


default search action
15th ICETE 2018: Porto, Portugal - Volume 2
- Pierangela Samarati, Mohammad S. Obaidat:
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018. SciTePress 2018, ISBN 978-989-758-319-3
Invited Speakers
- Zeno J. M. H. Geradts:
Forensic Challenges on Multimedia Analytics, Big Data and the Internet of Things. ICETE (1) 2018: 5-99 - Jan Mendling:
The Past, Present and Future of Business Process Management. ICETE (1) 2018: 101 - Ismael Ripoll:
Scientific Research vs Bug Hunting. ICETE (1) 2018: 103-144 - Tobias Hoellwarth:
The CLOUD: Trigger for a Socio-Economic Revolution. ICETE (1) 2018: 145 - Miguel Pupo Correia:
Storing Critical Data in the Cloud: Challenges and Solutions. ICETE (1) 2018: 147-185
Papers
- Vivek Agrawal, Einar Arthur Snekkenes:
Secure Benchmarking using Electronic Voting. 191-206 - François Gérard, Veronika Kuchta
, Rajeev Anand Sahu, Gaurav Sharma, Olivier Markowitch:
Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage. 207-218 - Nikolaos Tsalis, George Stergiopoulos, Evangelos Bitsikas, Dimitris Gritzalis, Theodore K. Apostolopoulos:
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. 219-229 - Ameera Salem Al Abdouli, Mohamed Al Ali, Emanuele Bellini, Florian Caullery, Alexandros Hasikos, Marc Manzano, Víctor Mateu
:
DRANKULA: A McEliece-like Rank Metric based Cryptosystem Implementation. 230-241 - Takahiro Matsuda, Kenta Takahashi, Goichiro Hanaoka:
On the Security of Linear Sketch Schemes against Recovering Attacks. 242-253 - Mohamed Amine Belhamra, El Mamoun Souidi:
A Steganogaphic Scheme for MAC-Independent Opportunistic Routing and Encoding (MORE) Protocol. 254-264 - Georg Bramm
, Mark Gall, Julian Schütte:
BDABE - Blockchain-based Distributed Attribute based Encryption. 265-276 - Catalin V. Bîrjoveanu, Mirela Bîrjoveanu:
An Optimistic Fair Exchange E-commerce Protocol for Complex Transactions. 277-288 - Igor Zavalyshyn, Nuno O. Duarte, Nuno Santos:
An Extended Case Study about Securing Smart Home Hubs through N-version Programming. 289-300 - Sana Belguith
, Nesrine Kaaniche, Giovanni Russello:
Lightweight Attribute-based Encryption Supporting Access Policy Update for Cloud Assisted IoT. 301-312 - Laurent Gomez, Alberto Ibarrondo
, José Márquez, Patrick Duverger:
Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference. 313-320 - Nesrine Kaaniche, Maryline Laurent:
SABE: A Selective Attribute-based Encryption for an Efficient Threshold Multi-level Access Control. 321-333 - Maryline Laurent, Nesrine Kaaniche, Christian Le, Mathieu Vander Plaetse:
A Blockchain based Access Control Scheme. 334-342 - Waheeb Yaqub, Ibrahim Kamel, Zeyar Aung:
Distortion-free Watermarking Scheme for Compressed Data in Columnar Database. ICETE (2) 2018: 343-353 - Danilo Verhaert, Majid Nateghizad, Zekeriya Erkin
:
An Efficient Privacy-preserving Recommender System for e-Healthcare Systems. 354-365 - Jan Hajny, Petr Dzurenda, Lukas Malina, Sara Ricci
:
Anonymous Data Collection Scheme from Short Group Signatures. 366-375 - Adam Szekeres, Einar Arthur Snekkenes:
Unobtrusive Psychological Profiling for Risk Analysis. 376-386 - Ilhem Souissi, Nadia Ben Azzouna, Tahar Berradia, Lamjed Ben Saïd:
Fuzzy Logic based Model for Energy Consumption Trust Estimation in Electric Vehicular Networks. 387-399 - Sandip Ghosal, R. K. Shyamasundar, N. V. Narendra Kumar:
Static Security Certification of Programs via Dynamic Labelling. 400-411 - Mohammed Noraden Alsaleh, Ehab Al-Shaer, Qi Duan:
Verifying the Enforcement and Effectiveness of Network Lateral Movement Resistance Techniques. 412-423 - Luk Bettale
, Emmanuelle Dottax
, Mailody Ramphort:
Algebraic Side-Channel Attacks on Masked Implementations of AES. 424-435 - Majid Nateghizad, Zekeriya Erkin
, Reginald L. Lagendijk:
Efficient Index-based Search Protocols for Encrypted Databases. 436-447 - Luan Huy Pham, Massimiliano Albanese, Benjamin W. Priest:
A Quantitative Framework to Model Advanced Persistent Threats. 448-459 - Yuichi Kaji, Jason Paul Cruz, Yoshio Yatani:
Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains. 463-470 - Josep Domingo-Ferrer:
Big Data Anonymization Requirements vs Privacy Models. 471-478 - Alfredo Cuzzocrea, Fabio Martinelli, Francesco Mercaldo:
Applying Deep Learning Techniques to CAN Bus Attacks for Supporting Identification and Analysis Tasks. 479-487 - Christian Maulany, Majid Nateghizad, Bart Mennink, Zekeriya Erkin
:
Privacy-preserving Distributed Access Control for Medical Data. 488-497 - Hélène Le Bouder, Gaël Thomas, Edwin Bourget, Mariem Graa, Nora Cuppens, Jean-Louis Lanet:
