Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

CETA 2011 Abstracts

Return to Workshop on Cryptography for Emerging Technologies and Applications page.

Primary Author

Corella, Francisco
Karen Lewison, PomcorAn Overlooked Cryptographic Requirement for NSTIC
Desmedt, Yvo
University of College London
 Secret Sharing and Reliable Cloud Computing
Gligoroski, Danilo
Department of Telematics, NTNU, Norway
Svein Johan Knapskog, Q2S, NTNU, Norway
Simona Samardjiska, Department of Telematics, NTNU, Norway
The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies
Hoeper, Katrin
Motorola Solutions, Inc. 
Matthew Pirretti, Kevin Gudeth, Ron Buskey (Motorola Solutions, Inc)Secure App Execution On Commercial Mobile Devices By Means Of Bare Metal Hypervisors
Janeja, Vandana
University of Maryland, Baltimore Campus (UMBC)
Nabil Adam, Rutgers University
Josephine Namayanja, UMBC
IntAleGen: Integrated Alert Generation in Multi Pronged attacks on Networked Systems
Keoh, Sye Loong
Philips Research Europe
Oscar Garcia-Morchon, Sandeep S. Kumar (Philips Research Europe)Key Security Challenges in Smart Swarm of Things (SSoT)
Kupwade-Patil, Harsh
Southern Methodist University
Joseph Camp, Stephen A. Szygenda (Southern Methodist University)Secure location and energy aware routing in Wireless Sensor Networks using Identity-based cryptography
Kutylowski, Miroslaw  Enabling Development of Applications for Smart Cards – Between Native Solutions and Javacards 
Lanzagorta, Marco
ITT Corporation
 Secure Submarine Communications
Maiti, Abhranil
Virginia Tech
Vikash Gunreddy, Patrick Schaumont (Virginia Tech)A Framework for the Evaluation of Physical Unclonable Functions
Mattsson, Ulf
Bart Preneel, Katholieke Universiteit LeuvenA Novel Approach to the Tokenization of Credit Card Numbers
McAttee, Tuck
Revere Security
Whitfield Diffie, Daniel Engels (Revere Security)Revere Security Abstract for CETA
McGrew, David Compact Asymmetric Authentication using Hash-based Signatures
McGrew, David A Key Generation System (KGS) Suitable for Sensor and Building Networks
Mohan, Apurva
Honeywell ACS Labs  
 Cryptographic Challenges for Smart Grid Home Area Networks Secure Networking
Moriyama, Daisuke
Shin'ichiro Matsuo, NICT  Security/Privacy Models for "Internet of things": What should be studied from RFID-schemes?
Parsons, Ron
TecSec, Inc.
 Implementing a Standards Based Dynamic Key Framework to Complement PKI
Reyzin, Leonid
Boston University
Kyle Brogle, Sharon Goldberg (Boston University)Aggregate Signatures for BGPsec 
Rundgren, Anders
PrimeKey Solutions
 End-To-End Secured Credentialing over the Internet
Struik, Rene
Struik Security Consultancy
 Portable Credentials
Struik, Rene
Struik Security Consultancy
 Cryptography for Highly Constrained Networks
Sturm, John
Indiana State University
 An Open Framework for Low-Latency Communications across the Smart Grid
Surber, Beth Ann
WV Secretary of State
Jackie Harris, WV Secretary of StateUse of Cryptography in Securing On-line Voting
Tsai, Chii-ren
Citigroup O&T Risk Management
 Enterprise Key Management Challenges and Framework
Umezurike, Josiah J.  Symmetric Key Cryptography JJU-256 
Vijayarangan, Natarajan 
Tata Consultancy Services
 Trusted Mobile Education (Learning) Software
Volkovs, Nikolajs A Novel Approach to Authentication
Zaverucha, Greg
Certicom Research
 ECQV Implicit Certificates and the Cryptographic Suite for Embedded Systems (Suite E)






Created October 12, 2011, Updated September 21, 2016