


default search action
23rd NordSec 2018: Oslo, Norway
- Nils Gruschka:

Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Lecture Notes in Computer Science 11252, Springer 2018, ISBN 978-3-030-03637-9
Privacy
- Avikarsha Mandal, Frederik Armknecht

, Erik Zenner:
Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid. 3-18 - Iulia Bastys

, Frank Piessens, Andrei Sabelfeld:
Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps. 19-37 - Mirja Nitschke

, Philipp Holler
, Lukas Hartmann, Dogan Kesdogan:
MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones. 38-53 - Hongliang Liang, Yudong Wang, Tianqi Yang, Yue Yu:

AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications. 54-70
Cryptography
- George Teseleanu

:
Unifying Kleptographic Attacks. 73-87 - Tobias Pulls

, Rasmus Dahlberg
:
Steady - A Simple End-to-End Secure Logging System. 88-103 - Arash Atashpendar, Guru-Vamsi Policharla, Peter B. Rønne

, Peter Y. A. Ryan
:
Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation. 104-120 - Zheng Yang

, Mohsin Khan
, Wanping Liu
, Jun He
:
On Security Analysis of Generic Dynamic Authenticated Group Key Exchange. 121-137 - Ahto Buldas

, Risto Laanoja, Ahto Truu:
A Blockchain-Assisted Hash-Based Signature Scheme. 138-153 - Matilda Backendal

, Mihir Bellare
, Jessica Sorrell
, Jiahao Sun
:
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants. 154-170 - Rasmus Dahlberg

, Tobias Pulls
:
Verifiable Light-Weight Monitoring for Certificate Transparency Logs. 171-183
Network and Cloud Security
- Charalampos Stylianopoulos

, Linus Johansson, Oskar Olsson, Magnus Almgren
:
CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs. 187-202 - Sebastian Zillien

, Steffen Wendzel
:
Detection of Covert Channels in TCP Retransmissions. 203-218 - Vivien M. Rooney

, Simon N. Foley
:
What You Can Change and What You Can't: Human Experience in Computer Network Defenses. 219-235 - Alexander Bajic, Georg T. Becker:

Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques. 236-254 - Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser

:
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. 255-271 - Ehtesham Zahoor, Asim Ikram, Sabina Akhtar, Olivier Perrin:

Authorization Policies Specification and Consistency Management within Multi-cloud Environments. 272-288
Cyber Security and Malware
- Kaie Maennel

, Sten Mäses, Olaf Maennel
:
Cyber Hygiene: The Big Picture. 291-305 - Ahmed Seid Yesuf, Christian W. Probst:

Estimating the Risk of Fraud Against E-Services. 306-322 - Juha Nurmi

, Mikko S. Niemelä
:
PESTEL Analysis of Hacktivism Campaign Motivations. 323-335 - Alexander Reinthal

, Eleftherios Lef Filippakis
, Magnus Almgren
:
Data Modelling for Predicting Exploits. 336-351 - Kursat Aktas, Sevil Sen

:
UpDroid: Updated Android Malware and Its Familial Classification. 352-368 - Barbara Krumay

, Edward W. N. Bernroider
, Roman Walser
:
Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework. 369-384 - Ziya Alper Genç

, Gabriele Lenzini
, Peter Y. A. Ryan
:
Next Generation Cryptographic Ransomware. 385-401
Security for Software and Software Development
- Ronan Lashermes, Hélène Le Bouder, Gaël Thomas:

Hardware-Assisted Program Execution Integrity: HAPEI. 405-420 - Roberto Guanciale

:
Protecting Instruction Set Randomization from Code Reuse Attacks. 421-436 - Tobias Hamann, Mihai Herda

, Heiko Mantel, Martin Mohr, David Schneider, Markus Tasch:
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode. 437-453 - Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim, Hyoungshick Kim:

When Harry Met Tinder: Security Analysis of Dating Apps on Android. 454-467 - Hanne Rygge, Audun Jøsang

:
Threat Poker: Solving Security and Privacy Threats in Agile Software Development. 468-483

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














