


default search action
NordSec 2013: Ilulissat, Greenland
- Hanne Riis Nielson

, Dieter Gollmann:
Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Lecture Notes in Computer Science 8208, Springer 2013, ISBN 978-3-642-41487-9
Cyber-Physical Systems
- Alessio Di Mauro, Xenofon Fafoutis

, Sebastian Mödersheim
, Nicola Dragoni
:
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs. 1-16 - Roberto Vigo, Alessandro Bruni, Ender Yüksel:

Security Games for Cyber-Physical Systems. 17-32 - Willem Burgers, Roel Verdult, Marko C. J. D. van Eekelen:

Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials. 33-50
Security Policies
- Tero Hasu, Anya Helene Bagge

, Magne Haveraaen
:
Inferring Required Permissions for Statically Composed Programs. 51-66 - Mike Ter Louw, Phu H. Phung

, Rohini Krishnamurti, Venkat N. Venkatakrishnan:
SafeScript: JavaScript Transformation for Policy Enforcement. 67-83
Information Flow
- Musard Balliu:

A Logic for Information Flow Analysis of Distributed Programs. 84-99 - Martin Pettai, Peeter Laud

:
Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus. 100-115 - Pablo Buiras, Alejandro Russo

:
Lazy Programs Leak Secrets. 116-122
Security Experiences
- Arne Ansper, Ahto Buldas

, Margus Freudenthal, Jan Willemson:
High-Performance Qualified Digital Signatures for X-Road. 123-138 - Tigist Ayalew, Tigist Kidane, Bengt Carlsson:

Identification and Evaluation of Security Activities in Agile Projects. 139-153 - Marcin Nagy, N. Asokan

, Jörg Ott:
PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts. 154-165
Cyber-Physical Systems
- Marina Krotofil, Alvaro A. Cárdenas:

Resilience of Process Control Systems to Cyber-Physical Attacks. 166-182 - Fabian van den Broek, Ronny Wichers Schreur:

Femtocell Security in Theory and Practice. 183-198 - Alessio Antonini

, Alessandro Barenghi
, Gerardo Pelosi
:
Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques. 199-214
Web Security
- Thierry Sans, Iliano Cervesato

, Soha Hussein
:
Controlling Data Flow with a Policy-Based Programming Language for the Web. 215-230 - Bastian Braun, Christian v. Pollak, Joachim Posegga:

A Survey on Control-Flow Integrity Means in Web Application Frameworks. 231-246
Security Policies
- Dimiter Milushev, Dave Clarke:

Incremental Hyperproperty Model Checking via Games. 247-262 - Klara Stokes

:
Graph k-Anonymity through k-Means and as Modular Decomposition. 263-278
Network Security
- Nicolae Paladi, Christian Gehrmann, Fredric Morenius:

Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds. 279-296 - Nabil Hachem, Joaquín García-Alfaro

, Hervé Debar
:
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies. 297-312 - Ahto Buldas

, Andres Kroonmaa, Risto Laanoja:
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees. 313-320

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














