default search action
5. FPS 2012: Montreal, QC, Canada
- Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Ali Miri, Nadia Tawbi:
Foundations and Practice of Security - 5th International Symposium, FPS 2012, Montreal, QC, Canada, October 25-26, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7743, Springer 2013, ISBN 978-3-642-37118-9
Cryptography and Information Theory
- Jie Li, Jianliang Zheng:
MaD2: An Ultra-Performance Stream Cipher for Pervasive Data Encryption. 1-17 - Sumanta Sarkar, Reihaneh Safavi-Naini:
Proofs of Retrievability via Fountain Code. 18-32 - Jianliang Zheng, Jie Li:
MARC: Modified ARC4. 33-44 - Pawel Chwalinski, Roman V. Belavkin, Xiaochun Cheng:
Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements. 45-61
Key Management and Cryptographic Protocols
- Khair Eddin Sabri, Ridha Khédri:
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. 62-77 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Message Transmission and Key Establishment: Conditions for Equality of Weak and Strong Capacities. 78-94 - Nick Mailloux, Ali Miri, Monica Nevins:
COMPASS: Authenticated Group Key Agreement from Signcryption. 95-114
Privacy and Trust
- Cristina Pérez-Solà, Jordi Herrera-Joancomartí:
Classifying Online Social Network Users through the Social Graph. 115-131 - Tim Muller, Patrick Schweitzer:
A Formal Derivation of Composite Trust. 132-148 - Ahmad AlSa'deh, Hosnieh Rafiee, Christoph Meinel:
IPv6 Stateless Address Autoconfiguration: Balancing between Security, Privacy and Usability. 149-161
Policies and Applications Security
- Sandro Etalle, Timothy L. Hinrichs, Adam J. Lee, Daniel Trivellato, Nicola Zannone:
Policy Administration in Tag-Based Authorization. 162-179 - Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens:
Enabling Dynamic Security Policy in the Java Security Manager. 180-193 - Christophe Foket, Bjorn De Sutter, Bart Coppens, Koen De Bosschere:
A Novel Obfuscation: Class Hierarchy Flattening. 194-210 - Ashkan Rahimian, Philippe Charland, Stere Preda, Mourad Debbabi:
RESource: A Framework for Online Matching of Assembly with Open Source Code. 211-226 - Tongbo Luo, Xing Jin, Ajai Ananthanarayanan, Wenliang Du:
Touchjacking Attacks on Web in Android, iOS, and Windows Phone. 227-243
Network and Adaptive Security
- Lukas Malina, Jordi Castellà-Roca, Arnau Vives-Guasch, Jan Hajny:
Short-Term Linkable Group Signatures with Categorized Batch Verification. 244-260 - Stijn Volckaert, Bjorn De Sutter, Tim De Baets, Koen De Bosschere:
GHUMVEE: Efficient, Effective, and Flexible Replication. 261-277 - Sherif Saad, Issa Traoré:
Extracting Attack Scenarios Using Intrusion Semantics. 278-292 - Houari Mahfoud, Abdessamad Imine:
On Securely Manipulating XML Data. 293-307 - Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré:
Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. 308-323 - Tahsin Arafat Reza, Michel Barbeau:
QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. 324-340 - Colin O'Flynn, Zhizhang Chen:
A Case Study of Side-Channel Analysis Using Decoupling Capacitor Power Measurement with the OpenADC. 341-356
Short Papers
- Leanid Krautsevich, Fabio Martinelli, Artsiom Yautsiukhin:
Towards Modelling Adaptive Attacker's Behaviour. 357-364 - Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona:
Scalable Deniable Group Key Establishment. 365-373 - Darakhshan J. Mir:
Information-Theoretic Foundations of Differential Privacy. 374-381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.