Way Authentication Protocol in IMS Context
Mohamed Maachaoui, Anas Abou El Kalam, Christian Fraboul
222-231
High Capacity FFT-Based Audio Watermarking
Mehdi Fallahpour, David Megias
235-237
Efficient Prevention of Credit Card Leakage from Enterprise Networks
Matthew Hall, Reinoud Koornstra, Miranda Mowbray
238-240
Security Warnings for Children’s Smart Phones: A First Design Approach
Jana Dittmann, Jana Fruth, Ronny Merkel
241-243
Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
Muhammad Asim, Luan Ibraimi, Milan Petković
244-246
Anonymous Authentication from Public-Key Encryption Revisited
Daniel Slamanig
247-249

Part IV: Keynotes


Mobile Identity Management
Jaap-Henk Hoepman
253-253
Who Needs Facebook Anyway - Privacy and Sociality in Social Network Sites
Ronald Leenes
254-254
From Protecting a System to Protecting a Global Ecosystem
Moti Yung
255-255

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/