Primary Author | Co-Authors | Title |
Corella, Francisco Pomcor | Karen Lewison, Pomcor | An Overlooked Cryptographic Requirement for NSTIC |
Desmedt, Yvo University of College London | | Secret Sharing and Reliable Cloud Computing |
Gligoroski, Danilo Department of Telematics, NTNU, Norway | Svein Johan Knapskog, Q2S, NTNU, Norway Simona Samardjiska, Department of Telematics, NTNU, Norway | The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies |
Hoeper, Katrin Motorola Solutions, Inc. | Matthew Pirretti, Kevin Gudeth, Ron Buskey (Motorola Solutions, Inc) | Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors |
Janeja, Vandana University of Maryland, Baltimore Campus (UMBC) | Nabil Adam, Rutgers University Josephine Namayanja, UMBC | IntAleGen: Integrated Alert Generation in Multi Pronged attacks on Networked Systems |
Keoh, Sye Loong Philips Research Europe | Oscar Garcia-Morchon, Sandeep S. Kumar (Philips Research Europe) | Key Security Challenges in Smart Swarm of Things (SSoT) |
Kupwade-Patil, Harsh Southern Methodist University | Joseph Camp, Stephen A. Szygenda (Southern Methodist University) | Secure location and energy aware routing in Wireless Sensor Networks using Identity-based cryptography |
Kutylowski, Miroslaw | | Enabling Development of Applications for Smart Cards – Between Native Solutions and Javacards |
Lanzagorta, Marco ITT Corporation | | Secure Submarine Communications |
Maiti, Abhranil Virginia Tech | Vikash Gunreddy, Patrick Schaumont (Virginia Tech) | A Framework for the Evaluation of Physical Unclonable Functions |
Mattsson, Ulf Protegrity | Bart Preneel, Katholieke Universiteit Leuven | A Novel Approach to the Tokenization of Credit Card Numbers |
McAttee, Tuck Revere Security | Whitfield Diffie, Daniel Engels (Revere Security) | Revere Security Abstract for CETA |
McGrew, David | | Compact Asymmetric Authentication using Hash-based Signatures |
McGrew, David | | A Key Generation System (KGS) Suitable for Sensor and Building Networks |
Mohan, Apurva Honeywell ACS Labs | | Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking |
Moriyama, Daisuke NICT | Shin'ichiro Matsuo, NICT | Security/Privacy Models for "Internet of things": What should be studied from RFID-schemes? |
Parsons, Ron TecSec, Inc. | | Implementing a Standards Based Dynamic Key Framework to Complement PKI |
Reyzin, Leonid Boston University | Kyle Brogle, Sharon Goldberg (Boston University) | Aggregate Signatures for BGPsec |
Rundgren, Anders PrimeKey Solutions | | End-To-End Secured Credentialing over the Internet |
Struik, Rene Struik Security Consultancy | | Portable Credentials |
Struik, Rene Struik Security Consultancy | | Cryptography for Highly Constrained Networks |
Sturm, John Indiana State University | | An Open Framework for Low-Latency Communications across the Smart Grid |
Surber, Beth Ann WV Secretary of State | Jackie Harris, WV Secretary of State | Use of Cryptography in Securing On-line Voting |
Tsai, Chii-ren Citigroup O&T Risk Management | | Enterprise Key Management Challenges and Framework |
Umezurike, Josiah J. | | Symmetric Key Cryptography JJU-256 |
Vijayarangan, Natarajan Tata Consultancy Services | | Trusted Mobile Education (Learning) Software |
Volkovs, Nikolajs | | A Novel Approach to Authentication |
Zaverucha, Greg Certicom Research | | ECQV Implicit Certificates and the Cryptographic Suite for Embedded Systems (Suite E) |