default search action
23rd NordSec 2018: Oslo, Norway
- Nils Gruschka:
Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, November 28-30, 2018, Proceedings. Lecture Notes in Computer Science 11252, Springer 2018, ISBN 978-3-030-03637-9
Privacy
- Avikarsha Mandal, Frederik Armknecht, Erik Zenner:
Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid. 3-18 - Iulia Bastys, Frank Piessens, Andrei Sabelfeld:
Tracking Information Flow via Delayed Output - Addressing Privacy in IoT and Emailing Apps. 19-37 - Mirja Nitschke, Philipp Holler, Lukas Hartmann, Dogan Kesdogan:
MixMesh Zones - Changing Pseudonyms Using Device-to-Device Communication in Mix Zones. 38-53 - Hongliang Liang, Yudong Wang, Tianqi Yang, Yue Yu:
AppLance: A Lightweight Approach to Detect Privacy Leak for Packed Applications. 54-70
Cryptography
- George Teseleanu:
Unifying Kleptographic Attacks. 73-87 - Tobias Pulls, Rasmus Dahlberg:
Steady - A Simple End-to-End Secure Logging System. 88-103 - Arash Atashpendar, Guru-Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan:
Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation. 104-120 - Zheng Yang, Mohsin Khan, Wanping Liu, Jun He:
On Security Analysis of Generic Dynamic Authenticated Group Key Exchange. 121-137 - Ahto Buldas, Risto Laanoja, Ahto Truu:
A Blockchain-Assisted Hash-Based Signature Scheme. 138-153 - Matilda Backendal, Mihir Bellare, Jessica Sorrell, Jiahao Sun:
The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants. 154-170 - Rasmus Dahlberg, Tobias Pulls:
Verifiable Light-Weight Monitoring for Certificate Transparency Logs. 171-183
Network and Cloud Security
- Charalampos Stylianopoulos, Linus Johansson, Oskar Olsson, Magnus Almgren:
CLort: High Throughput and Low Energy Network Intrusion Detection on IoT Devices with Embedded GPUs. 187-202 - Sebastian Zillien, Steffen Wendzel:
Detection of Covert Channels in TCP Retransmissions. 203-218 - Vivien M. Rooney, Simon N. Foley:
What You Can Change and What You Can't: Human Experience in Computer Network Defenses. 219-235 - Alexander Bajic, Georg T. Becker:
Attack Simulation for a Realistic Evaluation and Comparison of Network Security Techniques. 236-254 - Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser:
Sarracenia: Enhancing the Performance and Stealthiness of SSH Honeypots Using Virtual Machine Introspection. 255-271 - Ehtesham Zahoor, Asim Ikram, Sabina Akhtar, Olivier Perrin:
Authorization Policies Specification and Consistency Management within Multi-cloud Environments. 272-288
Cyber Security and Malware
- Kaie Maennel, Sten Mäses, Olaf Maennel:
Cyber Hygiene: The Big Picture. 291-305 - Ahmed Seid Yesuf, Christian W. Probst:
Estimating the Risk of Fraud Against E-Services. 306-322 - Juha Nurmi, Mikko S. Niemelä:
PESTEL Analysis of Hacktivism Campaign Motivations. 323-335 - Alexander Reinthal, Eleftherios Lef Filippakis, Magnus Almgren:
Data Modelling for Predicting Exploits. 336-351 - Kursat Aktas, Sevil Sen:
UpDroid: Updated Android Malware and Its Familial Classification. 352-368 - Barbara Krumay, Edward W. N. Bernroider, Roman Walser:
Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework. 369-384 - Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
Next Generation Cryptographic Ransomware. 385-401
Security for Software and Software Development
- Ronan Lashermes, Hélène Le Bouder, Gaël Thomas:
Hardware-Assisted Program Execution Integrity: HAPEI. 405-420 - Roberto Guanciale:
Protecting Instruction Set Randomization from Code Reuse Attacks. 421-436 - Tobias Hamann, Mihai Herda, Heiko Mantel, Martin Mohr, David Schneider, Markus Tasch:
A Uniform Information-Flow Security Benchmark Suite for Source Code and Bytecode. 437-453 - Kuyju Kim, Taeyun Kim, Seungjin Lee, Soolin Kim, Hyoungshick Kim:
When Harry Met Tinder: Security Analysis of Dating Apps on Android. 454-467 - Hanne Rygge, Audun Jøsang:
Threat Poker: Solving Security and Privacy Threats in Agile Software Development. 468-483
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.