default search action
SEC 2009: Pafos, Cyprus
- Dimitris Gritzalis, Javier López:
Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings. IFIP Advances in Information and Communication Technology 297, Springer 2009, ISBN 978-3-642-01243-3
Identification and Authentication I
- Nathan L. Clarke, Sevasti Karatzouni, Steven Furnell:
Flexible and Transparent User Authentication for Mobile Devices. 1-12 - Amir Herzberg:
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. 13-24 - Yannis Soupionis, George Tountas, Dimitris Gritzalis:
Audio CAPTCHA for SIP-Based VoIP. 25-38
Threats and Attacks
- Ryan Farley, Xinyuan Wang:
Roving Bugnet: Distributed Surveillance Threat and Mitigation. 39-50 - Lucas Nussbaum, Pierre Neyron, Olivier Richard:
On Robust Covert Channels Inside DNS. 51-62 - Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Discovering Application-Level Insider Attacks Using Symbolic Execution. 63-75
Identification and Authentication II
- Gerald Stefan Kostmajer, Herbert Stögner, Andreas Uhl:
Custom JPEG Quantization for Improved Iris Recognition Accuracy. 76-86 - Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo:
On the IPP Properties of Reed-Solomon Codes. 87-97 - Li Yao, Ning Zhang:
A Generic Authentication LoA Derivation Model. 98-108
Applications of Cryptography and Information Hiding
- Herbert Leitold, Reinhard Posch, Thomas Rössler:
Media-Break Resistant eSignatures in eGovernment: An Austrian Experience. 109-118 - Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. 119-131 - Jorge Blasco Alís, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda, Miguel A. Orellana-Quiros:
Steganalysis of Hydan. 132-142
Trusted Computing
- Shay Gueron, Jean-Pierre Seifert:
On the Impossibility of Detecting Virtual Machine Monitors. 143-151 - Andreas Leicher, Nicolai Kuntze, Andreas U. Schmidt:
Implementation of a Trusted Ticket System. 152-163
Security Policies
- Anas Abou El Kalam, Philippe Balbiani:
A Policy Language for Modelling Recommendations. 176-189
Validation, Verification, Evaluation
- Andreas Fuchs, Sigrid Gürgens, Carsten Rudolph:
On the Security Validation of Integrated Security Solutions. 190-201 - Puneet Gupta, Scott D. Stoller:
Verification of Security Policy Enforcement in Enterprise Systems. 202-213 - Joachim Biskup, Jan-Hendrik Lochner, Sebastian Sonntag:
Optimization of the Controlled Evaluation of Closed Relational Queries. 214-225
Privacy Protection - Security Assessment
- Jan Paul Kolter, Thomas Kernchen, Günther Pernul:
Collaborative Privacy - A Community-Based Privacy Infrastructure. 226-236 - Pieter Verhaeghe, Jorn Lapon, Bart De Decker, Vincent Naessens, Kristof Verslype:
Security and Privacy Improvements for the Belgian eID Technology. 237-247 - Thomas Brandstetter, Konstantin Knorr, Ute Rosenbaum:
A Structured Security Assessment Methodology for Manufacturers of Critical Infrastructure Components. 248-258
Role Mining and Content Protection
- Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
Mining Stable Roles in RBAC. 259-269 - Abdullatif Shikfa, Melek Önen, Refik Molva:
Privacy-Preserving Content-Based Publish/Subscribe Networks. 270-282 - Hongxia Jin, Jeffery Lotspiech:
Broadcast Encryption for Differently Privileged. 283-293 - Mohammad Ashiqur Rahaman, Yves Roudier, Philip Miseldine, Andreas Schaad:
Ontology-Based Secure XML Content Distribution. 294-306
Security Protocols
- Felix Leder, Peter Martini:
NGBPA Next Generation BotNet Protocol Analysis. 307-317 - Mayla Brusò, Agostino Cortesi:
Non-repudiation Analysis with LySa. 318-329 - Alessandro Sorniotti, Refik Molva:
A Provably Secure Secret Handshake with Dynamic Controlled Matching. 330-341 - Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. 342-352
Access Control
- Quan Pham, Jason Reid, Adrian McCullagh, Ed Dawson:
On a Taxonomy of Delegation. 353-363 - Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo De Santis, Sara Foresti, Stefano Paraboschi, Pierangela Samarati:
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. 364-375 - Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde:
A Probabilistic Bound on the Basic Role Mining Problem and Its Applications. 376-386 - Christoph Benzmüller:
Automating Access Control Logics in Simple Type Theory with LEO-II. 387-398
Internet and Web Applications Security
- Yianna Danidou, Burkhard Schafer:
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security. 399-409 - Yannis Mallios, Sudeep Modi, Aditya Agarwala, Christina Johns:
Persona: Network Layer Anonymity and Accountability for Next Generation Internet. 410-420 - Sandra Steinbrecher, Stephan Groß, Markus Meichau:
Jason: A Scalable Reputation System for the Semantic Web. 421-431 - Ahmad Samer Wazan, Romain Laborde, David W. Chadwick, François Barrère, Abdelmalek Benzekri:
Which Web Browsers Process SSL Certificates in a Standardized Way? 432-442
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.