Sciweavers

SCN
2008
Springer
136views Communications» more  SCN 2008»
13 years 3 months ago
An efficient data structure for network anomaly detection
Abstract-- Despite the rapid advance in networking technologies, detection of network anomalies at high-speed switches/routers is still far from maturity. To push the frontier, two...
Jieyan Fan, Dapeng Wu, Kejie Lu, Antonio Nucci
SCN
2008
Springer
106views Communications» more  SCN 2008»
13 years 3 months ago
A bilateral remote user authentication scheme that preserves user anonymity
Smart card-based authentication is one of the most widely used and practical solutions to remote user authentication. Compared to other authentication schemes, our proposed scheme...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 3 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
SCN
2008
Springer
147views Communications» more  SCN 2008»
13 years 3 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
SCN
2008
Springer
105views Communications» more  SCN 2008»
13 years 3 months ago
Expressive Subgroup Signatures
In this work, we propose a new generalization of the notion of group signatures, that allows signers to cover the entire spectrum from complete disclosure to complete anonymity. Pr...
Xavier Boyen, Cécile Delerablée
SCN
2008
Springer
194views Communications» more  SCN 2008»
13 years 3 months ago
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes
We improve our proposal of a new variant of the McEliece cryptosystem based on QC-LDPC codes. The original McEliece cryptosystem, based on Goppa codes, is still unbroken up to now,...
Marco Baldi, Marco Bodrato, Franco Chiaraluce
SCN
2008
Springer
13 years 3 months ago
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
In this paper, we build, in a generic way, two asymmetric cryptosystems with a careful study of their security. We present first an additively homomorphic scheme which generalizes,...
Guilhem Castagnos
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 3 months ago
Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries
We present an implementation of the protocol of Lindell and Pinkas for secure two-party computation which is secure against malicious adversaries [13]. This is the first running sy...
Yehuda Lindell, Benny Pinkas, Nigel P. Smart
SCN
2008
Springer
131views Communications» more  SCN 2008»
13 years 3 months ago
CLL: A Cryptographic Link Layer for Local Area Networks
Abstract. Ethernet and IP form the basis of the vast majority of LAN installations. But these protocols do not provide comprehensive security mechanisms, and thus give way for a pl...
Yves Igor Jerschow, Christian Lochert, Björn ...
SCN
2008
Springer
142views Communications» more  SCN 2008»
13 years 3 months ago
A New DPA Countermeasure Based on Permutation Tables
Abstract. We propose and analyse a new countermeasure against Differential Power Analysis (DPA) for the AES encryption algorithm, based on permutation tables. As opposed to existin...
Jean-Sébastien Coron