


default search action
5th ICISSP 2019: Prague, Czech Republic - Revised Selected Papers
- Paolo Mori
, Steven Furnell, Olivier Camp:
Information Systems Security and Privacy - 5th International Conference, ICISSP 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers. Communications in Computer and Information Science 1221, Springer 2020, ISBN 978-3-030-49442-1 - Clemens Brunner
, Fabian Knirsch, Dominik Engel:
SPROOF: A Decentralized Platform for Attribute-Based Authentication. 1-23 - Roberto Di Pietro, Maurantonio Caprolu
, Simone Raponi:
Next Generation Information Warfare: Rationales, Scenarios, Threats, and Open Issues. 24-47 - Christine Große
, Maja Nyman, Leif Sundberg
:
Information Technology Consulting Firms' Readiness for Managing Information Security Incidents. 48-73 - Kazuhide Fukushima
, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device. 74-92 - Mary K. Bispham, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith:
Black-Box Attacks via the Speech Interface Using Linguistically Crafted Input. 93-120 - Takuya Ezure, Masaki Inamura:
Proposal and Performance Evaluation of an Order-Specified Aggregate Authority-Transfer Signature. 121-136 - Florian Patzer
, Philipp Lüdtke, Ankush Meshram
, Jürgen Beyerer
:
Context-Aware Software-Defined Networking for Automated Incident Response in Industrial Networks. 137-161 - Dayana Spagnuelo
, Ana Ferreira, Gabriele Lenzini:
Transparency Enhancing Tools and the GDPR: Do They Match? 162-185 - Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
User Study of the Effectiveness of a Privacy Policy Summarization Tool. 186-206 - Said Daoudagh
, Francesca Lonetti
, Eda Marchetti
:
A General Framework for Decentralized Combinatorial Testing of Access Control Engine: Examples of Application. 207-229 - Khondker Jahid Reza, Md Zahidul Islam
, Vladimir Estivill-Castro:
Protection of User-Defined Sensitive Attributes on Online Social Networks Against Attribute Inference Attack via Adversarial Data Mining. 230-249 - José Torres, Sergio de los Santos, Efthimios Alepis, Constantinos Patsakis
:
User Behavioral Biometrics and Machine Learning Towards Improving User Authentication in Smartphones. 250-271 - Wenjun Xiong
, Fredrik Krantz, Robert Lagerström:
Threat Modeling and Attack Simulations of Connected Vehicles: Proof of Concept. 272-287 - Mary K. Bispham, Ioannis Agrafiotis, Michael Goldsmith:
The Security of the Speech Interface: A Modelling Framework and Proposals for New Defence Mechanisms. 288-316 - Nezer Jacob Zaidenberg
, Michael Kiperberg, Raz Ben Yehuda, Roee Leon, Asaf Algawi, Amit Resh:
Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot. 317-334 - Christophe Ponsard
, Jeremy Grandclaudon:
Guidelines and Tool Support for Building a Cybersecurity Awareness Program for SMEs. 335-357 - Chiara Bodei
, Letterio Galletta
:
Analysing the Provenance of IoT Data. 358-381 - Luigi Catuogno, Clemente Galdi:
Improving Interoperability in Multi-domain Enterprise Right Management Applications. 382-402 - Maryam Almarwani, Boris Konev
, Alexei Lisitsa:
Fine-Grained Access Control for Querying Over Encrypted Document-Oriented Database. 403-425

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.