


default search action
15th Communications and Multimedia Security 2014: Aveiro, Portugal
- Bart De Decker, André Zúquete
:
Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014. Proceedings. Lecture Notes in Computer Science 8735, Springer 2014, ISBN 978-3-662-44884-7
Research Papers
- Abdulrahman Al-Mutairi, Stephen D. Wolthusen:
Malicious MPLS Policy Engine Reconnaissance. 3-18 - André Pereira, Manuel Eduardo Correia
, Pedro Brandão
:
USB Connection Vulnerabilities on Android Smartphones: Default and Vendors' Customizations. 19-32 - Paulo Pinto, Bernardo Patrão, Henrique Santos
:
Free Typed Text Using Keystroke Dynamics for Continuous Authentication. 33-45 - Faysal Boukayoua, Jorn Lapon
, Bart De Decker, Vincent Naessens:
Secure Storage on Android with Context-Aware Access Control. 46-59
Work in Progress
- Ping Chen, Lieven Desmet
, Christophe Huygens
:
A Study on Advanced Persistent Threats. 63-72 - Suaad S. Alarifi
, Stephen D. Wolthusen:
Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems. 73-85 - Alexander Chan, Tzipora Halevi, Nasir D. Memon
:
Touchpad Input for Continuous Biometric Authentication. 86-91 - Bernd Zwattendorfer, Daniel Slamanig
, Klaus Stranacher, Felix Hörandner
:
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption. 92-103 - Dalia Khader:
D-Shuffle for Prêt à Voter. 104-117 - Dmitry Chernyavskiy, Natalia G. Miloslavskaya
:
An Approach to Information Security Policy Modeling for Enterprise Networks. 118-127
Extended Abstracts
- Dalia Khader:
Introduction to Attribute Based Searchable Encryption. 131-135 - Andrea Kolberger, Ingrid Schaumüller-Bichl, Martin Deutschmann:
Risk Analysis of Physically Unclonable Functions. 136-139 - Rodolphe Marques, André Zúquete
:
Decentralized Bootstrap for Social Overlay Networks. 140-143
Keynotes
- Paulo Mateus
, Nikola Paunkovic
, João Rodrigues
, André Souto
:
Enhancing Privacy with Quantum Networks. 147-153 - Rui Melo Biscaia:
The Fundamental Principle of Breach Prevention. 154-156

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.