default search action
11th WISTP 2017: Heraklion, Greece
- Gerhard P. Hancke, Ernesto Damiani:
Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28-29, 2017, Proceedings. Lecture Notes in Computer Science 10741, Springer 2018, ISBN 978-3-319-93523-2
Security in Emerging Systems
- Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Pierre-François Bonnefoi, Amina Cherif, Damien Sauveron, Serge Chaumette:
A Secure and Trusted Channel Protocol for UAVs Fleets. 3-24 - Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes:
Philanthropy on the Blockchain. 25-38
Security of Data
- Shujie Cui, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello:
Long White Cloud (LWC): A Practical and Privacy-Preserving Outsourced Database. 41-55 - Hao Jiang, Ahmed Bouabdallah:
JACPoL: A Simple but Expressive JSON-Based Access Control Policy Language. 56-72
Trusted Execution
- Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis:
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs. 75-92 - Sébanjila Kevin Bukasa, Ronan Lashermes, Hélène Le Bouder, Jean-Louis Lanet, Axel Legay:
How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip. 93-109
Defences and Evaluation
- Madeline Cheah, Hoang Nga Nguyen, Jeremy W. Bryans, Siraj A. Shaikh:
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications. 113-129 - Ziya Alper Genç, Süleyman Kardas, Mehmet Sabir Kiraz:
Examination of a New Defense Mechanism: Honeywords. 130-139 - Yonas Leguesse, Mark Vella, Joshua Ellul:
AndroNeo: Hardening Android Malware Sandboxes by Predicting Evasion Heuristics. 140-152
Protocols and Algorithms
- Öznur Kalkar, Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol:
A More Efficient 1-Checkable Secure Outsourcing Algorithm for Bilinear Maps. 155-164 - Pau Conejero-Alberola, M. Francisca Hinarejos, Josep Lluís Ferrer-Gomila:
A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons. 165-176 - Nektaria Kaloudi, Aikaterini Mitrokotsa:
Revisiting Two-Hop Distance-Bounding Protocols: Are You Really Close Enough? 177-188
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.