


default search action
STM 2017: Oslo, Norway
- Giovanni Livraga, Chris J. Mitchell:

Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings. Lecture Notes in Computer Science 10547, Springer 2017, ISBN 978-3-319-68062-0
Cryptosystems and Applied Cryptography
- Kazuto Ogawa, Sakurako Tamura, Goichiro Hanaoka:

Key Management for Versatile Pay-TV Services. 3-18 - Daniel Homann

, Christian Göge, Lena Wiese
:
Dynamic Similarity Search over Encrypted Data with Low Leakage. 19-35 - Papa B. Seye, Augustin P. Sarr:

Enhanced Modelling of Authenticated Key Exchange Security. 36-52
Software Security and Risk Management
- Job Noorman, Jan Tobias Mühlberg

, Frank Piessens:
Authentic Execution of Distributed Event-Driven Applications with a Small TCB. 55-71 - William Dash, Matthew J. Craven

:
Exploring Botnet Evolution via Multidimensional Models and Visualisation. 72-88 - Per Håkon Meland, Inger Anne Tøndel, Marie Elisabeth Gaup Moe

, Fredrik Seehusen:
Facing Uncertainty in Cyber Insurance Policies. 89-100
Authorization
- Hiroaki Kikuchi, Koichi Niihara, Michihiro Yamada:

How Much is Risk Increased by Sharing Credential in Group? 103-117 - Giacomo Giorgi

, Antonio La Marra, Fabio Martinelli, Paolo Mori
, Andrea Saracino
:
Smart Parental Advisory: A Usage Control and Deep Learning-Based Framework for Dynamic Parental Control on Smart TV. 118-133 - Audun Jøsang

:
A Consistent Definition of Authorization. 134-144
Security Vulnerabilities and Protocols
- Jorden Whitefield

, Liqun Chen
, Frank Kargl, Andrew Paverd
, Steve A. Schneider
, Helen Treharne
, Stephan Wesemeyer
:
Formal Analysis of V2X Revocation Protocols. 147-163 - Olga Gadyatskaya, Ravi Jhawar, Sjouke Mauw, Rolando Trujillo-Rasua

, Tim A. C. Willemse:
Refinement-Aware Generation of Attack Trees. 164-179 - László Erdödi, Audun Jøsang

:
Exploit Prevention, Quo Vadis? 180-190
Secure Systems
- Kalonji Kalala, Tao Feng, Iluju Kiringa:

EigenTrust for Hierarchically Structured Chord. 203-212 - Tim Grube, Markus Thummerer, Jörg Daubert, Max Mühlhäuser:

Cover Traffic: A Trade of Anonymity and Efficiency. 213-223 - Luca Arnaboldi

, Charles Morisset:
Quantitative Analysis of DoS Attacks and Client Puzzles in IoT Systems. 224-233

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














