


default search action
NordSec 2009: Oslo, Norway
- Audun Jøsang, Torleiv Maseng, Svein J. Knapskog:

Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings. Lecture Notes in Computer Science 5838, Springer 2009, ISBN 978-3-642-04765-7
Anonymity and Privacy
- Jan Muntermann, Heiko Roßnagel

:
On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market. 1-14 - Heiko Roßnagel

, Jan Zibuschka, Lexi Pimenidis, Thomas Deselaers:
Facilitating the Adoption of Tor by Focusing on a Promising Target Group. 15-27 - Igor Margasinski:

A Parallelism-Based Approach to Network Anonymization. 28-43 - Md. Sadek Ferdous

, Audun Jøsang
, Kuldeep Singh, Ravishankar Borgaonkar:
Security Usability of Petname Systems. 44-59
Modelling and Design
- Karsten Peder Holth, Do van Thuan, Ivar Jørstad, Do Van Thanh:

An Analysis of Widget Security. 60-71 - Jason Crampton:

Trade-Offs in Cryptographic Implementations of Temporal Access Control. 72-87 - Riccardo Focardi

, Flaminia L. Luccio
, Graham Steel:
Blunting Differential Attacks on PIN Processing APIs. 88-103
Network Layer Security
- Ejaz Ahmed, Andrew J. Clark, George M. Mohay:

Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic. 104-119 - Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes

:
An Improved Attack on TKIP. 120-132
Security for Mobile Users
- Lander Casado, Philippas Tsigas

:
ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System. 133-147 - Naveed Ahmed, Christian Damsgaard Jensen:

A Mechanism for Identity Delegation at Authentication Level. 148-162 - Heiko Roßnagel

, Jan Muntermann:
Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services. 163-178 - Jan Bouda, Jan Krhovjak, Vashek Matyas, Petr Svenda

:
Towards True Random Number Generation in Mobile Environments. 179-189
Embedded Systems and Mechanisms
- Mikko Kiviharju, Teijo Venäläinen, Suna Kinnunen:

Towards Modelling Information Security with Key-Challenge Petri Nets. 190-206 - Arne Ansper, Sven Heiberg, Helger Lipmaa

, Tom André Øverland, Filip van Laenen:
Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011. 207-222 - Thomas Vilarinho, Kjetil Haslum, Josef Noll:

Advanced SIM Capabilities Supporting Trust-Based Applications. 223-238 - Nataliia Bielova

, Fabio Massacci
, Andrea Micheletti:
Towards Practical Enforcement Theories. 239-254
Protocols and Protocol Analysis
- Benedikt Westermann:

Security Analysis of AN.ON's Payment Scheme. 255-270 - Peeter Laud

, Meelis Roos:
Formal Analysis of the Estonian Mobile-ID Protocol. 271-286 - Hugues Chabot, Raphaël Khoury, Nadia Tawbi

:
Generating In-Line Monitors for Rabin Automata. 287-301

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














