default search action
SEC 2015: Hamburg, Germany
- Hannes Federrath, Dieter Gollmann:
ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings. IFIP Advances in Information and Communication Technology 455, Springer 2015, ISBN 978-3-319-18466-1
Privacy
- Aydin Abadi, Sotirios Terzis, Changyu Dong:
O-PSI: Delegated Private Set Intersection on Outsourced Datasets. 3-17 - Josep Domingo-Ferrer, Qianhong Wu, Alberto Blanco-Justicia:
Flexible and Robust Privacy-Preserving Implicit Authentication. 18-34 - Dang Vinh Pham, Dogan Kesdogan:
Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack. 35-50 - Esra Erdin, Eric Klukovich, Gurhan Gunduz, Mehmet Hadi Gunes:
POSN: A Personal Online Social Network. 51-66 - Wojciech Jamroga, Masoud Tabatabaei:
Strategic Noninterference. 67-81 - Jaber Karimpour, Ayaz Isazadeh, Ali A. Noroozi:
Verifying Observational Determinism. 82-93
Web Security
- Chetan Bansal, Sören Preibusch, Natasa Milic-Frayling:
Cache Timing Attacks Revisited: Efficient and Repeatable Browser History, OS and Network Sniffing. 97-111 - Jinwei Hu, Heiko Mantel, Sebastian Ruhleder:
Enforcing Usage Constraints on Credentials for Web Applications. 112-125 - Amrit Kumar, Cédric Lauradoux:
A Survey of Alerting Websites: Risks and Solutions. 126-141
Access Control, Trust and Identity Management
- Asahiko Yamada:
A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant. 145-158 - Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford:
Enhancing Passwords Security Using Deceptive Covert Communication. 159-173 - Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri:
Information Sharing and User Privacy in the Third-Party Identity Management Landscape. 174-188 - Mohsen Rezvani, Mohammad Allahbakhsh, Lorenzo Vigentini, Aleksandar Ignjatovic, Sanjay K. Jha:
An Iterative Algorithm for Reputation Aggregation in Multi-dimensional and Multinomial Rating Systems. 189-203 - Timothy J. Carbino, Michael A. Temple, Juan Lopez Jr.:
A Comparison of PHY-Based Fingerprinting Methods Used to Enhance Network Access Control. 204-217 - Salvador Martínez Perez, Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot:
Model-Driven Integration and Analysis of Access-control Policies in Multi-layer Information Systems. 218-233
Network Security
- Simão Reis, André Zúquete, Carlos Faneca, José M. N. Vieira:
Authenticated File Broadcast Protocol. 237-251 - Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro, Dingqi Yang:
Automated Classification of C&C Connections Through Malware URL Clustering. 252-266 - Christoph Pohl, Alf Zugenmaier, Michael Meier, Hans-Joachim Hof:
B.Hive: A Zero Configuration Forms Honeypot for Productive Web Applications. 267-280
Security Management and Human Aspects of Security
- Lena Yuryna Connolly, Michael Lang, J. Doug Tygar:
Investigation of Employee Security Behaviour: A Grounded Theory Approach. 283-296 - Fredrik Karlsson, Göran Goldkuhl, Karin Hedström:
Practice-Based Discourse Analysis of InfoSec Policies. 297-310 - Maria B. Line, Nils Brede Moe:
Understanding Collaborative Challenges in IT Security Preparedness Exercises. 311-324 - Teodor Sommestad:
Social Groupings and Information Security Obedience Within Organizations. 325-338 - Ravi Jhawar, Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, Rolando Trujillo-Rasua:
Attack Trees with Sequential Conjunction. 339-353 - David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Enhancing the Security of Image CAPTCHAs Through Noise Addition. 354-368
Software Security
- Enrico Lovat, Alexander Fromm, Martin Mohr, Alexander Pretschner:
SHRIFT System-Wide HybRid Information Flow Tracking. 371-385 - Liang Deng, Qingkai Zeng, Yao Liu:
ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries. 386-400 - Quoc Huy Do, Richard Bubel, Reiner Hähnle:
Exploit Generation for Information Flow Leaks in Object-Oriented Programs. 401-415 - Jiang Ming, Dongpeng Xu, Dinghao Wu:
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference. 416-430 - Zhijiao Zhang, Ya-Shuai Lü, Yu Chen, Yongqiang Lu, Yuanchun Shi:
Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach. 431-445 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Integrity for Approximate Joins on Untrusted Computational Servers. 446-459
Applied Cryptography
- Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. 463-478 - Toan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong, Isao Echizen:
Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment. 479-494 - Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
A Secure Exam Protocol Without Trusted Parties. 495-509
Mobile and Cloud Services Security
- Li Li, Alexandre Bartel, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
ApkCombiner: Combining Multiple Android Apps to Support Inter-App Analysis. 513-527 - Francisco Vigário, Miguel Neto, Diogo Fonseca, Mário M. Freire, Pedro R. M. Inácio:
Assessment of the Susceptibility to Data Manipulation of Android Games with In-app Purchases. 528-541 - Xiangyu Liu, Zhe Zhou, Wenrui Diao, Zhou Li, Kehuan Zhang:
An Empirical Study on Android for Saving Non-shared Data on Public Storage. 542-556 - Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah:
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation. 557-570 - Konstantin Knorr, David Aspinall, Maria Wolters:
On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps. 571-584 - Alevtina Dubovitskaya, Visara Urovi, Matteo Vasirani, Karl Aberer, Michael Ignaz Schumacher:
A Cloud-Based eHealth Architecture for Privacy Preserving Data Integration. 585-598
Cyber-physical Systems and Critical Infrastructures Security
- Konstantinos Maraslis, Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mo Haghighi:
Application of a Game Theoretic Approach in Smart Sensor Data Trustworthiness Problems. 601-615 - Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier:
Securing BACnet's Pitfalls. 616-629 - Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph:
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. 630-644
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.