![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
NordSec 2013: Ilulissat, Greenland
- Hanne Riis Nielson
, Dieter Gollmann:
Secure IT Systems - 18th Nordic Conference, NordSec 2013, Ilulissat, Greenland, October 18-21, 2013, Proceedings. Lecture Notes in Computer Science 8208, Springer 2013, ISBN 978-3-642-41487-9
Cyber-Physical Systems
- Alessio Di Mauro, Xenofon Fafoutis
, Sebastian Mödersheim
, Nicola Dragoni
:
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs. 1-16 - Roberto Vigo, Alessandro Bruni, Ender Yüksel:
Security Games for Cyber-Physical Systems. 17-32 - Willem Burgers, Roel Verdult, Marko C. J. D. van Eekelen:
Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials. 33-50
Security Policies
- Tero Hasu, Anya Helene Bagge
, Magne Haveraaen
:
Inferring Required Permissions for Statically Composed Programs. 51-66 - Mike Ter Louw, Phu H. Phung
, Rohini Krishnamurti, Venkat N. Venkatakrishnan:
SafeScript: JavaScript Transformation for Policy Enforcement. 67-83
Information Flow
- Musard Balliu:
A Logic for Information Flow Analysis of Distributed Programs. 84-99 - Martin Pettai, Peeter Laud
:
Dynamics and Secure Information Flow for a Higher-Order Pi-Calculus. 100-115 - Pablo Buiras, Alejandro Russo
:
Lazy Programs Leak Secrets. 116-122
Security Experiences
- Arne Ansper, Ahto Buldas
, Margus Freudenthal, Jan Willemson:
High-Performance Qualified Digital Signatures for X-Road. 123-138 - Tigist Ayalew, Tigist Kidane, Bengt Carlsson:
Identification and Evaluation of Security Activities in Agile Projects. 139-153 - Marcin Nagy, N. Asokan
, Jörg Ott:
PeerShare: A System Secure Distribution of Sensitive Data among Social Contacts. 154-165
Cyber-Physical Systems
- Marina Krotofil, Alvaro A. Cárdenas:
Resilience of Process Control Systems to Cyber-Physical Attacks. 166-182 - Fabian van den Broek, Ronny Wichers Schreur:
Femtocell Security in Theory and Practice. 183-198 - Alessio Antonini
, Alessandro Barenghi
, Gerardo Pelosi
:
Security Analysis of Building Automation Networks - Threat Model and Viable Mitigation Techniques. 199-214
Web Security
- Thierry Sans, Iliano Cervesato
, Soha Hussein
:
Controlling Data Flow with a Policy-Based Programming Language for the Web. 215-230 - Bastian Braun, Christian v. Pollak, Joachim Posegga:
A Survey on Control-Flow Integrity Means in Web Application Frameworks. 231-246
Security Policies
- Dimiter Milushev, Dave Clarke:
Incremental Hyperproperty Model Checking via Games. 247-262 - Klara Stokes
:
Graph k-Anonymity through k-Means and as Modular Decomposition. 263-278
Network Security
- Nicolae Paladi, Christian Gehrmann, Fredric Morenius:
Domain-Based Storage Protection (DBSP) in Public Infrastructure Clouds. 279-296 - Nabil Hachem, Joaquín García-Alfaro
, Hervé Debar
:
An Adaptive Mitigation Framework for Handling Suspicious Network Flows via MPLS Policies. 297-312 - Ahto Buldas
, Andres Kroonmaa, Risto Laanoja:
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees. 313-320
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.