


default search action
22nd NordSec 2017: Tartu, Estonia
- Helger Lipmaa, Aikaterini Mitrokotsa
, Raimundas Matulevicius:
Secure IT Systems - 22nd Nordic Conference, NordSec 2017, Tartu, Estonia, November 8-10, 2017, Proceedings. Lecture Notes in Computer Science 10674, Springer 2017, ISBN 978-3-319-70289-6
Outsourcing Computations
- Ahto Buldas
, Risto Laanoja, Ahto Truu:
A Server-Assisted Hash-Based Signature Scheme. 3-17 - Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing of Verifiable Attribute-Based Keyword Search. 18-35
Privacy Preservation
- Farzaneh Abed, Francesco Berti
, Stefan Lucks:
Is RCB a Leakage Resilient Authenticated Encryption Scheme? 39-52 - Ryuji Miyoshi, Hiroaki Yamamoto, Hiroshi Fujiwara, Takashi Miyazaki:
Practical and Secure Searchable Symmetric Encryption with a Small Index. 53-69 - Christophe Kiennert, Nesrine Kaaniche
, Maryline Laurent
, Pierre-Olivier Rocher, Joaquín García-Alfaro
:
Anonymous Certification for an e-Assessment Framework. 70-85 - Christian Roth, Lukas Hartmann, Dogan Kesdogan:
PARTS - Privacy-Aware Routing with Transportation Subgraphs. 86-101
Security and Privacy in Machine Learning
- Sabarathinam Chockalingam
, Wolter Pieters, André Teixeira
, Pieter H. A. J. M. van Gelder
:
Bayesian Network Models in Cyber Security: A Systematic Review. 105-122 - Kaie Maennel
, Rain Ottis
, Olaf Maennel
:
Improving and Measuring Learning Effectiveness at Cyber Defense Exercises. 123-138 - Peeter Laud, Alisa Pankova:
Privacy-Preserving Frequent Itemset Mining for Sparse and Dense Data. 139-155
Applications
- Rosario Giustolisi:
Free Rides in Denmark: Lessons from Improperly Generated Mobile Transport Tickets. 159-174 - Danielle Morgan
, Arnis Parsovs
:
Using the Estonian Electronic Identity Card for Authentication to a Machine. 175-191 - Aurélien Palisse, Antoine Durand, Hélène Le Bouder, Colas Le Guernic, Jean-Louis Lanet:
Data Aware Defense (DaD): Towards a Generic and Practical Ransomware Countermeasure. 192-208 - Alberto Geniola, Markku Antikainen, Tuomas Aura
:
A Large-Scale Analysis of Download Portals and Freeware Installers. 209-225
Access Control
- Thanh Bui
, Tuomas Aura
:
GPASS: A Password Manager with Group-Based Access Control. 229-244 - Richard Gay, Jinwei Hu, Heiko Mantel, Johannes Schickel:
Towards Accelerated Usage Control Based on Access Correlations. 245-261
Emerging Security Areas
- Rémi Géraud
, Mirko Koscina, Paul Lenczner, David Naccache, David Saulpic:
Generating Functionally Equivalent Programs Having Non-isomorphic Control-Flow Graphs. 265-279 - Núria Costa, Ramiro Martínez
, Paz Morillo:
Proof of a Shuffle for Lattice-Based Cryptography. 280-296 - Thibault de Balthasar, Julio C. Hernandez-Castro:
An Analysis of Bitcoin Laundry Services. 297-312

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.