


default search action
16th CANS 2017: Hong Kong, China
- Srdjan Capkun, Sherman S. M. Chow

:
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11261, Springer 2018, ISBN 978-3-030-02640-0
Foundation of Applied Cryptography
- Mihir Bellare, Adam O'Neill, Igors Stepanovs:

Forward-Security Under Continual Leakage. 3-26 - José Becerra, Vincenzo Iovino

, Dimiter Ostrev, Petra Sala, Marjan Skrobot
:
Tightly-Secure PAK(E). 27-48
Processing Encrypted Data
- Matteo Maffei, Manuel Reinert, Dominique Schröder

:
On the Security of Frequency-Hiding Order-Preserving Encryption. 51-70 - Daniel Demmler, Kay Hamacher, Thomas Schneider

, Sebastian Stammler:
Privacy-Preserving Whole-Genome Variant Queries. 71-92 - Lihua Wang

, Yoshinori Aono, Le Trieu Phong:
A New Secure Matrix Multiplication from Ring-LWE. 93-111
Predicate Encryption
- Jonathan Katz, Matteo Maffei, Giulio Malavolta

, Dominique Schröder
:
Subset Predicate Encryption and Its Applications. 115-134 - Tim van de Kamp

, Andreas Peter
, Maarten H. Everts
, Willem Jonker:
Multi-client Predicate-Only Encryption for Conjunctive Equality Tests. 135-157
Credentials and Authentication
- Elena Pagnin

, Jing Liu, Aikaterini Mitrokotsa
:
Revisiting Yasuda et al.'s Biometric Authentication Protocol: Are You Private Enough? 161-178 - Stephan Krenn, Thomas Lorünser

, Anja Salzer, Christoph Striecks:
Towards Attribute-Based Credentials in the Cloud. 179-202 - Xavier Bultel, Pascal Lafourcade

:
Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures. 203-226
Web Security
- Marcus Niemietz, Jörg Schwenk:

Out of the Dark: UI Redressing and Trustworthy Events. 229-249 - Daniele Enrico Asoni, Samuel Hitz, Adrian Perrig:

A Paged Domain Name System for Query Privacy. 250-273
Bitcoin and Blockchain
- Indra Deep Mastan, Souradyuti Paul:

A New Approach to Deanonymization of Unreachable Bitcoin Nodes. 277-298 - Christos Patsonakis, Katerina Samari, Mema Roussopoulos, Aggelos Kiayias:

Towards a Smart Contract-Based, Decentralized, Public-Key Infrastructure. 299-321
Embedded System Security
- Wei Feng, Yu Qin, Shijun Zhao, Ziwen Liu, XiaoBo Chu, Dengguo Feng:

Secure Code Updates for Smart Embedded Devices Based on PUFs. 325-346 - Tomer Ashur

, Jeroen Delvaux, Sanghan Lee, Pieter Maene
, Eduard Marin
, Svetla Nikova
, Oscar Reparaz, Vladimir Rozic, Dave Singelée
, Bohan Yang, Bart Preneel
:
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network. 347-369
Anonymous and Virtual Private Networks
- Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu:

Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps. 373-389 - Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz:

Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. 390-412
Wireless and Physical Layer Security
- Daniele Antonioli

, Sandra Deepthy Siby
, Nils Ole Tippenhauer
:
Practical Evaluation of Passive COTS Eavesdropping in 802.11b/n/ac WLAN. 415-435 - Mohammad Hossein Chinaei, Diethelm Ostry, Vijay Sivaraman:

A Novel Algorithm for Secret Key Generation in Passive Backscatter Communication Systems. 436-455
Short Papers
- S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekaran Pandu Rangan:

A Provably-Secure Unidirectional Proxy Re-encryption Scheme Without Pairing in the Random Oracle Model. 459-469 - Mayur Punekar, Qutaibah M. Malluhi, Yvo Desmedt, Yongge Wang

:
Computational Aspects of Ideal (t, n)-Threshold Scheme of Chen, Laing, and Martin. 470-481 - Angela Jäschke, Frederik Armknecht

:
(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation. 482-492 - Suvradip Chakraborty, Y. Sreenivasa Rao

, Chandrasekaran Pandu Rangan:
An Efficient Attribute-Based Authenticated Key Exchange Protocol. 493-503 - Baodong Qin, Qinglan Zhao, Dong Zheng, Hui Cui

:
Server-Aided Revocable Attribute-Based Encryption Resilient to Decryption Key Exposure. 504-514 - Robert Annessi

, Tanja Zseby
, Joachim Fabini:
A New Direction for Research on Data Origin Authentication in Group Communication. 515-525 - Frederik Möllers, Stephanie Vogelgesang, Jochen Krüger, Isao Echizen, Christoph Sorge:

Modelling Traffic Analysis in Home Automation Systems. 526-536 - Jack Sturgess

, Ivan Martinovic:
VisAuth: Authentication over a Visual Channel Using an Embedded Image. 537-546

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