Theoretical Security Evaluation of the Human Semantic Authentication Protocol. 498-505 - Upendra Kapshikar, Ayan Mahalanobis:
A Quantum-Secure Niederreiter Cryptosystem using Quasi-Cyclic Codes. ICETE (2) 2018: 506-513 - Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade, Lihua Ye:
Secure Grouping and Aggregation with MapReduce. 514-521 - Mriganka Mandal
, Ratna Dutta:
Cost-effective Private Linear Key Agreement with Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors. 522-529 - Nuha Aldausari, Cui Zhang, Jun Dai:
Combining Design by Contract and Inference Rules of Programming Logic towards Software Reliability. 530-537 - Christoph Stach, Sascha Alpers
, Stefanie Betz, Frank Dürr, Andreas Fritsch, Kai Mindermann, Saravana Murthy Palanisamy, Gunther Schiefer
, Manuela Wagner, Bernhard Mitschang, Andreas Oberweis, Stefan Wagner:
The AVARE PATRON - A Holistic Privacy Approach for the Internet of Things. 538-545 - Dominik Ziegler
, Bernd Prünster
, Alexander Marsalek, Christian Kollmann:
Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes. 546-553 - Abba Garba, Zhi Guan, Anran Li, Zhong Chen:
Analysis of Man-In-The-Middle of Attack on Bitcoin Address. 554-561 - Pedro S. Ribeiro, Nuno Santos, Nuno O. Duarte:
DBStore: A TrustZone-backed Database Management System for Mobile Applications. 562-569 - Audrey Lucas, Arnaud Tisserand:
Microcontroller Implementation of Simultaneous Protections Against Observation and Perturbation Attacks for ECC. 570-577 - Bonan Cuan, Aliénor Damien, Claire Delaplace, Mathieu Valois:
Malware Detection in PDF Files using Machine Learning. 578-585 - Makram W. Hatoum, Rony Darazi, Jean-François Couchot:
Blind PDF Document Watermarking Robust Against PCA and ICA Attacks. 586-593 - Imran Makhdoom
, Mehran Abolhasan
, Wei Ni:
Blockchain for IoT: The Challenges and a Way Forward. 594-605 - Fatemeh Amiri, Gerald Quirchmayr
, Peter Kieseberg:
A Machine Learning Approach for Privacy-preservation in E-business Applications. 609-618 - Gustavo Gonzalez Granadillo, Susana Gonzalez Zarzosa
, Mario Faiella:
Towards an Enhanced Security Data Analytic Platform. 619-624 - Antoine Loiseau, Jacques J. A. Fournier:
Binary Edwards Curves for Intrinsically Secure ECC Implementations for the IoT. 625-631 - Ricardo Gonçalves, Manuel Eduardo Correia, Pedro Brandão:
A Flexible Framework for Rogue Access Point Detection. 632-637 - Walid Rjaibi:
Holistic Database Encryption. 638-643 - Panayiotis Charalambous, Marios Karapetris, Elias Athanasopoulos:
KAuth: A Strong Single Sign-On Service based on PKI. 644-649 - Angelo Massimo Perillo, Emiliano De Cristofaro:
PAPEETE: Private, Authorized, and Fast Personal Genomic Testing. 650-655 - Dipayan Das, Vishal Saraswat:
Compact Lattice Signatures. 656-661 - Dipayan Das, Vishal Saraswat:
A Novel Lattice Reduction Algorithm. 662-667 - Yosra Ben Dhief, Yacine Djemaiel, Slim Rekhis, Noureddine Boudriga:
Secure Authentication Solution for Cloud-based Smart City Surveillance System. 668-673 - Gautam Srivastava, Ashutosh Dhar Dwivedi
, Rajani Singh:
Crypto-democracy: A Decentralized Voting Scheme using Blockchain Technology. 674-679 - Dilara Acarali, Muttukrishnan Rajarajan, Nikos Komninos
:
Evaluating the Provision of Botnet Defences using Translational Research Concepts. 680-685 - Iulian Aciobanitei, Roxana-Ioana Guinea, Mihai-Lica Pura:
AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols. 686-691 - Lukas Malina, Jan Hajny, Petr Dzurenda, Sara Ricci
:
Lightweight Ring Signatures for Decentralized Privacy-preserving Transactions. 692-697 - Andreas Schaad, Björn Grohmann, Oliver Winzenried, Ferdinand Brasser, Ahmad-Reza Sadeghi:
Towards a Cloud-based System for Software Protection and Licensing. 698-702 - Lalitha Muthu Subramanian, Roopa Vishwanathan:
Attribute Based Signatures: The Case for Automation. 703-708 - Brandon Broadnax, Matthias Huber, Bernhard Löwe, Jörn Müller-Quade, Patrik Scheidecker:
Towards Efficient Software Protection Obeying Kerckhoffs's Principle using Tamper-proof Hardware. 719-724 - Tikaram Sanyashi, Sreyans Nahata, Rushang Dhanesha, Bernard Menezes:
Learning Plaintext in Galbraith's LWE Cryptosystem. 725-731 - Fabio Martinelli, Francesco Mercaldo, Christina Michailidou, Andrea Saracino:
Phylogenetic Analysis for Ransomware Detection and Classification into Families. ICETE (2) 2018: 732-737 - Konstantinos Rantos, George Drosatos
, Konstantinos Demertzis, Christos Ilioudis, Alexandros Papanikolaou:
Blockchain-based Consents Management for Personal Data Processing in the IoT Ecosystem. 738-743

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.