Activity Spoofing and Its Defense in Android Smartphones (Englisch)
- Neue Suche nach: Cooley, Brett
- Neue Suche nach: Wang, Haining
- Neue Suche nach: Stavrou, Angelos
- Neue Suche nach: Cooley, Brett
- Neue Suche nach: Wang, Haining
- Neue Suche nach: Stavrou, Angelos
In:
ACNS, International Conference on Applied Cryptography and Network Security, 12
;
494-512
;
2014
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Activity Spoofing and Its Defense in Android Smartphones
-
Beteiligte:
-
Erschienen in:Lecture Notes in Computer Science ; 8479 ; 494-512
-
Verlag:
- Neue Suche nach: Springer International Publishing
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2014
-
Format / Umfang:19 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
New Modular Compilers for Authenticated Key ExchangeLi, Y. / Schage, S. / Yang, Z. / Bader, C. / Schwenk, J. et al. | 2014
- 19
-
Password-Based Authenticated Key Exchange without Centralized Trusted SetupYoneyama, K. et al. | 2014
- 37
-
A Linear Algebra Attack to Group-Ring-Based Key Exchange ProtocolsKreuzer, M. / Myasnikov, A.D. / Ushakov, A. et al. | 2014
- 44
-
Improved Constructions of PRFs Secure against Related-Key AttacksLewi, K. / Montgomery, H. / Raghunathan, A. et al. | 2014
- 62
-
Verifiable Multi-server Private Information RetrievalZhang, L.F. / Safavi-Naini, R. et al. | 2014
- 80
-
Certified BitcoinsAteniese, G. / Faonio, A. / Magri, B. / de Medeiros, B. et al. | 2014
- 97
-
Leakage Resilient Proofs of Ownership in Cloud Storage, RevisitedXu, J. / Zhou, J. et al. | 2014
- 116
-
Private Message Transmission Using Disjoint PathsAhmadi, H. / Safavi-Naini, R. et al. | 2014
- 134
-
Partial Key Exposure Attacks on Takagi's Variant of RSAHuang, Z. / Hu, L. / Xu, J. / Peng, L. / Xie, Y. et al. | 2014
- 151
-
New Partial Key Exposure Attacks on CRT-RSA with Large Public ExponentsLu, Y. / Zhang, R. / Lin, D. et al. | 2014
- 163
-
Bit-Flip Faults on Elliptic Curve Base Fields, RevisitedKim, T. / Tibouchi, M. et al. | 2014
- 181
-
All-but-One Dual Projective Hashing and Its ApplicationsZhang, Z. / Chen, Y. / Chow, S.S.M. / Hanaoka, G. / Cao, Z. / Zhao, Y. et al. | 2014
- 199
-
Distributed Smooth Projective Hashing and Its Application to Two-Server Password Authenticated Key ExchangeKiefer, F. / Manulis, M. et al. | 2014
- 217
-
Sakura: A Flexible Coding for Tree HashingBertoni, G. / Daemen, J. / Peeters, M. / Van Assche, G. et al. | 2014
- 235
-
Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash FunctionsNaito, Y. / Yoneyama, K. / Ohta, K. et al. | 2014
- 253
-
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and ApplicationsSasaki, Y. et al. | 2014
- 271
-
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type CiphersBlondeau, C. / Bogdanov, A. / Wang, M. et al. | 2014
- 289
-
Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash FunctionMa, B. / Li, B. / Hao, R. / Li, X. et al. | 2014
- 308
-
Differential Cryptanalysis and Linear Distinguisher of Full-Round ZorroWang, Y. / Wu, W. / Guo, Z. / Yu, X. et al. | 2014
- 324
-
Detecting Hidden LeakagesMoradi, A. / Guilley, S. / Heuser, A. et al. | 2014
- 343
-
Improving Intrusion Detection Systems for Wireless Sensor NetworksStetsko, A. / Smolka, T. / Matyas, V. / Stehlik, M. et al. | 2014
- 361
-
MoTE-ECC: Energy-Scalable Elliptic Curve Cryptography for Wireless Sensor NetworksLiu, Z. / Wenger, E. / Grossschadl, J. et al. | 2014
- 380
-
BackRef: Accountability in Anonymous Communication NetworksBackes, M. / Clark, J. / Kate, A. / Simeonovski, M. / Druschel, P. et al. | 2014
- 401
-
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTPBackes, M. / Gerling, R.W. / Gerling, S. / Nurnberger, S. / Schroder, D. / Simkin, M. et al. | 2014
- 419
-
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation ListAttrapadung, N. / Emura, K. / Hanaoka, G. / Sakai, Y. et al. | 2014
- 438
-
Faster Batch Verification of Standard ECDSA Signatures Using Summation PolynomialsKarati, S. / Das, A. et al. | 2014
- 457
-
On Updatable Redactable SignaturesPohls, H.C. / Samelin, K. et al. | 2014
- 476
-
Practical Signatures from the Partial Fourier Recovery ProblemHoffstein, J. / Pipher, J. / Schanck, J.M. / Silverman, J.H. / Whyte, W. et al. | 2014
- 494
-
Activity Spoofing and Its Defense in Android SmartphonesCooley, B. / Wang, H. / Stavrou, A. et al. | 2014
- 513
-
Polymorphism as a Defense for Automated Attack of WebsitesWang, X. / Kohno, T. / Blakley, B. et al. | 2014
- 531
-
Fragmentation Considered Leaking: Port Inference for DNS PoisoningShulman, H. / Waidner, M. et al. | 2014
- 549
-
Delegating a Pairing Can Be Both Secure and EfficientCanard, S. / Devigne, J. / Sanders, O. et al. | 2014
- 566
-
Automatic Protocol Selection in Secure Two-Party ComputationsKerschbaum, F. / Schneider, T. / Schropfer, A. et al. | 2014