default search action
9. WISTP 2015: Heraklion, Greece
- Raja Naeem Akram, Sushil Jajodia:
Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings. Lecture Notes in Computer Science 9311, Springer 2015, ISBN 978-3-319-24017-6
Security and Privacy Services
- Radim Ostádal, Petr Svenda, Vashek Matyás:
On Secrecy Amplification Protocols. 3-19 - Tassos Dimitriou, Ioannis Krontiris:
Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing. 20-35 - Alejandro Calleja, Pedro Peris-Lopez, Juan E. Tapiador:
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. 36-51 - Neyire Deniz Sarier:
Private Minutia-Based Fingerprint Matching. 52-67
Secure Resource Sharing and Access Control
- Jo Van Bulck, Job Noorman, Jan Tobias Mühlberg, Frank Piessens:
Secure Resource Sharing for Embedded Protected Module Architectures. 71-87 - Hoi Le Thi, Reihaneh Safavi-Naini, Asadullah Al Galib:
Secure Obfuscation of Authoring Style. 88-103 - Miguel Morales-Sandoval, Arturo Diaz-Perez:
DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption. 104-119 - Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou:
WSACd - A Usable Access Control Framework for Smart Home Devices. 120-133
Secure Devices and Execution Environment
- Masoud Narouei, Hassan Takabi:
Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques. 137-152 - Ghada Arfaoui, Saïd Gharout, Jean-François Lalande, Jacques Traoré:
Practical and Privacy-Preserving TEE Migration. 153-168 - Duc-Phong Le, Chik How Tan, Michael Tunstall:
Randomizing the Montgomery Powering Ladder. 169-184
Challenges of Security and Reliability
- Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden:
How Current Android Malware Seeks to Evade Automated Code Analysis. 187-202 - Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers:
On Linkability and Malleability in Self-blindable Credentials. 203-218 - Qiao Hu, Lavinia Mihaela Dinca, Gerhard P. Hancke:
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. 219-234
Short Papers
- David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel:
Normalizing Security Events with a Hierarchical Knowledge Base. 237-248 - Marieta Georgieva Ivanova, Christian W. Probst, René Rydhof Hansen, Florian Kammüller:
Attack Tree Generation by Policy Invalidation. 249-259 - George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas, Ioannis G. Askoxylakis:
Lightweight Password Hashing Scheme for Embedded Systems. 260-270 - Konstantinos Rantos, Konstantinos Fysarakis, Othonas Sultatos, Ioannis G. Askoxylakis:
Secure and Authenticated Access to LLN Resources Through Policy Constraints. 271-280
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.