


default search action
SEC 2009: Pafos, Cyprus
- Dimitris Gritzalis, Javier López:

Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. IFIP Advances in Information and Communication Technology 297, Springer 2009, ISBN 978-3-642-01243-3
Identification and Authentication I
- Nathan L. Clarke

, Sevasti Karatzouni, Steven Furnell
:
Flexible and Transparent User Authentication for Mobile Devices. 1-12 - Amir Herzberg:

Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. 13-24 - Yannis Soupionis, George Tountas, Dimitris Gritzalis:

Audio CAPTCHA for SIP-Based VoIP. 25-38
Threats and Attacks
- Ryan Farley, Xinyuan Wang:

Roving Bugnet: Distributed Surveillance Threat and Mitigation. 39-50 - Lucas Nussbaum, Pierre Neyron, Olivier Richard:

On Robust Covert Channels Inside DNS. 51-62 - Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Discovering Application-Level Insider Attacks Using Symbolic Execution. 63-75
Identification and Authentication II
- Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl:

Custom JPEG Quantization for Improved Iris Recognition Accuracy. 76-86 - Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano

, Neus Domingo:
On the IPP Properties of Reed-Solomon Codes. 87-97 - Li Yao, Ning Zhang:

A Generic Authentication LoA Derivation Model. 98-108
Applications of Cryptography and Information Hiding
- Herbert Leitold, Reinhard Posch, Thomas Rössler:

Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. 109-118 - Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima

, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. 119-131 - Jorge Blasco Alís

, Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda, Miguel A. Orellana-Quiros:
Steganalysis of Hydan. 132-142
Trusted Computing
- Shay Gueron

, Jean-Pierre Seifert:
On the Impossibility of Detecting Virtual Machine Monitors. 143-151 - Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt:

Implementation of a Trusted Ticket System. 152-163
Security Policies
- Anas Abou El Kalam

, Philippe Balbiani
:
A Policy Language for Modelling Recommendations. 176-189
Validation, Verification, Evaluation
- Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph

:
On the Security Validation of Integrated Security Solutions. 190-201 - Puneet Gupta, Scott D. Stoller:

Verification of Security Policy Enforcement in Enterprise Systems. 202-213 - Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag:

Optimization of the Controlled Evaluation of Closed Relational Queries. 214-225
Privacy Protection - Security Assessment
- Jan Paul Kolter, Thomas Kernchen, Günther Pernul:

Collaborative Privacy - A Community-Based Privacy Infrastructure. 226-236 - Pieter Verhaeghe, Jorn Lapon

, Bart De Decker, Vincent Naessens, Kristof Verslype:
Security and Privacy Improvements for the Belgian eID Technology. 237-247 - Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum:

A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components. 248-258
Role Mining and Content Protection
- Alessandro Colantonio, Roberto Di Pietro

, Alberto Ocello, Nino Vincenzo Verde:
Mining Stable Roles in RBAC. 259-269 - Abdullatif Shikfa

, Melek Önen
, Refik Molva
:
Privacy-Preserving Content-Based Publish/Subscribe Networks. 270-282 - Hongxia Jin, Jeffery Lotspiech:

Broadcast Encryption for Differently Privileged. 283-293 - Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad:

Ontology-Based Secure XML Content Distribution. 294-306
Security Protocols
- Felix Leder, Peter Martini:

NGBPA Next Generation BotNet Protocol Analysis. 307-317 - Mayla Brusò, Agostino Cortesi

:
Non-repudiation Analysis with LySa. 318-329 - Alessandro Sorniotti, Refik Molva

:
A Provably Secure Secret Handshake with Dynamic Controlled Matching. 330-341 - Amir Herzberg

, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. 342-352
Access Control
- Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson

:
On a Taxonomy of Delegation. 353-363 - Carlo Blundo

, Stelvio Cimato
, Sabrina De Capitani di Vimercati
, Alfredo De Santis
, Sara Foresti
, Stefano Paraboschi
, Pierangela Samarati
:
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. 364-375 - Alessandro Colantonio, Roberto Di Pietro

, Alberto Ocello, Nino Vincenzo Verde:
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. 376-386 - Christoph Benzmüller

:
Automating Access Control Logics in Simple Type Theory with LEO-II. 387-398
Internet and Web Applications Security
- Yianna Danidou

, Burkhard Schafer:
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security. 399-409 - Yannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns:

Persona: Network Layer Anonymity and Accountability for Next Generation Internet. 410-420 - Sandra Steinbrecher, Stephan Groß, Markus Meichau:

Jason: A Scalable Reputation System for the Semantic Web. 421-431 - Ahmad Samer Wazan, Romain Laborde, David W. Chadwick

, François Barrère, Abdelmalek Benzekri:
Which Web Browsers Process SSL Certificates in a Standardized Way? 432-442

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














