Primary Author
|
Co-Authors |
Title |
Corella, Francisco
Pomcor |
Karen Lewison, Pomcor |
An Overlooked Cryptographic Requirement for NSTIC |
Desmedt, Yvo
University of College London |
|
Secret Sharing and Reliable Cloud Computing |
Gligoroski, Danilo
Department of Telematics, NTNU, Norway |
Svein Johan Knapskog, Q2S, NTNU, Norway
Simona Samardjiska, Department of Telematics, NTNU, Norway |
The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies |
Hoeper, Katrin
Motorola Solutions, Inc. |
Matthew Pirretti, Kevin Gudeth, Ron Buskey (Motorola Solutions, Inc) |
Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors |
Janeja, Vandana
University of Maryland, Baltimore Campus (UMBC) |
Nabil Adam, Rutgers University
Josephine Namayanja, UMBC |
IntAleGen: Integrated Alert Generation in Multi Pronged attacks on Networked Systems |
Keoh, Sye Loong
Philips Research Europe |
Oscar Garcia-Morchon, Sandeep S. Kumar (Philips Research Europe) |
Key Security Challenges in Smart Swarm of Things (SSoT) |
Kupwade-Patil, Harsh
Southern Methodist University |
Joseph Camp, Stephen A. Szygenda (Southern Methodist University) |
Secure location and energy aware routing in Wireless Sensor Networks using Identity-based cryptography |
Kutylowski, Miroslaw |
|
Enabling Development of Applications for Smart Cards – Between Native Solutions and Javacards |
Lanzagorta, Marco
ITT Corporation |
|
Secure Submarine Communications |
Maiti, Abhranil
Virginia Tech |
Vikash Gunreddy, Patrick Schaumont (Virginia Tech) |
A Framework for the Evaluation of Physical Unclonable Functions |
Mattsson, Ulf
Protegrity |
Bart Preneel, Katholieke Universiteit Leuven |
A Novel Approach to the Tokenization of Credit Card Numbers |
McAttee, Tuck
Revere Security |
Whitfield Diffie, Daniel Engels (Revere Security) |
Revere Security Abstract for CETA |
McGrew, David |
|
Compact Asymmetric Authentication using Hash-based Signatures |
McGrew, David |
|
A Key Generation System (KGS) Suitable for Sensor and Building Networks |
Mohan, Apurva
Honeywell ACS Labs |
|
Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking |
Moriyama, Daisuke
NICT |
Shin'ichiro Matsuo, NICT |
Security/Privacy Models for "Internet of things": What should be studied from RFID-schemes? |
Parsons, Ron
TecSec, Inc. |
|
Implementing a Standards Based Dynamic Key Framework to Complement PKI |
Reyzin, Leonid
Boston University |
Kyle Brogle, Sharon Goldberg (Boston University) |
Aggregate Signatures for BGPsec |
Rundgren, Anders
PrimeKey Solutions |
|
End-To-End Secured Credentialing over the Internet |
Struik, Rene
Struik Security Consultancy |
|
Portable Credentials |
Struik, Rene
Struik Security Consultancy |
|
Cryptography for Highly Constrained Networks |
Sturm, John
Indiana State University |
|
An Open Framework for Low-Latency Communications across the Smart Grid |
Surber, Beth Ann
WV Secretary of State |
Jackie Harris, WV Secretary of State |
Use of Cryptography in Securing On-line Voting |
Tsai, Chii-ren
Citigroup O&T Risk Management |
|
Enterprise Key Management Challenges and Framework |
Umezurike, Josiah J. |
|
Symmetric Key Cryptography JJU-256 |
Vijayarangan, Natarajan
Tata Consultancy Services |
|
Trusted Mobile Education (Learning) Software |
Volkovs, Nikolajs |
|
A Novel Approach to Authentication |
Zaverucha, Greg
Certicom Research |
|
ECQV Implicit Certificates and the Cryptographic Suite for Embedded Systems (Suite E) |