


default search action
NordSec 2010: Espoo, Finland
- Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg:

Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers. Lecture Notes in Computer Science 7127, Springer 2012, ISBN 978-3-642-27936-2
Network Security
- Mikko Särelä, Christian Esteve Rothenberg

, András Zahemszky, Pekka Nikander, Jörg Ott:
BloomCasting: Security in Bloom Filter Based Multicast. 1-16 - Sanna Suoranta, Jani Heikkinen, Pekka Silvekoski:

Authentication Session Migration. 17-32 - Miika Komu

, Sasu Tarkoma
, Andrey Lukyanenko:
Mitigation of Unsolicited Traffic across Domains with Host Identities and Puzzles. 33-48 - Ravishankar Borgaonkar, Kevin Redon, Jean-Pierre Seifert:

Experimental Analysis of the Femtocell Location Verification Techniques. 49-54
Invited Talk
- Erka Koivunen:

"Why Wasn't I Notified?": Information Security Incident Reporting Demystified. 55-70
Monitoring and Reputation
- Pern Hui Chia, Andreas P. Heiner, N. Asokan

:
Use of Ratings from Personalized Communities for Trustworthy Application Installation. 71-88 - Gunnar Kreitz, Mads Dam, Douglas Wikström:

Practical Private Information Aggregation in Large Networks. 89-103 - Magnus Almgren

, Wolfgang John
:
Tracking Malicious Hosts on a 10Gbps Backbone Link. 104-120
Privacy
- Elahe Kani-Zabihi

, Lizzie Coles-Kemp:
Service Users' Requirements for Tools to Support Effective On-line Privacy and Consent Practices. 121-135 - Dominik Herrmann, Christoph Gerber, Christian Banse

, Hannes Federrath:
Analyzing Characteristic Host Access Patterns for Re-identification of Web User Sessions. 136-154
Policy Enforcement
- Jason Crampton, Michael Huth:

A Framework for the Modular Specification and Orchestration of Authorization Policies. 155-170 - Kari Kostiainen, N. Asokan

, Jan-Erik Ekberg:
Credential Disabling from Trusted Execution Environments. 171-186 - Olga Gadyatskaya, Fabio Massacci

, Federica Paci
, Sergey A. Stankevich
:
Java Card Architecture for Autonomous Yet Secure Evolution of Smart Cards Applications. 187-192 - Filippo Del Tedesco, Alejandro Russo

, David Sands:
Implementing Erasure Policies Using Taint Analysis. 193-209
Selected OWASP AppSec Research 2010 Papers
- Juan José Conti, Alejandro Russo

:
A Taint Mode for Python via a Library. 210-222 - Philippe De Ryck, Maarten Decat, Lieven Desmet

, Frank Piessens, Wouter Joosen:
Security of Web Mashups: A Survey. 223-238 - Jonas Magazinius, Phu H. Phung

, David Sands:
Safe Wrappers and Sane Policies for Self Protecting JavaScript. 239-255
Cryptography and Protocols
- Jose Quaresma, Christian W. Probst

:
Protocol Implementation Generator. 256-268 - Billy Bob Brumley

:
Secure and Fast Implementations of Two Involution Ciphers. 269-282 - Markku-Juhani O. Saarinen

:
The PASSERINE Public Key Encryption and Authentication Mechanism. 283-288

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














