


default search action
10th WISTP 2016: Heraklion, Greece
- Sara Foresti, Javier López:

Information Security Theory and Practice - 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Lecture Notes in Computer Science 9895, Springer 2016, ISBN 978-3-319-45930-1
Authentication and Key Management
- Frank Morgner, Paul Bastian, Marc Fischlin:

Securing Transactions with the eIDAS Protocols. 3-18 - Kim Thuat Nguyen, Nouha Oualha

, Maryline Laurent
:
Novel Lightweight Signcryption-Based Key Distribution Mechanisms for MIKEY. 19-34 - Vlasta Stavova, Vashek Matyas, Mike Just

:
Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. 35-50
Secure Hardware Systems
- Jan Tobias Mühlberg

, Sara Cleemput, Mustafa A. Mustafa
, Jo Van Bulck
, Bart Preneel
, Frank Piessens:
An Implementation of a High Assurance Smart Meter Using Protected Module Architectures. 53-69 - Vassilios G. Vassilakis

, Emmanouil Panaousis
, Haralambos Mouratidis:
Security Challenges of Small Cell as a Service in Virtualized Mobile Edge Computing Environments. 70-84 - Kyriakos Stefanidis

, Artemios G. Voyiatzis:
An HMM-Based Anomaly Detection Approach for SCADA Systems. 85-99
Attacks to Software and Network Systems
- Ishai Rosenberg, Ehud Gudes:

Attacking and Defending Dynamic Analysis System-Calls Based IDS. 103-119 - Leonardo Regano

, Daniele Canavese
, Cataldo Basile
, Alessio Viticchié, Antonio Lioy
:
Towards Automatic Risk Analysis and Mitigation of Software Applications. 120-135 - Damien Couroussé

, Thierno Barry, Bruno Robisson
, Philippe Jaillon, Olivier Potin, Jean-Louis Lanet:
Runtime Code Polymorphism as a Protection Against Side Channel Attacks. 136-152 - Guillaume Barbu, Alberto Battistello

:
Analysis of a Code-Based Countermeasure Against Side-Channel and Fault Attacks. 153-168
Access Control and Data Protection
- Leila Bahri

, Barbara Carminati
, Elena Ferrari
, William Lucia:
LAMP - Label-Based Access-Control for More Privacy in Online Social Networks. 171-186 - Ling Chen, Ting Yu, Rada Chirkova:

Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data. 187-203 - Peter Samarin, Alexander Skripnik, Kerstin Lemke-Rust:

Fault-Channel Watermarks. 204-219
Short Papers
- Ahmad Sabouri:

The Effect of Semantic Elaboration on the Perceived Security and Privacy Risk of Privacy-ABCs - An Empirical Experiment. 223-235 - Hervé Chabanne

, Julien Keuffer, Roch Lescuyer:
Delegating Biometric Authentication with the Sumcheck Protocol. 236-244 - Fatma Al Maqbali, Chris J. Mitchell

:
Password Generators: Old Ideas and New. 245-253 - Panagiotis Papadopoulos

, Elias Athanasopoulos, Eleni Kosta, George Siganos, Angelos D. Keromytis, Evangelos P. Markatos:
Provable Network Activity for Protecting Users Against False Accusation. 254-261 - Madeline Cheah

, Siraj A. Shaikh
, Jeremy W. Bryans
, Hoang Nga Nguyen:
Combining Third Party Components Securely in Automotive Systems. 262-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














