


default search action
STM 2013: Egham, UK
- Rafael Accorsi, Silvio Ranise

:
Security and Trust Management - 9th International Workshop, STM 2013, Egham, UK, September 12-13, 2013. Proceedings. Lecture Notes in Computer Science 8203, Springer 2013, ISBN 978-3-642-41097-0
Privacy
- Costas Delakouridis, Christos Anagnostopoulos

:
On Enhancement of 'Share The Secret' Scheme for Location Privacy. 1-16 - Peeter Laud

, Alisa Pankova:
New Attacks against Transformation-Based Privacy-Preserving Linear Programming. 17-32 - Ryan D. Riley

, Chris Clifton, Qutaibah M. Malluhi:
Maintaining Database Anonymity in the Presence of Queries. 33-48
Network, Web, and Mobile Security
- Alessandra De Benedictis

, Behzad Koosha, Massimiliano Albanese
, Valentina Casola
:
A Probabilistic Framework for Distributed Localization of Attackers in MANETs. 49-64 - Mauro Conti

, Nicola Dragoni
, Sebastiano Gottardo:
MITHYS: Mind The Hand You Shake - Protecting Mobile Devices from SSL Usage Vulnerabilities. 65-81 - Alexios Mylonas

, Nikolaos Tsalis, Dimitris Gritzalis:
Evaluating the Manageability of Web Browsers Controls. 82-98
Security Protocols
- Marco Rocchetto, Luca Viganò, Marco Volpe, Giacomo Dalle Vedove:

Using Interpolation for the Verification of Security Protocols. 99-114 - Lil María Rodríguez-Henríquez

, Debrup Chakraborty
:
RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases. 115-130
Security Policies and Trust Management
- Ana Ferreira

, Jean-Louis Huynen, Vincent Koenig, Gabriele Lenzini, Salvador Rivas:
Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names. 131-143 - Yannis Mallios, Lujo Bauer

, Dilsun Kirli Kaynar, Fabio Martinelli, Charles Morisset:
Probabilistic Cost Enforcement of Security Policies. 144-159 - Nik Sultana, Moritz Y. Becker, Markulf Kohlweiss

:
Selective Disclosure in Datalog-Based Trust Management. 160-175
Business Process Security
- Thomas G. Koslowski, Christian Zimmermann:

Towards a Detective Approach to Process-Centered Resilience. 176-190 - Thomas Stocker, Frank Böhr:

IF-Net: A Meta-Model for Security-Oriented Process Specification. 191-206
Watermarking for Security
- Javier Franco-Contreras, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens, Christian Roux:

Authenticity Control of Relational Databases by Means of Lossless Watermarking Based on Circular Histogram Modulation. 207-222 - Marco Botta, Davide Cavagnino, Victor Pomponiu:

Weighted-Sum Fragile Watermarking in the Karhunen-Loève Domain. 223-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














