


default search action
9. WISTP 2015: Heraklion, Greece
- Raja Naeem Akram, Sushil Jajodia:

Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings. Lecture Notes in Computer Science 9311, Springer 2015, ISBN 978-3-319-24017-6
Security and Privacy Services
- Radim Ostádal, Petr Svenda

, Vashek Matyás:
On Secrecy Amplification Protocols. 3-19 - Tassos Dimitriou, Ioannis Krontiris:

Privacy-Respecting Auctions as Incentive Mechanisms in Mobile Crowd Sensing. 20-35 - Alejandro Calleja, Pedro Peris-Lopez

, Juan E. Tapiador
:
Electrical Heart Signals can be Monitored from the Moon: Security Implications for IPI-Based Protocols. 36-51 - Neyire Deniz Sarier

:
Private Minutia-Based Fingerprint Matching. 52-67
Secure Resource Sharing and Access Control
- Jo Van Bulck

, Job Noorman, Jan Tobias Mühlberg
, Frank Piessens:
Secure Resource Sharing for Embedded Protected Module Architectures. 71-87 - Hoi Le Thi, Reihaneh Safavi-Naini, Asadullah Al Galib:

Secure Obfuscation of Authoring Style. 88-103 - Miguel Morales-Sandoval

, Arturo Diaz-Perez:
DET-ABE: A Java API for Data Confidentiality and Fine-Grained Access Control from Attribute Based Encryption. 104-119 - Konstantinos Fysarakis, Charalampos Konstantourakis, Konstantinos Rantos, Charalampos Manifavas, Ioannis Papaefstathiou:

WSACd - A Usable Access Control Framework for Smart Home Devices. 120-133
Secure Devices and Execution Environment
- Masoud Narouei, Hassan Takabi:

Automatic Top-Down Role Engineering Framework Using Natural Language Processing Techniques. 137-152 - Ghada Arfaoui

, Saïd Gharout, Jean-François Lalande
, Jacques Traoré:
Practical and Privacy-Preserving TEE Migration. 153-168 - Duc-Phong Le

, Chik How Tan, Michael Tunstall
:
Randomizing the Montgomery Powering Ladder. 169-184
Challenges of Security and Reliability
- Siegfried Rasthofer, Irfan Asrar, Stephan Huber, Eric Bodden

:
How Current Android Malware Seeks to Evade Automated Code Analysis. 187-202 - Jaap-Henk Hoepman, Wouter Lueks, Sietse Ringers:

On Linkability and Malleability in Self-blindable Credentials. 203-218 - Qiao Hu, Lavinia Mihaela Dinca, Gerhard P. Hancke

:
Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality. 219-234
Short Papers
- David Jaeger, Amir Azodi, Feng Cheng, Christoph Meinel:

Normalizing Security Events with a Hierarchical Knowledge Base. 237-248 - Marieta Georgieva Ivanova, Christian W. Probst

, René Rydhof Hansen
, Florian Kammüller:
Attack Tree Generation by Policy Invalidation. 249-259 - George Hatzivasilis

, Ioannis Papaefstathiou
, Charalampos Manifavas, Ioannis G. Askoxylakis:
Lightweight Password Hashing Scheme for Embedded Systems. 260-270 - Konstantinos Rantos, Konstantinos Fysarakis, Othonas Sultatos, Ioannis G. Askoxylakis:

Secure and Authenticated Access to LLN Resources Through Policy Constraints. 271-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














