- arXiv [preprints – full text]:
- Relative Generalized Rank Weight of Linear Codes and Its Applications to Network Coding
- General Method for the Security Analysis in a Quantum Direct Communication Protocol
- Key Agreement Over a 3-receiver Broadcast Channel
- Secret Key Agreement Using Conferencing in State- Dependent Multiple Access Channels with An Eavesdropper
- Cryptanalysis and Improvement of Two Certificateless Three-party Authenticated Key Agreement Protocols
- Secrecy Without One-way Functions
- Campbell, J. (2013, Jan. 24). LAPD Spied on 21 Using StingRay Anti-Terrorism Tool. LA Weekly. [Read]
- Cryptology ePrint Archive [preprints]: new articles
- Ducklin, P. (2013, Jan. 24). Kim Dotcom’s Coders Hacking on Mega’s Cryptography Even As We Speak. Naked Security. [Read / Also: 3 Charged for Gozi Bank Attacks]
- Gallagher, R. (2013, Jan. 24). Letter to Skype: Come Clean on Your Eavesdropping Capabilities and Policies. Slate. [Read]
- [Gartner – full text / link to database + search for title in box at upper right]]:
- Creating a Security Process Catalog
- Formalizing Security Processes
- Security Governance, Management and Operations Are Not the Same
- The Security Processes You Must Get Right
- Goodin, D. (2013, Jan. 24). Secret Backdoors Found in Firewall, VPN Gear from Barracuda Networks. Ars Technica. [Read / Also: Canadian Student Expelled for White Hat Hack / Red October Quickly Unplugged]
- Google. (2013, Jan. 23). Transparency Report: What it Takes for Governments to Access Personal Information. [Read]
- HP’s Pwn2Own Hacking Contest Targets Browsers, Plug-ins. Infosecurity. [Read / Also: The Shift to ‘Post PC’ Threats / Study: 64% of Banks Claim DDoS Attacks / New HHS Rules Require Privacy / New EU Cyber Directive Expected Shortly]
- Martinez, J. (2013, Jan. 22). House Judiciary Committee to Look at Hacking Law in Wake of Swartz’s Death. The Hill. [Read / Also: Democrats Prioritize Cybersecurity Legislation / New House Trade Head Open to Privacy Regulation]
- McMillan, R. (2013, Jan. 18). Google Declares War on the Password. Wired. [Read]
- Rao, A., Jha, B., & Kini, G. (2013). Effect of Grammar on Security of Long Passwords [preprint]. [Read – download via Carnegie Mellon]
- Security & Communication Networks – new issue [full text]:
- Trust Modeling for Message Relay Control and Local Action Decision Making in VANETs
- Network Specific Vulnerability Based Alert Reduction Approach
- Further Analysis of Pairing-based Traitor Tracing Schemes for Broadcast Encryption
- What You See Predicts What You Get – Lightweight Agent-based Malware Detection
- Virtual Private Key Generator Based Escrow-free Certificateless Public Key Cryptosystem for Mobile Ad Hoc Networks
- Immunizing Mobile Ad Hoc Networks Against Collaborative Attacks Using Cooperative Immune Model
- Efficient and Strongly Unforgeable Identity-based Signature Scheme From Lattices in the Standard Model
- Toward Early Warning Against Internet Worms Based on Critical-sized Networks
- Modeling and Security Analysis of Enterprise Network Using Attack–defense Stochastic Game Petri Nets
- Secure Multicast Key Protocol for Electronic Mail Systems with Providing Perfect Forward Secrecy
- A Security-enhanced Key Agreement Protocol Based on Chaotic Maps
- Feature-based Type Identification of File Fragments
- Sood, A. K., & Enbody, R. J. (2013). Crimeware-as-a-service – A Survey of Commoditized Crimeware in the Underground Market [preprint]. International Journal of Critical Infrastructure Protection. [Read]
- Vijayan, J. (2013, Jan. 23). Exposure of Files on Unsecured Wireless No Excuse to Search, Judge Rules. Computerworld. [Read / Also: Targeted Attack on Reporters Without Borders / $396K Fine in PlayStation Hack]
Calls for Papers
Conferences
- International Conference on Privacy and Security in Mobile Systems [Atlantic City, NJ, June 24-27, 2013 – submissions due March 4]
- 4th IEEE Workshop on Data Security and Privacy in Wireless Networks [Madrid, Spain, June 4, 2013 – submissions due Feb. 28]
- Held in conjunction with the the 8th ACM Symposium on Information, Computer and Communications Security [all May 7, 2013, with submissions due Feb. 1]:
- 13th annual IEEE Conference on Technologies for Homeland Security [Waltham, MA, Nov. 12-14, 2013 – submissions due March 15]
- 22nd USENIX Security Symposium [Washington, DC, Aug. 14-16, 2013 – submissions due Feb. 21]