default search action
EuroS&P 2017: Paris, France - Workshops
- 2017 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2017, Paris, France, April 26-28, 2017. IEEE 2017, ISBN 978-1-5386-2244-5
IEEE Secuirty and Privacy on the Blockchain (S&B) Workshop
- Harry Halpin, Marta Piekarska:
Introduction to Security and Privacy on the Blockchain. 1-3 - Andrew Miller, Iddo Bentov:
Zero-Collateral Lotteries in Bitcoin and Ethereum. 4-13 - Henning Kopp, David Mödinger, Franz J. Hauck, Frank Kargl, Christoph Bösch:
Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives. 14-22 - Maria Borge, Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Bryan Ford:
Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies. 23-26 - Dmitry Khovratovich, Jason Law:
BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace. 27-31 - Malte Möser, Rainer Böhme:
Anonymous Alone? Measuring Bitcoin's Second-Generation Anonymization Techniques. 32-41 - Masashi Sato, Shin'ichiro Matsuo:
Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography. 42-49 - Aymen Boudguiga, Nabil Bouzerna, Louis Granboulan, Alexis Olivereau, Flavien Quesnel, Anthony Roger, Renaud Sirdey:
Towards Better Availability and Accountability for IoT Updates by Means of a Blockchain. 50-58 - Ken Naganuma, Masayuki Yoshino, Hisayoshi Sato, Takayuki Suzuki:
Auditable Zerocoin. 59-63 - S. Matthew English, Ehsan Nezhadian:
Conditions of Full Disclosure: The Blockchain Remuneration Model. 64-67 - Leif-Nissen Lundbaek, Michael Huth:
Oligarchic Control of Business-to-Business Blockchains. 68-71
IMPS 2017: Innovations in Mobile Privacy & Security Workshop
- Bram Bonné, Peter Quax, Wim Lamotte:
The Privacy API: Facilitating Insights in How One's Own User Data is Shared. 72-75 - Stephan A. Kollmann, Alastair R. Beresford:
The Cost of Push Notifications for Smartphones Using Tor Hidden Services. 76-85
SEMS: Workshop on Security for Embedded and Mobile Systems
- Apostolos P. Fournaris, Louiza Papachristodoulou, Nicolas Sklavos:
Secure and Efficient RNS Software Implementation for Elliptic Curve Cryptography. 86-93 - Omer Shwartz, Guy Shitrit, Asaf Shabtai, Yossi Oren:
From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts. 94-98 - Tomer Gluck, Rami Puzis, Yossi Oren, Asaf Shabtai:
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case. 99-103 - Nikita Veshchikov, Sylvain Guilley:
Use of Simulators for Side-Channel Analysis. 104-112 - Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, Shinsaku Kiyomoto:
Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers. 113-121 - Mohammad Etemad, Filipe Beato, Alptekin Küpçü, Bart Preneel:
Are You Really My Friend? Efficient and Secure Friend-Matching in Mobile Social Networks. 122-131
S4CIP'17: 2nd Workshop on Safety & Security aSSurance for Critical Infrastructures Protection
- Asuka Terai, Shingo Abe, Shoya Kojima, Yuta Takano, Ichiro Koshijima:
Cyber-Attack Detection for Industrial Control System Monitoring with Support Vector Machine Based on Communication Profile. 132-138 - Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri:
Challenges and Approaches in Securing Safety-Relevant Railway Signalling. 139-145 - Giuseppe Primiero, Franco Raimondi, Taolue Chen, Rajagopal Nagarajan:
A Proof-Theoretic Trust and Reputation Model for VANET. 146-152 - Zhendong Ma, Aleksandar Hudic, Abdelkader Magdy Shaaban, Sándor Plósz:
Security Viewpoint in a Reference Architecture Model for Cyber-Physical Production Systems. 153-159 - Simona Bernardi, Raúl Piraces Alastuey, Raquel Trillo Lado:
Using Process Mining and Model-Driven Engineering to Enhance Security of Web Information Systems. 160-166 - Stefano Marrone:
Towards a Unified Definition of Cyber and Physical Vulnerability in Critical Infrastructures. 167-173 - Giles Howard, Michael J. Butler, John Colley, Vladimiro Sassone:
Formal Analysis of Safety and Security Requirements of Critical Systems Supported by an Extended STPA Methodology. 174-180
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.