


default search action
NordSec 2015: Stockholm, Sweden
- Sonja Buchegger, Mads Dam:
Secure IT Systems, 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings. Lecture Notes in Computer Science 9417, Springer 2015, ISBN 978-3-319-26501-8 - Hayretdin Bahsi
, Olaf Manuel Maennel
:
A Conceptual Nationwide Cyber Situational Awareness Framework for Critical Infrastructures. 3-10 - Hannes Holm, Martin Karresand
, Arne Vidström, Erik Westring:
A Survey of Industrial Control System Testbeds. 11-26 - Martin Leth Pedersen, Michael Hedegaard Sørensen, Daniel Lux, Ulrik Nyman
, René Rydhof Hansen
:
The Timed Decentralised Label Model. 27-43 - Hongyu Jin
, Panos Papadimitratos:
Resilient Collaborative Privacy for Location-Based Services. 47-63 - Benjamin Greschbach, Guillermo Rodríguez-Cano
, Tomas Ericsson, Sonja Buchegger:
Design of a Privacy-Preserving Document Submission and Grading System. 64-71 - Daniel Bosk, Martin Kjellqvist, Sonja Buchegger:
Towards Perfectly Secure and Deniable Communication Using an NFC-Based Key-Exchange Scheme. 72-87 - Billy Bob Brumley
:
Faster Binary Curve Software: A Case Study. 91-105 - Markku-Juhani O. Saarinen
, Billy Bob Brumley
:
WHIRLBOB, the Whirlpool Based Variant of STRIBOB. 106-122 - Huihui Yang
, Vladimir A. Oleshchuk:
An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees. 123-135 - Ijlal Loutfi, Audun Jøsang
:
FIDO Trust Requirements. 139-155 - Edgar Alonso Lopez-Rojas
, Stefan Axelsson:
Using the RetSim Fraud Simulation Tool to Set Thresholds for Triage of Retail Fraud. 156-171 - Dan Gorton:
IncidentResponseSim: An Agent-Based Simulation Tool for Risk Management of Online Fraud. 172-187 - Artem Voronkov
, Stefan Lindskog, Leonardo A. Martucci:
Challenges in Managing Firewalls. 191-196 - Bernd Jäger, Christian Röpke, Iris Adam, Thorsten Holz
:
Multi-layer Access Control for SDN-Based Telco Clouds. 197-204 - Luigi Catuogno, Clemente Galdi
, Giuseppe Persiano:
Guaranteeing Dependency Enforcement in Software Updates. 205-212 - Sanna Suoranta, Lari Haataja, Tuomas Aura:
Electronic Citizen Identities and Strong Authentication. 213-230

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.