


default search action
4. FPS 2011: Paris, France
- Joaquín García-Alfaro

, Pascal Lafourcade:
Foundations and Practice of Security - 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6888, Springer 2012, ISBN 978-3-642-27900-3
Keynote Address
- Fatemeh Raji

, Ali Miri, Mohammad Davarpanah Jazi:
Preserving Privacy in Online Social Networks. 1-13
Short Papers
- Jordi Pujol Ahulló, Roger Jardí-Cedó, Jordi Castellà-Roca, Oriol Farràs

:
TTP SmartCard-Based ElGamal Cryptosystem Using Threshold Scheme for Electronic Elections. 14-22 - Martin Gagné, Pascal Lafourcade

, Yassine Lakhnech, Reihaneh Safavi-Naini:
Automated Verification of Block Cipher Modes of Operation, an Improved Method. 23-31
Pervasive Security and Threshold Cryptography
- Nicola Dragoni

, Eduardo Lostal, Davide Papini, Javier Fabra:
SC 2: Secure Communication over Smart Cards - How to Secure Off-Card Matching in Security-by-Contract for Open Multi-application Smart Cards. 32-48 - Behzad Malek, Ali Miri:

Private Identification of RFID Tags. 49-61 - Martin Stanek:

Threshold Encryption into Multiple Ciphertexts. 62-72
Encryption, Cryptanalysis and Automatic Verification
- Yu Chen, Song Luo, Jian-bin Hu, Zhong Chen:

A Novel Commutative Blinding Identity Based Encryption Scheme. 73-89 - Marina Pudovkina

:
A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules. 90-101 - Gilles Barthe, Mathilde Duclos, Yassine Lakhnech:

A Computational Indistinguishability Logic for the Bounded Storage Model. 102-117
Keynote Addresses
- Gimer Cervera, Michel Barbeau

, Joaquín García-Alfaro
, Evangelos Kranakis
:
Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol. 118-131 - Hadi Ahmadi, Reihaneh Safavi-Naini:

Secret Key Establishment over Noisy Channels. 132-147
Formal Methods and Network Security
- Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner

:
Formal Specification and Validation of Security Policies. 148-163 - Jannik Dreier, Pascal Lafourcade

, Yassine Lakhnech:
Vote-Independence: A Powerful Privacy Notion for Voting Protocols. 164-180 - Michal Rjasko:

Black-Box Property of Cryptographic Hash Functions. 181-193 - Jun Ho Huh, Hyoungshick Kim:

Phishing Detection with Popular Search Engines: Simple and Effective. 194-207
Ongoing Research
- Eugenia I. Papagiannakopoulou

, Maria N. Koukovini, Georgios V. Lioudakis
, Joaquín García-Alfaro
, Dimitra I. Kaklamani, Iakovos S. Venieris:
A Contextual Privacy-Aware Access Control Model for Network Monitoring Workflows: Work in Progress. 208-217 - Michel Embe Jiague, Marc Frappier

, Frédéric Gervais, Régine Laleau, Richard St-Denis
:
A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress. 218-226 - Pierre Konopacki, Hakim Belhaouari, Marc Frappier

, Régine Laleau:
Specification and Verification of Access Control Policies in EB3SEC: Work in Progress. 227-233 - Jérémy Milhau, Marc Frappier

, Régine Laleau:
A Metamodel of the B Modeling of Access-Control Policies: Work in Progress. 234-241 - Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro

:
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress. 242-251

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














