


default search action
SEC 2016: Ghent, Belgium
- Jaap-Henk Hoepman, Stefan Katzenbeisser:

ICT Systems Security and Privacy Protection - 31st IFIP TC 11 International Conference, SEC 2016, Ghent, Belgium, May 30 - June 1, 2016, Proceedings. IFIP Advances in Information and Communication Technology 471, Springer 2016, ISBN 978-3-319-33629-9
Cryptographic Protocols
- Oksana Kulyk, Stephan Neumann, Karola Marky, Jurlind Budurushi

, Melanie Volkamer:
Coercion-Resistant Proxy Voting. 3-16 - Xavier Bultel, Pascal Lafourcade

:
A Posteriori Openable Public Key Encryption. 17-31 - Sérgio M. Câmara, Dhananjay Anand, Victoria Pillitteri

, Luiz F. R. C. Carmo:
Multicast Delayed Authentication for Streaming Synchrophasor Data in the Smart Grid. 32-46
Human Aspects of Security
- Gurpreet Dhillon

, Spyridon Samonas, Ugo Etudo:
Developing a Human Activity Model for Insider IS Security Breaches Using Action Design Research. 49-61 - Awad A. Younis, Yashwant K. Malaiya, Indrajit Ray:

Evaluating CVSS Base Score Using Vulnerability Rewards Programs. 62-75 - Gurpreet Dhillon

, Chandrashekar Challa, Kane Smith:
Defining Objectives for Preventing Cyberstalking. 76-87
Cyber Infrastructure
- Sridhar Adepu, Aditya Mathur:

Using Process Invariants to Detect Cyber Attacks on a Water Treatment System. 91-104 - Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey:

Expression and Enforcement of Security Policy for Virtual Resource Allocation in IaaS Cloud. 105-118 - Salaheddine Zerkane

, David Espes
, Philippe Le Parc, Frédéric Cuppens:
Software Defined Networking Reactive Stateful Firewall. 119-132
Phishing and Data Sharing
- Simon Stockhardt, Benjamin Reinheimer, Melanie Volkamer, Peter Mayer

, Alexandra Kunz, Philipp Rack, Daniel Lehmann:
Teaching Phishing-Security: Which Way is Best? 135-149 - Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape

, Toru Nakamura, Gökhan Bal, Haruo Takasaki, Kai Rannenberg:
On Gender Specific Perception of Data Sharing in Japan. 150-160 - Melanie Volkamer, Karen Renaud

, Benjamin Reinheimer:
TORPEDO: TOoltip-poweRed Phishing Email DetectiOn. 161-175
Social Networks
- Dieudonne Mulamba, Indrajit Ray, Indrakshi Ray:

SybilRadar: A Graph-Structure Based Framework for Sybil Detection in On-line Social Networks. 179-193 - Iraklis Symeonidis

, Fatemeh Shirazi, Gergely Biczók
, Cristina Pérez-Solà
, Bart Preneel
:
Collateral Damage of Facebook Apps: Friends, Providers, and Privacy Interdependence. 194-208
Software Vulnerabilities
- Hongzhe Li, Jaesang Oh, Hakjoo Oh, Heejo Lee:

Automated Source Code Instrumentation for Verifying Potential Vulnerabilities. 211-226 - Daniela Oliveira, Jedidiah R. Crandall

, Harry A. Kalodner, Nicole Morin, Megan Maher, Jesús Navarro, Felix Emiliano:
An Information Flow-Based Taxonomy to Understand the Nature of Software Vulnerabilities. 227-242 - Enrico Bazzoli, Claudio Criscione, Federico Maggi, Stefano Zanero

:
XSS PEEKER: Dissecting the XSS Exploitation Techniques and Fuzzing Mechanisms of Blackbox Web Application Scanners. 243-258
TPM and Internet of Things
- Benjamin Aziz

, Paul Fremantle, Rui Wei, Álvaro Enrique Arenas:
A Utility-Based Reputation Model for the Internet of Things. 261-275 - Andreas Fuchs, Christoph Krauß

, Jürgen Repp:
Advanced Remote Firmware Upgrades Using TPM 2.0. 276-289
Sidechannel Analysis
- Yuan Zhao, Jingqiang Lin, Wuqiong Pan, Cong Xue, Fangyu Zheng, Ziqiang Ma:

RegRSA: Using Registers as Buffers to Resist Memory Disclosure Attacks. 293-307 - Changhai Ou, Zhu Wang, Degang Sun, Xinping Zhou, Juan Ai:

Uncertain? No, It's Very Certain! - Recovering the Key from Guessing Entropy Enhanced CPA. 308-320
Software Security
- Ping Chen, Christophe Huygens

, Lieven Desmet
, Wouter Joosen:
Advanced or Not? A Comparative Study of the Use of Anti-debugging and Anti-VM Techniques in Generic and Targeted Malware. 323-336 - Yu-Yang Hong, Yu-Ping Wang

, Jie Yin:
NativeProtector: Protecting Android Applications by Isolating and Intercepting Third-Party Native Libraries. 337-351 - Andrew Bedford

, Stephen Chong, Josée Desharnais
, Nadia Tawbi
:
A Progress-Sensitive Flow-Sensitive Inlined Information-Flow Control Monitor. 352-366
Privacy
- Frederik Möllers

, Christoph Sorge:
Deducing User Presence from Inter-Message Intervals in Home Automation Systems. 369-383 - Ella Kolkowska, Annica Kristoffersson

:
Privacy by Design Principles in Design of New Generation Cognitive Assistive Technologies. 384-397 - Alexander Schaub

, Rémi Bazin, Omar Hasan, Lionel Brunie:
A Trustless Privacy-Preserving Reputation System. 398-411

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














