


default search action
SEC 2012: Crete, Greece
- Dimitris Gritzalis, Steven Furnell

, Marianthi Theoharidou:
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings. IFIP Advances in Information and Communication Technology 376, Springer 2012, ISBN 978-3-642-30435-4
Attacks and Malicious Code
- Michael Roland

, Josef Langer, Josef Scharinger:
Relay Attacks on Secure Element-Enabled Mobile Devices - Virtual Pickpocketing Revisited. 1-12 - Alessandro Armando

, Alessio Merlo, Mauro Migliardi
, Luca Verderame
:
Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures). 13-24 - Bernhard J. Berger

, Karsten Sohr
:
An Approach to Detecting Inter-Session Data Flow Induced by Object Pooling. 25-36 - Guillaume Barbu, Christophe Giraud

, Vincent Guerin:
Embedded Eavesdropping on Java Card. 37-48
Security Architectures
- Sofia-Anna Menesidou

, Vasilios Katos
:
Authenticated Key Exchange (AKE) in Delay Tolerant Networks. 49-60 - Alexandre B. Augusto, Manuel Eduardo Correia

:
OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management. 61-74 - Andreas Leicher, Andreas U. Schmidt, Yogendra Shah:

Smart OpenID: A Smart Card Based OpenID Protocol. 75-86 - David Zhao, Issa Traoré, Ali A. Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu

:
Peer to Peer Botnet Detection Based on Flow Intervals. 87-102
System Security
- Eleni Gessiou, Vasilis Pappas, Elias Athanasopoulos, Angelos D. Keromytis, Sotiris Ioannidis:

Towards a Universal Data Provenance Framework Using Dynamic Instrumentation. 103-114 - Baozeng Ding, Fufeng Yao, Yanjun Wu, Yeping He:

Improving Flask Implementation Using Hardware Assisted In-VM Isolation. 115-125 - Francesco Gadaleta, Nick Nikiforakis, Jan Tobias Mühlberg

, Wouter Joosen:
HyperForce: Hypervisor-enForced Execution of Security-Critical Code. 126-137 - Feifei Wang, Ping Chen, Bing Mao, Li Xie:

RandHyp: Preventing Attacks via Xen Hypercall Interface. 138-149
Access Control
- John C. John, Shamik Sural

, Vijayalakshmi Atluri
, Jaideep Vaidya:
Role Mining under Role-Usage Cardinality Constraint. 150-161 - Ruben Rios, Jose Antonio Onieva

, Javier López
:
HIDE_DHCP: Covert Communications through Network Configuration Messages. 162-173 - Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquín García-Alfaro

, Tarik Moataz, Xavier Rimasson:
Handling Stateful Firewall Anomalies. 174-186 - Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi

, Luigi Logrippo:
A Framework for Threat Assessment in Access Control Systems. 187-198
Database Security
- Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Stefano Paraboschi
, Pierangela Samarati
:
Support for Write Privileges on Outsourced Data. 199-210 - Weihan Li, Brajendra Panda, Qussai Yaseen

:
Malicious Users' Transactions: Tackling Insider Threat. 211-222
Privacy Attitudes and Properties
- George Drosatos

, Aimilia Tasidou, Pavlos S. Efraimidis:
Privacy-Preserving Television Audience Measurement Using Smart TVs. 223-234 - Christian Banse

, Dominik Herrmann, Hannes Federrath:
Tracking Users on the Internet with Behavioral Patterns: Evaluation of Its Practical Feasibility. 235-248 - Alexios Mylonas

, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis:
Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. 249-260
Social Networks and Social Engineering
- Shuhao Li, Xiao-chun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang:

Modeling Social Engineering Botnet Dynamics across Multiple Social Networks. 261-272 - Giampaolo Bella

, Lizzie Coles-Kemp:
Layered Analysis of Security Ceremonies. 273-286
Applied Cryptography, Anonymity and Trust
- Joan Boyar

, René Peralta:
A Small Depth-16 Circuit for the AES S-Box. 287-298 - Maria Christofi, Aline Gouget:

Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol. 299-314
Usable Security
- Amir Herzberg

, Ronen Margulies:
My Authentication Album: Adaptive Images-Based Login Mechanism. 315-326 - Shuzhe Yang, Gökhan Bal:

Balancing Security and Usability of Local Security Mechanisms for Mobile Devices. 327-338 - Ella Kolkowska, Bart De Decker:

Analyzing Value Conflicts for a Work-Friendly ISS Policy Implementation. 339-351 - Gurpreet Dhillon

, Tiago Oliveira
, Santa R. Susarapu, Mário M. Caldeira
:
When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems. 352-363
Security and Trust Models
- Olga Gadyatskaya, Fabio Massacci

, Anton Philippov:
Security-by-Contract for the OSGi Platform. 364-375 - Hyundo Park, Sung-Oh David Jung, Heejo Lee, Hoh Peter In:

Cyber Weather Forecasting: Forecasting Unknown Internet Worms Using Randomness Analysis. 376-387 - Yulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang:

Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. 388-399 - Han Jiao, Jixue Liu

, Jiuyong Li
, Chengfei Liu
:
Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework. 400-411
Security Economics
- Giuseppe D'Acquisto, Marta Flamini

, Maurizio Naldi
:
A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation. 412-423 - Yolanta Beres, Jonathan Griffin:

Optimizing Network Patching Policy Decisions. 424-442 - Marianthi Theoharidou

, Alexios Mylonas
, Dimitris Gritzalis:
A Risk Assessment Method for Smartphones. 443-456 - Ronald Dodge, Kathryn Coronges, Ericka Rovira:

Empirical Benefits of Training to Phishing Susceptibility. 457-464
Authentication and Delegation
- Hataichanok Saevanee, Nathan L. Clarke

, Steven M. Furnell
:
Multi-modal Behavioural Biometric Authentication for Mobile Devices. 465-474 - Christoforos Ntantogian

, Christos Xenakis
, Ioannis Stavrakakis
:
Analysis and Modeling of False Synchronizations in 3G-WLAN Integrated Networks. 475-488 - Yongge Wang

:
Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks. 489-500 - Shaoying Cai, Yingjiu Li, Yunlei Zhao:

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains. 501-512 - Vrizlynn L. L. Thing, Hwei-Ming Ying:

Enhanced Dictionary Based Rainbow Table. 513-524
Short Papers
- Sarah Nait Bahloul, Emmanuel Coquery, Mohand-Said Hacid:

Authorization Policies for Materialized Views. 525-530 - Yongdong Wu, Zhigang Zhao:

Enhancing the Security of On-line Transactions with CAPTCHA Keyboard. 531-536 - Xin Kang

, Yongdong Wu:
Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach. 537-542 - Ioannis Psaroudakis, Vasilios Katos

, Pavlos S. Efraimidis:
A Framework for Anonymizing GSM Calls over a Smartphone VoIP Network. 543-548 - Marco Prandini

, Marco Ramilli:
A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages. 549-554 - Milica Milutinovic, Vincent Naessens, Bart De Decker:

Privacy-Preserving Mechanisms for Organizing Tasks in a Pervasive eHealth System. 555-560 - Yannis Soupionis, Miltiadis Kandias:

Web Services Security Assessment: An Authentication-Focused Approach. 561-566 - Nineta Polemi, Theodoros Ntouskas:

Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case. 567-572 - Nor Badrul Anuar

, Maria Papadaki
, Steven Furnell
, Nathan L. Clarke
:
A Response Strategy Model for Intrusion Response Systems. 573-578 - Massimo Ficco, Massimiliano Rak

:
Intrusion Tolerance of Stealth DoS Attacks to Web Services. 579-584 - Christos Grompanopoulos, Ioannis Mavridis:

Towards Use-Based Usage Control. 585-590

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














